摘要:
An identification system includes a reader and one or more tags. The reader identifies tags such as radio frequency (RF) tags. The system divides a number space into n bins, wherein each bin is associated with m unique bits of the number space, and the number space contains the identification codes of the tags. A command is issued to test v bits of the number space. A response is received from a tag, wherein the response occurs when a first portion of an identification code of the tag matches the v bits of the number space, a timing of the response corresponds to a particular bin and m unique bits associated with the particular bin correspond to a second portion of the identification code.
摘要:
There is provided an interrogator, transponder, and transponder identification method, which shorten processing time for identification. An interrogator that makes wireless communication with a transponder, comprising: a temporary number specify section that transmits a request for transmission of a unit bit string as a bit string having a predetermined length in a bit string expressing a temporary number owned by the transponder, receives a unit bit sting transmitted from the transponder in response to the request, and specifies the temporary number of the transponder, based on the unit bit string; and an identification information obtaining section that transmits, if a temporary number of a transponder is specified by the temporary number specify section, a request for transmission of identification information of the transponder to the transponder, and receives the identification information transmitted from the transponder, in response to the request.
摘要:
Provided are a tag estimation method and a tag identification method using the same in a RFID system. In the tag estimating method, a reader divides tags in an identifiable area into a predetermined number of groups. Tags are identified by applying a pilot frame Lp to a first group among the divided groups. The reader calculates a collision probability Pcoll of tags after the pilot frame ends. Then, unidentified tags of the first group, which are not identified for the pilot frame, are identified by allocating an additional pilot slot Ladd at an end of the pilot frame or generating a new frame L1 according to the collision probability Pcoll.
摘要:
A method of establishing wireless communications between an interrogator and individual ones of multiple wireless identification devices, the method comprising utilizing a tree search method to establish communications without collision between the interrogator and individual ones of the multiple wireless identification devices, a search tree being defined for the tree search method, the tree having multiple levels representing subgroups of the multiple wireless identification devices, the number of devices in a subgroup in one level being half of the number of devices in the next higher level, the tree search method employing level skipping wherein at least one level of the tree is skipped. A communications system comprising an interrogator, and a plurality of wireless identification devices configured to communicate with the interrogator in a wireless fashion, the respective wireless identification devices having a unique identification number, the interrogator being configured to employ a tree search technique to determine the unique identification numbers of the different wireless identification devices so as to be able to establish communications between the interrogator and individual ones of the multiple wireless identification devices without collision by multiple wireless identification devices attempting to respond to the interrogator at the same time, wherein levels of the tree are occasionally skipped. RFID tags are managed by an interrogator. In one embodiment, the interrogator sends a first command indicating a first value and a first memory range, and a second command indicating second value and a second memory range. The first memory range differs from the second memory range by at least two bits. RFID tags compare the first and second values to corresponding values stored in the tags to determine if the tags are selected. Selected tags may respond to the interrogator with independently generated random numbers.
摘要:
Systems and methods for efficiently querying and identifying multiple items on a communication channel are disclosed. The inventions preferably uses radio frequency identification with interrogation devices and systems that identify radio frequency identification transponders. A depth-first tree traversal protocol algorithm, including commands and symbols, is used to more efficiently interrogate a plurality of transponders in a short amount of time.
摘要:
One or more transponders are selected by a base station out of a plurality of transponders. For this purpose an identification bit sequence (IB) that is or includes a random number bit sequence (ZB) is made available in the respective transponder and the base station transmits in a bit-by-bit fashion a selection bit sequence (AB) to the transponders. These sequences (IB or ZB) and (AB) are compared bit-by-bit in the respective transponder. The comparing is performed by way of a predeterminable comparing criterion to provide a comparing result in the form of a selection bit to which a bit value is assigned. The selection is then made depending on the bit value of the selection bit of the respective transponder.
摘要:
A method for identifying objects using an interrogation device on a communication channel is disclosed. Each object has an identification number in the form of a plurality of digits and has the ability to communicate to the interrogating device at least two different predetermined responses to indicate the value of the digits contained in its identification number. The objects are activated, and a single digit from currently activated objects is interrogated, and each object sends one of the predetermined responses. The value of the received responses is recorded, and those objects which responded with any but one of the at least two different messages are signaled to enter a deactivated state when two of the at least two different messages are received. The sequence of responses transmitted and received thus far for those objects placed in the deactivated state are recorded. Objects will no longer respond until the step of activating is repeated. The steps are selectively repeated until all of the predetermined responses are obtained for the complete identification number of at least one of the objects. The steps may thereafter be selectively repeated until the identification number of each of the objects is obtained.
摘要:
An identification system includes a reader and one or more tags. The reader identifies tags such as radio frequency (RF) tags. The system divides a number space into n bins, wherein each bin is associated with m unique bits of the number space, and the number space contains the identification codes of the tags. A command is issued to test v bits of the number space. A response is received from a tag, wherein the response occurs when a first portion of an identification code of the tag matches the v bits of the number space, a timing of the response corresponds to a particular bin and m unique bits associated with the particular bin correspond to a second portion of the identification code.
摘要:
System and methods for optimizing communications between an RFID reader and a population of tags are described. To increase a read rate, the reader and tags use a partial binary tree traversal. In partial binary tree traversal, a first portion of a tag identification sequence is read. A set marker command is then transmitted to a group of tags causing the tags to set a bit position for start of subsequent binary tree traversal. The subsequent binary tree traversal for the tag group starts at the marked position. Thus, the reader and group of tags negotiate a subset of the identification sequence instead of the entire identification sequence.