摘要:
Methods and apparatus provide secure two-way (reader-to-tag and tag-to-reader) RFID communications. According to one aspect, a tag receives a noise-encrypted RF carrier signal from a reader and backscatter modulates it with tag information. Eavesdroppers cannot extract the tag information from the backscattered signal because it is masked by the noise encryption.
摘要:
RFID tags are commanded to generate a pilot tone in their backscatter. When the backscattered pilot tone is received in the reader, the pilot tone is used to estimate the tag period/frequency. Then, the estimate is used to seed and lock a symbol timing recovery loop, which provides a detected signal to one or more correlators for detecting the tag preamble. A delayed version of the received tag signal is compared against a baseline signal threshold established from the received signal to detect the pilot tone.
摘要:
Methods and apparatus for providing secure two-way (reader-to-tag and tag-to-reader) RFID communications. According to one aspect of the invention, a tag receives a noise-encrypted RF carrier signal from a reader and backscatter modulates it with tag information. Eavesdroppers cannot extract the tag information from the backscattered signal because it is masked by the noise encryption. According to another aspect of the invention, establishing a secure two-way RFID communication link includes a reader modulating a carrier signal with a noise encryption signal and broadcasting the noise-encrypted carrier to a singulated tag. The tag backscatter modulates the noise-encrypted carrier with a first portion of a key and/or a one-time pad pseudorandom number. If a key is used, upon receiving the backscattered signal the reader verifies that the tag is authentic, and, if verified as authentic, transmits a second portion of the key, possibly encrypted by a function depending on the one-time pad pseudorandom number, to the tag.
摘要:
A process is disclosed for communicating with individual tags in a population of tags having a binary tree organization, wherein each tag corresponds to a leaf node of the binary tree. The process includes singulating a predetermined leaf node and returning to a designated re-entry node associated with the predetermined leaf node after singulating.
摘要:
Systems, software, devices, and methods are described for an RFID reader system to communicate with RFID tags. RF energy encountered in conjunction with using a selected channel is detected and used to adjust a waveform shaping parameter in combination with a performance requirement. RF waves can be transmitted from the reader to the RFID tags and RF waves can be backscattered from the RFID tags. At least some of the RF waves transmitted to or backscattered from the RFID tags have a waveform with a shape according to the adjusted waveform shaping parameter.
摘要:
NVM arrays include rows and columns of NVM cells comprising a floating gate, a programming element, and a logic storage element. During a programming or erase mode, the floating gate of each cell is charged to a predetermined level. At the beginning of a read mode, all storage elements are pre-charged to a high supply voltage level. Following the pre-charge, selected cells are read to determine stored bit values. A charge status of the floating gate of each cell determines whether the storage element is turned on and the pre-charge voltage is pulled down corresponding to a bit value.
摘要:
Methods of and apparatuses for matching the signal delay, clock timing, frequency response, gain, offset, and/or transfer function of signal pathways in electrical circuits such as, for example, time-interleaved and pipelined circuits using analog-valued floating-gate MOSFETs are disclosed. The methods and apparatuses disclosed are applicable to a variety of circuits, including but not limited to, sample-and-hold or track-and-hold circuits, quadrature mixers, analog-to-digital converters (ADCs), digital-to-analog converters (DACs), analog or digital filters, and amplifiers.
摘要:
An RFID reader inventories a population of tags. The reader evaluates responses from tags by categorizing them in slots. As tags are inventoried, the number of slots based on a Q-parameter is reduced. The reader addresses the tags by communicating a Q1 value for the Q parameter, generates first contents from replies received from the tags, and computes a first merit statistic based on the first contents. Next, the reader determines a Q2 value for the Q parameter, which if used in the same way would meet a preset fairway condition better than the first merit statistic. After determining the Q2 value, the reader addresses a portion of the tags by communicating the Q2 value for the Q parameter.
摘要:
RFID tags have an on-chip antenna and an off-chip antenna. One of the antennas can become uncoupled if the proper signal is received, while the other antenna may still operate. The uncoupled antenna can be the larger one, for example the off-chip antenna. Then the tag can then be read only by the smaller antenna, which effectively reduces the range of the RFID tag, but without disabling it entirely.
摘要:
Methods and apparatuses for programming a single-poly pFET-based nonvolatile memory cell bias the cell so that band-to-band tunneling (BTBT) is induced and electrons generated by the BTBT are injected onto a floating gate of the cell. Following a predetermined event, the single-poly pFET is biased to induce impact-ionized hot-electron injection (IHEI). The predetermined event may be, for example, the expiration of a predetermined time period or a determination that a channel has been formed by the BTBT injection process that is sufficiently conducting to support IHEI. Employing BTBT permits a previously overerased or stuck bit to be “unstuck” or “removed” and thus be made usable (i.e., able to be programmed) again.