摘要:
A system and method that facilitates the configuration and control of components of an RFID system, taking into account how the RFID system components are associated with one or more physical locations within an environment in which the RFID system is deployed. A user provides information specifying associations between the system components and the physical locations within the environment to obtain visual representations of configuration data generated therefrom with reference to a facility view, an RF coverage view, and a location view of the data. The facility view serves as a reference plane for placement and orientation of antennas associated with RFID readers, location benchmark tags, and the physical locations of interest. After each antenna is placed and oriented on the facility view, an estimate of the size and shape of the RF interrogation zone of each antenna is computed, and representations of the RF interrogation zones are provided on the facility view to obtain the RF coverage view of the data. Next, the user provides information specifying the physical locations of interest to obtain the location view of the data. A composite of the facility view, the coverage view, and the location view is then generated to obtain an enhanced visual understanding of how the system components and the physical locations exist within the system environment, and how the components and locations are associated with one another.
摘要:
An architecture of an RFID system that facilitates the accessing of RFID tag data within an RFID environment. The architecture includes a plurality of RFID readers, each reader being operative to transmit a first RF signal for scanning at least one RFID tag disposed within an RF coverage region associated with the reader, and to receive at least one second RF signal including tag data in response to the scanning of the tag. The architecture further includes at least one host computer operative to execute at least one client application, and at least one controller/processor communicably coupled to the plurality of readers and the at least one host computer. The controller/processor is operative to control operation of the plurality of readers, to process the tag data received by the plurality of readers, and to provide the processed tag data to the at least one host computer for use by the at least one client application executing thereon.
摘要:
A system and method that facilitates the configuration and control of components of a radio frequency identification (RFID) system, taking into account how the RFID system components are associated with one or more physical locations within an environment in which the RFID system is deployed. The RFID system can be controlled by obtaining a representation of the physical space. Next, at least one region of interest is specified in the representation of the physical space. An interrogation zone is then specified in the representation of the physical space, in which the interrogation zone corresponds to the data reader. Next, at least one overlap region of the interrogation zone and the region of interest is specified. Information is then stored, including the representation, and the interest region, the interrogation zone, and/or the overlap region. Operation of the data reader is controlled as a function of the stored information.
摘要:
A system and method that facilitates the configuration and control of components of an RFID system, taking into account how the RFID system components are associated with one or more physical locations within an environment in which the RFID system is deployed. A user provides information specifying associations between the system components and the physical locations within the environment to obtain visual representations of configuration data generated therefrom with reference to a facility view, an RF coverage view, and a location view of the data. The facility view serves as a reference plane for placement and orientation of antennas associated with RFID readers, location benchmark tags, and the physical locations of interest. After each antenna is placed and oriented on the facility view, an estimate of the size and shape of the RF interrogation zone of each antenna is computed, and representations of the RF interrogation zones are provided on the facility view to obtain the RF coverage view of the data. Next, the user provides information specifying the physical locations of interest to obtain the location view of the data. A composite of the facility view, the coverage view, and the location view is then generated to obtain an enhanced visual understanding of how the system components and the physical locations exist within the system environment, and how the components and locations are associated with one another.
摘要:
An architecture of an RFID system that facilitates the accessing of RFID tag data within an RFID environment. The architecture includes a plurality of RFID readers, each reader being operative to transmit a first RF signal for scanning at least one RFID tag disposed within an RF coverage region associated with the reader, and to receive at least one second RF signal including tag data in response to the scanning of the tag. The architecture further includes at least one host computer operative to execute at least one client application, and at least one controller/processor communicably coupled to the plurality of readers and the at least one host computer. The controller/processor is operative to control operation of the plurality of readers, to process the tag data received by the plurality of readers, and to provide the processed tag data to the at least one host computer for use by the at least one client application executing thereon.
摘要:
A system and method for monitoring and characterizing various sources of RF interference within an RFID environment, and for adjusting the operational characteristics of an array of RFID readers within the system based on these interference characterizations. The system examines the received transmissions from readers in the network by controlling a calibration cycle or while they are operating as interrogators to determine interference parameters, and to verify the operation of the readers in the array. The system also examines outside sources of interference, and signal dependent interference. The interference characterization can also be estimated from a combination of calculations and co-monitoring.
摘要:
A system and method of scheduling RFID tag interrogations by a plurality of RFID readers so as to mitigate the effects of interference within an RFID environment in which the readers are deployed, and to enhance the efficiency and reliability of the overall RFID system. The system includes a plurality of RFID receivers for receiving RFID tag data, a plurality of RFID tag interrogators for transmitting RF interrogation signals for interrogating RFID tags, and a controller for providing to at least one interrogator, at least one receiver, and at least one tag, a parameter associated with operational characteristics of the interrogator, the receiver, and the tag, respectively. The interrogator, the receiver, and the tag are operative, in response to receipt of the respective parameter, to modify its operational characteristics in accordance with the respective parameter, thereby avoiding interference at the receivers and the tags.
摘要:
A system and method of determining locations of one or more RFID tags within an RFID environment. The system includes a plurality of RFID readers, each operative to transmit and receive RF signals for scanning a tag disposed within an RF coverage region associated with the reader, and for receiving tag data in response to the scanning of the tag. A plurality of sub-locations is determined within the environment, each corresponding to at least a portion of at least one of a plurality of RF coverage regions associated with the readers. The sub-locations are mapped to a plurality of predefined locations within the environment. A reader scans a tag, and receives tag scan data from the tag in response to the scanning of the tag. The tag scan data includes a tag identifier associated with the scanned tag. The tag scan data is mapped to the sub-locations based on the RF coverage region associated with the reader. The location of the scanned tag is then determined with reference to the predefined locations within the environment, based on the tag identifier included in the tag scan data, the mapping of the tag scan data to the sub-locations, and the mapping of the sub-locations to the predefined locations.
摘要:
A radio frequency identification wristband for attaching to a patient that has a band, a wristband housing attached to or integral with said band, one or more radio frequency identification tag(s) or tag inlay(s), an insulator material, wherein said wristband housing is adhered to said radio frequency identification tag or tag inlay, said radio frequency identification tag or tag inlay is adhered to an isolator material, and wherein said insulator material is nearest to the skin of the patient and insulates the radio frequency identification tag or tag inlay from the patient's skin.
摘要:
A Pluggable small form-factor UHF Radio Frequency ID reader having in an enclosure: a host CPU; volatile memory; non-volatile memory; power inputs; digital circuitry comprising the CPU and supporting components; analog circuitry comprising power and Radio Frequency components; one or more antennas; networking components; user interface components; debug and test components; WiFi subsystem; Radio Frequency ID subsystem; wherein said enclosure comprises thermal dissipation capacity, radio frequency transparency with WiFi and Radio Frequency ID antennas, provides protection from physical and radiofrequency forces, is mountable to an AC outlet and can also be mounted flush to a solid wall or surface or at an angle to a solid wall or surface, connectable to PoE or DC inputs, having a capacity to convert AC/DC current; Radio Frequency ID setting configurable, employs intelligent filtering and smoothing algorithms and transmits only relevant summarized information back over a network, and permits firmware management and real-time monitoring.