-
公开(公告)号:US11790192B1
公开(公告)日:2023-10-17
申请号:US17732623
申请日:2022-04-29
申请人: Impinj, Inc.
IPC分类号: G06K7/10 , G06Q10/087 , G06K19/077
CPC分类号: G06K7/10366 , G06K7/10128 , G06Q10/087 , G06K7/10178 , G06K19/07749
摘要: Techniques are provided to estimate the location of an RFID tag using tag read information, such as a tag read count or a tag read rate, and an opportunity metric, such as an inventory cycle duration, inventory cycle rate, or inventory cycle count. A tag tracking system determines read information for a tag in a zone and an opportunity metric associated with the tag and the zone. The tag tracking system then computes a success rate based on the tag read information and opportunity metric, and uses the success rate to estimate the location of the tag.
-
公开(公告)号:US11748703B1
公开(公告)日:2023-09-05
申请号:US17592598
申请日:2022-02-04
申请人: Impinj, Inc.
IPC分类号: G06Q10/08 , G06Q10/087 , G06K7/10 , G06K19/077 , G08B13/24 , G06K19/07
CPC分类号: G06Q10/087 , G06K7/10297 , G06K19/0705 , G06K19/07749 , G08B13/2485
摘要: An RFID loss-prevention system (LPS) may monitor RFID-tagged items in a facility. An RFID reader transmits a first inventory command configured to cause tags in a first state to respond, receive a reply from a first tag, determine that the first tag has a low transition risk, and cause the first tag to switch to a second state. The reader may also receive a reply from a second tag, determine that the second tag has a high transition risk, and cause the second tag to remain in the first state. The reader may then transmit a second inventory command configured to cause tags in the first state to respond, receive a reply from the second tag in response to the second inventory command, determine that the second tag has inappropriately exited the facility, and issue an alert.
-
公开(公告)号:US10733395B1
公开(公告)日:2020-08-04
申请号:US16270611
申请日:2019-02-08
申请人: Impinj, Inc.
发明人: Christopher J. Diorio , Scott A. Cooper , Kurt E. Sundstrom , Todd E. Humes , Alberto Pesavento
摘要: Embodiments are directed to restricting access to Radio Frequency Identification (RFID) tag information based on location. Access to RFID tag information may be restricted at the reader level, at the requester level, and at the network level. When reader-level restrictions exist, devices may be prevented from inventorying tags and retrieving information from tags. When requester-level restrictions exist, a requester or device may be prevented from receiving tag information from inventoried tags or a network. When network-level restrictions exist, a network may discard or otherwise restrict tag information received from devices.
-
公开(公告)号:US10521768B1
公开(公告)日:2019-12-31
申请号:US16455792
申请日:2019-06-28
申请人: Impinj, Inc.
IPC分类号: G06Q10/08 , G06K7/10 , G06K19/077 , G08B13/24 , G06K19/07
摘要: An RFID loss-prevention system (LPS) may monitor RFID-tagged items in a facility. An RFID reader transmits a first inventory command configured to cause tags in a first state to respond, receive a reply from a first tag, determine that the first tag has a low transition risk, and cause the first tag to switch to a second state. The reader may also receive a reply from a second tag, determine that the second tag has a high transition risk, and cause the second tag to remain in the first state. The reader may then transmit a second inventory command configured to cause tags in the first state to respond, receive a reply from the second tag in response to the second inventory command, determine that the second tag has inappropriately exited the facility, and issue an alert.
-
公开(公告)号:US10373115B1
公开(公告)日:2019-08-06
申请号:US15811554
申请日:2017-11-13
申请人: Impinj, Inc.
IPC分类号: G06Q10/08 , G06K19/07 , G08B13/24 , G06K19/077 , G06K7/10
摘要: An RFID loss-prevention system (LPS) may monitor RFID-tagged items in a facility. An RFID reader transmits a first inventory command configured to cause tags in a first state to respond, receive a reply from a first tag, determine that the first tag has a low transition risk, and cause the first tag to switch to a second state. The reader may also receive a reply from a second tag, determine that the second tag has a high transition risk, and cause the second tag to remain in the first state. The reader may then transmit a second inventory command configured to cause tags in the first state to respond, receive a reply from the second tag in response to the second inventory command, determine that the second tag has inappropriately exited the facility, and issue an alert.
-
公开(公告)号:US09565022B1
公开(公告)日:2017-02-07
申请号:US14318367
申请日:2014-06-27
申请人: Impinj, Inc.
CPC分类号: H04L9/14 , G06K7/10257 , G06K19/073 , G06Q30/00 , H04L9/0643 , H04L9/0877 , H04L9/30 , H04L9/3271 , H04L63/06 , H04L63/083 , H04L2209/805 , H04W12/04 , H04W12/06
摘要: A cryptographically-enabled RFID tag stores a primary secret key and derives secondary keys from the primary key. A secondary key may be derived by combining the primary key with one or more other parameters using one or more algorithms. The tag uses a derived secondary key to encrypt or electronically sign a tag response sent to a verifying entity. The verifying entity does not know the derived secondary key, but knows the tag primary key and the parameters and algorithms used to derive the secondary key and can derive all of the potential secondary keys. The verifying entity can then attempt to authenticate the tag or tag response by trying potential secondary keys.
摘要翻译: 启用加密功能的RFID标签存储主密钥,并从主键导出辅助密钥。 可以通过使用一个或多个算法将主键与一个或多个其他参数组合来导出次要键。 标签使用派生的次要密钥来加密或电子签名发送到验证实体的标签响应。 验证实体不知道派生的辅助密钥,而是知道标签主键以及用于导出辅助密钥的参数和算法,并且可以导出所有潜在的辅助密钥。 然后,验证实体可以尝试通过尝试潜在的次要密钥来验证标签或标签响应。
-
公开(公告)号:US11797813B1
公开(公告)日:2023-10-24
申请号:US16868561
申请日:2020-05-07
申请人: Impinj, Inc.
发明人: Joshua F. Ensworth , Alberto Pesavento , Harley K. Heinrich , Theron Stanford , Thomas G. Anderl
CPC分类号: G06K19/0723 , G06K7/0008 , G06K7/10297
摘要: RFID tag ICs in a population can adjust the impedance values used to backscatter-modulate reply signals to increase the distribution or spread of backscattered signal parameters, thereby facilitating the recovery of collided tag replies. An RFID tag IC may adjust its impedance value(s) based on a reader command or independently.
-
公开(公告)号:US11244282B1
公开(公告)日:2022-02-08
申请号:US17326520
申请日:2021-05-21
申请人: Impinj, Inc.
IPC分类号: G06Q10/08 , G06K7/10 , G06K19/077 , G08B13/24 , G06K19/07
摘要: An RFID loss-prevention system (LPS) may monitor RFID-tagged items in a facility. An RFID reader transmits a first inventory command configured to cause tags in a first state to respond, receive a reply from a first tag, determine that the first tag has a low transition risk, and cause the first tag to switch to a second state. The reader may also receive a reply from a second tag, determine that the second tag has a high transition risk, and cause the second tag to remain in the first state. The reader may then transmit a second inventory command configured to cause tags in the first state to respond, receive a reply from the second tag in response to the second inventory command, determine that the second tag has inappropriately exited the facility, and issue an alert.
-
公开(公告)号:US10650346B1
公开(公告)日:2020-05-12
申请号:US16137555
申请日:2018-09-21
申请人: Impinj, Inc.
摘要: Portals and other chokepoints can be monitored with RFID reader systems. A portion of an RFID reader system capable of generating multiple beams can be mounted between two adjacent chokepoints such that some beams are associated with one chokepoint while other beams are associated with the other chokepoint. When replies from an item are received, the item can be associated with a chokepoint based on parameters or characteristics associated with the replies and/or the beam(s) on which the replies are received. If the detected item is moving, its movement direction through the chokepoint and/or its movement speed may also be determined.
-
公开(公告)号:US10204245B1
公开(公告)日:2019-02-12
申请号:US15945788
申请日:2018-04-05
申请人: Impinj, Inc.
发明人: Christopher J. Diorio , Scott A. Cooper , Kurt E. Sundstrom , Todd E. Humes , Alberto Pesavento
摘要: Embodiments are directed to restricting access to Radio Frequency Identification (RFID) tag information based on location. Access to RFID tag information may be restricted at the reader level, at the requester level, and at the network level. When reader-level restrictions exist, devices may be prevented from inventorying tags and retrieving information from tags. When requester-level restrictions exist, a requester or device may be prevented from receiving tag information from inventoried tags or a network. When network-level restrictions exist, a network may discard or otherwise restrict tag information received from devices.
-
-
-
-
-
-
-
-
-