摘要:
A radio frequency identification (RFID) tag is provided that prevents a recognition error of the RFID tag due to the occurrence of a shadow region. The RFID tag includes a first tag performing communication with an RFID reader and a second tag connected to the first tag and suitable for use with a different communication type from the first tag. Thus, when information stored in the first tag can not be read, the second tag is activated and externally transmits information and when information stored in the first tag can be read, the second tag is 1o deactivated and does not externally transmit information. A communication method of an RFID system including an RFID reader communicating with an RFID tag is also provided.
摘要:
Methods and apparatus are disclosed for location of objects to facilitate retrieval, filing, security, inventory stock-keeping and the like. The methods and apparatus employ a tag element associated with each object-to-be-located, and interrogation system for searching one or more spatial regions for such tagged items, as well as mechanisms for identifying objects within the interrogated region.
摘要:
Methods and apparatus are disclosed for location of objects to facilitate retrieval, filing, security, inventory stock-keeping and the like. The methods and apparatus employ a tag element associated with each object-to-be-located, and interrogation system for searching one or more spatial regions for such tagged items, as well as mechanisms for identifying objects within the interrogated region.
摘要:
Techniques for detecting radio-frequency identification (RFID) tags are disclosed. For example, an exit control system is described that detects unauthorized removal of articles from a protected facility. A series of antennas are setup to produce interrogation corridors located near the exit of the protected area. RFID tags are attached to the articles to be protected. Each tag includes information that uniquely identifies the article to which it is affixed and status information as to whether the articles removal from the facility is authorized. The RF reader outputs RF signals through the antennas to create electromagnetic fields within the interrogation corridors. The reader outputs RF power from a single port to the multiple antennas via a splitter/combiner. In this way, a single RF reader with only one transmitter/receiver port simultaneously interrogates multiple antennas. A variety of techniques are described by which the reader can detect the removal of an unauthorized article.
摘要:
Containers for holding goods are provided with a relay conductive structure for relaying RFID tags signals from one side of the container to another. The conductive structure includes a first antenna on the first side of the container, a second antenna on a second side of the container and a transmission line connecting the antennas. When the containers are arranged in a stack, the relay of RFID signals past each row of containers enables the interrogation toward the rear of the stack without disassembling the stack of containers.
摘要:
A method, system, and apparatus for interrogating a radio frequency identification (RFID) tag population are described. Tags are interrogated by a reader. The reader and tags engage in communication according to communications algorithms, where data symbols are exchanged between the reader and tags. Furthermore, a reader implicitly controls the operating state of every tag in the tag population by transmitting a single data symbol. Bit patterns may be collected from the tags by the reader, using a variety of interrogation techniques. In a general interrogation, the reader exchanges symbols with the tag population to interrogate the entire tag population. In a specific interrogation, a reader exchanges symbols with the tag population to target a particular tag identification number. Tags may also be placed in a superposition state by the reader, where they respond whenever a received data symbol matches the next bit of their identification number.
摘要:
An apparatus and method to identify devices including a first set of commands to identify devices in a first state and a second set of commands to identify devices in a second state, wherein devices identified in the first state are placed in the second state and devices identified in the second state are placed in the first state.
摘要:
A transfer function system for determining an identifier on a surface acoustic wave (SAW) identification tag and a method of operating the same. In one embodiment the system provides for (1) generating a radio frequency (RF) interrogation signal that causes a transducer located on a piezoelectric substrate to produce an initial acoustic pulse that reflects off of a plurality of reflectors arranged according to time and phase position on the substrate to yield response acoustic pulses, the transducer generating an RF response signal from the response acoustic pulses; and (2) determining the identifier by decoding the RF response signal in view of predefined time, phase and amplitude parameters.
摘要:
A method, system, and apparatus for remotely calibrating data symbols received by a radio frequency identification (RFID) tag population are described. Tags are interrogated by a reader, which may be located in a network of readers. The reader transmits data symbols to the tags. Tags respond to the interrogations with symbols that each represent one or more bits of data. To calibrate the tags, the reader transmits a plurality of pulses of different lengths to the tag population. The tags receive the plurality of pulses. A characteristic of each pulse, such as a pulse length, is stored by the tags. The stored pulse lengths are used to define different data symbols that are subsequently received by the tags from the reader.
摘要:
Methods and apparatus are disclosed for location of objects to facilitate retrieval, filing, security, inventory stock-keeping and the like. The methods and apparatus employ a tag element associated with each object-to-be-located, and interrogation system for searching one or more spatial regions for such tagged items, as well as mechanisms for identifying objects within the interrogated region.