摘要:
An interrogation system employable with an object having a radio frequency identification (RFID) tag and method of operating the same. In one embodiment, the interrogation system includes a database having prior knowledge about the object, and an interrogator that scans the RFID tag and discerns additional information therefrom about the object. The interrogator still further includes a control system that identifies the object based on the prior knowledge and the additional information.
摘要:
A reply code for a radio frequency identification (RFID) tag, a method of improving a reply code for a radio frequency identification (RFID) tag for interrogation by an interrogator and an RFID tag employing the same. In one embodiment, the reply code includes a preamble having information about a quality of a clock associated with the RFID tag. The reply code also includes a tag identification (ID) code providing a digital signature for the RFID tag. The reply code still further includes an aftamble located aft of the preamble and having information about the quality of the clock. The aftamble cooperates with the preamble to improve a quality of the reply code for interrogation by an interrogator.
摘要:
An interrogator, methods of discerning the presence of an object, and interrogation systems employing the same. In one embodiment, the interrogation systems include multiple interrogators that communicate with a base command unit to track a location of an object. In another embodiment wherein the object is an RFID object (e.g., an object with an RFID tag), the interrogators employ signal processing techniques such as precharging the RFID object, and correlating a reference code with a reply code from the RIFD object using selected techniques to increase a sensitivity of the interrogator, especially for adverse environments. In other embodiments, the interrogation systems include variations of metal instruments and sponges employed therewith. In yet another embodiment, the interrogation system includes metal interrogators capable of discerning the presence of a metal object, especially in a presence of another metal object.
摘要:
An interrogator, methods of discerning the presence of an object, and interrogation systems employing the same. In one embodiment, the interrogation systems include multiple interrogators that communicate with a base command unit to track a location of an object. In another embodiment wherein the object is an RFID object (e.g., an object with an RFID tag), the interrogators employ signal processing techniques such as precharging the RFID object, and correlating a reference code with a reply code from the RIFD object using selected techniques to increase a sensitivity of the interrogator, especially for adverse environments. In other embodiments, the interrogation systems include variations of metal instruments and sponges employed therewith. In yet another embodiment, the interrogation system includes metal interrogators capable of discerning the presence of a metal object, especially in a presence of another metal object.
摘要:
An interrogator, methods of discerning the presence of an object, and interrogation systems employing the same. In one embodiment, the interrogation systems include multiple interrogators that communicate with a base command unit to track a location of an object. In another embodiment wherein the object is an RFID object (e.g., an object with an RFID tag), the interrogators employ signal processing techniques such as precharging the RFID object, and correlating a reference code with a reply code from the RFID object using selected techniques to increase a sensitivity of the interrogator, especially for adverse environments. In other embodiments, the interrogation systems include variations of metal instruments and sponges employed therewith. In yet another embodiment, the interrogation system includes metal interrogators capable of discerning the presence of a metal object, especially in a presence of another metal object.
摘要:
A control and processing system for use with an interrogator and an interrogation system employing the same. In one embodiment, the control and processing system includes a correlation subsystem having a correlator that correlates a reference code with a reply code from a radio frequency identification (RFID) tag and provides a correlation signal therefrom. The control and processing system also includes a decision subsystem that verifies a presence of the RFID tag as a function of the correlation signal.
摘要:
A control and processing system for use with an interrogator and an interrogation system employing the same. In one embodiment, the control and processing system includes a correlation subsystem having a correlator that correlates a reference code with a reply code from a radio frequency identification (RFID) tag and provides a correlation signal therefrom. The control and processing system also includes a decision subsystem that verifies a presence of the RFID tag as a function of the correlation signal.
摘要:
An interrogator, methods of discerning the presence of an object, and interrogation systems employing the same. In one embodiment, the interrogation systems include multiple interrogators that communicate with a base command unit to track a location of an object. In another embodiment wherein the object is an RFID object (e.g., an object with an RFID tag), the interrogators employ signal processing techniques such as precharging the RFID object, and correlating a reference code with a reply code from the RFID object using selected techniques to increase a sensitivity of the interrogator, especially for adverse environments. In other embodiments, the interrogation systems include variations of metal instruments and sponges employed therewith. In yet another embodiment, the interrogation system includes metal interrogators capable of discerning the presence of a metal object, especially in a presence of another metal object.
摘要:
In a first embodiment of the invention, a concatenated preamble code is formed by a kronecker product between two subcodes of the same or different lengths. The subcodes have favorable correlation properties and may be Barker codes, minimum peak sidelobe codes, Gold codes, Kasami codes, Bozta codes, or other codes. At the receiver a two-stage processor is used to detect the concatenated preamble code. The two-stage processor comprises a series of two filters, one of which is preferably a mismatched filter. In another aspect of the invention, a repeated codeword preamble is formed from a series of the same repeated short subcode. The short subcode may be an augmented or truncated odd-length code. At the receiver a single matched filter is preferably used to generate a series of spikes separated by the period of the subcode. An alert/confirm detector non-coherently adds together individual correlation spikes and reject false alarms. The alert function measures total correlation energy and adjusts detection thresholds based thereon, while the confirm function ensures that the proper number of correlation spikes exceed a detection threshold at the correct times. The preamble codes and their means for detection are preferably employed in a TDMA spread spectrum communication system, wherein a plurality of user stations communicate with a base station, one in each time slot (or virtual time slot).
摘要:
A system and method for time division duplex communication over a single frequency band wherein guard time overhead is reduced by active adjustment of reverse link transmission timing as a function of round trip propagation time. A time frame is divided into a plurality of time slots, during each of which the base station transmits to a user station and the user station transmits to the base station. Communication is initiated by a round trip timing transaction. In response to a general polling message from the base station, a user station seeking to establish communication transmits a short reply message. The base station calculates the distance of the user station by measuring the propagation delay with respect to receipt of the reply message. The base station sends a timing adjustment command to the user station instructing the user station to advance or retard its timing according to the calculated distance, so as to minimize guard times between time slots. Thereafter, the base station monitors the user station transmissions and periodically commands the user station to advance or retard its timing in a like manner. The user station may transmit a control preamble at the start of each time slot to allow the base station to perform round trip timing calculations, and/or to allow adjustment of user station power or antenna selection.