Method, system, and apparatus for binary traversal of a tag population
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
H04Q-005/22
H04Q-005/00
G08B-013/14
G08B-005/22
H01H-067/00
출원번호
US-0072885
(2002-02-12)
발명자
/ 주소
Shanks,Wayne E
Powell,Kevin J
Bandy,William R
Arneson,Michael R
출원인 / 주소
Symbol Technologies, Inc.
대리인 / 주소
Sterne, Kessler, Goldstein &
인용정보
피인용 횟수 :
34인용 특허 :
86
초록▼
A method, system, and apparatus for interrogating a radio frequency identification (RFID) tag population are described. Tags are interrogated by a reader. The reader and tags engage in communication according to binary traversal algorithms, where single bit data symbols are exchanged between the rea
A method, system, and apparatus for interrogating a radio frequency identification (RFID) tag population are described. Tags are interrogated by a reader. The reader and tags engage in communication according to binary traversal algorithms, where single bit data symbols are exchanged between the reader and tags. Furthermore, a reader implicitly controls the operating state of every tag in the tag population by transmitting a single data symbol. Bit patterns may be collected from the tags by the reader, using a variety of interrogation techniques. In a general interrogation, the reader exchanges symbols with the tag population to interrogate the entire tag population. In a specific interrogation, a reader exchanges symbols with the tag population to target a particular tag identification number. Tags may also be placed in a superposition state by the reader, where they respond whenever a received data symbol matches the next bit of their identification number.
대표청구항▼
What is claimed is: 1. A method in a radio frequency identification (RFID) tag device for controlling an operating state of the tag device using a reader, wherein the operating state is chosen from a plurality of possible states, comprising the steps of: (a) receiving a symbol from the reader when
What is claimed is: 1. A method in a radio frequency identification (RFID) tag device for controlling an operating state of the tag device using a reader, wherein the operating state is chosen from a plurality of possible states, comprising the steps of: (a) receiving a symbol from the reader when the operating state is a present state, wherein a first pulse width for the received symbol represents a first data value, and a second pulse width for the received symbol represents a second data value; (b) determining a new state for the operating state based upon the received symbol and present state; and (c) transitioning the operating state from the present state to the determined new state. 2. The method of claim 1, wherein step (c) includes the step of: transitioning the operating state from the present state to the determined new state without receiving any symbols from the reader other than in step (a). 3. The method of claim 2, further comprising the step of: (d) repeating steps (a)-(c). 4. The method of claim 1, wherein step (a) includes the step of: determining the received symbol to be a data "0," data "1," or data "NULL." 5. The method of claim 1, wherein step (c) includes the step of: transmitting a symbol from the tag device to the reader. 6. The method of claim 5, wherein the symbol transmitted to the reader includes a bit of an identification number, wherein said transmitting step includes the step of: transmitting the bit of the identification number. 7. The method of claim 1, further comprising the step of: (d) performing steps (a)-(c) regardless of whether the reader is performing a general read interrogation or a specific read interrogation. 8. A method in a radio frequency identification (RFID) tag device for controlling an operating state of the tag device using a reader, comprising the steps of: receiving a symbol from the reader; and determining a new state for the operating state of the tag device, wherein said determining step includes the steps of: (a) allowing the operating state to remain in a first state if the operating state is the first state when the symbol is received, (b) transitioning the operating state to the first state if the operating state is a second state when the symbol is received, (c) transitioning the operating state to a third state if the operating state is a fourth state when the symbol is received, and (d) transitioning the operating state to the first state if the operating state is a fifth state when the symbol is received. 9. The method of claim 8, wherein the first state is a command state, wherein step (a) includes the step of: allowing the operating state to remain in the command state if the operating state is the command state when the symbol is received. 10. The method of claim 8, wherein the first state is a command state and the second state is a superposition state, wherein step (b) includes the step of: transitioning the operating state to the command state if the operating state is the superposition state when the symbol is received. 11. The method of claim 8, wherein the third state is a dormant state and the fourth state is a tree traversal state, wherein step (c) includes the step of: transitioning the operating state to the dormant state if the operating state is the tree traversal state when the symbol is received. 12. The method of claim 8, wherein the first state is a command state and the fifth state is a mute state, wherein step (d) includes the step of: transitioning the operating state to the command state if the operating state is the mute state when the symbol is received. 13. The method of claim 8, wherein the received symbol is a "NULL" symbol, wherein the receiving step includes the step of: receiving a "NULL" symbol from the reader. 14. A method in a radio frequency identification (RFID) tag device for controlling an operating state of the tag device from a reader, comprising the steps of: receiving a symbol from the reader; and determining a new state for the operating state of the tag device, wherein said determining step includes the steps of: (a) if the operating state is a first state when the symbol is received in said receiving step, performing the following steps: (1) transitioning the operating state to a second state if a value of the received symbol is a first data value, and (2) transitioning the operating state to a third state if the value of the received symbol is a second data value; (c) allowing the operating state to remain the third state if the operating state is the third state when the symbol is received in said receiving step; (d) if the operating state is the second state when the symbol is received in said receiving step, performing the following steps: (1) allowing the operating state to remain the second state if the received symbol matches a present tag identification bit, and (2) transitioning the operating state to a fourth state if the received symbol does not match the present tag identification bit; and (e) allowing the operating state to remain the fourth state if the operating state is the fourth state when the symbol is received in said receiving step. 15. The method of claim 14, wherein the first state is a command state and the second state is a tree traversal state, wherein step (a)( 1) includes the step of: transitioning the operating state to a tree traversal state if a value of the received symbol is a first data value. 16. The method of claim 14, wherein the first state is a command state and the third state is a superposition state, wherein step (a)(2) includes the step of: transitioning the operating state to a superposition state if the value of the received symbol is a second data value. 17. The method of claim 14, wherein the third state is a superposition state, wherein step (c) includes the step of: allowing the operating state to remain the superposition state if the operating state is the superposition state when the symbol is received in said receiving step. 18. The method of claim 14, wherein the second state is a tree traversal state, wherein step (d)(1) includes the step of: allowing the operating state to remain the tree traversal state if the received symbol matches a present tag identification bit. 19. The method of claim 14, wherein the second state is a tree traversal state and the fourth state is a mute state, wherein step (d)(1) includes the step of: transitioning the operating state to a mute state if the received symbol does not match the present tag identification bit. 20. The method of claim 14, wherein the fourth state is a mute state, wherein step (e) includes the step of: allowing the operating state to remain the mute state if the operating state is the mute state when the symbol is received in said receiving step. 21. The method of claim 14, wherein the first data value is a "0" symbol and the second state is a tree traversal state, wherein step (a)(1) includes the step of: if a value of the received symbol is a "0" symbol, transitioning the operating state to the tree traversal state. 22. The method of claim 14, wherein the second data value is a "1" symbol and the third state is a superposition state, wherein step (a)(2) includes the step of: if the value of the received symbol is a "1" symbol, transitioning the operating state to the superposition state. 23. The method of claim 14, wherein in step (d), if the operating state is the second state when the symbol is received in said receiving step, further performing: transitioning the operating state to a fifth state if the received symbol is a third data value. 24. The method of claim 23, wherein the second state is a tree traversal state and the fifth state is a dormant state, wherein step (d)(3) includes the step of: transitioning the operating state to the dormant state if the received symbol is a third data value. 25. The method of claim 23, wherein said determining step further comprises: (f) if the operating state is the fifth state when the symbol is received, transitioning the operating state to the first state when the symbol is received. 26. The method of claim 25, wherein step (f) comprises: transitioning the operating state to the first state through a sixth state when the symbol is received if the operating state is the fifth state when the symbol is received. 27. The method of claim 26, wherein the first state is a command state, the fifth state is a dormant state, and the sixth state is a calibration state, wherein step (f) includes: transitioning the operating state to the command state through the calibration state when the symbol is received if the operating state is the dormant state when the symbol is received. 28. The method of claim 25, wherein said determining step further comprises: (g) if the operating state is the sixth state, transitioning the operating state to the fifth state when an invalid signal is received. 29. The method of claim 14, wherein said determining step further comprises: (f) if the operating state is the third state when the symbol is received, transitioning the operating state to the first state if the value of the received symbol is a third data value. 30. The method of claim 14, wherein in step (a), if the operating state is the first state when the symbol is received in said receiving step, further performing: allowing the operating state to remain the first state if the value of the received symbol is a third data value. 31. The method of claim 14, wherein step (e) comprises: allowing the operating state to remain the fourth state if the operating state is the fourth state when the value of the received symbol is the first data value or the second data value. 32. The method of claim 31, wherein in step (e), if the operating state is the fourth state when the symbol is received in said receiving step, further performing: transitioning the operating state to the first state if the value of the received symbol is a third data value.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (86)
Dodd Harold (Blyth GB3) Stanier Brian J. (Stockton on Tees GB3), Access control equipment and method for using the same.
Snodgrass Charles K. (Boise ID) Montalvo Armando (Belmont CA), Apparatus and method for error detection and correction in radio frequency identification device.
Marsh Michael J. C. (Johannesburg ZAX) Carson Mark H. (Pretoria ZAX) Gouws Gideon J. (Pretoria ZAX) Marais Mario A. (Pretoria ZAX) Hodson Trevor M. (Randburg ZAX), Attaching an electronic circuit to a substrate.
Reis Robert Steven (Palo Alto CA) Verma Vikram (Palo Alto CA) Mihovilovic Domingo Antonio (Mountain View CA) Bertrand Peter Scott (Palo Alto CA) Stevens Richard Kenneth (Cupertino CA), Communication system for communicating with tags.
Reis Robert Steven (Palo Alto CA) Verma Vikram (Palo Alto CA) Mihovilovic Domingo Antonio (Mountain View CA) Bertrand Peter Scott (Palo Alto CA) Stevens Richard Kenneth (Cupertino CA), Communication system for communicating with tags.
Kobayashi Nakaba (Kariya JPX) Nagura Michinaga (Kariya JPX) Toyama Kazumasa (Nagoya JPX), Communication system which establishes communication sessions based on unit ID codes to avoid transmission conflicts.
Snodgrass Charles K. (Boise ID) Allen David H. (Rochester MN) Tuttle John R. (Boise ID) Rotzoll Robert R. (Boise ID) Pax George E. (Boise ID), Data communication method using identification protocol.
Snodgrass Charles K. (Boise ID) Allen David H. (Rochester MN) Tuttle John R. (Boise ID) Rotzoll Robert R. (Boise ID) Pax George E. (Boise ID), Data communication method using identification protocol.
Snodgrass Charles K. (Boise ID) Allen David H. (Rochester MN) Tuttle John R. (Boise ID) Rotzoll Robert R. (Boise ID) Pax George E. (Boise ID), Data communication system using identification protocol.
Snodgrass Charles K. (Boise ID) Allen David H. (Rochester MN) Tuttle John R. (Boise ID) Rotzoll Robert R. (Boise ID) Pax George E. (Boise ID), Data communication transceiver using identification protocol.
Theimer Marvin M. (Mountain View CA) Want Roy (Mountain View CA), Decentralized tracking and routing system wherein packages are associated with active tags.
Marsh Michael J. C. (Johannesburg ZAX) Lenarcik Andrzej (Johannesburg ZAX) Van Zyl Clinton A. (Pretoria ZAX) Van Schalkwyk Andries C. (Pretoria ZAX) Oosthuizen Marthinus J. R. (Pretoria ZAX), Detection of multiple articles.
Tervoert Marius L. (Borculo NLX) Venema Willem H. J. (Enschede NLX) Scholten Arjan H. (Enschede NLX) Stekelenburg Jan C. (Varsseveld NLX), Electromagnetic identification system for identifying a plurality of coded responders simultaneously present in an inter.
Caswell Robert L. (207 Laurelwood Ave. Placentia CA 92670) Bass C. David (17806 Joshua Cir. Fountain Valley CA 92708), Inventory management system using transponders associated with specific products.
Ekchian Jack A. (Watertown MA) Hoffman Robert W. (Arlington MA) Ekchian Leon (Woodland Hills CA) Gabriel Kaigham J. (Belmont MA), Item identification tag for rapid inventory data acquisition system.
Sims Nathaniel M. (Wellesley Hills MA) Turner John M. (Lake Forest IL) Zeisloft Jane M. (Barrington IL) Kusswurm Daniel C. (Geneva IL) LaBedz Ralph H. (McHenry IL), Managing an inventory of devices.
Strietzel Rainer (Heidelberg DEX), Method and apparatus for generating an equipment reply signal for the automatic identification of objects and/or living.
Verma Vikram (Palo Alto CA) Reis Robert S. (Palo Alto CA) Mihovilovic Domingo A. (Mountain View CA) Keleshian Philip J. (San Jose CA), Method and apparatus for locating items.
Reynolds Andrew E. ; Wiklof Christopher A. ; Bodnar Daniel B., Method and apparatus to perform a predefined search on data carriers, such as RFID tags.
Chieu Trieu Can ; Cofino Thomas Anthony ; Heinrich Harley Kent ; Sousa Paul Jorge ; Zai Li-Cheng Richard, Method for communicating with RF transponders.
Tuttle John R. (Corrales NM) Hoyt Eugene P. (Colorado Springs CO) Springett James C. (La Crescenta CA), Modulated spread spectrum in RF identification systems method.
Chan Shun S. (Flushing NY) Heinrich Harley K. (Brewster NY) Kandlur Dilip D. (Briarcliff Manor NY) Krishna Arvind (Briarcliff Manor NY), Multiple item radio frequency tag identification protocol.
Tompkins Eugene (1016 E. Warren Detroit MI 48224) Hayes William (24150 Inkster Rd. Southfield MI 48034), Nationwide airport luggage tracking system and method.
Hook Christopher (Reading GB2) Juson Keith (Malmesburg GB2) Hall Chris (London GB2) Ferguson Donald Harold (Maple CAX) Paun Dimitrie Octavian (Mississauga CAX) Oprea Alexandru (Willowdale CAX), Passive transponder.
Simon William F. (235 W. Fairbault Duluth MN 55803) Torrey William C. (801 Seventh Ave. ; E. Superior WI 54880) Hull Chris W. (1096 85th Ave. ; W. Duluth MN 55808), Personnel locator.
Carney Scott N. (Palatine IL) Lauro George L. (San Jose CA) Krenz Eric L. (Crystal Lake IL) Ghaem Sanjar (Palatine IL), RF tagging system including RF tags with variable frequency resonant circuits.
Bowers John H. ; Clare Thomas J., RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system.
Moskowitz Paul A. (Yorktown Heights NY) Brady Michael J. (Brewster NY) Coteus Paul W. (Yorktown Heights NY), Radio frequency circuit and memory in thin flexible package.
Dieska David E. ; Friedman Daniel Joseph ; Goldman Kenneth Alan ; Heinrich Harley Kent, Single chip RF tag oscillator circuit synchronized by base station modulation frequency.
Smith Gregory M. (Colorado Springs CO), System and method for initiating communications between a controller and a selected subset of multiple transponders in a.
Cesar Christian Lenz (Shrub Oak NY) Chan Shun Shing (Flushing NY) Cofino Thomas Anthony (Rye NY) Goldman Kenneth Alan (Norwalk CT) Greene Sharon L. (Mt. Kisco NY) Heinrich Harley Kent (Brewster NY) M, System and method for radio frequency tag group select.
Cresap Michael S. (1294 Dorothy Rd. Crownsville MD 21032) Plant ; Jr. Edward G. (7892 Americana Cir. Apt. 201 Glen Burnie MD 21060), Tag tansponder system and method to identify items for purposes such as locating, identifying, counting, inventorying, o.
Welles ; II Kenneth Brakeley (Scotia NY) Hershey John Erik (Ballston Lake NY), Use of mutter mode in asset tracking for gathering data from cargo sensors.
Steele, Kerry D.; Anderson, Gordon A.; Gilbert, Ronald W., Communications device identification methods, communications methods, wireless communications readers, wireless communications systems, and articles of manufacture.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.