Embodiments of the subject matter described herein relate generally to radio frequency identification (RFID). More particularly, embodiments of the subject matter relate to an RFID reader device that can be operated in a read-only mode to receive RFID tag response signals generated in response to interrogation by a different interrogator device.
RFID systems and their basic operating principles are well known. RFID systems employ fixed (stationary) RFID readers and/or portable RFID readers, both of which can be used to interrogate RFID tags associated with products, containers, or any items of interest. A traditional RFID reader interrogates RFID tags, which respond by providing tag data that can be collected, interpreted, displayed, or otherwise processed by the RFID reader. In this regard, traditional RFID readers perform both interrogation and reading functions.
In practice, an RFID reader has a limited interrogation zone. Tags located within the interrogation zone can be adequately energized by the interrogation signals emitted by the RFID reader, and tags located outside the interrogation zone may not be properly energized and/or may not be able to produce a tag response signal having the minimum required signal strength needed for reading. These characteristics are illustrated in
The interrogation range limitations mentioned above can be undesirable in certain situations. For example, if multiple readers are deployed for purposes of redundancy and/or for determining the location of tags (using, for example, triangulation techniques), then those readers must be densely arranged to ensure that their interrogation zones overlap by at least a minimum amount needed to support the particular application. Unfortunately, an RFID system having a large number of densely arranged readers can be costly to implement, maintain, and operate.
A more complete understanding of the subject matter may be derived by referring to the detailed description and claims when considered in conjunction with the following figures, wherein like reference numbers refer to similar elements throughout the figures.
The following detailed description is merely illustrative in nature and is not intended to limit the embodiments of the subject matter or the application and uses of such embodiments. As used herein, the word “exemplary” means “serving as an example, instance, or illustration.” Any implementation described herein as exemplary is not necessarily to be construed as preferred or advantageous over other implementations. Furthermore, there is no intention to be bound by any expressed or implied theory presented in the preceding technical field, background, brief summary or the following detailed description.
Techniques and technologies may be described herein in terms of functional and/or logical block components, and with reference to symbolic representations of operations, processing tasks, and functions that may be performed by various computing components or devices. It should be appreciated that the various block components shown in the figures may be realized by any number of hardware, software, and/or firmware components configured to perform the specified functions. For example, an embodiment of a system or a component may employ various integrated circuit components, e.g., memory elements, digital signal processing elements, logic elements, look-up tables, or the like, which may carry out a variety of functions under the control of one or more microprocessors or other control devices. Moreover, for the sake of brevity, conventional aspects of RFID system components, RFID tags, data communication, processing of RFID tag data, and other aspects of the systems (and the individual operating components of the systems) may not be described in detail herein.
The subject matter presented here relates to a read-only RFID reader device that is capable of receiving RFID tag response signals being interrogated by a different interrogator device. In other words, the read-only RFID reader device does not generate RFID interrogation or activation signals while it is operating in its read-only mode. In accordance with one embodiment, the RFID reader device exclusively operates in the read-only mode, and it has no native interrogation capabilities. In accordance with another embodiment, the RFID reader device can operate in at least two different modes: (1) a traditional interrogate-and-read mode; and (2) a read-only mode.
An RFID system could include one or more read-only RFID devices cooperating with one or more interrogator devices. In this regard, a dual-mode RFID device operating in its read-and-interrogate mode (rather than its read-only mode) could serve as the interrogator device for one or more RFID reader devices operating in the read-only mode. Read-only RFID devices can be utilized to provide reading redundancy, to extend the reading range of a traditional RFID reader, to determine the location of target RFID tags, and the like. In this regard, one or more read-only RFID devices can concurrently (simultaneously) receive and process a tag response signal generated by an RFID tag that is being interrogated. Concurrent operation in this manner enables the RFID system to gather location-related information in a quick and efficient manner, relative to conventional approaches that rely on sequential interrogation and reading by different interrogator devices.
Referring now to the figures, a schematic representation of an exemplary embodiment of an RFID system 200 is shown in
The RFID system 200 may be deployed in any area or location in which RFID reader coverage is desired. For example, the RFID system 200 may be deployed in a warehouse environment, a storage depot environment, a store front, a supermarket, or the like. A component in the RFID system 200 could be a “fixed” or stationary device, or a mobile and portable device. A fixed component would typically be connected to the network architecture 210 using a network cable or other tangible data communication link. On the other hand, a mobile component (such as a handheld reader) could communicate with the RFID system controller 202 using a wireless data communication link, a tangible interface cable, a network cable, a data communication cradle, or the like.
The RFID system controller 202 is deployed when centralized control and management of the RFID system 200 is desired. It should be appreciated that the RFID system controller 202 could be realized as a standalone hardware device, as a software application running on a computer device, as a processing module or other logical construct integrated with a system component having additional functionality, or the like. Indeed, the RFID system controller 202 could be implemented as a standalone piece of hardware in the RFID system 200, or its functionality could be incorporated into any suitable component or device, such as an RFID switch device, a network server component, or the like. For this particular embodiment, the RFID system controller 202 is coupled to (and communicates with) the interrogator device 204 and the read-only RFID devices 206, 208 via the network architecture 210.
When deployed, the RFID system controller 202 may be utilized to control the operation of the interrogator device 204 and the read-only RFID devices 206, 208 to perform centralized collection and processing of RFID tag response signals, to manage data communication between the components of the RFID system 200, to manage data communication between the RFID system 200 and devices or systems external to the RFID system 200, and/or to perform other functions and operations described herein. For example, the RFID system controller 202 might perform the following functions and operations, without limitation: receive and process service requests; translate service requests into commands; dispatch commands to the interrogator device 204; receive tag data from the interrogator device 204 and/or the read-only RFID devices 206, 208; determine the location of an interrogated tag (the geographical location and/or a relative location); and/or determine the distance between an interrogated tag and one or more of the interrogator device 204, the read-only RFID device 206, and the read-only RFID device 208. Of course, the RFID system controller 202 could be suitably configured to perform other functions as needed for the particular system application.
The RFID system controller 202 may be suitably configured and designed to support wireless and/or wired data communication with the interrogator device 204 and the read-only RFID devices 206, 208. In this regard, some or all of the components within the RFID system 200 may support one or more of the following wireless data communication techniques, protocols, and methodologies, without limitation: IrDA (infrared); BLUETOOTH; ZIGBEE (and other variants of the IEEE 802.15 protocol); IEEE 802.11 (any variation); IEEE 802.16 (WiMAX or any other variation); cellular/wireless/cordless telecommunication protocols; satellite data communication protocols; wireless hospital or health care facility network protocols such as those operating in the WMTS bands; and proprietary wireless data communication protocols. Moreover, some of all of the components within the RFID system 200 may support one or more of the following traditional (non-wireless) data communication techniques, protocols, and methodologies, without limitation: Ethernet; home network communication protocols; USB; IEEE 1394 (Firewire); hospital network communication protocols; and proprietary data communication protocols.
The interrogator device 204 is preferably implemented as a traditional RFID reader that generates RFID interrogation signals and receives RFID tag response signals from RFID tags that are located within its interrogation range (such as the RFID tags 212). In this regard, the interrogator device 204 may leverage well known and conventional RFID techniques and technologies related to the generation of RFID interrogation signals and to the receipt, interpretation, and processing of RFID tag response signals. As is well understood, the interrogator device 204 utilizes the traditional RFID over-the-air interface to interrogate tags and to receive tag response signals. Although the interrogator device 204 is preferably realized as a traditional RFID reader, certain embodiments of the RFID system 200 could instead implement an interrogate-only device that lacks the ability to read tag response signals. Such an embodiment could rely on traditional RFID readers and/or the read-only RFID devices 206, 208, which function to read the tag response signals on behalf of the interrogate-only device. Moreover, the interrogator device 204 could be suitably configured to support a read-only mode (as presented here) at certain times, e.g., during periods when it is not actively interrogating tags.
As described in more detail below, a read-only RFID device in the RFID system 200 could be realized as a multimode device or as a strictly read-only device. A multimode device supports at least two different operating modes: (1) an interrogate-and-read mode; and (2) a read-only mode. A multimode device could also support an interrogate-only mode; accordingly, the interrogator device 204 could also function as a read-only RFID device in certain embodiments. In contrast, a strictly read-only device functions only as a tag response receiver. In this regard, a strictly read-only device lacks the ability to interrogate RFID tags, or its interrogation ability has been disabled or deactivated. It should be understood that the term “read-only RFID device” applies to either type of device, particularly when the device is operating in its read-only mode.
For the embodiment depicted in
The network architecture 210 can be realized using any number of physical, virtual, or logical components, including hardware, software, firmware, and/or processing logic configured to support data communication between an originating component and a destination component, where data communication is carried out in accordance with one or more designated communication protocols over one or more designated communication media. For example, the network architecture 210 may include or cooperate with, without limitation: a computer network such as a local area network (LAN) or a wide area network (WAN); a cellular telecommunication network; an 802.11 network (WLAN); an 802.16 network (WiMAX); the Internet; a hospital data communication network (WMTS or other); a control network; the public switched telephone network; a satellite communication network; or the like. In practice, network communications involving a component or an element of the RFID system 200 may be routed using two or more different types of data communication networks using known or proprietary network interfacing techniques.
One benefit of using the read-only RFID devices 206, 208 in the RFID system 200 relates to their extended reading range, relative to the typical interrogation range of an interrogator device. In this regard, the interrogation range of a typical RFID reader is less than its reading range. This forward link limitation is due to the minimum interrogation signal strength needed to energize tags, compared to the minimum signal strength needed to read tag response signals. This concept is illustrated in
Assume, for example, that the read-only RFID device 304 is a multimode device that includes interrogation capabilities. The interrogation zone 312 of the read-only RFID device 304 is depicted in dashed lines. As shown in
In practice, a plurality of read-only RFID devices can be used to concurrently obtain tag response signals, thus allowing for diversity in capturing responses for tags that might be marginal to the interrogator device. Moreover, if multiple read-only RFID devices are used to simultaneously read a tag response signal generated by a target RFID tag, the RFID system 200 can effectively and efficiently locate the target tag by way of phase, signal strength, beamforming, and other locationing techniques.
Turning now to
The processor 402 may be implemented or performed with a general purpose processor, a content addressable memory, a digital signal processor, an application specific integrated circuit, a field programmable gate array, any suitable programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination designed to perform the mobile device functions described here. The processor 402 may be realized as a microprocessor, a controller, a microcontroller, or a state machine. Moreover, the processor 402 may be implemented as a combination of computing devices, e.g., a combination of a digital signal processor and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a digital signal processor core, or any other such configuration.
The memory 404 may be realized as RAM memory, flash memory, EPROM memory, EEPROM memory, registers, a hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. In this regard, the memory 404 can be coupled to the processor 402 such that the processor 402 can read information from, and write information to, the memory 404. In the alternative, the memory 404 may be integral to the processor 402. As an example, the processor 402 and the memory 404 may reside in an ASIC.
The user interface 406 may include or be realized as one or more buttons, input/output elements, display elements, switches, or other features that enable the user to interact with the RFID reader 400. It should be appreciated that the user interface 406 is optional and that certain embodiments of the RFID reader 400 may include no user interface elements. When deployed, however, the user interface 406 can be manipulated as needed to control the operation of the RFID reader 400, to configure or initialize the RFID reader 400, to view or process RFID tag data, and/or to otherwise interact with components, applications, or data associated with the RFID reader 400.
The power supply 408 may be a disposable or rechargeable battery, a set of batteries, or a battery pack that is rated to provide the necessary voltage and energy to support the operation of the RFID reader 400. Alternatively or additionally, the power supply 408 may include or cooperate with a transformer, voltage regulator, and/or other component to receive power from an external source such as an ordinary AC outlet. The power supply 408 may be regulated in an appropriate manner to facilitate operation of the RFID reader 400 in the traditional interrogate-and-read mode or the read-only mode, as so desired. Moreover, the power supply 408 can be regulated to support a low power sleep mode, which is described in more detail below.
The RFID radio module 410 is suitably configured to support RFID interrogation (assuming that the RFID reader 400 is a multimode device) and RFID tag reading functions. In particular, the RFID radio module 410 are configured to support both operating modes (interrogate-and-read and read-only) as needed during operation of the RFID reader 400. Although not separately shown in
The network interface 412 represents hardware, software, firmware, processing logic, and the like, that allows the RFID reader 400 to support data communication using one or more data communication networks (such as the network architecture 210 shown in
In certain embodiments, the RF analyzer 414 analyzes one or more RF signal characteristics of tag response signals received by the RFID reader 400. Moreover, the RF analyzer 414 can be used to analyze one or more RF signal characteristics of interrogation signals (generated by interrogator devices other than the RFID reader 400 itself) received by the RFID reader 400. These RF signal characteristics may include, without limitation: power; received signal strength; phase information; and frequency or channel information. In certain embodiments, the RF analyzer 414 can be used to obtain received signal strength information associated with tag response signals. Alternatively or additionally, the RF analyzer 414 can be used to obtain a phase difference between a received interrogation signal and a received tag response signal. As described in more detail below, the received signal strength and/or the phase information can be used to determine the range or location of a target RFID tag.
The mode switching logic 416 may be implemented with or executed by the processor 402 for purposes of switching between operating modes of the RFID reader 400. For example, the processor 402 and the mode switching logic 416 may cooperate to control switching between a low power sleep mode, the active read-only mode, and the interrogate-and-read mode. These different operating modes are described in more detail below.
The interrogation signal detector 418 is utilized as a monitor while the RFID reader 400 is in the low power sleep mode. The interrogation signal detector 418 is suitably configured to detect the presence of an RFID interrogation signal generated by a remote interrogator device, i.e., a device other than the RFID reader 400. In practice, the interrogation signal detector 418 will utilize a sensor, detector, or RF receiver that does not rely on the normal operating power requirements of the RFID radio module 410. This feature allows the interrogation signal detector 418 to remain operational during sleeping periods when the RFID radio module 410 is disabled or is otherwise in a low power consumption mode. Accordingly, the interrogation signal detector might employ sensor or detector technology that differs from that used by the receiver of the RFID radio module 410.
In certain embodiments, the interrogation signal detector 418 leverages conventional RFID tag technology. Thus, the interrogation signal detector 418 could be realized using an active or an active-assist RFID tag, which might be attached or coupled to the RFID reader 400, affixed to the housing of the RFID reader 400, integrated with the RFID reader 400, contained within the housing of the RFID reader 400, or the like. In this regard, the interrogation signal detector 418 could respond to an RFID interrogation signal having a signal strength that might not be high enough to energize a tag for purposes of generating a tag response signal. Thus, an interrogation signal generated by a distant interrogator device, and having a relatively low signal strength, could still be detected by the interrogation signal detector 418. In response to the detection of an interrogation signal, the RFID reader 400 can leave the low power sleep mode, activate its RFID radio module 410, and enter the read-only mode.
As mentioned above, the read-only RFID devices 206, 208 and the RFID reader 400 are preferably designed to support different operating modes, including a low power sleep mode, a read-only mode, and an interrogate-and-read mode. In certain implementations, the interrogator device 204 could also be designed to support different operating modes, including a low power sleep mode, a read-only mode, an interrogate-only mode, and an interrogate-and-read mode. In this regard,
Referring to
This description assumes that the RFID reader device is operated and maintained in the active read-only mode (task 510) so that it can receive tag response signals generated by RFID tags being interrogated by a different interrogator device. While in the read-only mode, the interrogation capability of the RFID reader device is inhibited, disabled, or suppressed. This ensures that the RFID reader device devotes its reading abilities and resources for purposes of receiving and processing tag response signals that are generated by RFID tags being interrogated by a remotely located interrogation device (task 512). For this example, the interrogation signal detected at query task 506 is the same interrogation signal that is responsible for generating the tag response signals received at task 512. In other words, the interrogation signal used to interrogate one or more target RFID tags is detected at the read-only RFID device, which then switches to the read-only mode such that it can read the tag responses generated by the target RFID tags.
While operating in the active read-only mode, the RFID reader device continues to monitor for the presence of the interrogation signal. If the process 500 detects loss of the interrogation signal (query task 514), then it will initiate the switching of modes. More specifically, the RFID reader device will be switched from the active read-only mode to the low power sleep mode (task 516) in response to the loss of the interrogation signal. Thereafter, the RFID reader device can be operated and maintained in the low power sleep mode until another interrogation signal is detected.
As mentioned briefly above, one or more read-only RFID devices can be utilized to provide read redundancy and/or to assist in locating interrogated tags. In this regard,
This description assumes that the interrogator device receives the tag response signal generated by a target RFID tag (task 604). In other words, the interrogator device operates in the traditional interrogate-and-read mode. In addition, at least one distinct and physically separate read-only RFID device concurrently receives the same tag response signal (task 606). Thus, if three read-only RFID devices are within reading range of the target RFID tag, then the tag response signal will normally be independently and simultaneously read by four different and distinct devices: the interrogator device and each of the three read-only RFID devices. Notably, such concurrent/simultaneous reading of the tag response signal is accomplished without having to interrogate the target RFID tag multiple times in sequence. Instead, the target RFID tag is interrogated once and each of the various devices receive its own respective “version” of the same tag response signal.
The tag data conveyed by the tag response signal can be processed and otherwise handled as so desired. For example, the interrogator device and the read-only RFID devices could send the tag data (and/or other information associated with or derived from the tag response signal) to an RFID system controller for centralized processing and handling. As another example, the interrogator device and the read-only RFID devices could perform some processing of the tag data before sending it to an RFID system controller. As yet another example, the interrogator device and the read-only RFID devices could handle the processing of the tag data (independently or in a distributed manner) without involving a centralized controller or server.
This embodiment of the process 600 continues by determining a location of the target RFID tag and/or a distance (range) between the target RFID tag and one of the devices in the RFID system (task 608). Notably, the location/distance is determined based at least in part on information conveyed by or otherwise associated with the received tag response signal. In other words, the location/distance is determined based at least in part on information associated with the tag response signal as received at the interrogator device, and/or as received at each of the read-only RFID devices. Task 608 may be executed at a centralized controller or server, at the interrogator device, and/or at the read-only RFID devices. An exemplary process for determining tag location is described below with reference to
In certain embodiments, it may be desirable for the process 600 to associate, link, or otherwise correlate the received tag response signal (or the related tag data) with the interrogator device (task 610). Such correlation could be performed by a centralized RFID system controller or server. A received tag response signal could be correlated to an interrogation signal using, for example, time stamp data that indicates when the tag response signal was received. In this regard, the time stamp data could be compared to an interrogation time or interrogation time window corresponding to a particular interrogation signal. This approach is feasible in systems that generate only one interrogation signal at a time, and this approach assumes that the system has the intelligence to be aware of which interrogator device is active at any given time. In advanced RFID systems that support concurrent interrogation by multiple interrogation devices, however, more sophisticated techniques may be implemented to determine the relationship between received tag data and its interrogator device. For example, correlation of tag response signals could rely on an indication of the interrogating channel or frequency used by each interrogator device. Thus, tag response data from read-only RFID devices operating on an identified channel can be correlated to the particular interrogator device that interrogated the tags using that identified channel.
The analyzed characteristics of the tag response signal represent information that is used to determine or estimate the location of the target RFID tag. For example, the process 700 can determine distances from the various components to the target RFID tag (task 710). More specifically, the process 700 determines the distance between the target RFID tag and the interrogator device, the distance between the target RFID tag and the first read-only RFID device, and the distance between the target RFID tag and the second read-only RFID device. These distances may be determined from the received signal strength information and/or from the phase difference measurements. The process 700 may continue by determining or calculating the location of the target RFID tag (task 712). For this example, the location of the target RFID tag is determined using one or more of the distances calculated at task 710. The determined location could be an absolute location if the components of the RFID system are fixed and in known positions. Alternatively, the determined location could be relative to one or more of the components of the RFID system at the time of interrogation and reading. Depending upon the embodiment, tasks 710 and 712 could be performed by the RFID system controller, by the interrogator device, and/or by one or both of the read-only RFID devices. Moreover, task 712 may utilize any suitable technique, algorithm, or methodology to determine the location of the target RFID tag. For example, the use of three or more reading devices may be desirable to allow triangulation-based location calculations.
The process 700 represents one implementation of a relatively accurate and precise technique for determining the absolute or relative location of a target RFID tag. The RFID system described herein can also be utilized to estimate a “rough” location of a target RFID tag, based on the known locations of the interrogator device and the read-only RFID devices, and based on the known or assumed reading ranges of the system devices. Referring again to
While at least one exemplary embodiment has been presented in the foregoing detailed description, it should be appreciated that a vast number of variations exist. It should also be appreciated that the exemplary embodiment or embodiments described herein are not intended to limit the scope, applicability, or configuration of the claimed subject matter in any way. Rather, the foregoing detailed description will provide those skilled in the art with a convenient road map for implementing the described embodiment or embodiments. It should be understood that various changes can be made in the function and arrangement of elements without departing from the scope defined by the claims, which includes known equivalents and foreseeable equivalents at the time of filing this patent application.