摘要:
Radio Frequency Identification (RFID) readers may transmit one or more encapsulated commands within the payload of an encapsulating command. An encapsulated command includes at least a command code and an instruction. A reader may instruct a tag to store the encapsulated command(s) or instruction(s) for later execution. A sequence of encapsulated commands may be contained within one encapsulating command or spread across multiple encapsulating commands. The sequence of encapsulated commands, or the sequence of instructions associated with the encapsulated commands, may form a program. The reader may cause the tag to execute the instructions or program upon receipt, upon a trigger event, serially or in parallel, and/or may cause the tag to modify the instructions or program by adjusting parameters. The reader may later instruct a tag to execute the instructions or program via another command which, in some cases, may be sent prior to tag singulation.
摘要:
Radio Frequency Identification (RFID) tags may receive one or more encapsulated commands within the payload of an encapsulating command. An encapsulated command includes at least a command code and an instruction. A tag may store the encapsulated command(s) or the instruction portion of the encapsulated command(s) for later execution. A sequence of encapsulated commands may be contained within one encapsulating command or spread across multiple encapsulating commands. The sequence of encapsulated commands, or the sequence of instructions associated with the encapsulated commands, may form a program. The tag may execute the instructions or program upon receipt, upon a trigger event, serially or in parallel, and/or may modify the instructions or program by adjusting parameters. The tag may later be told by a reader to execute the instructions or program via another command which, in some cases, may be sent prior to tag singulation.
摘要:
Radio Frequency Identification (RFID) readers may transmit one or more run commands specifying one or more programs for tag execution prior to tag singulation. A run command may encapsulate the program(s), in which case a tag may store or store and execute the program(s). A run command may alternatively specify programs stored on a tag. The reader may instruct a tag to execute the program(s) upon receipt, upon a trigger event, serially or in parallel, and/or may cause the tag to modify the program(s) by adjusting parameters. The reader may instruct tags to execute the program(s) via the run command or another command, which may be sent prior to tag singulation. A reader may cause a tag to determine whether to participate in a subsequent inventory round, modify a behavior during a subsequent inventory round, or store a result in a tag memory, based on the executed program(s).
摘要:
Radio Frequency Identification (RFID) tags may receive one or more run commands, prior to being singulated, that specify one or more programs for the tag to execute. A run command may encapsulate the programs, in which case the tag may execute or store and execute the program(s). A run command may alternatively specify programs stored on the tag. The tag may execute the program(s) upon receipt, upon a trigger event, serially or in parallel, and/or may modify the instructions or program(s) by adjusting parameters. A reader may tell the tag to execute the instructions or program(s) via the run command or another command which, in some cases, may be sent prior to tag singulation. A tag may, based on a result of the executed program(s), determine whether to participate in a subsequent inventory round, modify a behavior during a subsequent inventory round, or store the result in tag memory.
摘要:
RFID tags and chips for RFID tags are capable of being inventoried in one or more early attempts. These tags are capable of then refraining from participating in one or more subsequent inventorying attempts. In some embodiments refraining is performed solely by the tag, while in others it is guided by the RFID reader. In some embodiments, an inventoried indicator in the tag becomes updated upon backscattering. The updated value is used by the tag to recognize a subsequent attempt, and thus refrain from participating in it. This permits the subsequent attempt to be used more intensively for inventorying the more elusive, harder-to-read tags, especially in more demanding scenarios.
摘要:
RFID readers transmit a Quiet Technology (QT) command to RFID tags causing at least one of the tags to transition between a private profile and a public profile. When a tag is inventoried in the private profile, it replies to the reader with contents from its private memory. When a tag is inventoried in the public profile, it replies to the reader with contents from its public memory, where the contents of the public memory may be a subset and/or modified version of the private memory contents, or entirely different altogether. The tag's profile can be switched again by another QT command from the reader, or following a loss of power at the tag. An access password and/or a short-range mechanism may be employed to allow only authorized readers to transition tag profiles or interrogate the private memory contents of tags in the public profile.
摘要:
RFID tags, ICs for RFID tags, and methods are provided. In some embodiments, an RFID tag includes a memory with multiple sections, and a processing block. The processing block may map one of these sections, or another of these sections, for purposes of responding to a first command from an RFID reader. As such, an RFID tag can operate according to the data stored in the section mapped at the time. In some embodiments, a tag can even transition from mapping one of the sections to mapping another of the sections. This can amount to the tag exhibiting alternative behaviors, and permits hiding data on the tag.
摘要:
RFID reader systems, readers, components, software and methods can inventory RFID tags in one or more early attempts. Then they can facilitate the inventoried RFID tags to refrain from participating in one or more subsequent inventorying attempts. In some embodiments, an inventoried indicator in the tag becomes updated upon backscattering. The updated value is used by the tag to recognize a subsequent attempt, and thus refrain from participating in it. This permits the subsequent attempt to be used more intensively for inventorying the more elusive, harder-to-read tags, especially in more demanding scenarios.
摘要:
Embodiments are directed to a Radio Frequency Identification (RFID) integrated circuit (IC) having a first circuit block electrically coupled to first and second antenna contacts. The first antenna contact is disposed on a first surface of the IC and the second antenna contact is disposed on a second surface of the IC different from the first surface. The first and second antenna contacts are electrically disconnected from each other.
摘要:
RFID readers transmit a Quiet Technology (QT) command to RFID tags causing at least one of the tags to transition between a private profile and a public profile. When a tag is inventoried in the private profile, it replies to the reader with contents from its private memory. When a tag is inventoried in the public profile, it replies to the reader with contents from its public memory, where the contents of the public memory may be a subset and/or modified version of the private memory contents, or entirely different altogether. The tag's profile can be switched again by another QT command from the reader, or following a loss of power at the tag. An access password and/or a short-range mechanism may be employed to allow only authorized readers to transition tag profiles or interrogate the private memory contents of tags in the public profile.