Abstract:
A device configured for tracking spatial placement of one or more HF (High frequency) RFID (Radio-frequency identification) tag objects on a surface is disclosed. The device includes an HF RFID reader, a transmission antenna, and a plurality of reception antennas. The transmission antenna effectively transmits power and data over an area that is defined to be a detection surface. Each one of the plurality of reception antennas is able to effectively receive data from a separate portion of the detection surface, while all of the plurality of reception antennas together are able to effectively receive data from substantially all of the detection surface. In one embodiment, the transmission antenna is constantly transmitting power.
Abstract:
A device configured for tracking spatial placement of one or more HF (High frequency) RFID (Radio-frequency identification) tag objects on a surface is disclosed. The device includes an HF RFID reader, a transmission antenna, and a plurality of reception antennas. The transmission antenna effectively transmits power and data over an area that is defined to be a detection surface. Each one of the plurality of reception antennas is able to effectively receive data from a separate portion of the detection surface, while all of the plurality of reception antennas together are able to effectively receive data from substantially all of the detection surface. In one embodiment, the transmission antenna is constantly transmitting power.
Abstract:
The exemplary embodiments of the invention realize an efficient prevention of massive infiltration of cloned RFID transponders into existing and new RFID systems. Furthermore, reader devices used for authentication of RFID transponders do not need to be on-line and do not need to be equipped with a Security Authentication Module (SAM). This simplifies authentication procedures and reduces costs. According to an exemplary embodiment of the invention a transponder-specific originality signature is stored by a transponder manufacturer on the transponder. The transponder-specific originality signature may, for example, be stored in the non-volatile memory (EEPROM) of the transponder during the fabrication of the transponder. This transponder-specific originality signature can be checked at any time in a convenient way, which provides an indication of originality of said transponder.
Abstract:
The exemplary embodiments of the invention realize an efficient prevention of massive infiltration of cloned RFID transponders into existing and new RFID systems. Furthermore, reader devices used for authentication of RFID transponders do not need to be on-line and do not need to be equipped with a Security Authentication Module (SAM). This simplifies authentication procedures and reduces costs. According to an exemplary embodiment of the invention a transponder-specific originality signature is stored by a transponder manufacturer on the transponder. The transponder-specific originality signature may, for example, be stored in the non-volatile memory (EEPROM) of the transponder during the fabrication of the transponder. This transponder-specific originality signature can be checked at any time in a convenient way, which provides an indication of originality of said transponder.