Abstract:
An apparatus and method for reading multiple tags with different protocols in a RFID system are provided. The method of reading multiple tags with different protocols in a RFID system including the steps of: a) setting scheduling parameters including target protocols to read, priorities of each protocol, and information about a scheduling algorithm mode for reading multiple tags; b) reading tags of a single protocol corresponding to the target protocol when the scheduling algorithm mode is a single mode; and c) reading multiple tags by the target protocols when the scheduling algorithm mode is a multi mode.
Abstract:
Provided is a Radio Frequency identification (RFID) system and method for protecting information. The system includes: an identification information storing unit which includes identification information and generates an interrupt/interference signal to block access without permission; an RFID calling unit which reads information of the identification information storing unit by loading a basic protocol and a security protocol for recognizing the identification information storing unit; and a storing unit which registers and stores information required for authentication between the RFID calling unit and the identification information storing unit, and information required for access control.
Abstract:
Provided is a planar inverted-F antenna (PIFA) which has a Co-Planar Waveguide (CPW) feeding structure and can be attached to a metal surface, and an RFID tag using the same. The PIFA includes a radiation patch layer; a Co-Planar Waveguide (CPW) feeding layer; a feeding probe; and a short-circuit. The CPW feeding layer includes a feeding means and a ground surface. The feeding probe electrically connects the radiation patch layer and the feeding means and provides a Radio Frequency (RF) signal to be radiated to the radiation patch layer. The short-circuiting means short-circuits the radiation patch layer and the ground surface through the dielectric layer. The PIFA can be applied to a passive RFID tag. Impedance matching between the antenna and the RFID chip is possible. Also, the PIFA can easily control resonant frequency of the antenna and reactance.
Abstract:
Provided is a method for designing multiband antenna using a genetic algorithm unit linked to an electromagnetic wave analyzing unit and to a computer-readable recording medium for recording a program that implements the method. The multiband antenna designing method can design an antenna having an optimal structure by combining a genetic algorithm, one of global optimization techniques, with a full electromagnetic wave analyzing program Quick Finite Difference Time Domain (QFDTD). The method of the present research includes the steps of: a) at the full electromagnetic wave analyzing unit, analyzing an antenna structure contained in an input file and linking the antenna structure to the genetic algorithm unit; b) at the genetic algorithm unit, generating an initial group that expresses the antenna structure; c) at the genetic algorithm unit, evaluating cost functions by using the antenna structure analysis result; and d) at the genetic algorithm unit, designing an antenna by selecting objects based on the cost functions, mating the selected objects and generating mutants.
Abstract:
A tag transmitting apparatus of a passive RFID system generates a plurality of orthogonal square waves, converts tag data to a plurality of parallel data, and transmits the plurality of parallel data to a reader using a plurality of square waves as a subcarrier.
Abstract:
A passive phase jitter modulation (PJM) tag is charged with power in a continuous wave (CW) section. When receiving a command from a reader, the passive PJM tag must recognize the command and determine exactly when to begin demodulating the command. Only then can the passive PJM tag demodulate the command. To this end, a synchronization apparatus for accurately demodulating a signal input to a PJM tag includes a plurality of correlators correlating a received phase jitter-modulated signal with a template of an internal matched filter which is in the same form as at least a portion of a modified frequency modulation (MFM) flag.
Abstract:
An apparatus and a method for demodulating a subcarrier tag signal in a radio frequency identification (RFID) reader is provided. The apparatus for demodulating the subcarrier tag signal in the RFID reader may include: an edge signal generation unit receiving a subcarrier tag signal and generating an edge signal with respect to the tag signal; an edge information extraction unit extracting edge information from the generated edge signal; and a decoding unit decoding the tag signal using the extracted edge information.
Abstract:
Provided is a method for estimating the number of tags in a slotted Aloha-based RFID system, which can estimate the number of tags through a new statistical average scheme using the number of slots, the measured number of empty slots, and the measured number of ID slots. The estimating method includes the steps of: a) setting the number (N) of slots, the measured number (c0) of empty slots, and the measured number (c1) of ID slots as parameters; and estimating the number (n) of the tags by substituting the set values into n=(N−1)/(c0/c1).
Abstract:
Provided are a reader-tag integrated RFID apparatus and a method for controlling the same. The apparatus includes a tag unit for communicating with an external reader, and transmitting a response signal and data corresponding to a signal transmitted from the external reader to the external reader, a reader unit for selecting a channel between other reader and the reader-tag integrated RFID apparatus with a different delay time, and communicating with an external tag using a random value to minimize collision; and a controller for selectively activating one of the tag unit and the reader unit if it necessary.
Abstract:
Provided is a method for securing information between a Radio Frequency Identification (RFID) reader and tag, and an RFID Reader and tag using the same. The method includes the steps of: a) requesting an access password of the RFID tag in the RFID reader; b) extracting a key value mapped to the access password transmitted from the RFID tag and transmitting the key value to the RFID tag in the RFID reader; c) outputting a hash function value from the key value transmitted from the RFID reader in the RFID tag; and d) determining whether to allow the RFID reader to access to an RFID tag memory based on whether the outputted hash function value is the same as the access password of the RFID tag.