SUCESSIVE MEMORY WRITES IN AN RFID INTERROGATOR
First Claim
1. A process for optimizing radio frequency identification (RFID) encoding by reducing the time required to complete a user defined function, comprising the steps of:
- creating a high level configurable command stack optimization operation;
issuing individual commands via an RFID printer as one command;
allowing an RFID interrogator to process all the individual commands at once; and
responding to all the individual commands.
2 Assignments
0 Petitions
Accused Products
Abstract
A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer simultaneously prints on and electronically encodes/verifies RFID labels, tags, and/or stickers attached to a continuous web. The industrial printer comprises a lighted sensor array for indexing the printing to the RFID tags; and a cutter powered from the industrial printer for cutting the web that the RFID tags are disposed on. The industrial printer comprises two RFID reader/writers that are individually controlled. Specifically, one of the RFID reader/writers comprises the ability to electronically encode the RFID tags while the web is moving; and the second RFID reader/writer uses an additional RFID module and antenna on the printer for verifying the data encoded to the RFID tags. The printer provides for successive writes to various memory blocks and optimizes the communication sequence between the interrogator and tag.
-
Citations
20 Claims
-
1. A process for optimizing radio frequency identification (RFID) encoding by reducing the time required to complete a user defined function, comprising the steps of:
-
creating a high level configurable command stack optimization operation; issuing individual commands via an RFID printer as one command; allowing an RFID interrogator to process all the individual commands at once; and
responding to all the individual commands. - View Dependent Claims (2, 3)
-
-
4. A process for optimizing the command sequence between an RFID interrogator and an RFID tag based on foreknowledge of the communication sequence, comprising the steps of:
-
removing query command; removing ack command; issuing a Req_RN command via the RFID interrogator; issuing a handle New RN 16 via the RFID tag; responding with an access command via the RFID Interrogator; and responding with status via the RFID tag. - View Dependent Claims (5, 6, 7, 8)
-
-
9. A process for optimizing system throughput via providing for successive writes to multiple memory blocks in a RFID Gen 2 tag device via a configurable composite RFID interrogator host write memory command before returning results of a command to a host, comprising the steps of:
-
accepting memory block identification for each memory block to be written and data to be written into each memory block; executing RFID Gen 2 tag device commands via the composite RFID interrogator host write memory command to place the RFID Gen 2 tag device in an open state; executing successive write commands to the multiple memory blocks of the RFID Gen 2 tag device defined in a host command; and returning the RFID Gen 2 tag device to a ready state when all memory blocks have been written, and returning status of results to the host command. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification