IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0552514
(2012-07-18)
|
등록번호 |
US-8674809
(2014-03-18)
|
발명자
/ 주소 |
- Bares, William Henry
- Paley, Daniel Noah
- Schlicht, Lauren Marie
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
6 인용 특허 :
81 |
초록
▼
Systems and methods for activating one or more devices are disclosed. According to one embodiment, the device listens for an activate code, the activate code having a length field and a mask field, the mask field including a mask value, the length field specifying a length of the mask field to a fin
Systems and methods for activating one or more devices are disclosed. According to one embodiment, the device listens for an activate code, the activate code having a length field and a mask field, the mask field including a mask value, the length field specifying a length of the mask field to a final bit of the mask value. Upon receiving the activate code, the length field is compared to a stored length value for determining whether the length field meets a predefined criterion. If the length field meets the predefined criterion, an address of the activate value is loaded (if an address field is present) and the appropriate bits (mask value) of the mask field are compared to a stored activate value. An activate signal is generated if the mask value matches the stored activate value. The activate signal can be used to activate additional circuitry including the entire device.
대표청구항
▼
1. A method for activating a device, comprising: listening for an activate code;receiving the activate code, the activate code having a length field and a mask field following the length field, the mask field including a mask value, the length field having a length value specifying a length of the m
1. A method for activating a device, comprising: listening for an activate code;receiving the activate code, the activate code having a length field and a mask field following the length field, the mask field including a mask value, the length field having a length value specifying a length of the mask field as a specific numerical value of bits to a final bit of the mask value, thereby specifying a position of the final bit of the mask value in the mask field;comparing the length value in the length field to a stored length value for determining whether the length field meets a predefined criterion;comparing the mask value in the mask field to a stored activate value upon determining that the length field meets the predefined criterion; andactivating additional circuitry upon determining that the mask value matches the stored activate value;remaining in a hibernate state upon determining that the mask value does not match the stored activate value,wherein the predefined criterion is that the length value of the length field is greater or less than the stored length value,wherein the activate code is preceded by an interrupt signal, and further comprising detecting the interrupt signal and performing the method upon detecting the interrupt signal,wherein the mask value in the mask field is compared to the stored activate value on a bit-by-bit basis as the activate code is received, andwherein at least one of the fields of the activate code is programmable, wherein authorization is required prior to programming the at least one of the fields. 2. A method as recited in claim 1, wherein the predefined criterion is that the length value of the length field is greater than the stored length value. 3. A method as recited in claim 1, wherein the predefined criterion is that the length value of the length field is not greater than the stored length value. 4. A method as recited in claim 1, wherein the mask value is not compared to the stored activate value if the length field does not meet the predefined criterion, wherein the additional circuitry is not activated. 5. A method as recited in claim 1, wherein the activate code further includes an address field, wherein the address field is received prior to the mask field, the address field indicating a start position of the mask value in the mask field of the activate command. 6. A method as recited in claim 5, wherein the mask field is of a predefined length, wherein the method fails if the length field and address field result in a roll-over when comparing the stored activate value to the mask value. 7. A method as recited in claim 5, wherein the mask field is a circular mask, wherein if the length field and address field result in a roll-over, the stored activate value is compared to bits in the mask field in a circular manner. 8. A method as recited in claim 1, wherein the device is a radio frequency identification (RFID) tag, wherein the specific numerical value of bits to the final bit of the mask value is a numerical bit position of the final bit of the mask value in the mask field. 9. A method as recited in claim 8, wherein RFID tag is a passive tag. 10. A method as recited in claim 8, wherein RFID tag is an active tag. 11. A method as recited in claim 1, wherein the method is performed by several RFID tags, wherein only a portion of the tags compare the mask value in the mask field to a stored activate value upon receiving a particular activate code. 12. A Radio Frequency Identification (RFID) system, comprising: a plurality of RFID tags configured to perform the method of claim 1; andan RFID interrogator in communication with the RFID tags. 13. A method as recited in claim 1, wherein the activate code is preceded by a clock synchronization signal. 14. A method as recited in claim 1, further comprising changing the stored length value for use in a subsequent communication. 15. A method as recited in claim 1, further comprising changing the stored activate value for use in a subsequent communication. 16. A method as recited in claim 1, wherein the authorization includes verification of a password. 17. A method as recited in claim 1, further comprising terminating the comparison upon comparing the final bit of the mask field as specified by the length field. 18. A method as recited in claim 1, further comprising remaining in the hibernate state when the length field does not meet the predefined criterion. 19. A method as recited in claim 1, wherein the length value of the length field is equal to at least one of (i) a number of bits from a first bit following the length field to a final bit of the mask value, and (ii) a number of bits from a first bit of the mask field to the final bit of the mask value. 20. A method as recited in claim 1, wherein the predefined criterion is that the specific numerical value of bits defined by the length value of the length field is numerically greater or less than the stored length value. 21. An RFD tag, comprising: a circuit configured to perform the method as recited in claim 1; and a memory for storing the stored activate value.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.