Successive memory writes in an RFID interrogator
First Claim
1. A process for optimizing the command sequence between an RFID interrogator and an RFID tag based on foreknowledge of the communication sequence between an RFID interrogator and an RFID tag, comprising the steps of:
- removing query command via the RFID interrogator;
removing ack command via the RFID interrogator;
issuing a Req_RN command via the RFID interrogator;
issuing a handle New RN 16 via the RFID tag;
responding with an access command via the RFID Interrogator; and
responding with status via the RFID tag.
2 Assignments
0 Petitions
Accused Products
Abstract
A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer simultaneously prints on and electronically encodes/verifies RFID labels, tags, and/or stickers attached to a continuous web. The industrial printer comprises a lighted sensor array for indexing the printing to the RFID tags; and a cutter powered from the industrial printer for cutting the web that the RFID tags are disposed on. The industrial printer comprises two RFID reader/writers that are individually controlled. Specifically, one of the RFID reader/writers comprises the ability to electronically encode the RFID tags while the web is moving; and the second RFID reader/writer uses an additional RFID module and antenna on the printer for verifying the data encoded to the RFID tags. The printer provides for successive writes to various memory blocks and optimizes the communication sequence between the interrogator and tag.
-
Citations
10 Claims
-
1. A process for optimizing the command sequence between an RFID interrogator and an RFID tag based on foreknowledge of the communication sequence between an RFID interrogator and an RFID tag, comprising the steps of:
-
removing query command via the RFID interrogator; removing ack command via the RFID interrogator; issuing a Req_RN command via the RFID interrogator; issuing a handle New RN 16 via the RFID tag; responding with an access command via the RFID Interrogator; and responding with status via the RFID tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification