摘要:
RFID systems, devices, software and methods are adapted for receiving from an RFID tag at least waves that communicate at least a first version of its code. An output tag code is output that is the same as the first version, if a fidelity criterion is met regarding the first version. If not met, the output tag code is instead a final version that is reconstructed from the first version, and also from any additionally optionally subsequently received versions. In some embodiments, an error recovery block includes a subcomponent fidelity criterion checking block that can determine whether the fidelity criterion is met, and a code reconstruction block that can derive the final version.
摘要:
Methods and apparatus provide secure two-way (reader-to-tag and tag-to-reader) RFID communications. According to one aspect, a tag receives a noise-encrypted RF carrier signal from a reader and backscatter modulates it with tag information. Eavesdroppers cannot extract the tag information from the backscattered signal because it is masked by the noise encryption.
摘要:
RFID readers, systems, and methods are provided for overcoming the effects of RF interference. While a system is communicating in a channel, RF interference is monitored. If it is low, then the next channel to be hopped onto is chosen in an unbiased manner. But if interference is high, then the next channel to be hopped onto is chosen in a biased manner that disfavors at least one channel over another, in view of the detected interference. The choice of the next channel can thus result in diminishing communication in channels with a lot of RF interference.
摘要:
RFID tags are commanded to generate a pilot tone in their backscatter. When the backscattered pilot tone is received in the reader, the pilot tone is used to estimate the tag period/frequency. Then, the estimate is used to seed and lock a symbol timing recovery loop, which provides a detected signal to one or more correlators for detecting the tag preamble. A delayed version of the received tag signal is compared against a baseline signal threshold established from the received signal to detect the pilot tone.
摘要:
Methods and apparatus for providing secure two-way (reader-to-tag and tag-to-reader) RFID communications. According to one aspect of the invention, a tag receives a noise-encrypted RF carrier signal from a reader and backscatter modulates it with tag information. Eavesdroppers cannot extract the tag information from the backscattered signal because it is masked by the noise encryption. According to another aspect of the invention, establishing a secure two-way RFID communication link includes a reader modulating a carrier signal with a noise encryption signal and broadcasting the noise-encrypted carrier to a singulated tag. The tag backscatter modulates the noise-encrypted carrier with a first portion of a key and/or a one-time pad pseudorandom number. If a key is used, upon receiving the backscattered signal the reader verifies that the tag is authentic, and, if verified as authentic, transmits a second portion of the key, possibly encrypted by a function depending on the one-time pad pseudorandom number, to the tag.
摘要:
A process is disclosed for communicating with individual tags in a population of tags having a binary tree organization, wherein each tag corresponds to a leaf node of the binary tree. The process includes singulating a predetermined leaf node and returning to a designated re-entry node associated with the predetermined leaf node after singulating.
摘要:
A radio frequency identification tag is disclosed that is configured to transmit a signal modulated with one of more than two different subcarrier modulation frequencies such that the signal represents more than one binary bit as a single symbol.
摘要:
RFID readers, systems, and methods are provided for overcoming the effects of RF interference. While a system is communicating in a channel, RF interference is monitored. If it is low, then hopping to another channel is performed according to an ordinary decision. But if interference is high, then hopping out to another channel can be earlier than would be dictated by the ordinary decision under the same circumstances. The earlier hopping out can result in diminishing communication in channels with a lot of RF interference.
摘要:
Systems and methods to determine timebase and timing (i.e., time sync) of received signals in RFID systems. Multiple matched filters corresponding to multiple timebases are used to receive the preambles of signals received from RFID tags. The multiple matched filters define a range of expected timebases of the received signals. The matched filter with the maximum output signal peak is used to derive the timebase and timing of the received signal. Viterbi techniques can be used in determining the timebase and timing to incorporate a portion of the data signal in addition to the preamble. Reconfigurable matched filters can be used so that after a preliminary timebase is determined as described above, the matched filters can be reconfigured to define a new smaller range centered about the preliminary timebase. This allows the timebase to be determined with finer resolution when another preamble portion is received.
摘要:
RFID tags and chips for RFID tags are capable of being inventoried in one or more early attempts. These tags are capable of then refraining from participating in one or more subsequent inventorying attempts. In some embodiments refraining is performed solely by the tag, while in others it is guided by the RFID reader. In some embodiments, an inventoried indicator in the tag becomes updated upon backscattering. The updated value is used by the tag to recognize a subsequent attempt, and thus refrain from participating in it. This permits the subsequent attempt to be used more intensively for inventorying the more elusive, harder-to-read tags, especially in more demanding scenarios.