摘要:
RFID reader systems, readers, components, software and methods for causing a custom RFID tag to change how many remaining commands they will comply with. In a number of embodiments, this is achieved by causing a custom limiting command to be transmitted to the tag.
摘要:
RFID reader systems, readers, components, software and methods for causing a custom RFID tag to change how many remaining commands they will comply with. In a number of embodiments, this is achieved by causing a custom limiting command to be transmitted to the tag.
摘要:
RFID tags and chips for RFID tags are capable of complying with only a limited number of remaining commands, and methods. In a number of embodiments, a counter is adjusted in association with receiving a command and complying with it. The tag complies until the counter reaches a limit, and then it can stop complying. Non-compliance can be by the tag becoming quiet, or performing other activities, or performing nothing at all, or performing only selected activities, and so on. In some embodiments non-compliance is permanent, while in others it is temporary and/or restorable.
摘要:
RFID tags and chips for RFID tags are capable of complying with only a limited number of remaining commands, and methods. In a number of embodiments, a counter is adjusted in association with receiving a command and complying with it. The tag complies until the counter reaches a limit, and then it can stop complying. Non-compliance can be by the tag becoming quiet, or performing other activities, or performing nothing at all, or performing only selected activities, and so on. In some embodiments non-compliance is permanent, while in others it is temporary and/or restorable.
摘要:
An RFID tag can have a state diagram with a timed state that automatically expires after a timeout time. RFID reader systems, software, tags, circuits and methods are provided that send an interim command to cancel the impending automatic expiration.
摘要:
Radio Frequency IDentification (RFID) reader system, software, and methods are provided, such that an operational processing block for the RFID reader to communicate with an RFID tag uses a RF spectrum portion subdivided into a set of channels. The communication takes place in the presence of a foreign device that uses a subset of first channels of the RF spectrum and does not use a subset of second channels of the spectrum. The methods cause a radiating power directed towards the tag to be reduced and a radiating dwell time to be changed. This is to assure that co-existing systems can operate without compromising their functionality and operational quality. In some embodiments, the radiating power is reduced to zero.
摘要:
Radio Frequency Identification (RFID) readers may transmit one or more encapsulated commands within the payload of an encapsulating command. An encapsulated command includes at least a command code and an instruction. A reader may instruct a tag to store the encapsulated command(s) or instruction(s) for later execution. A sequence of encapsulated commands may be contained within one encapsulating command or spread across multiple encapsulating commands. The sequence of encapsulated commands, or the sequence of instructions associated with the encapsulated commands, may form a program. The reader may cause the tag to execute the instructions or program upon receipt, upon a trigger event, serially or in parallel, and/or may cause the tag to modify the instructions or program by adjusting parameters. The reader may later instruct a tag to execute the instructions or program via another command which, in some cases, may be sent prior to tag singulation.
摘要:
Radio Frequency Identification (RFID) tags may receive one or more encapsulated commands within the payload of an encapsulating command. An encapsulated command includes at least a command code and an instruction. A tag may store the encapsulated command(s) or the instruction portion of the encapsulated command(s) for later execution. A sequence of encapsulated commands may be contained within one encapsulating command or spread across multiple encapsulating commands. The sequence of encapsulated commands, or the sequence of instructions associated with the encapsulated commands, may form a program. The tag may execute the instructions or program upon receipt, upon a trigger event, serially or in parallel, and/or may modify the instructions or program by adjusting parameters. The tag may later be told by a reader to execute the instructions or program via another command which, in some cases, may be sent prior to tag singulation.
摘要:
In RFID systems employed for loss prevention, an item supplier or an ingress reader writes an ownership code associated with an organization or facility into a tag, indicating that an item to which the tag is attached is associated with the facility and not foreign. At checkout or point-of-sale an authorization reader writes a digital signature into the tag indicating that the tagged item is allowed to leave the facility. At point-of-exit an exit reader determines if the tagged item is allowed to leave the facility by verifying the ownership code and the digital signature. The loss-prevention system may issue an alert or sound an alarm if a facility-associated item is leaving the facility without a proper digital signature indicating that the item is approved to leave.
摘要:
RFID tags and chips for RFID tags are capable of replying using changed reply timing. In a number of embodiments, this timing change is achieved when a tag receives a custom timing command from an RFID reader. In some embodiments, the changed reply timing affects an amount of delay before a tag backscatters a reply.