1. Field of the Invention
The present invention generally relates to the field of radio frequency identification (RFID) device communication protocols, and more particularly, to the management of power absorption and reflectivity of individual tags to facilitate reading of tags that are positioned close together and/or grouped in significant numbers.
2. Description of Related Art
RFID tags may be either backscatter or non-backscatter tags. Non-backscatter tags typically send information to readers by originating a carrier signal on which amplitude, frequency, or phase modulated data is impressed. Backscatter tags send information by modulating the reflectivity of the tag within a range that allows the tag to continue to be powered by the reader. Readers may detect such backscatter modulation a number ways, such as by sensing fluctuations in power of a resonant transmission antenna.
With respect to 13 MHz RFID operation, the term used to describe RFID tags or labels is the “load modulation” of the magnetic field. However, in the UHF RFID operation (e.g., 900 MHz), the pertinent term used is the “delta radar cross section” (dRCS) or backscatter which forms the signaling mechanism. As a result, the term “reflectivity” is expressed in terms of the RCS in meter2. Thus, by way of example, the RCS of a ½ wavelength dipole in the 900 MHz range is approximately 0.01-0.02 m2. The dRCS is approximately 10-0.1% change of the RCS.
Both backscatter and non-backscatter tags, especially those operating in the UHF or microwave ranges, are normally highly reflective whether or not they are actively communicating with a reader. If two tags are positioned along a line extending from the reader, the tag closer to the reader is fully illuminated by the reader. The tag further from the reader is not fully illuminated. Rather it is substantially occluded by the tag closer to the reader. Therefore the tag further from the reader receives less power than it would if the tag closer to the reader were absent.
This is particularly problematic when large numbers of tags are present. The tags closer to the reader can act as a mirror, reflecting signals back to a reader, and thus casting a shadow on the tags further from the reader. This may result in a failure to read the tags in the shadow.
In view of the foregoing, there still remains a need to allow security tags closest to a reader to respond to a reader's interrogation signal and then to become transparent or cloak itself to allow other security tags in the vicinity to respond.
A radio frequency identification (RFID) system is disclosed. The RFID system comprises: a reader for emitting an interrogation signal and for receiving response signals based thereon; and a first tag for emitting a respective response signal based upon receipt of the interrogation signal and defining a first reflectivity that casts a shadow on at least a second tag, wherein the first tag comprises circuitry that alters the first reflectivity state to a second reflectivity state that makes the first tag substantially transparent to the interrogation signal such that the interrogation signal can illuminate the second tag without physically moving either the first or second tag.
A method of interrogating a group of RFID tags is disclosed. The method comprises the steps of: (a) emitting a first reader signal from a reader toward the group of RFID tags; (b) energizing a first tag having an RFID chip and tuned to a reader frequency for defining a first reflectivity state of the first tag; (c) listening to instructions within the first reader signal by the first tag to determine if the first reader signal is an initial encounter or a repeat encounter; (d) generating a reflected response signal from the first RFID tag if the first reader signal is an initial encounter; (e) temporarily altering the reflectivity of the first RFID tag to a second reflectivity state to render the first RFID tag substantially transparent to the first reader signal, thereby permitting a second tag located in a shadow of first RFID tag to receive the first reader signal, and wherein the second tag is in a first reflectivity state for receiving the first reader signal; and (f) the second tag comprising an RFID chip and generating its own reflected signal from the first reader signal; and (g) the first tag restoring itself to the first reflectivity state after temporarily altering the reflectivity.
A radio frequency identification (RFID) tag is disclosed. The RFID tag comprises an antenna (e.g., a dipole antenna or a loop configuration), an RFID chip coupled to the antenna, wherein the RFID chip comprises tag reflectivity circuitry. The tag reflectivity circuitry permits the tag to become temporarily detuned from a first RFID reader signal emitted by an RFID reader once the RFID security tag has responded to the first RFID reader signal and then re-tunes the RFID tag to the RFID reader.
A method of automatically altering the reflectivity of an RFID tag is disclosed, The method comprises: (a) providing an antenna coupled to an RFID chip to form the RFID tag and wherein the RFID tag is initially tuned to an RFID reader frequency, defining a first reflectivity state; (b) energizing the RFID tag upon receipt of an RFID reader signal having a frequency to which the RFID tag is tuned; (c) listening, by the RFID chip, to instructions within the RFID reader signal by to determine if the reader signal is an initial encounter or a repeat encounter; (d) generating a reflected response signal from the RFID tag if the first reader signal is an initial encounter; (e) temporarily altering the reflectivity of the RFID tag to a second reflectivity state to render the RFID tag substantially transparent to the RFID reader signal; and (f) restoring the RFID tag to the first reflectivity state.
The invention will be described in conjunction with the following drawings in which like reference numerals designate like elements and wherein:
A way to address the problem of security tags reflecting the reader's interrogation signal away from surrounding security tags is to enable individual tags to conditionally alter their reflectivity dramatically. Such alteration may occur in response to a particular operational status, such as: the receipt of a certain signal or command from a reader; the completion of a transmission to the reader; or the sensing of an input or condition unrelated to the communications protocol with the reader or with other tags.
The alteration can be achieved by a number of means. For example, additional impedance could be introduced in parallel or in series with tag antenna elements. Alternatively, the antenna elements can be disconnected from either tuning elements of the tag or from the RFID integrated circuit (chip).
The alteration can be permanent but is preferably temporary. Temporary alteration can be achieved by an analog and/or digital timing circuit which controls the reflectivity alteration mechanism. A digital timing circuit, for example, may include a real-time clock circuit, e.g. a timer that holds the reflectivity altered for a specific number of seconds. An analog timing circuit can include a floating gate MOSFET switch (e.g., EPROM) wherein the floating gate has a useful decay period. Such can be achieved by adding a high impedance leakage path to a floating gate element that is otherwise completely isolated during non-programming periods.
Furthermore, the tuned range of the tag may be determined via the use of variable capacitors, as depicted in the figures of this application. It should be understood that the term “variable capacitors” is defined broadly. Dynamically variable capacitors may be achieved by any means but are preferably implemented on integrated circuit devices. For example, an n-bit variable capacitor could be implemented in a CMOS fabrication process using independent n-switches connected to n polysilicon to polysilicon, polysilicon to field, polysilicon to metal, or metal to metal plate capacitors with values of x, x/2, x/4 . . . x/n pF respectively. Other options include, but are not limited to, simple junction capacitors, voltage-controlled variable junction capacitors, MEMS devices, or even the use of active switched-capacitor methods. It is within the broadest scope of the invention to permit the signal processing unit (SPU, as discussed below) to configure the tag capacitances “on the fly”. The use of fixed capacitors is also within the broadest scope of the invention.
The invention of the present application results in an increased detection based on respective detection probability for a large tag population.
As shown in
The chip 22 also includes a variable impedance device 28. In
SW1128 in
It should be noted that the switches may be implemented in a variety of ways, MEMs microswitches or solid state switches (JFETs, MOSFETs, etc.), etc. and any other type of switch known in the art.
By way of example only, the following discussion (and associated Table I) provides an explanation of the advantages of using temporary alteration of tag reflectivity based on the following scenario. The propagation of energy is in two dimensions through a set of tags with ideal half wavelength UHF dipole antennas, where the tags are arranged in rows and where the dipoles are aligned perpendicular to the direction of the propagation of the radio energy from a reader. It is assumed that all energy from the reader reaches the first row of tags. A fully resonant, tuned antenna ideally re-radiates 100% of the energy impinging upon it: 50% of the energy is reflected back toward to the reader antenna and 50% is radiated toward the next row of tags, and so on. Thus, each row will receive 50% of the energy impinging upon the prior row.
This should now be compared to the detuned tag condition, i.e., the propagation in the same array of tags where the tag antennas are instead not tuned to the frequency of the reader. See Table II below. It is assumed that reflectivity therefore drops by 3 dB, i.e., 50%. (Simulations indicate that decreases of 3 to 4 dB in reflectivity may also be obtained in tags using, for instance, practical UHF loop antennas.) An interesting effect occurs with the detuned tags. As stated, the energy reflected back to the reader from the first row of tags drops by half, therefore to 25% of the original energy from the reader. Similarly, the amount of energy re-radiated to the next row also drops by half, to 25%. However, the remaining 50% of the original energy from the reader is not lost. It propagates uninterrupted to the second row of readers. The total energy reaching the second row is 75%, a 50% increase over the case where the tags in the row closet to the reader are tuned. The effect is more significant in rows further from the reader. For instance, the energy impinging the 4th row is 400% higher than it is in the case where all the tags are tuned.
In this much simplified illustration, it should be emphasized that non-ideal factors such as power consumption by the tags, multiple reflections between rows, phase effects, etc., have been neglected. Nonetheless, the principle of the advantage of selectively detuning a tag nearer the reader for purposes of enabling propagation of reader energy to a tag further from the reader along a pathway through the detuned tag is readily appreciated.
By way of example only, there is shown in
The RFID chip 22 comprises, among other things, non-volatile memory such that when power is removed (e.g., the RFID reader 202 is silent), the RFID chip 22 forms a state machine that knows its prior response history.
It should be noted that process 600 is by way of example only and that other processes can be used. In any of the processes, the completion of the second reflectivity state must always place the security tag 20-420 into the first reflectivity state so that the security tag can be re-energized. Thus, if step 612 involves detuning the tag until all power runs out, the default mechanism in the RFID chip 22 is to power off such that the tag 20-420 is placed into the tuned or first reflectivity state.
It should be also noted that the predetermined period of time can be defined in any number of ways. If the physical layout of items having the tags associated therewith are known, the predetermine period can be the time it takes the reader to complete communications with all of the tags in the reader field.
For wide adaptability of the security tag 20-420, it may be desirable to have the tags 20-420 detune to a frequency that RFID readers in other jurisdictions are tuned (e.g., 860 MHz). That way, the RFID chip 22 in the tags 20-420 can be programmed to simply reverse the tune/detune process from the other jurisdiction.
While the invention has been described in detail and with reference to specific examples thereof, it will be apparent to one skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope thereof.
This utility application claims the benefit under 35 U.S.C. §119(e) of Provisional Application Ser. No. 61/249,843 filed on Oct. 8, 2009 entitled RFID REFLECTIVITY MODE POWER RATIONING and whose entire disclosure is incorporated by reference herein.
Number | Date | Country | |
---|---|---|---|
61249843 | Oct 2009 | US |