The invention relates in general to the arrangement and use of radio frequency identification (RFID) tags. In particular, the invention relates to the operation of a reader/interrogator of an RFID tag system. More specifically, the invention address the problem of a reader/interrogator not being fully effective over its entire designated frequency band due to antenna design compromises and installation constraints. It provides for a selection of a sub-band of frequencies within a designated frequency band on which an RFID reader/interrogator will operate.
Radio frequency identification (RFID) tags are electronic devices that may be affixed to items whose presence is to be detected and/or monitored. RFID tags are classified based on standards defined by national and international standards bodies (e.g., EPCGlobal and ISO). Standard tag classes include Class 0, Class 1, and Class 1 Generation 2 (referred to herein as “Gen 2”). The presence of an RFID tag, and therefore the presence of the item to which the tag is affixed, may be checked and monitored wirelessly by an “RFID reader”, also known as a “reader-interrogator”, “interrogator”, or simply “reader.” Readers typically have one or more antennas for transmitting radio frequency signals to RFID tags and receiving responses from them. An RFID tag within range of a reader-transmitted signal responds with a signal including a unique identifier.
With the maturation of RFID technology, efficient communication between tags and readers has become a key enabler in supply chain management, especially in manufacturing, shipping, and retail industries, as well as in building security installations, healthcare facilities, libraries, airports, warehouses etc. Many processes, as well as the status of many items, may be readily monitored via RFID tags.
RFID systems generally operate using a frequency hop technique, thus, they transmit and receive signals on various frequencies within a communications channel in some predetermined or random sequence. In effect, they transmit bursts of frequencies in sequence at various center frequencies.
Due to design constraints and construction variability, an RFID reader/interrogator and RFID tags do not always operate optimally and efficiently over an entire communication channel on which they are intended to operate. One contributor to this problem is the antenna of the reader/interrogator. In an “ideal” world a reader/interrogator antenna, such as, for example, a dipole antenna, would be constructed so as to be “full length”, i.e. its physical length is made to be ½ wavelength at an intended operating frequency. This operating frequency may be the center of a band of frequencies constituting a communication channel.
A typical full length antenna has a pass band characteristic that permits it to operate reasonably efficiently over its entire intended communication channel. However, due to size constraints required by particular installations, the antenna of a reader/interrogator can not always be made to be full size. Design constraints may require that the antenna be shorter than ideal in order to fit within a certain size reader/interrogator or to fit the reader/interrogator within a small space allowed by a particular installation. A shorter than ideal antenna must be tuned to the correct center frequency using reactive elements.
Also, in the “ideal” world, an antenna would be installed in “free space” in such a manner that its characteristics are not affected by the dielectric properties of objects nearby. However, in the real world, particular installations require that the antenna be situated in a manner that its characteristics are indeed affected by nearby objects, such as mounting structures, etc.
Also, mechanical and electrical tolerances may accumulate during the manufacturing process which may result in an antenna frequency which is biased towards the upper or lower side of the communications channel.
Due to these and other design compromises, an antenna of a reader/interrogator may perform with a less than ideal characteristic. The antenna may not function optimally across the entire communication channel on which it is intended to operate.
For example, when a dipole antenna is constructed so that the physical dimension of its radiating element is less than ½ wavelength, it must be loaded with reactive elements in order to cause it to resonate near a center of an intended communication channel. The use of such reactive loading causes a normal antenna pass band characteristic to become more sharp, i.e. the roll off from its center frequency is more steep, and the operating bandwidth narrows more than it does for a full length antenna. Given this sharper roll off characteristic and narrower operating bandwidth, an interrogator antenna may have insufficient gain at certain frequencies to allow for reliable reception of signals and efficient response to signals. The incidence of “no read” responses from RFID tags interrogated may be too high to allow for efficient operation of the interrogator.
In addition to antenna design constraints described above, there may be other design compromises and normal construction tolerances that contribute to an RFID reader/interrogator and tag system not performing optimally over its entire intended operating channel.
What is needed, then, is an RFID reader/interrogator that can adapt its operation to compensate for an antenna that does not operate efficiently over an entire frequency band on which it is intended to operate.
This section is for the purpose of summarizing some aspects of the inventions described more fully in other sections of this patent document. It briefly introduces some preferred embodiments. Simplifications or omissions may be made to avoid obscuring the purpose of the section. Such simplifications or omissions are not intended to limit the scope of the claimed inventions.
To a degree, the frequencies on which an interrogator/RFID tag system is to operate can be selected in advance. A particular RFID interrogator can be programmed to use the selected frequencies. Thus, if the actual center frequency and bandwidth of an interrogator antenna can become known before the interrogator is installed and put into service, it can be programmed to frequency hop within a sub-band of “good” frequencies within an intended communication channel consistent with the actual characteristics of its antenna.
The invention relates to an RFID interrogator which can be adapted to operate only within a sub-band of frequencies within an operating channel when it is not possible for it to operate efficiently over an entire channel on which they are intended to operate, such as, for example, because of antenna design constraints, installation constraints, or if another device is operating continuously within some portion of the channel and needs to be avoided. etc.
To adapt, an interrogator, can analyze interrogation results from the entire channel to identify a sub-band of frequencies within a communication channel on which it operates most efficiently and then limits its operation to only a sub-band of frequencies at which efficient operation can be carried out. The reader/interrogator is programmed such that it operates on such an identified sub-band of frequencies rather than using all frequencies within the communication channel. This allows for its more efficient use in an actual installation by allowing a higher percentage of “reads” of RFID tags responsive to its transmitted interrogation signals.
The invention described in this patent document relates in general to selecting an optimal sub-band of frequencies to which operation of an RFID interrogator should be limited within a designated communication channel. This limitation of frequencies can be accomplished by limiting the operation of a reader/interrogator to transmit interrogation signals only within the identified sub-band of frequencies. The use of a particular sub-band of frequencies allows the interrogator to operate at high efficiency.
Techniques are described herein for optimizing the operation an already constructed RFID tag interrogator by selecting a sub-band of frequencies within an intended communication channel on which it can be operated efficiently.
Normally, a reader/interrogator transmits interrogation signals. These signals are transmitted according to a frequency hopping scheme. After an RFID interrogator has been determined to operate efficiently within a sub-band of a communication channel, its operation is limited to transmitting interrogation signals only within an identified sub-band.
One technique for identifying a sub-band of frequencies for a particular RFID interrogator measures the Voltage Standing Wave Ratio (VSWR) of its antenna across its entire intended communication channel. A sub-band of optimal frequencies is identified by determining a sub-band having acceptable VSWR measurements.
A second technique for identifying a sub-band of frequencies for a particular RFID interrogator measures and tabulates responses to interrogation signals on various frequencies within the intended communication channel. A tabulation of “read” and “no read” responses indicates what frequencies are effective for interrogating the tag. A sub-band of optimal frequencies is determined based on a count of “reads” and “no read” responses.
Using either technique, the information characterizing an already manufactured RFID interrogtor can be used to select a sub-band of frequencies on which the interrogator will interrogate RFID tags in actual use. By limiting interrogation to those frequencies that are effective, the interrogator can be operated with greater efficiency than it could be if the entire spectrum of the communication channel were used. Such optimization of the interrogator results in an RFID system that operates with enhanced efficiency.
The invention can be implemented in numerous ways, including methods, systems, devices, and computer readable medium. Several embodiments of the invention are described below, but they are not the only ways to practice the invention described herein.
The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate the invention and, together with the description, further serve to explain the principles of the invention and to enable a person skilled in the pertinent art to make and use the invention.
In the drawings, like reference numbers indicate identical or functionally similar elements.
Additionally, references numbers which are the same, but vary by virtue of an appended letter of the alphabet (for example, 412, 412R, 412P, 412S) or an appended letter and number (for example, 412, 412S1, 412S2) indicate elements which may be substantially the same or similar, but represent variations or modifications of the basic element. In some cases, the reference number without the appended letter or without the appended letter and number (for example, 412) may indicate a generic form of the element, while reference numbers with an appended letter or an appended letter and number (for example, 412S, 412S1, 412S2, 412P) may indicate a more particular or modified form of the element.
Additionally, the leftmost digit(s) of a reference number identifies the drawing in which the reference number first appears. For example, an element labeled 412 typically indicates that the element first appeared in
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be apparent to those skilled in the art that the invention, including structures, systems, and methods, may be practiced without these specific details. The description and representation herein are the common means used by those experienced or skilled in the art to most effectively convey the substance of their work to others skilled in the art. In other instances, well-known methods, procedures, components, and circuitry have not been described in detail to avoid unnecessarily obscuring aspects of the invention.
References in the specification to “one embodiment,” “an embodiment,” “an example embodiment,” etc., indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it is submitted that it is within the knowledge of one skilled in the art to effect such feature, structure, or characteristic in connection with other embodiments whether or not explicitly described.
The terms “reader” and “interrogator” are used interchangeably. They both refer to the device used to send an interrogation signal to an RFID tag and read any signal transmitted from or backscattered from an RFID tag.
Exemplary Operating Environment
Before describing embodiments of the invention in detail, it is helpful to describe an example RFID communications environment in which the inventions may be implemented.
Environment 100 includes any number of one or more readers 104. For example, environment 100 includes a first reader 104a and a second reader 104b. Readers 104a and/or 104b may be requested by an external application to address the population of tags 120. Alternatively, reader 104a and/or reader 104b may have internal logic that initiates communication, or may have a trigger mechanism that an operator of a reader 104 uses to initiate communication. Readers 104a and 104b may also communicate with each other in a reader network (see
As shown in
Tag population 120 may include tags 102 of various types, such as, for example, various classes of tags as enumerated above. Thus, in response to interrogation signals, the various tags 102 may transmit one or more response signals 112 to an interrogating reader 104. Some of the tags, for example, may respond by alternatively reflecting and absorbing portions of signal 104 according to a time-based pattern or frequency. This technique for alternatively absorbing and reflecting signal 104 is referred to herein as backscatter modulation. Typically, such backscatter modulation may include one or more alpha-numeric characters that uniquely identify a particular tag. Readers 104a and 104b receive and obtain data from response signals 112, such as an identification number of the responding tag 102. In the embodiments described herein, a reader may be capable of communicating with tags 102 according to various suitable communication protocols, including Class 0, Class 1, EPC Gen 2, other binary traversal protocols and slotted aloha protocols, and any other protocols mentioned elsewhere herein, and future communication protocols. Additionally, tag population 120 may include one or more tags having the packed object format described herein and/or one or more tags not using the packed object format (e.g., standard ISO tags).
Baseband processor 212 and network interface 216 are optionally present in reader 104. Baseband processor 212 may be present in reader 104, or may be located remote from reader 104. For example, in an embodiment, network interface 216 may be present in reader 104, to communicate between transceiver portion 220 and a remote server that includes baseband processor 212. When baseband processor 212 is present in reader 104, network interface 216 may be optionally present to communicate between baseband processor 212 and a remote server. In another embodiment, network interface 216 is not present in reader 104.
In an embodiment, reader 104 includes network interface 216 to interface reader 104 with a communications network 218. As shown in
Reader 104 has at least one antenna 202 for communicating with tags 102 and/or other readers 104. Antenna(s) 202 may be any type of reader antenna known to persons skilled in the relevant art(s), including for example and without limitation, a vertical, dipole, monopole, loop, Yagi-Uda, slot, and patch antenna type.
Transceiver 220 receives a tag response via antenna 202. Transceiver 220 outputs a decoded data signal 214 generated from the tag response. Network interface 216 is used to transmit decoded data signal 214 received from transceiver portion 220 (optionally through baseband processor 212) to a remote server coupled to communications network 218. Baseband processor 212 optionally processes the data of decoded data signal 214 prior to being sent over communications network 218.
In embodiments, network interface 216 enables a wired and/or wireless connection with communications network 218. For example, network interface 216 may enable a wireless local area network (WLAN) link (including a IEEE 802.11 WLAN standard link), a BLUETOOTH link, and/or other types of wireless communication links. Communications network 218 may be a local area network (LAN), a wide area network (WAN) (e.g., the Internet), and/or a personal area network (PAN).
In embodiments, a variety of mechanisms may be used to initiate an interrogation request by reader 104. For example, an interrogation request may be initiated by a remote computer system/server that communicates with reader 104 over communications network 218. Alternatively, reader 104 may include a finger-trigger mechanism, a keyboard, a graphical user interface (GUI), and/or a voice activated mechanism with which a user of reader 104 may interact to initiate an interrogation by reader 104. An autonomous mode may be used where the reader interrogates based on a repeating timed duty cycle.
In the example of
Modulator/encoder 208 receives interrogation request 210, and is coupled to an input of RF front-end 204. Modulator/encoder 208 encodes interrogation request 210 into a signal format, such as, for example, one of pulse-interval encoding (PIE), FMO, or Miller encoding formats, modulates the encoded signal, and outputs the modulated encoded interrogation signal to RF front-end 204.
RF front-end 204 may include one or more antenna matching elements, amplifiers, filters, an echo-cancellation unit, a down-converter, and/or an up-converter. RF front-end 204 receives a modulated encoded interrogation signal from modulator/encoder 208, up-converts (if necessary) the interrogation signal, and transmits the interrogation signal to antenna 202 to be radiated. Furthermore, RF front-end 204 receives a tag response signal through antenna 202 and down-converts (if necessary) the response signal to a frequency range amenable to further signal processing.
Demodulator/decoder 206 is coupled to an output of RF front-end 204, receiving a modulated tag response signal from RF front-end 204. In an EPC Gen 2 protocol environment, for example, the received modulated tag response signal may have been modulated according to amplitude shift keying (ASK) or phase shift keying (PSK) modulation techniques. Demodulator/decoder 206 demodulates the tag response signal. For example, the tag response signal may include backscattered data formatted according to FMO or Miller encoding formats in an EPC Gen 2 embodiment. Demodulator/decoder 206 outputs decoded data signal 214.
The configuration of transceiver 220 shown in
The invention described herein is applicable to any type of RFID tag, with suitable additional features, as described in further detail below in conjunction with
IC 306 controls operation of tag 102, and transmits signals to, and receives signals from RFID readers using antenna 304. In the example of
Demodulator 314 demodulates a radio frequency communication signal (e.g., interrogation signal 110) on antenna signal 328 received from a reader by antenna 304. Control logic 310 receives demodulated data of the radio frequency communication signal from demodulator 314 on an input signal 322. Control logic 310 controls the operation of RFID tag 102, based on internal logic, the information received from demodulator 314, and the contents of memory 308. For example, control logic 310 accesses memory 308 via a bus 320 to determine whether tag 102 is to transmit a logical “1” or a logical “0” (of identification number 318) in response to a reader interrogation. Control logic 310 outputs data to be transmitted to a reader (e.g., response signal 112) onto an output signal 324. Control logic 310 may include software, firmware, and/or hardware, or any combination thereof. For example, control logic 310 may include digital circuitry, such as logic gates, and may be configured as a state machine in an embodiment.
Modulator 316 is coupled to antenna 304 by antenna signal 328, and receives output signal 324 from control logic 310. Modulator 316 modulates data of output signal 324 (e.g., one or more bits of identification number 318) onto a radio frequency signal (e.g., a carrier signal transmitted by reader 104) received via antenna 304. The modulated radio frequency signal is response signal 112 (see
Charge pump 312 (or other type of power generation module) is coupled to antenna 304 by antenna signal 328. Charge pump 312 receives a radio frequency communication signal (e.g., a carrier signal transmitted by reader 104) from antenna 304, and generates a direct current (DC) voltage level that is output on tag power signal 326. Tag power signal 326 powers circuits of IC die 306, including control logic 320.
Charge pump 312 rectifies a portion of the power of the radio frequency communication signal of antenna signal 328 to create a voltage power. Charge pump 312 increases the voltage level of the rectified power to a level sufficient to power circuits of IC die 306. Charge pump 312 may also include a regulator to stabilize the voltage of tag power signal 326. Charge pump 312 may be configured in any suitable way known to persons skilled in the relevant art(s). For description of an example charge pump applicable to tag 102, refer to U.S. Pat. No. 6,734,797, titled “Identification tag Utilizing Charge Pumps for Voltage Supply Generation and Data Recovery,” which is incorporated by reference herein in its entirety. Alternative circuits for generating power in a tag, as would be known to persons skilled in the relevant art(s), may be present. Further description of charge pump 312 is provided below.
It will be recognized by persons skilled in the relevant art(s) that tag 102 may include any number of modulators, demodulators, charge pumps, and antennas. Tag 102 may additionally include further elements, including an impedance matching network and/or other circuitry. Furthermore, although tag 102 is shown in
Memory 308 is typically a non-volatile memory, but can alternatively be a volatile memory, such as a DRAM. Memory 308 stores data, including an identification number 318. In a Gen-2 tag, tag memory 308 may be logically separated into four memory banks.
Overview of Sub-Band Identification for RFID Interrogator
The following sections of this specification, along with
While specific methods and configurations are described, it should be understood that this is done for illustration purposes only. A person skilled in the art will recognize that other configurations and procedures may be used without departing from the spirit and scope of the invention.
In particular, RFID reader and system embodiments are described wherein within a particular frequency band channel of operation, a sub-band of frequencies is selected on which the RFID reader can optimally operate.
There are various ways to identify a sub-band of frequencies of a communication channel on which a particular interrogator should be operated in order to properly receive and transmit signals. One such technique is the measure the VSWR of the interrogator antenna over its entire intended communication channel frequency range and to then limit frequencies of actual use to those falling within a “sweet spot” of low VSWR. In
“Read/No Read” Technique for Sub-Band Identification
Persons skilled in the relevant arts will recognize that the elements, methods, techniques, and principles of the inventions may be applied, with suitable modifications, to other kinds of radio frequency reporting systems which may employ mechanically modifiable elements.
The above examples of a system and method for operating an RFID interrogator are exemplary only. Persons skilled in the relevant arts will recognize that a variety of alternatives may exist in terms of materials, relations of structural and operational elements, and methods of employing or applying the same. Such variations fall within the scope and spirit of the invention which is not limited by the particular examples described above.
While various embodiments of the invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. It will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Thus, the breadth and scope of the invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.