US20070176751A1 - Multiple Item Radio Frequency Tag Identification Protocol - Google Patents

Multiple Item Radio Frequency Tag Identification Protocol Download PDF

Info

Publication number
US20070176751A1
US20070176751A1 US11/619,131 US61913107A US2007176751A1 US 20070176751 A1 US20070176751 A1 US 20070176751A1 US 61913107 A US61913107 A US 61913107A US 2007176751 A1 US2007176751 A1 US 2007176751A1
Authority
US
United States
Prior art keywords
tag
command
state
base station
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/619,131
Inventor
Christian Cesar
Shun Chan
Thomas Colino
Kenneth Goldman
Sharon Greene
Harley Heinrich
Kevin McAuliffe
Dilip Kandlur
Arvind Krishna
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=33303827&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20070176751(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority claimed from US08/303,965 external-priority patent/US5673037A/en
Priority claimed from US08/646,539 external-priority patent/US5828318A/en
Priority claimed from US08/694,606 external-priority patent/US5942987A/en
Application filed by Individual filed Critical Individual
Priority to US11/619,131 priority Critical patent/US20070176751A1/en
Publication of US20070176751A1 publication Critical patent/US20070176751A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10019Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
    • G06K7/10108Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. interrogating only those RFIDs that fulfill a predetermined requirement, e.g. selecting all RFIDs having the same speed and moving in a cloud like fashion, e.g. on the same train; interrogating only RFIDs having a certain predetermined temperature, e.g. in the same fridge, another possibility being the active ignoring of a group of tags that fulfill a predetermined requirement, equivalent to the Boolean NOT operation
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • G05B19/042Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
    • G05B19/0421Multiprocessor system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10019Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
    • G06K7/10029Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the time domain, e.g. using binary tree search or RFID responses allocated to a random time slot
    • G06K7/10039Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the time domain, e.g. using binary tree search or RFID responses allocated to a random time slot interrogator driven, i.e. synchronous
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C17/00Arrangements for transmitting signals characterised by the use of a wireless electrical link
    • G08C17/02Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/22Pc multi processor system
    • G05B2219/2231Master slave
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/20Pc systems
    • G05B2219/25Pc structure of the system
    • G05B2219/25277Tristate
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/20Binding and programming of remote control devices

Definitions

  • the master Because the master often does not know ahead of time the number of slaves present and because that number may be very large and possibly unwieldy, it is advantageous for the master to be able to select a subset of the slaves with which to communicate further. Such a selection must of course be done by a conditional. Those slaves that meet the condition are thus considered selected, while those that do not meet the condition are considered not selected. The selection is performed by broadcasting to all slaves the condition that must be met. This is akin to asking those among a large crowd of people whose last name is Lowell to raise their hand. Each slave is defined as having at least the capability to listen to the master's broadcasts, to receive the broadcast condition and to self-test so as to determine whether it meets the condition. See U.S.
  • U.S. Pat. No. 5,673,037 in turn incorporates U.S. Pat. No. 5,550,547 by reference in its entirety, and accordingly, U.S. Pat. No. 5,550,547 is hereby incorporated herein by reference in its entirety.
  • U.S. Pat. No. 5,550,547 discloses a base station with a base memory (220, the second figure of Pat. No. 5,550,547) which stores a special command structure that is used to communicate with the RFID tags.
  • the base memory includes a novel command structure for tag group selection also.
  • U.S. Pat. No. 5,550,547 states that group select structures are described in the U.S. patent application Ser. No. 08/303,965 entitled “SYSTEM AND METHOD FOR RADIO FREQUENCY TAG GROUP SELECT” to C. Cesar et al. filed Sep. 9, 1994 (now U.S. Pat. No. 5,673,037), which is incorporated by reference in its entirety in U.S. Pat. No. 5,550,547.
  • the fifth figure of the incorporated U.S. Pat. No. 5,550,547 shows an algorithm being executed by each of a plurality of RF tags which includes processing of an identification command which in a preferred embodiment is the group select command.
  • This invention relates to the field of radio frequency (RF) tag identification. More specifically, the invention relates to the field of identifying and reading information from more than one RF that transmitting at simultaneously.
  • RF radio frequency
  • Radio Frequency Identification is just one of many identification technologies for identifying objects.
  • the heart of the RF ID system lies in an information carrying tag.
  • the tag functions in response to a coded RF signal received from a base station.
  • the tag reflects the incident RF carrier back to the base station.
  • Information is transferred as the reflected signal is modulated by the tag according to its programmed information protocol.
  • the tag consists of a semiconductor chip having RF circuits, logic, and memory.
  • the tag also has an antenna, often a collection of discrete components, capacitors and diodes, for example, a battery in the case of active tags, a substrate for mounting the components, interconnections between components, and a means of physical enclosure.
  • a battery in the case of active tags
  • passive tags has no battery. They derive their energy from the RF signal used to interrogate the tag.
  • RF ID tags are manufactured by mounting the individual elements to a circuit card.
  • passive RF tags consist of two basic parts:
  • a radio frequency (RF) identification system also consists of an RF base station and a plurality of RF tags.
  • the base station has a computer section which issues commands to an RF transmitter and receives commands from the RF receiver.
  • the commands serve to identify tags present in the RF field of the base station.
  • commands exist to gather information from the tags.
  • commands exist which output information to the tags. This output information may be held temporarily on the tag, it may remain until over written, or it may remain permanently on the tag.
  • the RF transmitter of the base station encodes the command from the computer section, modulates it from a base band to the radio frequency, amplifies it, and passes it to the RF antenna.
  • the RF receiver gathers the return signal from the antenna, demodulates it from the RF frequency to the base band, decodes it, and passes it back to the computer section for processing.
  • the base station antenna sends RF signals to and receives RF signals from one or more tags with in the RF signal range.
  • RF ID While the application of RF ID technology is not as widespread as other ID technologies, bar code for example, RF ID is on its way to becoming a pervasive technology in some areas, notably vehicle identification.
  • the RFID tag can be used to identify multiple objects in a very short time, on the order of a second.
  • the tag powers up in the RF field, starts a clock, and seeds a random number generator.
  • the tag sends out a 64-bit ID (at internal clock frequency) at intervals determined by the random number generator
  • the base station synchronizes to the tag transmission from a transmitting tag in the field. If there is a successful reception (no errors), the station uses a power interruption to transmit a simple shutdown code to the tag. This approach works because the station is synchronized so that tag and times its shutdown code using that tag frequency.
  • the tag uses the gap detection circuitry to identify power interruptions.
  • Two shutdown modes are available: i) the tag is prevented from talking as long as it remains in the field; and ii) the tag is prevented from talking even after departing field (for approximately 10 minutes or more.)
  • the shutdown mode (ii) is accessible only after shutdown mode (i) has been entered.
  • This technology only applies identifying tags only, i.e., there is only a single read channel.
  • the system can not write to the tags.
  • tags conflict with each other.
  • the simplest RF identification readers respond by either: 1. identifying the nearest tag in the field or 2. by not identifying any of the tags in the field.
  • Another approach for identifying multiple tags in the field, as described above, has been to have the tags repeatedly identify themselves after random delay times between their transmissions, and then to disable the tag following successful reception by the reader.
  • This approach must be optimized for the expected number of tags in the field. If there are fewer than the expected number of tags in the field, this approach can potentially be very slow because the delay times between each tag read will be longer than necessary. If there more tags than the expected number of tags in the field, this approach will again be very slow, because there will be times when the base station will be faced with reading more than one tag. In these cases, the protocol will have to restarted. In extreme cases the base station may not be able to identify any of the tags in the field.
  • An object of this invention is an improved radio frequency tag identification system.
  • An object of this invention is a RE identification protocol for identifying an arbitrary number of tagged items in the field in a minimum amount of time.
  • Another object of this invention is an improved radio frequency tag identification system that can identify and gather information from more than one tag that is simultaneously transmitting an RF signal.
  • the present invention uses a novel adaptation of a tree splitting algorithm applied to Radio Frequency (RF) tagging technology to identify many tags in the RF field of a base station.
  • RF Radio Frequency
  • the invention uses the tree splitting algorithm to identify a single tag in a field of a plurality of tags. Once the single tag is identified, the identified tag is placed in a Data_Exchange state where the base station can access data from the tag memory by using information that identifies the tag.
  • FIG. 1 is a block diagram of a novel radio frequency identification system.
  • FIG. 2 is a block diagram of a novel base station used in the present invention.
  • FIG. 3 is a flow chart of the algorithm executed by the base station.
  • FIG. 4 is a block diagram of a novel RF tag structure used by the present invention.
  • FIG. 5 is a flow chart of a preferred algorithm being executed by each of a plurality of RF tags.
  • FIG. 6 is a drawing showing one example of how the features of the present invention cooperate to enable identification and information access to more that one RF tag simultaneously transmitting to the base station.
  • FIG. 1 shows a block diagram of the Multiple Radio Frequence Identification system ( 100 ).
  • Base station ( 110 ) will transmit a RF signal ( 130 ) through the antenna ( 140 ) to the RFID tags ( 120 ).
  • the base station ( 110 ) runs a novel algorithm ( 300 ) that is used to enable the reading of a large number of RFID tags ( 120 ) that simultaneously are communicating with the base station ( 110 ).
  • the tags will response by sending an RF signal back to the base station.
  • the tags ( 121 - 125 ) each also runs a novel tag algorithm ( 440 ).
  • FIG. 2 shows a block diagram of the base station ( 110 ).
  • the base station design includes a Base Memory ( 220 ).
  • the Base Memory is used to keep application data and identification information (tag number) of the RFID tags that could be in the field.
  • the Base Memory ( 220 ) also stores a special command structure that is used to communicate with the RFID tags.
  • a novel command structure for tag group selection are included also. These group select structures are described in the U.S. patent application entitled “SYSTEM AND METHOD FOR RADIO FREQUENCY TAG GROUP SELECT” to C. Cesar et al. filed on Sep. 9, 1994 and is herein incorporated by reference in its entirety.
  • a Base Logic ( 230 ) contains a digital design that can control and execute the base station algorithm ( 300 ).
  • the Base Logic ( 230 ) uses a Base RE ( 240 ) front end to send and receive the RF signal ( 130 ) through the attached antenna ( 140 ) of the Base Station ( 110 ).
  • the Multiple RFID Tag and Base Station ( 110 ) protocols are based on a tree splitting protocol with novel components—the set of special commands, their structures, and inputs of the tag states.
  • FIG. 3 shows a flow chart of the base station algorithm ( 300 ).
  • the Radio Frequency field ( 130 ) will have a certain power level. This power level will dictate the distance within which the base station ( 110 ) can communicate with tags ( 120 ). Those tags ( 120 ) able to communicate with the base station ( 110 ) are said to be in the field ( 130 ). This communication link will be die out ( 320 ) when the base station ( 110 ) is turned off.
  • a special set of identification commands can be issued ( 330 ) by the base station ( 110 ) to the RFID tags ( 120 ). If no identification command is issued ( 332 ) or sent ( 332 ) and the RE signal ( 130 ) is active (i.e., at its power level, 312 ), the base station will be in its idle ( 340 ) state.
  • a response ( 350 ) signal will be sent back from REFID tags ( 120 ). If no response ( 352 ) signal comes back from RFID tags ( 120 ), the base station will either resend the identification command ( 330 ) or go to the idle ( 340 ) state.
  • the RFID tags ( 120 ) respond to the identification command ( 350 ) that the base station ( 110 ) sent out ( 330 ), further checks are made. If the base station ( 110 ) identifies ( 360 ) the signal coming back from the tag (the response), base station application commands can be sent ( 370 ) to the identified tag ( 360 ). Zero or more application commands can be sent ( 372 ). When there are no more application commands, the algorithm ends ( 380 )
  • a given tag ( 121 ) signal is identified if the tag ( 121 ) is the only tag responding to the base station ( 110 ) identification command ( 330 ).
  • tags ( 120 ) there may be more than one tag ( 120 ) that tries to respond ( 350 ) to the base station ( 110 ) identification command sent ( 330 ).
  • the tag identification ( 360 ) fails ( 362 ).
  • the identification command is resent ( 330 ) via ( 362 and 352 ). This processes is repeated until a single tag response ( 350 ).
  • application commands include read commands, that enable the base station ( 110 ) to read application data from the tag memory ( 460 ); write commands, that enables the base station ( 110 ) to write application data to the tag memory ( 460 ); and lock commands, that prevents further writing to certain tag memory ( 460 ) locations.
  • the identification commands include a Group_select command and a Group_unselect command. These commands are described in the U.S. patent application to C. Cesar et al. incorporated by reference above. Note that in the preferred embodiment both the Group_select and Group_unselect command can cause the following comparisons: equal, not equal, less than, and greater than. Further, two other identification commands are included in this preferred embodiment—fail command and resend command.
  • the fail command is sent out by the base station if more than one tag transmits to the base station ( 110 ) at one time and cause the state counter ( 432 ) to increment (by one). (See 362 in FIG. 3 .)
  • the resend command causes the state counter ( 432 ) (in FIG. 4 ) to decrement (by one).
  • FIG. 4 is a block diagram of a typical preferred embodiment of a RFID tag ( 120 ).
  • Each RFID tag ( 120 ) contains a tag antenna ( 410 ), which is used to receive and transmit an RF signal.
  • the tag antenna connects to the tag system ( 450 ) which includes a tag RF front end ( 420 ), tag logic ( 430 ), tag algorithm ( 440 ), and the tag memory ( 460 ).
  • a tag RF ( 420 ) front end is used to convert the RF signal into DC voltage which powers up the tags logic ( 430 ) and the tag algorithm ( 440 ) and transmits information and commands to the tag.
  • the tag logic ( 430 ) includes four main components: a) a Random number generator ( 431 ), b) an eight bit up-down state counter ( 432 ), c) a command decode logic ( 433 ), and d) a state register ( 434 ).
  • a value in the state register ( 434 ) indicates what state the tag is in—Ready ( 510 ), identify ( 530 ), and Data_Exchange ( 560 ).
  • the random number generator is used to generate a true random number which is used to tell the REFID tag ( 120 ) to increment or decrement the updown state counter ( 432 ) by one.
  • the command decode logic ( 433 ) decodes a special command set which is sent from the base station ( 110 ).
  • the tag algorithm ( 440 ) uses a novel tree splitting technique to identify all the tags in the field successfully even when more than one tag initially tries to simultaneously communicate with the base station.
  • each tag Since each tag is assumed to have minimal intelligence, it does not recognize the existence of other tags in the field.
  • the tags do not transmit except in response to queries from the base station ( 110 ).
  • queries i.e., when the tags ( 120 ) are sent one or more identification commands, all the tags response simultaneously, thus interfering with each other's transmission. In this case the results received at the base station are a corrupted data set. (See the failed identification match 362 in FIG. 3 .)
  • the purpose of the algorithm to organize and sequence the transmission from the tags in an orderly manner so that the base station ( 110 ) can successfully receive the data.
  • the tag algorithm ( 440 ) includes Three states—1) Ready state ( 510 ), 2) Identification state ( 530 ), and 3) Data Exchange state ( 560 ). There are certain commands can only be recognized in a specific state.
  • Tag memory ( 460 ) is use to store all the application data and the tag identification number.
  • FIG. 5 is a flow chart of the RFID tag algorithm ( 440 ).
  • the RFID tag ( 120 ) when the RFID tag ( 120 ) is powered up by the RE signal ( 130 ) in the field, the RFID tag ( 120 ) itself is in the Ready state ( 510 ).
  • an active tag a tag with on-board battery power—can be used.
  • the tags do not transmit except in response to identification commands ( 330 ) (queries) from the base station ( 110 ).
  • the RFID tag will die ( 515 ) out if the REID tag is out of the RF signal ( 130 ) field. For example, when the base station ( 110 ) stops transmitting.
  • the Ready state ( 510 ) is the initial state of the tag ( 120 ).
  • RFID tags ( 120 ) in the READY state ( 510 ) will listen to all transmissions and responses to the all identification commands and application commands.
  • the identification command is the Group_select command and the application command is the Read command.
  • the base station ( 110 ) powers up, it waits a small amount of time ( 100 - 300 ms) for all the tags ( 120 ) in the field to stabilize in the READY state ( 110 ) before it sends out other commands.
  • the RF carrier will be constantly sent out from the base station ( 110 ) even during this wait. This is done so that the RF section ( 420 ) of the tag maintain power to the tag ( 120 ).
  • All the logic circuitry in the tag ( 120 ) is powered up in the READY state ( 510 ), but the tag does not transmit anything until commanded by the base station.
  • the tag goes into the Identification (ID) state ( 530 ) only when a Group_select command is received ( 520 ) by a tag in the READY state ( 510 ). If no command is received ( 520 ), the tag will wait ( 522 ) until a Group_select command ( 520 ) is received.
  • ID state ( 530 ) is necessary since the base station may not know identification information of the tags ( 120 ) in the field.
  • the tag will go ( 512 ) to the Data_exchange state ( 570 ). In this case the tag will send an acknowledgement to the base station. In a preferred embodiment, this acknowledgement is 8 bits of data. This is possible if the base station already has the identification of the tags in the field.
  • the tag In the TD state ( 530 ) the tag will continue to transmit identification information (like its tag number) back to the base station ( 110 ) as long as the state counter of the tag is a predetermined value. In a preferred embodiment, and throughout this discussion, this value is zero.
  • the base station issues a Fail command ( 540 ).
  • each tag increments their state counter ( 432 ) by one if either:
  • the state counter ( 432 ) has a value greater than zero or
  • the state counter ( 432 ) has a value equal to zero and a value of the tag random number ( 431 ) is a given value. In a preferred embodiment this value zero.
  • tags with state counter ( 432 ) values that are not zero stop transmitting. Therefore, these tags will not transmit at all until there counters can be decremented to zero because in all future fail command transmissions of the base station ( 110 ) will cause their state counter to increment (by condition 1 above). Note also that these tags are still in the ID state ( 530 ) even though they are not transmitting.
  • tags ( 120 ) in the field that are in the ID state ( 530 ) that have state counter ( 432 ) with a zero value will continue to transmit. After this transmission, these tags will redetermine, e.g. “roll”, their random number value ( 431 ). If there are more than one of these tags ( 120 ) transmitting, the base station ( 110 ) will again send out a Fail command ( 540 ). At this point, the conditions for incrementing the tag state counters ( 432 ) are reapplied.
  • the process in repeated ( 542 ) until, only one tag remains with a zero value in its state counter ( 432 ). When this occurs, there is a non fail condition ( 544 ) and the base station will receive the identification information (tag number) of the tag. Then the base station will issue an application command ( 550 ), (in the preferred embodiment this is a Read command), to access (read) the appropriate data in the memory ( 460 ) of the sole tag that is transmitting. In a preferred embodiment, this is eight bytes of data at the tag memory location ( 460 ) specified in the Read command ( 550 ).
  • the tag logic ( 430 ) causes the tag to go to the Data_exchange state ( 560 ). That is the tag, leaves the ID state ( 530 ), and stops transmitting its identification information.
  • the base station knows the identity of the tag, e.g, the base station ( 110 ) can issue ( 570 ) any application command directly to the identified tag.
  • these application commands are the Read command, Write command, and Lock command.
  • a Group_unselect ( 580 ) command can be issued by the base station to remove some of the tags from the ID state ( 530 ). In this case, the tags that are unselected go back to the READY state ( 510 ).
  • Tags in the Data_exchange state have already been successfully identified by the base station. Tags in this state only response to certain commands. Data can be read, write or Lock ( 570 ) to a specific tag base on the command that sends from base station. Tag remains in Data Exchange state until tag leaves the RF field for a predetermined amount of time. In this case, the tag goes into Ready state and can only be activated again by a RF signal which power up by the base station.
  • the base station ( 110 ) issues a Resend command ( 540 ).
  • the Resend command causes all tags to decrement their counters by one. Therefore, tags in the ID state ( 530 ) with counters that had a one value, will have a zero value and will begin to transmit their identification information back to the base station ( 110 ). If there is more than one tag responding the identification process using Fail commands as described above is repeated. If there are no tags responding after the Resend command is issued ( 540 ), one or more Resend commands are sent to the tags in the field in an effort to reduce some tag state counters to zero.
  • a Group_select command ( 590 ) is send in order to reset all of the tag ( 120 ) state counters ( 432 ) to zero (the initial state).
  • This Group_select ( 590 ) may bring more tags into the ID state ( 530 ) from the READY state ( 510 ) particularly if these tags are new in the field. Those tags in the Data_exchange state ( 560 ) are unaffected by the Group_select ( 590 ) command.
  • tag state counters ( 432 ) only increment when the base station ( 110 ) sends a Fail command. Likewise, the tag state counters ( 432 ) only decrement when the base station ( 110 ) sends a Resend command. By counting the number of sent Fail commands and Resend commands, the base station ( 110 ) can determine that all the tags in the field have been identified when the number of Fail commands and Resend commands are equal.
  • FIG. 6 shows an example of the Multiple Item RF Identification protocol This algorithm uses two pieces of hardware on the tag, an 8 bit state counter ( 432 , S) random number (one bit—1 or 0) generator ( 431 , R), and a command decode logic ( 433 , 605 ).
  • Tags ( 1 to 4 ) in the ID state with the counter ( 432 ) at 0 transmit their ID. Initially all the selected tags have a zero value in their state counter (S, 432 ).
  • the base station ( 110 ) receives an error.
  • the FAIL ( 610 , 540 ) command is sent.
  • FAIL ( 610 ) causes all tags with a count not equal to 0 to increment their counter ( 432 ). That is, they move further away from being able to transmit.
  • FAIL ( 610 ) also causes all tags with a count of 0 (those who just transmitted) to generate a random number ( 431 ). Those who roll a zero, increment their counter, and do not transmit. Those who roll a 1 keep the counter at zero and try again.
  • tag 2 and tag 4 will re-transmitted. But tag 1 and tag 3 will not transmit.
  • a second RESEND ( 620 , 540 ) command will be send right after the READ ( 630 , 550 ) command is sent.
  • Tag 1 , 3 , and 4 will decrement their state counter ( 432 ) by 1 after they receive the RESEND ( 620 , 540 )) command.
  • Tag 1 and 3 will have a state counter (C) value of 1 and tag 4 will have state counter (C) value of zero. Only tag 4 transmit.
  • a success transmission occurs since a single tag 4 ID is received by the base station.
  • a second READ ( 630 , 550 ) command with the tag 4 ID is sent by the base station. If the READ command is received correctly, tag 4 moves to the DATA_EXCHANGE state and transmits its data (8 bytes).
  • a third RESEND ( 620 , 540 ) command will be send again right after the READ ( 630 ) command is sent.
  • Tag 1 , and 3 will decrement their counter by 1 after they receive the RESEND ( 620 ) command.
  • Tag 1 and 3 will have state counter value of zero. So both of the tags will transmitted.
  • a forth FAIL ( 610 ) command will be issued to the tag 1 and 3 .
  • a counter value of the tag 1 will be incremented to 1 due to its random number roll (R) to zero.
  • Tag 3 will have the same state counter value zero due to the random number roll (R) to 1. Therefore, only tag 3 will transmit.
  • a success transmission occurs since a single tag 3 ID is received by the base station.
  • a third READ ( 630 ) command with the ID is sent by the base station. If the READ command is received correctly, tag 3 moves to the DATA_EXCHANGE state and transmits its data.
  • a forth RESEND ( 620 , 540 ) command will be send right after the READ ( 630 ) command is sent.
  • Tag 1 will decrement its state counter (S) by 1 to became zero after receiving the RESEND ( 620 , 540 ) command.
  • Tag 1 will transmit.

Abstract

An exemplary embodiment uses a novel adaptation of a tree splitting algorithm applied to Radio Frequency (RE) tagging technology to identify many tags in the RF field of a base station. The embodiment uses the tree splitting algorithm to identify a single tag in a field of a plurality of radio frequency tags. Once the single tag is identified, the identified tag is placed in a Data_Exchange state where the base station can access data from the tag memory by using information that identifies the tag.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • The present application is a division of application Ser. No. 10/979,866 filed Nov. 2, 2004, which is a continuation of application Ser. No. 09/179,481 filed Oct. 27, 1998, now U.S. Pat. No. 6,812,852 issued Nov. 2, 2004, which is a continuation of application Ser. No. 08/646,539 filed May 8, 1996, now U.S. Pat. No. 5,828,318 issued Oct. 27, 1998. Said application Ser. No. 09/179,481 is a continuation-in-part of application Ser. No. 08/694,606 filed Aug. 9, 1996, now U.S. Pat. No. 5,942,987 issued Aug. 24, 1999, which in turn is a continuation-in-part of application Ser. No. 08/303,965 filed Sep. 9, 1994, now U.S. Pat. No. 5,673,037 issued Sep. 30, 1997. Reference is also made to U.S. Pat. No. 5,550,547 which is commonly owned with the aforementioned applications. Said U.S. Pat. Nos. 5,550,547, 5,673,037 and 5,828,318 are hereby incorporated herein by reference in their entireties, including material incorporated in said U.S. Pat. Nos. 5,550,547, 5,673,037 and 5,828,318 by reference. Application Ser. No. 10/979,866 filed Nov. 2, 2004, is hereby incorporated herein by reference in its entirety including material incorporated in said application Ser. No. 10/979,866 by reference.
  • GENERAL DISCUSSION OF THE DISCLOSURES INCORPORATED HEREIN BY REFERENCE
  • Because the master often does not know ahead of time the number of slaves present and because that number may be very large and possibly unwieldy, it is advantageous for the master to be able to select a subset of the slaves with which to communicate further. Such a selection must of course be done by a conditional. Those slaves that meet the condition are thus considered selected, while those that do not meet the condition are considered not selected. The selection is performed by broadcasting to all slaves the condition that must be met. This is akin to asking those among a large crowd of people whose last name is Lowell to raise their hand. Each slave is defined as having at least the capability to listen to the master's broadcasts, to receive the broadcast condition and to self-test so as to determine whether it meets the condition. See U.S. patent application Ser. No. 08/303,965, to Cesar et al. filed on Sep. 9, 1994, now U.S. Pat. No. 5,673,037 issued Sep. 30, 1997, which is herein incorporated by reference in its entirety. U.S. Pat. No. 5,673,037 in turn incorporates U.S. Pat. No. 5,550,547 by reference in its entirety, and accordingly, U.S. Pat. No. 5,550,547 is hereby incorporated herein by reference in its entirety. U.S. Pat. No. 5,550,547 discloses a base station with a base memory (220, the second figure of Pat. No. 5,550,547) which stores a special command structure that is used to communicate with the RFID tags. In a preferred embodiment, the base memory includes a novel command structure for tag group selection also. U.S. Pat. No. 5,550,547 states that group select structures are described in the U.S. patent application Ser. No. 08/303,965 entitled “SYSTEM AND METHOD FOR RADIO FREQUENCY TAG GROUP SELECT” to C. Cesar et al. filed Sep. 9, 1994 (now U.S. Pat. No. 5,673,037), which is incorporated by reference in its entirety in U.S. Pat. No. 5,550,547. The fifth figure of the incorporated U.S. Pat. No. 5,550,547 shows an algorithm being executed by each of a plurality of RF tags which includes processing of an identification command which in a preferred embodiment is the group select command.
  • FIELD
  • This invention relates to the field of radio frequency (RF) tag identification. More specifically, the invention relates to the field of identifying and reading information from more than one RF that transmitting at simultaneously.
  • BACKGROUND
  • Radio Frequency Identification (RF ID) is just one of many identification technologies for identifying objects. The heart of the RF ID system lies in an information carrying tag. The tag functions in response to a coded RF signal received from a base station. Typically, the tag reflects the incident RF carrier back to the base station. Information is transferred as the reflected signal is modulated by the tag according to its programmed information protocol.
  • The tag consists of a semiconductor chip having RF circuits, logic, and memory. The tag also has an antenna, often a collection of discrete components, capacitors and diodes, for example, a battery in the case of active tags, a substrate for mounting the components, interconnections between components, and a means of physical enclosure. One variety of tag, passive tags, has no battery. They derive their energy from the RF signal used to interrogate the tag. In general, RF ID tags are manufactured by mounting the individual elements to a circuit card.
  • Basically, passive RF tags consist of two basic parts:
  • a) An analog circuit which detects and decodes the RF signal and also provides power to the digital part of the Tag using RF field strength from the Base Station, and
  • b) A digital circuit which implements the multiple items of the tag identification protocol.
  • A radio frequency (RF) identification system also consists of an RF base station and a plurality of RF tags.
  • In a typical configuration, the base station has a computer section which issues commands to an RF transmitter and receives commands from the RF receiver. The commands serve to identify tags present in the RF field of the base station. In some implementations, commands exist to gather information from the tags. In more advanced systems, commands exist which output information to the tags. This output information may be held temporarily on the tag, it may remain until over written, or it may remain permanently on the tag.
  • The RF transmitter of the base station encodes the command from the computer section, modulates it from a base band to the radio frequency, amplifies it, and passes it to the RF antenna. The RF receiver gathers the return signal from the antenna, demodulates it from the RF frequency to the base band, decodes it, and passes it back to the computer section for processing. The base station antenna sends RF signals to and receives RF signals from one or more tags with in the RF signal range.
  • While the application of RF ID technology is not as widespread as other ID technologies, bar code for example, RF ID is on its way to becoming a pervasive technology in some areas, notably vehicle identification.
  • Multiple objects can be identified by checking each individually using bar code reader. However, this process consumes a lot of time. It is also error prone—the error rate made by either human beings or by the bar code reader is very high.
  • This iterative process can be simplified and solved by introducing the RFID Tag technology. The RFID tag can be used to identify multiple objects in a very short time, on the order of a second.
  • One way of implementing multiple RF tag identification is as follows:
  • a. the tag powers up in the RF field, starts a clock, and seeds a random number generator.
  • b. the tag sends out a 64-bit ID (at internal clock frequency) at intervals determined by the random number generator
  • c. the base station synchronizes to the tag transmission from a transmitting tag in the field. If there is a successful reception (no errors), the station uses a power interruption to transmit a simple shutdown code to the tag. This approach works because the station is synchronized so that tag and times its shutdown code using that tag frequency. The tag uses the gap detection circuitry to identify power interruptions.
  • d. Two shutdown modes are available: i) the tag is prevented from talking as long as it remains in the field; and ii) the tag is prevented from talking even after departing field (for approximately 10 minutes or more.) The shutdown mode (ii) is accessible only after shutdown mode (i) has been entered.
  • e. In this application, multiple items are identified by shutting down each tag immediately after a successful read. Other tags in the field, ideally, will not be synched to the internal frequency of the tag which has just been read, nor, ideally, will they have just finished transmitting their id when the base stations sends the shutdown signal to the tag which has just been identified.
  • This technology only applies identifying tags only, i.e., there is only a single read channel. The system can not write to the tags.
  • STATEMENT OF PROBLEMS WITH THE PRIOR ART
  • When multiple RF identification tags are simultaneously presented to a reader (base station), the tags conflict with each other. The simplest RF identification readers respond by either: 1. identifying the nearest tag in the field or 2. by not identifying any of the tags in the field. Another approach for identifying multiple tags in the field, as described above, has been to have the tags repeatedly identify themselves after random delay times between their transmissions, and then to disable the tag following successful reception by the reader.
  • This approach must be optimized for the expected number of tags in the field. If there are fewer than the expected number of tags in the field, this approach can potentially be very slow because the delay times between each tag read will be longer than necessary. If there more tags than the expected number of tags in the field, this approach will again be very slow, because there will be times when the base station will be faced with reading more than one tag. In these cases, the protocol will have to restarted. In extreme cases the base station may not be able to identify any of the tags in the field.
  • OBJECTS
  • An object of this invention is an improved radio frequency tag identification system.
  • An object of this invention is a RE identification protocol for identifying an arbitrary number of tagged items in the field in a minimum amount of time.
  • Another object of this invention is an improved radio frequency tag identification system that can identify and gather information from more than one tag that is simultaneously transmitting an RF signal.
  • SUMMARY
  • The present invention uses a novel adaptation of a tree splitting algorithm applied to Radio Frequency (RF) tagging technology to identify many tags in the RF field of a base station.
  • The invention uses the tree splitting algorithm to identify a single tag in a field of a plurality of tags. Once the single tag is identified, the identified tag is placed in a Data_Exchange state where the base station can access data from the tag memory by using information that identifies the tag.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a novel radio frequency identification system.
  • FIG. 2 is a block diagram of a novel base station used in the present invention.
  • FIG. 3 is a flow chart of the algorithm executed by the base station.
  • FIG. 4 is a block diagram of a novel RF tag structure used by the present invention.
  • FIG. 5 is a flow chart of a preferred algorithm being executed by each of a plurality of RF tags.
  • FIG. 6 is a drawing showing one example of how the features of the present invention cooperate to enable identification and information access to more that one RF tag simultaneously transmitting to the base station.
  • DESCRIPTION
  • FIG. 1 shows a block diagram of the Multiple Radio Frequence Identification system (100). Base station (110) will transmit a RF signal (130) through the antenna (140) to the RFID tags (120). The base station (110) runs a novel algorithm (300) that is used to enable the reading of a large number of RFID tags (120) that simultaneously are communicating with the base station (110). When each of the RFID tags (121-125) received a command, the tags will response by sending an RF signal back to the base station. The tags (121-125) each also runs a novel tag algorithm (440).
  • FIG. 2 shows a block diagram of the base station (110). The base station design includes a Base Memory (220). The Base Memory is used to keep application data and identification information (tag number) of the RFID tags that could be in the field. The Base Memory (220) also stores a special command structure that is used to communicate with the RFID tags. In a preferred embodiment, a novel command structure for tag group selection are included also. These group select structures are described in the U.S. patent application entitled “SYSTEM AND METHOD FOR RADIO FREQUENCY TAG GROUP SELECT” to C. Cesar et al. filed on Sep. 9, 1994 and is herein incorporated by reference in its entirety.
  • A Base Logic (230), contains a digital design that can control and execute the base station algorithm (300). The Base Logic (230) uses a Base RE (240) front end to send and receive the RF signal (130) through the attached antenna (140) of the Base Station (110).
  • The Multiple RFID Tag and Base Station (110) protocols are based on a tree splitting protocol with novel components—the set of special commands, their structures, and inputs of the tag states.
  • FIG. 3 shows a flow chart of the base station algorithm (300). Once the base station is turned on (310), the Radio Frequency field (130) will have a certain power level. This power level will dictate the distance within which the base station (110) can communicate with tags (120). Those tags (120) able to communicate with the base station (110) are said to be in the field (130). This communication link will be die out (320) when the base station (110) is turned off.
  • With the RF signal (130) is active (312), a special set of identification commands can be issued (330) by the base station (110) to the RFID tags (120). If no identification command is issued (332) or sent (332) and the RE signal (130) is active (i.e., at its power level, 312), the base station will be in its idle (340) state.
  • When an identification command is issued (330) or sent (330), a response (350) signal will be sent back from REFID tags (120). If no response (352) signal comes back from RFID tags (120), the base station will either resend the identification command (330) or go to the idle (340) state.
  • If the RFID tags (120) respond to the identification command (350) that the base station (110) sent out (330), further checks are made. If the base station (110) identifies (360) the signal coming back from the tag (the response), base station application commands can be sent (370) to the identified tag (360). Zero or more application commands can be sent (372). When there are no more application commands, the algorithm ends (380)
  • A given tag (121) signal is identified if the tag (121) is the only tag responding to the base station (110) identification command (330).
  • Alternatively, there may be more than one tag (120) that tries to respond (350) to the base station (110) identification command sent (330). In this case, the tag identification (360) fails (362). Upon failure (362), the identification command is resent (330) via (362 and 352). This processes is repeated until a single tag response (350).
  • In a preferred embodiment, application commands include read commands, that enable the base station (110) to read application data from the tag memory (460); write commands, that enables the base station (110) to write application data to the tag memory (460); and lock commands, that prevents further writing to certain tag memory (460) locations.
  • In a preferred embodiment, the identification commands include a Group_select command and a Group_unselect command. These commands are described in the U.S. patent application to C. Cesar et al. incorporated by reference above. Note that in the preferred embodiment both the Group_select and Group_unselect command can cause the following comparisons: equal, not equal, less than, and greater than. Further, two other identification commands are included in this preferred embodiment—fail command and resend command. The fail command is sent out by the base station if more than one tag transmits to the base station (110) at one time and cause the state counter (432) to increment (by one). (See 362 in FIG. 3.) The resend command causes the state counter (432) (in FIG. 4) to decrement (by one).
  • FIG. 4 is a block diagram of a typical preferred embodiment of a RFID tag (120). Each RFID tag (120) contains a tag antenna (410), which is used to receive and transmit an RF signal. The tag antenna connects to the tag system (450) which includes a tag RF front end (420), tag logic (430), tag algorithm (440), and the tag memory (460). A tag RF (420) front end is used to convert the RF signal into DC voltage which powers up the tags logic (430) and the tag algorithm (440) and transmits information and commands to the tag. The tag logic (430) includes four main components: a) a Random number generator (431), b) an eight bit up-down state counter (432), c) a command decode logic (433), and d) a state register (434). A value in the state register (434) indicates what state the tag is in—Ready (510), identify (530), and Data_Exchange (560). The random number generator is used to generate a true random number which is used to tell the REFID tag (120) to increment or decrement the updown state counter (432) by one. The command decode logic (433) decodes a special command set which is sent from the base station (110). The tag algorithm (440) uses a novel tree splitting technique to identify all the tags in the field successfully even when more than one tag initially tries to simultaneously communicate with the base station.
  • Since each tag is assumed to have minimal intelligence, it does not recognize the existence of other tags in the field. The tags do not transmit except in response to queries from the base station (110). When queried by the base station (110), i.e., when the tags (120) are sent one or more identification commands, all the tags response simultaneously, thus interfering with each other's transmission. In this case the results received at the base station are a corrupted data set. (See the failed identification match 362 in FIG. 3.) The purpose of the algorithm to organize and sequence the transmission from the tags in an orderly manner so that the base station (110) can successfully receive the data.
  • Refer to FIG. 5. The tag algorithm (440) includes Three states—1) Ready state (510), 2) Identification state (530), and 3) Data Exchange state (560). There are certain commands can only be recognized in a specific state.
  • Tag memory (460) is use to store all the application data and the tag identification number.
  • FIG. 5 is a flow chart of the RFID tag algorithm (440). In a preferred embodiment, when the RFID tag (120) is powered up by the RE signal (130) in the field, the RFID tag (120) itself is in the Ready state (510). (Note that in an alternative embodiment, an active tag—a tag with on-board battery power—can be used.) Since each tag is assumed to have minimal intelligence, it does not recognize the existence of other tags in the field. The tags do not transmit except in response to identification commands (330) (queries) from the base station (110). The RFID tag will die (515) out if the REID tag is out of the RF signal (130) field. For example, when the base station (110) stops transmitting.
  • The Ready state (510) is the initial state of the tag (120). In a preferred embodiment, RFID tags (120) in the READY state (510) will listen to all transmissions and responses to the all identification commands and application commands. In a preferred embodiment, the identification command is the Group_select command and the application command is the Read command. After the base station (110) powers up, it waits a small amount of time (100-300 ms) for all the tags (120) in the field to stabilize in the READY state (110) before it sends out other commands. The RF carrier will be constantly sent out from the base station (110) even during this wait. This is done so that the RF section (420) of the tag maintain power to the tag (120).
  • All the logic circuitry in the tag (120) is powered up in the READY state (510), but the tag does not transmit anything until commanded by the base station.
  • The tag goes into the Identification (ID) state (530) only when a Group_select command is received (520) by a tag in the READY state (510). If no command is received (520), the tag will wait (522) until a Group_select command (520) is received. The ID state (530) is necessary since the base station may not know identification information of the tags (120) in the field.
  • If a Read command is received by a tag in the READY state (510), the tag will go (512) to the Data_exchange state (570). In this case the tag will send an acknowledgement to the base station. In a preferred embodiment, this acknowledgement is 8 bits of data. This is possible if the base station already has the identification of the tags in the field.
  • In the TD state (530) the tag will continue to transmit identification information (like its tag number) back to the base station (110) as long as the state counter of the tag is a predetermined value. In a preferred embodiment, and throughout this discussion, this value is zero.
  • If more than one tag is transmitting information to the base station (110), the base station issues a Fail command (540).
  • When the tags in the field receive a Fail command (540), each tag increments their state counter (432) by one if either:
  • 1. the state counter (432) has a value greater than zero or
  • 2. the state counter (432) has a value equal to zero and a value of the tag random number (431) is a given value. In a preferred embodiment this value zero.
  • Note that tags with state counter (432) values that are not zero, stop transmitting. Therefore, these tags will not transmit at all until there counters can be decremented to zero because in all future fail command transmissions of the base station (110) will cause their state counter to increment (by condition 1 above). Note also that these tags are still in the ID state (530) even though they are not transmitting.
  • However, those tags (120) in the field that are in the ID state (530) that have state counter (432) with a zero value, will continue to transmit. After this transmission, these tags will redetermine, e.g. “roll”, their random number value (431). If there are more than one of these tags (120) transmitting, the base station (110) will again send out a Fail command (540). At this point, the conditions for incrementing the tag state counters (432) are reapplied.
  • The process in repeated (542) until, only one tag remains with a zero value in its state counter (432). When this occurs, there is a non fail condition (544) and the base station will receive the identification information (tag number) of the tag. Then the base station will issue an application command (550), (in the preferred embodiment this is a Read command), to access (read) the appropriate data in the memory (460) of the sole tag that is transmitting. In a preferred embodiment, this is eight bytes of data at the tag memory location (460) specified in the Read command (550).
  • After the data of the sole tag is read (550), the tag logic (430) causes the tag to go to the Data_exchange state (560). That is the tag, leaves the ID state (530), and stops transmitting its identification information. In the Data Exchange state, the base station, knows the identity of the tag, e.g, the base station (110) can issue (570) any application command directly to the identified tag. In a preferred embodiment, these application commands are the Read command, Write command, and Lock command.
  • In an alternative embodiment, a Group_unselect (580) command can be issued by the base station to remove some of the tags from the ID state (530). In this case, the tags that are unselected go back to the READY state (510).
  • All tags in the Data_exchange state have already been successfully identified by the base station. Tags in this state only response to certain commands. Data can be read, write or Lock (570) to a specific tag base on the command that sends from base station. Tag remains in Data Exchange state until tag leaves the RF field for a predetermined amount of time. In this case, the tag goes into Ready state and can only be activated again by a RF signal which power up by the base station.
  • After the READ command (550), subsequent to a non fail condition (544), is issued, the base station (110) issues a Resend command (540). The Resend command causes all tags to decrement their counters by one. Therefore, tags in the ID state (530) with counters that had a one value, will have a zero value and will begin to transmit their identification information back to the base station (110). If there is more than one tag responding the identification process using Fail commands as described above is repeated. If there are no tags responding after the Resend command is issued (540), one or more Resend commands are sent to the tags in the field in an effort to reduce some tag state counters to zero.
  • If after one or more Resend commands is issued and there is still no response from any tag in the field, a Group_select command (590) is send in order to reset all of the tag (120) state counters (432) to zero (the initial state). This Group_select (590) may bring more tags into the ID state (530) from the READY state (510) particularly if these tags are new in the field. Those tags in the Data_exchange state (560) are unaffected by the Group_select (590) command.
  • In a preferred embodiment, tag state counters (432) only increment when the base station (110) sends a Fail command. Likewise, the tag state counters (432) only decrement when the base station (110) sends a Resend command. By counting the number of sent Fail commands and Resend commands, the base station (110) can determine that all the tags in the field have been identified when the number of Fail commands and Resend commands are equal.
  • FIG. 6 shows an example of the Multiple Item RF Identification protocol This algorithm uses two pieces of hardware on the tag, an 8 bit state counter (432, S) random number (one bit—1 or 0) generator (431, R), and a command decode logic (433, 605).
  • In the beginning, a group of tags (1 to 4) are moved to the ID state and their state counters (S) are set to 0. Subsets of the group were unselected back to the READY state. Other subgroups were selected before the identification process begins. Only the finally selected tags are shown in FIG. 6.
  • After selection, the following method (see FIGS. 3 and 5) is performed:
  • 1—Tags (1 to 4) in the ID state with the counter (432) at 0 transmit their ID. Initially all the selected tags have a zero value in their state counter (S, 432).
  • 2—Since more than one tag transmits, the base station (110) receives an error. The FAIL (610, 540) command is sent. FAIL (610) causes all tags with a count not equal to 0 to increment their counter (432). That is, they move further away from being able to transmit.
  • FAIL (610) also causes all tags with a count of 0 (those who just transmitted) to generate a random number (431). Those who roll a zero, increment their counter, and do not transmit. Those who roll a 1 keep the counter at zero and try again.
  • In this case, tag 2 and tag 4 will re-transmitted. But tag 1 and tag 3 will not transmit.
  • 3—A second tag transmission is done. Since tag 2 and tag 4 transmitted together, a collision signal will be received by the base station (110). Therefore a FAIL (610) command will be issued from the base station (110) to the tags once again.
  • 4—The count of the tag 1 and tag 3 will be incremented by 1 to became 2 due to the FAIL (610) command received. And the count of tag 2 and tag 4 (with a zero in the state counter) will also incremented by 1 to became 1 due to the random number roll to zero and the FAIL command (610) received.
  • 5—Now there will be no RE signal transmitting back to the base station due to the non zero state counter value at the tags 1-4. Therefore when the time out situation is met, a RESEND (620, 540) command will be sent to the tags. This causes all the tags state counters to decrement by 1.
  • 6—Now the state counter (432) value of the tag 2 and tag 4 are zero and they re-transmit again. But tag 1 and tag 3, due to their state counter value being non zero, do not transmit.
  • 7—Since tag 2 and tag 4 transmitted together, a collision signal will be received by the base station (110). Therefore a third FAIL (610) command will be issued from the base station (110) to the tags.
  • 8—The counter (432) value of tag 1 and tag 3 will be incremented by 1 to became the value 2. But since tag 2 has a random number (431) roll (R) to 1 and a previous state counter (432) value of zero and it re-transmits. For the tag 4, its state counter (432) value had been incremented by 1 due to the random number (431) roll to zero and will not transmit.
  • 9—A success transmission (non fail—544) occurred since a single tag 2 ID is received by the base station (110) A READ (630, 550) command with the ID of tag 2 is sent by the base station (110). If the READ (550, 630) command is received correctly, that tag moves to the DATA_EXCHANGE state (560) and transmits its data (8 bytes).
  • 10—A second RESEND (620, 540) command will be send right after the READ (630, 550) command is sent. Tag 1, 3, and 4 will decrement their state counter (432) by 1 after they receive the RESEND (620, 540)) command. Tag 1 and 3 will have a state counter (C) value of 1 and tag 4 will have state counter (C) value of zero. Only tag 4 transmit.
  • 11—A success transmission (non fail 544) occurs since a single tag 4 ID is received by the base station. A second READ (630, 550) command with the tag 4 ID is sent by the base station. If the READ command is received correctly, tag 4 moves to the DATA_EXCHANGE state and transmits its data (8 bytes).
  • 12—A third RESEND (620, 540) command will be send again right after the READ (630) command is sent. Tag 1, and 3 will decrement their counter by 1 after they receive the RESEND (620) command. Tag 1 and 3 will have state counter value of zero. So both of the tags will transmitted.
  • 13—Due to the collision signal detected by the base station (110). A forth FAIL (610) command will be issued to the tag 1 and 3. A counter value of the tag 1 will be incremented to 1 due to its random number roll (R) to zero. Tag 3 will have the same state counter value zero due to the random number roll (R) to 1. Therefore, only tag 3 will transmit.
  • 14—A success transmission occurs since a single tag 3 ID is received by the base station. A third READ (630) command with the ID is sent by the base station. If the READ command is received correctly, tag 3 moves to the DATA_EXCHANGE state and transmits its data.
  • 15—A forth RESEND (620, 540) command will be send right after the READ (630) command is sent. Tag 1 will decrement its state counter (S) by 1 to became zero after receiving the RESEND (620, 540) command. Tag 1 will transmit.
  • 16—Again a success transmission occurs since a single tag 1 ID is received by the base station. A forth READ (630) command with the tag 1 ID is sent by the base station. If the READ command is received correctly, tag 1 moves to the DATA_EXCHANGE state and transmits its data.
  • 17—Finally, all tags (1 to 4) in the field are identified and ready to do any applications that the base station wants it to perform. This can be confirmed because the number of Resend and Fail commands sent by the base station are equal (to 4).
  • Given this disclosure, one skilled in the art can develop alternative equivalent embodiments that are within the contemplation of the inventors.

Claims (17)

1. A radio frequency tag for communicating with a base station, comprising:
a. an antenna and tag radio frequency circuit for sending and receiving radio frequency signals to and from the base station;
b. a tag memory for storing tag data;
c. a tag logic circuit connected to the tag radio frequency circuit and the tag memory, the tag logic circuit having a tag state register that indicates the tag is in a state that is one of the states including READY, ID, and Data Exchange, the tag logic further having a state counter and a random number generator; and
d. a tag algorithm, run by the tag logic, that places the tag in the READY state by setting the state register to READY when the tag is powered and places the tag in the ID state by setting the state register to ID when the base station sends the tag an identification command.
2. A tag, as in claim 1, where the identification command is a Group_select command and the tag transmits a command response back to the base station while the tag is in the ID state.
3. A tag, as in claim 2, where the command response is tag identification information.
4. A tag, as in claim 3, where the tag receives a Fail command from the base station that causes the tag algorithm to increase a state counter value in the state counter if:
a. the state counter has a value not equal to a predetermined value, or
b. the state counter has a value equal to the predetermined value and the random number generator has a given value, whereby the tag stops transmitting the tag identification information while the state counter value is not equal to the predetermined value and the tag algorithm causes the random number generator to generate a new random value.
5. A tag, as in claim 4, where the tag receives a Resend command from the base station that causes the tag algorithm to decrease the state counter value.
6. A tag, as in claim 5, where the tag starts sending the tag identification information when the state counter value is equal to a predetermined value.
7. A tag, as in claim 6, where the base station sends the tag a READ command and the tag algorithm places the tag in the Data_Exchange state whereby the base station can sent one or more application commands to the tag by identifying the tag with the identification information sent to the base station.
8. A tag, as in claim 5, where the Fail command causes the tag algorithm to decrease the state counter value and the Resend command causes the tag algorithm to increase the state counter value.
9. A tag, as in claim 5, where the predetermined value is zero and the given value is zero.
10. A tag, as in claim 5, where the algorithm increases the state counter by one for each Fail command sent and decrements the state counter by one for each Resend command sent whereby the base station has read the identification information from every tag in a field of tags when the number of Fail and Resend commands are equal.
11. A tag, as in claim 5, where the tag algorithm resets the value in the state counter to the predetermined value when the tag receives a Group_select command from the base station.
12. A tag, as in claim 1, where the tag algorithm places the tag in the READY state by resetting the state register to READY when the tag receives a Group_unselect command from the base station.
13. A tag, as in claim 1, where the tag is placed in the Data_Exchange state by setting the state register to Data_Exchange when the tag receives a READ command from the base station whereby the tag sends back an acknowledgement.
14. A system for reading information from a plurality of radio frequency tags that are in the field of a radio frequency signal sent by a reader, comprising:
i. a tag, further comprising:
a. an antenna and tag radio frequency circuit for sending and receiving radio frequency signals to and from the reader;
b. a tag memory for storing tag data;
c. a tag logic circuit connected to the tag radio frequency circuit and the tag memory, the tag logic circuit having a tag state register that indicates the tag is in a state that is one of the states including READY, ID, and Data Exchange, the tag logic further having a state counter and a random number generator; and
d. a tag algorithm, run by the tag logic;
ii. a reader that is able to transmit information commands to the field of tags, the information commands including a Group_select, a Fail, and a Resend command,
a. the Group_select command causing the tag algorithm to place one or more selected tags in the ID state by causing each selected tag algorithm to set its respective state register to ID and reset its respective state counter to a predetermined value,
b. the Fail command being generated by the reader when more than one tag sends tag identification information to the reader simultaneously, the Fail command causing the algorithm of each selected tag to increment its respective state counter if:
1) the state counter has a value not equal to a predetermined value, or
2) the state counter has a value equal to the predetermined value and the random number generator has a given value,
c. the Resend command sent by the reader when tag identification information is sent back to the reader in response to a READ command by a single tag in the field, the Resend command causing the state counter of all the tags in the field to decrement,
whereby the reader can identify an individual tag in the field of tags, and cause the identified tag to go into a Data_Exchange state where the reader can access information from the tag memory.
15. A method, for reading a radio frequency identification tag in a radio frequency field of a plurality of tags comprising the steps of:
a. sending a group_select command from a reader that places one or more selected tags in the field in a ID state;
b. sending identification information from all the selected tags to the reader;
c. sending a fail command from the reader if more than one tag sends identification information simultaneously;
d. increasing a state counter value in the state counter of one or more selected tags if:
1) the state counter has a value not equal to a predetermined value, or
2) the state counter has a value equal to the predetermined value and the random number generator has a given value, the tag stopping transmission of the tag identification information while the state counter value is not equal to the predetermined value and the tag algorithm causing the random number generator to generate a new random value;
e. sending identification information a next time from all the selected tags to the reader, the selected tags having a state counter value equal to the predetermined value;
f. repeating steps c-e until a sole tag is sending identification information to the reader;
g. issuing a READ command to the sole tag using the identification information of the sole tag; and
h. placing the sole tag in a Data_exchange state where the reader can access data from the sole tag memory by using application commands.
16. A system for selecting a subset of slaves that satisfy a selection criterion, and causing the selected subset of slaves to participate in an identification and isolation process whereby slaves of the selected subset are successively identified and isolated from further participation in such identification and isolation process, said system comprising:
(a) a master unit for communicating a command containing a selection criterion to a plurality of slaves;
(b) each slave of said plurality of slaves being in one of three or more different possible conditions during the identification and isolation process;
(c) a memory in said each slave containing at least one information value for use in evaluation of a selection criterion;
(d) a receiving unit in said each slave for receiving the command containing the selection criterion from the master unit; and
(e) a processing unit in said each slave that processes the command containing the selection criterion from the master unit;
(f) the processing units of the slaves having a mode of operation such that a subgroup of slaves that have an information value that satisfies the selection criterion are moved from a first condition to a second condition for participation in an identification and isolation process; and
(g) the processing units of the subgroup of slaves in the second condition having a mode of operation whereby individual slaves of said subgroup can progress to a third condition during the identification and isolation process, with slaves that have progressed to the third condition, and have been identified, being isolated from further participation in the identification and isolation process that continues so as to identify and isolate other of the slaves in the second condition.
17. A method for selecting a subset of slaves that satisfy at least one selection criterion during a selection process, and then identifying slaves of the selected subset, and causing identified slaves of the selected subset of slaves to be isolated from further participation in the identification process, said method comprising;
(a) storing at least one information value in each of a plurality of slaves for use in evaluating at least one selection criterion;
(b) representing at least one selection criterion in at least one selection criterion command;
(c) communhicating the at least one selection criterion command to the plurality of slaves;
(d) processing the at least one selection criterion command at each of said plurality of slave and deeming certain of the slaves based on storage of the at least one information value to be selected as a result of the selection process;
(e) carrying out an identification process with respect to the certain slaves deemed selected as a result of the selection process; and
(f) causing slaves that are identified during the identification process of clause (e) to be isolated trom responding farther in the course of the identification process of clause (e).
US11/619,131 1994-09-09 2007-01-02 Multiple Item Radio Frequency Tag Identification Protocol Abandoned US20070176751A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/619,131 US20070176751A1 (en) 1994-09-09 2007-01-02 Multiple Item Radio Frequency Tag Identification Protocol

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US08/303,965 US5673037A (en) 1994-09-09 1994-09-09 System and method for radio frequency tag group select
US08/646,539 US5828318A (en) 1996-05-08 1996-05-08 System and method for selecting a subset of autonomous and independent slave entities
US08/694,606 US5942987A (en) 1994-09-09 1996-08-09 Radio frequency identification system with write broadcast capability
US09/179,481 US6812852B1 (en) 1994-09-09 1998-10-27 System and method for selecting a subset of autonomous and independent slave entities
US10/979,866 US7158046B2 (en) 1994-09-09 2004-11-02 System and method for radio frequency tag group select
US11/619,131 US20070176751A1 (en) 1994-09-09 2007-01-02 Multiple Item Radio Frequency Tag Identification Protocol

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US10/979,866 Division US7158046B2 (en) 1994-09-09 2004-11-02 System and method for radio frequency tag group select

Publications (1)

Publication Number Publication Date
US20070176751A1 true US20070176751A1 (en) 2007-08-02

Family

ID=33303827

Family Applications (4)

Application Number Title Priority Date Filing Date
US09/179,481 Expired - Fee Related US6812852B1 (en) 1994-09-09 1998-10-27 System and method for selecting a subset of autonomous and independent slave entities
US10/979,866 Expired - Fee Related US7158046B2 (en) 1994-09-09 2004-11-02 System and method for radio frequency tag group select
US11/619,051 Abandoned US20070159305A1 (en) 1994-09-09 2007-01-02 System and Method for Radio Frequency Tag Group Select
US11/619,131 Abandoned US20070176751A1 (en) 1994-09-09 2007-01-02 Multiple Item Radio Frequency Tag Identification Protocol

Family Applications Before (3)

Application Number Title Priority Date Filing Date
US09/179,481 Expired - Fee Related US6812852B1 (en) 1994-09-09 1998-10-27 System and method for selecting a subset of autonomous and independent slave entities
US10/979,866 Expired - Fee Related US7158046B2 (en) 1994-09-09 2004-11-02 System and method for radio frequency tag group select
US11/619,051 Abandoned US20070159305A1 (en) 1994-09-09 2007-01-02 System and Method for Radio Frequency Tag Group Select

Country Status (1)

Country Link
US (4) US6812852B1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050207364A1 (en) * 1998-02-19 2005-09-22 Wood Clifton W Jr Method of addressing messages and communications system
US20080204195A1 (en) * 2007-02-21 2008-08-28 Impinj, Inc. Rfid tag chips and tags complying with only a limited number of remaining commands and methods
US20080205335A1 (en) * 2007-02-27 2008-08-28 Quanta Computer Inc. Data transmitting method for wireless communication system
US20100007471A1 (en) * 2007-03-27 2010-01-14 Brother Kogyo Kabushiki Kaisha Apparatus for reading RFID tag
US20100023429A1 (en) * 2006-04-13 2010-01-28 Bolander Jarie G Embedding items with rfid tags for tracking and calibration
USRE41352E1 (en) * 1998-02-19 2010-05-25 Keystone Technology Solutions, Llc Method of addressing messages and communications
USRE41530E1 (en) 1998-02-19 2010-08-17 Round Rock Research, Llc Method and apparatus to select radio frequency identification devices in accordance with an arbitration scheme
US20110050412A1 (en) * 2009-08-18 2011-03-03 Cynthia Wittman Voice activated finding device
USRE42344E1 (en) 1998-02-19 2011-05-10 Round Rock Research, Llc Method and apparatus to manage RFID tags
US7973644B2 (en) 2007-01-30 2011-07-05 Round Rock Research, Llc Systems and methods for RFID tag arbitration where RFID tags generate multiple random numbers for different arbitration sessions
US8134452B2 (en) 2007-05-30 2012-03-13 Round Rock Research, Llc Methods and systems of receiving data payload of RFID tags
USRE43382E1 (en) 1998-02-19 2012-05-15 Round Rock Research, Llc Method of addressing messages and communications systems
US9031872B1 (en) 2013-03-12 2015-05-12 Target Brands, Inc. Digital sign with incorrectly stocked item identification
US9330284B1 (en) * 2011-04-18 2016-05-03 Impinj, Inc. Broadcast refresh of RFID tag persistence
CN106650535A (en) * 2016-12-21 2017-05-10 武汉市龙腾创科技有限公司 Multi-object data exchange method based on radio frequency identification
US10049317B1 (en) 2010-02-01 2018-08-14 Impinj, Inc. RFID tags with public and private inventory states
US10402710B1 (en) 2009-02-03 2019-09-03 Impinj, Inc. RFID tags with public and private inventory states

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6812852B1 (en) * 1994-09-09 2004-11-02 Intermac Ip Corp. System and method for selecting a subset of autonomous and independent slave entities
US7616094B2 (en) * 1994-09-09 2009-11-10 Intermec Ip Corp. Radio frequency identification system with write broadcast capability
BR9808714A (en) 1997-05-14 2000-07-11 Btg Int Ltd Enhanced identification system
US6836840B2 (en) * 2001-07-30 2004-12-28 International Business Machines Corporation Slaves with identification and selection stages for group write
TW535390B (en) * 2001-08-03 2003-06-01 Wistron Corp Control method and apparatus of IP phone
US20050075929A1 (en) * 2002-10-17 2005-04-07 Wolinsky Robert I. System and method for partitioning airtime for distribution and display of content
US20030229549A1 (en) 2001-10-17 2003-12-11 Automated Media Services, Inc. System and method for providing for out-of-home advertising utilizing a satellite network
US7614065B2 (en) 2001-12-17 2009-11-03 Automated Media Services, Inc. System and method for verifying content displayed on an electronic visual display
US6910911B2 (en) 2002-06-27 2005-06-28 Vocollect, Inc. Break-away electrical connector
GB2453477A (en) * 2004-02-06 2009-04-08 Zih Corp Identifying a plurality of transponders
US7362212B2 (en) * 2004-09-24 2008-04-22 Battelle Memorial Institute Communication methods, systems, apparatus, and devices involving RF tag registration
US7430398B2 (en) * 2005-05-03 2008-09-30 International Business Machines Corporation Radio frequency identification (RFID) system for dynamically and automatically establishing communication between a mobile wireless communicating device and a data processing system
EP1900153B1 (en) * 2005-07-04 2012-02-22 VKR Holding A/S System and method for operating a master unit and a plurality of slave units
PL1900152T3 (en) * 2005-07-04 2009-06-30 Vkr Holding As System comprising a master unit and a plurality of slave units for operating a plurality of devices
EP2079187B1 (en) * 2005-07-04 2011-09-07 VKR Holding A/S System comprising at least a master unit and a plurality of slave units
JP5027398B2 (en) 2005-09-27 2012-09-19 ルネサスエレクトロニクス株式会社 IC tag identification method
US20080055073A1 (en) * 2006-09-06 2008-03-06 Lutron Electronics Co., Inc. Method of discovering a remotely-located wireless control device
US7768422B2 (en) * 2006-09-06 2010-08-03 Carmen Jr Lawrence R Method of restoring a remote wireless control device to a known state
US7755505B2 (en) * 2006-09-06 2010-07-13 Lutron Electronics Co., Inc. Procedure for addressing remotely-located radio frequency components of a control system
US7880639B2 (en) * 2006-09-06 2011-02-01 Lutron Electronics Co., Inc. Method of establishing communication with wireless control devices
US20080147551A1 (en) * 2006-12-13 2008-06-19 Bea Systems, Inc. System and Method for a SIP Server with Online Charging
US20080258878A1 (en) * 2007-03-29 2008-10-23 Impinj, Inc. Facilitating rfid tags to refrain from participating in a subsequent inventorying attempt
WO2009089948A1 (en) * 2007-12-20 2009-07-23 International Business Machines Corporation System and method for determining rfid tagged items encompassed in a given area
CA2714566A1 (en) * 2008-02-08 2009-08-13 Automated Media Services, Inc. System and method for creating an in-store media network using traditional media metrics description of
USD626949S1 (en) 2008-02-20 2010-11-09 Vocollect Healthcare Systems, Inc. Body-worn mobile device
US8386261B2 (en) 2008-11-14 2013-02-26 Vocollect Healthcare Systems, Inc. Training/coaching system for a voice-enabled work environment
US8994508B2 (en) * 2008-12-11 2015-03-31 Intelleflex Corporation Inclusive or exclusive RFID tag interrogation and query round
US8717145B2 (en) * 2009-08-25 2014-05-06 Tyco Fire & Security Services GmbH RFID portal system with RFID tags having various read ranges
US8659397B2 (en) 2010-07-22 2014-02-25 Vocollect, Inc. Method and system for correctly identifying specific RFID tags
USD643400S1 (en) 2010-08-19 2011-08-16 Vocollect Healthcare Systems, Inc. Body-worn mobile device
USD643013S1 (en) 2010-08-20 2011-08-09 Vocollect Healthcare Systems, Inc. Body-worn mobile device
US9342810B2 (en) * 2012-05-01 2016-05-17 Hand Held Products, Inc. Dynamic scan context determination for asset reconciliation
US20140210692A1 (en) * 2013-01-25 2014-07-31 Opticon, Inc. System for remote management of electronic shelf display modules
US10779147B2 (en) * 2014-11-18 2020-09-15 Micron Technology, Inc. Wireless memory interface
US10757870B2 (en) * 2017-06-14 2020-09-01 Grow Solutions Tech Llc Devices, systems, and methods for providing and using crop control hardware in a master controller in an assembly line grow pod

Family Cites Families (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3970824A (en) 1975-01-13 1976-07-20 Schlage Electronics, Inc. Electronic recognition and identification system for identifying a family of codes
US4636950A (en) 1982-09-30 1987-01-13 Caswell Robert L Inventory management system using transponders associated with specific products
US4656463A (en) 1983-04-21 1987-04-07 Intelli-Tech Corporation LIMIS systems, devices and methods
US4673932A (en) 1983-12-29 1987-06-16 Revlon, Inc. Rapid inventory data acquistion system
GB8408538D0 (en) 1984-04-03 1984-05-16 Senelco Ltd Transmitter-responder systems
US5008661A (en) 1985-09-27 1991-04-16 Raj Phani K Electronic remote chemical identification system
ATE110480T1 (en) 1987-03-31 1994-09-15 Identec Ltd ACCESS CONTROL DEVICE.
US5550548A (en) 1988-07-08 1996-08-27 Texas Instruments Deutschland Gmbh Interrogator for detecting adjacent transponders
NL8802718A (en) 1988-11-04 1990-06-01 Nedap Nv Consecutive read=out system for multiple RF detection labels - uses transceiver, with group of labels switched on or off vby algorithmic selection procedure
NL8901659A (en) 1989-06-30 1991-01-16 Nedap Nv MULTIPASS SYSTEM.
WO1991010290A1 (en) * 1989-12-28 1991-07-11 Kabushiki Kaisha Toyota Chuo Kenkyusho Mobile communication system and mobile communication equipment
DE4003410A1 (en) * 1990-02-05 1991-08-08 Anatoli Stobbe PORTABLE FIELD PROGRAMMABLE DETECTOR TAG
GB9009739D0 (en) 1990-05-01 1990-06-20 Disys Inc Transponder system
US5407050A (en) 1991-03-14 1995-04-18 Kabushiki Kaisha Ace Denken Article control system
US5231273A (en) 1991-04-09 1993-07-27 Comtec Industries Inventory management system
US5151684A (en) 1991-04-12 1992-09-29 Johnsen Edward L Electronic inventory label and security apparatus
US5245534A (en) 1991-09-10 1993-09-14 Ers Associates Limited Partnership Electronic tag location systems
US5266925A (en) * 1991-09-30 1993-11-30 Westinghouse Electric Corp. Electronic identification tag interrogation method
US5268668A (en) 1992-01-07 1993-12-07 Detection Systems, Inc. Security/fire alarm system with group-addressing remote sensors
US5294931A (en) 1992-04-29 1994-03-15 Texas Instruments Deutschland Gmbh Method of interrogating a plurality of transponders arranged in the transmission range of an interrogating device and transponders for use in the said method
US5365551A (en) 1992-12-15 1994-11-15 Micron Technology, Inc. Data communication transceiver using identification protocol
RU2156540C2 (en) 1992-08-26 2000-09-20 Бритиш Технолоджи гроуп Лимитед Identification system with querying unit and multiple responding units, responder of identification system
US5410315A (en) 1992-12-08 1995-04-25 Texas Instruments Incorporated Group-addressable transponder arrangement
US5287112A (en) 1993-04-14 1994-02-15 Texas Instruments Incorporated High speed read/write AVI system
US5590339A (en) * 1993-08-23 1996-12-31 Macronix International Co., Ltd. Input device interface with power connect state and serial data channel enabling power to the device from time to time
US5517194A (en) * 1994-02-10 1996-05-14 Racom Systems, Inc. Passive RF transponder and method
US5539394A (en) * 1994-03-16 1996-07-23 International Business Machines Corporation Time division multiplexed batch mode item identification system
US5434572A (en) * 1994-06-07 1995-07-18 Ramtron International Corporation System and method for initiating communications between a controller and a selected subset of multiple transponders in a common RF field
US5489908A (en) 1994-07-27 1996-02-06 Texas Instruments Deutschland Gmbh Apparatus and method for identifying multiple transponders
US5942987A (en) 1994-09-09 1999-08-24 Intermec Ip Corp. Radio frequency identification system with write broadcast capability
US5828318A (en) * 1996-05-08 1998-10-27 International Business Machines Corporation System and method for selecting a subset of autonomous and independent slave entities
US5673037A (en) 1994-09-09 1997-09-30 International Business Machines Corporation System and method for radio frequency tag group select
US6812852B1 (en) * 1994-09-09 2004-11-02 Intermac Ip Corp. System and method for selecting a subset of autonomous and independent slave entities
US5550547A (en) 1994-09-12 1996-08-27 International Business Machines Corporation Multiple item radio frequency tag identification protocol

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8040829B2 (en) 1998-02-19 2011-10-18 Round Rock Research, Llc Method of addressing messages and communications system
USRE44411E1 (en) 1998-02-19 2013-08-06 Round Rock Research, Llc Method of addressing messages, method of establishing wireless communications and communications system
US20050207364A1 (en) * 1998-02-19 2005-09-22 Wood Clifton W Jr Method of addressing messages and communications system
USRE42900E1 (en) 1998-02-19 2011-11-08 Round Rock Research, Llc Method of addressing messages and communications systems
US9014077B2 (en) 1998-02-19 2015-04-21 Round Rock Research, Llc Methods and apparatus for conducting financial transactions
US8638709B2 (en) 1998-02-19 2014-01-28 Round Rock Research, Llc Methods and apparatus for conducting financial transactions
US8634338B2 (en) 1998-02-19 2014-01-21 Round Rock Research, Llc Methods and apparatus for conducting financial transactions
US20080042806A1 (en) * 1998-02-19 2008-02-21 Wood Clifton W Jr Method of Addressing Messages and Communications System
US7672260B2 (en) 1998-02-19 2010-03-02 Keystone Technology Solutions, Llc Method of addressing messages and communications system
USRE41352E1 (en) * 1998-02-19 2010-05-25 Keystone Technology Solutions, Llc Method of addressing messages and communications
US7760677B2 (en) 1998-02-19 2010-07-20 Keystone Technology Solutions, Llc Method of addressing messages and communications system
USRE41471E1 (en) 1998-02-19 2010-08-03 Round Rock Research, Llc Method of Addressing Messages and Communications System
USRE41530E1 (en) 1998-02-19 2010-08-17 Round Rock Research, Llc Method and apparatus to select radio frequency identification devices in accordance with an arbitration scheme
USRE43020E1 (en) 1998-02-19 2011-12-13 Round Rock Research, Llc Method of addressing messages, method of establishing wireless communications, and communications system
USRE42254E1 (en) * 1998-02-19 2011-03-29 Round Rock Research, Llc Method of addressing messages and communications system
USRE42344E1 (en) 1998-02-19 2011-05-10 Round Rock Research, Llc Method and apparatus to manage RFID tags
US8488581B2 (en) 1998-02-19 2013-07-16 Round Rock Research, Llc Methods and apparatus for conducting financial transactions
USRE43445E1 (en) 1998-02-19 2012-06-05 Round Rock Research, Llc Method and apparatus to manage RFID tags
USRE43382E1 (en) 1998-02-19 2012-05-15 Round Rock Research, Llc Method of addressing messages and communications systems
US7667603B2 (en) * 2006-04-13 2010-02-23 Tagent Corporation Embedding items with RFID tags for tracking and calibration
US20100023429A1 (en) * 2006-04-13 2010-01-28 Bolander Jarie G Embedding items with rfid tags for tracking and calibration
US7973644B2 (en) 2007-01-30 2011-07-05 Round Rock Research, Llc Systems and methods for RFID tag arbitration where RFID tags generate multiple random numbers for different arbitration sessions
US8207856B2 (en) 2007-01-30 2012-06-26 Round Rock Research, Llc Systems and methods for RFID tag arbitration where RFID tags generate multiple random numbers for different arbitration sessions
US20090002132A1 (en) * 2007-02-21 2009-01-01 Impinj, Inc. Causing rfid tag to change how many remaining commands it will comply with
US8354917B2 (en) * 2007-02-21 2013-01-15 Impinj, Inc. RFID tag chips and tags complying with only a limited number of remaining commands and methods
US8446258B2 (en) * 2007-02-21 2013-05-21 Impinj, Inc. Causing RFID tag to change how many remaining commands it will comply with
US20080204195A1 (en) * 2007-02-21 2008-08-28 Impinj, Inc. Rfid tag chips and tags complying with only a limited number of remaining commands and methods
US7965628B2 (en) * 2007-02-27 2011-06-21 Quanta Computer Inc. Data transmitting method for wireless communication system
US20080205335A1 (en) * 2007-02-27 2008-08-28 Quanta Computer Inc. Data transmitting method for wireless communication system
US20100007471A1 (en) * 2007-03-27 2010-01-14 Brother Kogyo Kabushiki Kaisha Apparatus for reading RFID tag
US8134452B2 (en) 2007-05-30 2012-03-13 Round Rock Research, Llc Methods and systems of receiving data payload of RFID tags
US11062190B1 (en) 2009-02-03 2021-07-13 Impinj, Inc. RFID tags with public and private inventory states
US10402710B1 (en) 2009-02-03 2019-09-03 Impinj, Inc. RFID tags with public and private inventory states
US11481592B1 (en) 2009-02-03 2022-10-25 Impinj, Inc. RFID tags with public and private inventory states
US20110050412A1 (en) * 2009-08-18 2011-03-03 Cynthia Wittman Voice activated finding device
US10049317B1 (en) 2010-02-01 2018-08-14 Impinj, Inc. RFID tags with public and private inventory states
US9330284B1 (en) * 2011-04-18 2016-05-03 Impinj, Inc. Broadcast refresh of RFID tag persistence
US9031872B1 (en) 2013-03-12 2015-05-12 Target Brands, Inc. Digital sign with incorrectly stocked item identification
CN106650535A (en) * 2016-12-21 2017-05-10 武汉市龙腾创科技有限公司 Multi-object data exchange method based on radio frequency identification

Also Published As

Publication number Publication date
US20050168348A1 (en) 2005-08-04
US20070159305A1 (en) 2007-07-12
US7158046B2 (en) 2007-01-02
US6812852B1 (en) 2004-11-02

Similar Documents

Publication Publication Date Title
US20070176751A1 (en) Multiple Item Radio Frequency Tag Identification Protocol
US5550547A (en) Multiple item radio frequency tag identification protocol
US6104279A (en) Method of communication between a plurality of remote units and a control unit
US5929801A (en) Method for repeating interrogations until failing to receive unintelligible responses to identify plurality of transponders by an interrogator
US6456191B1 (en) Tag system with anti-collision features
US6034603A (en) Radio tag system and method with improved tag interference avoidance
US5500650A (en) Data communication method using identification protocol
US5583850A (en) Data communication system using identification protocol
US8451092B2 (en) Method and apparatus for efficiently querying and identifying multiple items on a communication channel
US6995655B2 (en) Method of simultaneously reading multiple radio frequency tags, RF tags, and RF reader
EP0696011B1 (en) Apparatus and method for identifying multiple transponders
US6538563B1 (en) RF transponder identification system and protocol
US20050237159A1 (en) RFID tag systems, RFID tags and RFID processes with reverse link burst mode
EP0898815B1 (en) Transponder communications device
US20050237157A1 (en) RFID tag systems, RFID tags and RFID processes with branch node indexing
US8477017B2 (en) Method, system, and integrated circuit for communication in RFID or remote sensor systems
JPH08316888A (en) Tag identification system and method
US20050237158A1 (en) RFID tag systems, RFID tags and RFID processes using N-ary FSK
US7307964B2 (en) Contactless communication system and data carrier used for the same
EP0831618B1 (en) Improvements in or relating to information/data transfer systems
CA2266337C (en) Tag system with anti-collision features
WO2001065481A1 (en) Radio tag system and method with tag interference avoidance
US8258927B1 (en) Method and system for inventorying wireless transponders providing anti-eavesdropping anti-collision
US20020094830A1 (en) Method of transmitting data signals
KR100244844B1 (en) Radio frequency identification system with write broadcast capability

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION