摘要:
RFID tags, ICs for RFID tags, and methods are provided. In some embodiments, an RFID tag includes a memory with multiple sections, and a processing block. The processing block may map one of these sections, or another of these sections, for purposes of responding to a first command from an RFID reader. As such, an RFID tag can operate according to the data stored in the section mapped at the time. In some embodiments, a tag can even transition from mapping one of the sections to mapping another of the sections. This can amount to the tag exhibiting alternative behaviors, and permits hiding data on the tag.
摘要:
RFID tags, ICs for RFID tags, and methods are provided. In some embodiments, an RFID tag includes a memory with multiple sections, and a processing block. The processing block may map one of these sections, or another of these sections, for purposes of responding to a first command from an RFID reader. As such, an RFID tag can operate according to the data stored in the section mapped at the time. In some embodiments, a tag can even transition from mapping one of the sections to mapping another of the sections. This can amount to the tag exhibiting alternative behaviors, and permits hiding data on the tag.
摘要:
RFID readers transmit a Quiet Technology (QT) command to RFID tags causing at least one of the tags to transition between a private profile and a public profile. When a tag is inventoried in the private profile, it replies to the reader with contents from its private memory. When a tag is inventoried in the public profile, it replies to the reader with contents from its public memory, where the contents of the public memory may be a subset and/or modified version of the private memory contents, or entirely different altogether. The tag's profile can be switched again by another QT command from the reader, or following a loss of power at the tag. An access password and/or a short-range mechanism may be employed to allow only authorized readers to transition tag profiles or interrogate the private memory contents of tags in the public profile.
摘要:
RFID readers transmit a Quiet Technology (QT) command to RFID tags causing at least one of the tags to transition between a private profile and a public profile. When a tag is inventoried in the private profile, it replies to the reader with contents from its private memory. When a tag is inventoried in the public profile, it replies to the reader with contents from its public memory, where the contents of the public memory may be a subset and/or modified version of the private memory contents, or entirely different altogether. The tag's profile can be switched again by another QT command from the reader, or following a loss of power at the tag. An access password and/or a short-range mechanism may be employed to allow only authorized readers to transition tag profiles or interrogate the private memory contents of tags in the public profile.
摘要:
Embodiments are directed to a Radio Frequency Identification (RFID) integrated circuit (IC) having a first circuit block electrically coupled to first and second antenna contacts. The first antenna contact is disposed on a first surface of the IC and the second antenna contact is disposed on a second surface of the IC different from the first surface. The first and second antenna contacts are electrically disconnected from each other.
摘要:
An Integrated Circuit (IC) for an RFID tag and a tag including such an IC are provided where the IC includes at least two rectifiers and two antenna ports for connecting to two respective antennas with at least three of the four antenna terminals not sharing a reference potential of the IC. According to other embodiments, the antenna ports are also electrically isolated from each other.
摘要:
Rogue RFID readers are detected by listening to communication between rogue reader and a tag, capturing a time stamp and/or a channel associated with the communication, and checking the captured time stamp/channel to determine whether it is a result of a command from another legitimate reader. Audible or visible alerts may be issued, flags may be set, or messages transmitted to an administrator upon determining the operation of the rogue RFID reader. Based on the alert(s) affected tags or the rogue reader may be jammed or an effect of the illegal transmission by the rogue reader may be reversed or tags replaced.
摘要:
Rogue RFID readers are detected by listening to communication between rogue reader and a tag, capturing an identifier associated with the tag from the communication by the reader or by the tag, and checking the captured identifier to determine whether it is a result of a command from another legitimate reader. Audible or visible alerts may be issued, flags may be set, or messages transmitted to an administrator upon determining the operation of the rogue RFID reader. Based on the alert(s) affected tags or the rogue reader may be jammed or an effect of the illegal transmission by the rogue reader may be reversed or tags replaced.
摘要:
A nonconductive, organic stabilization layer deposited on an RFID IC provides a consistent and predictable mounting distance between the RFID IC and its antenna layer or a strap, thereby ensuring a consistent and predictable mounting capacitance between circuits of the RFID IC and an antenna formed on the inlay or the strap. Openings in the stabilization layer enable electrical connection between the antenna pads of the RFID IC and the terminals of the inlay antenna or strap contacts through bumps formed on the antenna pads, through a conductive redistribution layer formed on the stabilization layer (when the inlay or strap is attached to the RFID IC by means of an anisotropic conductive layer), or through a capacitive connection to the inlay antenna or strap (when the inlay or strap is attached to the RFID IC by means of a nonconductive layer).
摘要:
Disclosed is a technique for probing dynamic sheet charge density variations in integrated semiconductor devices. Using a specially designed non-invasive Nomarski phase contrast interferometer a sheet charge density sensitivity of 2.6.times.10.sup.8 e/cm.sup.2 / .sqroot.Hz is extracted from experimental data for 1 mA of detected photocurrent. The charge density sensitivity makes possible .mu.V signal level detection in an active device, and with digital signals the corresponding signal/noise level is sufficiently high that multi-mega-baud data can be captured in real time.
摘要翻译:公开了一种用于探测集成半导体器件中的动态片电荷密度变化的技术。 使用特殊设计的非侵入式Nomarski相位干涉仪,从实验数据中提取2.6×10 8 e / cm 2 / 2ROOT Hz的片材电荷密度灵敏度,检测1mA的光电流。 电荷密度灵敏度使得有源器件中的μV信号电平检测成为可能,并且对于数字信号,对应的信号/噪声电平足够高,从而可以实时捕获多兆波特数据。