Embodiments of the invention are generally related to the field of Radio Frequency Identification (RFID), and more particularly, to an RFID tag reading apparatus and method.
RFID systems are used for a wide variety of purposes including to detect and prevent inventory shrinkage and to perform inventory management functions in a variety of retail establishments, such as apparel and mass merchandisers, supermarkets, libraries, video stores, and the like. In general, such systems use a tag which is associated with an article or packaging for the article. Each tag typically includes an integrated circuit and typically responds to, and transmits signals in a radio frequency range, to a transmitter or an interrogator. Accordingly, potential customers or facility users can find an article equipped with an RFID tag by using an interrogator.
If the interrogator has prior knowledge of an identification (ID) number of the tag associated with an article the interrogator is searching for, it can transmit a specific query to the article with that specific identification number. However, such a specific ID number is not always available. If there are multiple tags within the radio frequency range of the interrogator, then all tags may send their ID numbers to the interrogator at the same time in response to a non-specific query. This causes collisions and often results in no tag being identified.
Some efforts have been made to decrease the collision problem described above. U.S. Pat. Application Publication No. 2007/0096877, and U.S. Pat. No. 6,226,300 respectively describe RFID searching methods by an Aloga algorithm and a Tree algorithm. These algorithms generally assume that the ID numbers of the tags in a radio frequency range are independent and substantially evenly distributed. However, this is not true in many circumstances of RFID applications. For example, in warehouses, many of the same kind of products or articles have tags with ID numbers that differ only slightly from one another. During the interrogation cycle, this can still cause many collisions using the Aloga and tree algorithms. Accordingly, there is a need in the art to increase the RFID searching speed.
In accordance with an embodiment disclosed herein, a method comprises identifying a known-ID-number set comprising at least two ID numbers of corresponding tags and each ID number comprises a plurality of bit positions; calculating an entropy between each corresponding bit position in the known-ID-number set; identifying the bit position having a greatest entropy; and transmitting a reading query to the tags in a communication range. The reading query includes a differential specific number corresponding to the bit position having the greatest entropy.
In accordance with another embodiment disclosed herein, an apparatus comprises a memory to store identification numbers of tags, and a processor. The processor is configured for identifying a known-ID-number set comprising at least two ID numbers of corresponding tags; calculating an entropy between each corresponding bit position of the at least two ID numbers in the known-ID-number set; identifying the bit position having a greatest entropy; and transmitting a reading query to the tags in a communication range. The reading query includes a differential specific number corresponding to the bit position having the greatest entropy.
In accordance with still another embodiment disclosed herein, a storage medium comprises a plurality of instructions. The storage medium, which when executed, cause an interrogator to: identify a known-ID-number set comprising at least two ID numbers of corresponding tags; calculate an entropy between each corresponding bit position in the known-ID-number set; identify the bit position having a greatest entropy; and transmit a reading query to the tags in a communication range, the reading query including a differential specific number corresponding to the bit position having the greatest entropy.
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Embodiments of the description relate to a wireless identification system. The wireless identification system includes an apparatus or interrogator, and a plurality of tags within a communication range of the interrogator. The communication range may be limited by signal strength (e.g., of the interrogator) which affects the distance from which a tag may be separated from the interrogator. Similarly, the communication range may be limited or restricted to a particular operational frequency range of the interrogator. Each tag is encoded with a unique identification (ID) number, and is associated with one article. The interrogator transmits reading queries to the tags to identify the ID numbers of each tag in the communication range. In certain embodiments, if one reading query matches one unique ID number of one tag, the tag sends the ID number to the interrogator, and this ID number is identified by the interrogator. However, if one reading query matches a plurality of ID numbers of a plurality of tags, a search process that utilizes similarities of the ID numbers is employed to address collisions that might otherwise delay the tag identification process. In certain embodiments, the tags only communicate with the interrogator responsive to the reading queries from the interrogator.
Each tag 14 may be described as having a unique identification (ID) number ω, with each ID number ω being described by a string of digits b, (e.g., ω={b1 b2 b3 . . . bi . . . bn}). In one embodiment, each of the digits “bi” represents a binary number having a value of “0” or “1”. In other embodiments, the digits may represent decimal, hexadecimal, or other mathematical numeral systems.
The exemplary searching process 16 starts at step 18. In one embodiment, the interrogator 12 sends a masked “start reading” query for addressing all tags 14 in the communication range of the interrogator 12. In one embodiment, the start reading query includes a bit mask that masks all but a chosen (e.g., pre-selected or randomly selected) bit location. That chosen bit location may be programmed to identify a desired value such as “0” or “1” in a binary system.
At step 19, in the illustrated embodiment, the interrogator 12 may decide if a collision is detected. If the interrogator 12 successfully reads only one ID number ω, it is assumed that only one associated tag 14 is in the communication range of the interrogator 12. As such, the single tag 14 is identified, and the searching process 16 ends at a step 34. If the interrogator 12 receives no response, it is assumed that no tags 14 are in the communication range of the interrogator 12, and again the search process 16 ends at step 34. If interrogator 12 receives responses from the query but can not successfully read any ID number, a collision is detected and the searching process 16 proceeds with step 20.
In certain embodiments, the exemplary searching process 16 comprises setting a known-ID-number set M at step 20. The known-ID-number set M includes at least two ID numbers ω1 and ω2 of two corresponding tags 14. In one embodiment, the at least two ID numbers ω1 and ω2 have been previously identified and are considered prior knowledge of the RFID system 10. In an alternative embodiment, the two ID numbers ω1 and ω2 may be identified by any possible RFID identification method. In one embodiment a tree splitting search process may be used for identifying two or more ID numbers to set up the known-ID-number set M.
Referring now to
Referring back to
As used herein, “entropy” of one bit position is a measurement of the level of variability between corresponding bit positions among the identified ID numbers in the known-ID-number set M. A high entropy means that the ID numbers of set M have a large variability with respect to corresponding bit positions, and a low entropy means that the ID numbers of set M have a small variability with respect to corresponding bit positions. In one embodiment, an entropy H(i) of one bit position can be calculated by equation 1:
wherein ω is an ID number of a tag 14.
The entropies for each bit position are calculated and compared to determine the greatest entropy Hh at a bit position bh.
Still referring to
In one embodiment, the interrogator 12 sends a reading query with a first value (e.g., “1”) at the bit position bh and mask bits at the other bit positions, as well as a reading query with a second value (e.g., “0”) at the bit position bh and mask bits at the other bit positions. By doing so, the tags 14 in the unknown-ID-number set N are divided into a first and a second group, with the first group having the first value (e.g., with “1”) at the bit position bh and the second group having the second value (e.g., “0”) at the bit position bh. In certain embodiments, if only one ID number contains the indicated value at the bit position bh, the corresponding tag 14 will send a message with the ID number to the interrogator 12 in response to the reading query with that particular value at the bit position bh. For example, if only one ID number of the unknown-ID-number set N has “0” at the bit position bh, this ID number can be identified by the interrogator 12. Similarly, if only one ID number of the unknown-ID-number set N has “1” at the bit position bh, this ID number can be identified by the interrogator 12. If two or more ID numbers of the unknown-ID-number set has the requested value at the bit bh, the interrogator 12 detects a collision.
At step 26, the interrogator 12 determines if one or two ID numbers are identified at step 24. If one or two ID numbers are identified, the ID numbers are added to the known-ID-number set M at step 28. The searching process 16 returns back to step 22, and updated entropies of bit positions are calculated based on the updated known-ID-number set M, and an updated greatest entropy is calculated based on the updated known-ID-number. Steps 22-26 are repeated until all ID numbers in the communication range of the interrogator are identified.
At step 26, if the interrogator 12 determines that no ID number is identified at step 24, the interrogator 12 detects a collision, and the searching process 16 proceeds with step 30.
At step 30, a bit position bs having a second greatest entropy Hs, according to the calculation at step 22, is taken as a second splitting node to further identify the ID numbers in the unknown-ID-number set N. The interrogator 12 sends a differential specific number at the bit position bs, and each of the first and second groups N1 and N2 is differentiated into two sub-groups.
At step 32, the interrogator 12 determines if a collision occurs after step 30. If no collision occurs, all ID numbers are identified, and the searching process 16 ends at step 34. If a collision occurs, the search process 16 returns back and repeats at step 26 until all ID numbers in the communication range of the interrogator 12 are identified.
In the example in
The interrogator 12 calculates entropies of each corresponding bit position of ID numbers of tags in the known-ID-number set M according to equation 1. In the illustrated example, these are represented by Tags 1 and 2.
In the illustrated example, the entropies of bit positions 7 and 8 of Tags 1 and 2 are identified as having the greatest entropies. Accordingly, the interrogator 12 selects bit position 8, as shown in phantom block 60 of
The interrogator 12 then calculates entropies of each bit position based on the ID numbers of Tags 1, 2 and 5 now in the known-ID-number set M. Bit numbers 7, 8, 9 and 10 are determined to have equally the greatest entropies. For the purpose of example, bit position 7 is taken as a second node 38 for further reading of tags 3, 4 and 6. The interrogator 12 sends a reading query “*****, *00**” and a reading query “*****, *10**” to Tags 3, 4 and 6. Tag 3 responds to the reading query “*****, *10**”, and thus the ID number of Tag 3 is identified and is added to the known-ID-number set M. Tags 4 and 6 respond to “*****, *00**”, and a further collision is detected.
Once again, the interrogator 12 calculates entropies of each corresponding bit position of the ID numbers in the known-ID-number set M, this time Tags 1, 2, 3 and 5. Bit numbers 7, 9 and 10 have equally greatest entropies. For the purpose of example, bit position number 10 is taken as a third node 40 for identifying tags 4 and 6. The interrogator 12 sends reading queries “*****, *00*0”, and “*****, *00*1” to Tags 4 and 6. Tags 4 and 6 respond to “*****, *00*1” and “*****, *00*0”, respectively and thus both are identified. Since no additional tags remain in the unknown-ID-number set N, the search process ends.
In one embodiment, the interrogator 12 includes a CPU or a processor 50, a power source 52, a memory 54 for storing identified ID numbers of tags 14, an interrogator circuitry 56, and an antenna 58. The power source 52 supplies direct-current power to the processor 50 and the interrogator circuitry 56. In one embodiment, the processor 50 stores instructions to cause the interrogator 12 to identify a known-ID-number set comprising at least two ID numbers of corresponding RFID tags; calculate an entropy between each corresponding bit position in the known-ID-number set; identify the bit position having a greatest entropy; and transmit a reading query to the tags in a radio frequency range, the reading query including a differential specific number corresponding to the bit position having the greatest entropy.
In one embodiment, the interrogator 12 transmits a reading query 60 via the antenna 58. The tag 14 receives a reading query 60 via its antenna 46. Upon receiving the reading query 60, the tag 14 responds by generating and transmitting a responsive signal or reply 62. The responsive signal 62 includes the ID number of the tag 14.
While only certain features of the invention have been illustrated and described herein, many modifications and changes will occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.