摘要:
Systems and methods to determine timebase and timing (i.e., time sync) of received signals in RFID systems. Multiple matched filters corresponding to multiple timebases are used to receive the preambles of signals received from RFID tags. The multiple matched filters define a range of expected timebases of the received signals. The matched filter with the maximum output signal peak is used to derive the timebase and timing of the received signal. Viterbi techniques can be used in determining the timebase and timing to incorporate a portion of the data signal in addition to the preamble. Reconfigurable matched filters can be used so that after a preliminary timebase is determined as described above, the matched filters can be reconfigured to define a new smaller range centered about the preliminary timebase. This allows the timebase to be determined with finer resolution when another preamble portion is received.
摘要:
Wirelessly testing an RFID tag before it is packaged or otherwise entered into a process reserved for “working” RFID tags is described. Various processes that employ such wireless testing as well as various “on-die” RFID tag antenna designs for facilitating the wireless testing are also described.
摘要:
An RFID tag has a fuse that is adapted to store configuration data in a way that survives loss of power. The fuse can be one time programmable or many times programmable, and be implemented with a non-volatile memory. The configuration data becomes available to an operational component of the tag, such as at power up, controlling its performance.
摘要:
NVM arrays include rows and columns of NVM cells comprising a floating gate, dual transistor, inverter storage element. Supply voltage for selected storage elements is turned off during a programming and an erase mode. Isolation transistors for each NVM cell or for each row of NVM cells may be used to control the supply voltage.
摘要:
RFID system components, such as readers and tags, communicate where at least a portion of data or a password is transmitted in encrypted form. The reader transmits a command, along with data or a password encrypted using an encryption kernel. In some instances, the tag itself has sent the kernel.
摘要:
RFID readers, computers, and methods are provided for reporting on the authentication of one or more RFID tags associated with a proffered item, while requiring special permissions be cleared before reporting. In some embodiments, a question is input about whether a Declared Password (DP) is regarded as proper for an Item Identifier (II), both of which have been input from the tags. An answer is generated for the question from the reference database, and transmitted to the user. The answer does not reveal an Actual Code that is indeed regarded as proper, unless the user first demonstrates they already know it. Beyond the authentication of the tag, the answer can further indicate the legitimacy of the proffered item, for a supply chain, at a Customs Office, etc.