Method of authenticating an article using microradios
First Claim
1. A method for detecting breach of a container, comprising the steps of:
- modulating the signal from an ensemble of parasitically powered microradios provided in aerosol form in a container, each of the microradios in the ensemble having a predetermined code associated therewith such that the information relating to the code is transmitted; and
,demodulating the transmission from the parasitically powered microradios;
the modulating step including parasitically injecting energy into the area surrounding the container and determining any microradio emission such that if any other object in the area is coated with microradios having the predetermined code, it is ascertained that the container has been breached due to the emergence of the aerosol containing microradios away from the container, the microradios attaching to other surfaces, including human or animal surfaces, identifying the individual or object breaching the container.
1 Assignment
0 Petitions
Accused Products
Abstract
A microradio is provided with a hysteretic switch to permit an optimum range increasing charging cycle, with the charging cycle being long relative to the transmit cycle. Secondly, an ensemble of microradios permits an n2 power enhancement to increase range with coherent operation. Various multi-frequency techniques are used both for parasitic powering and to isolate powering and transmit cycles. Applications for microradios and specifically for ensembles of microradios include authentication, tracking, fluid flow sensing, identification, terrain surveillance including crop health sensing and detection of improvised explosive devices, biohazard and containment breach detection, and biomedical applications including the use of microradios attached to molecular tags to destroy tagged cells when the microradios are activated. Microradio deployment includes the use of paints or other coatings containing microradios, greases and aerosols. Moreover, specialized antennas, including microcoils, mini dipoles, and staircase coiled structures are disclosed, with the use of nano-devices further reducing the size of the microradios.
23 Citations
18 Claims
-
1. A method for detecting breach of a container, comprising the steps of:
-
modulating the signal from an ensemble of parasitically powered microradios provided in aerosol form in a container, each of the microradios in the ensemble having a predetermined code associated therewith such that the information relating to the code is transmitted; and
,demodulating the transmission from the parasitically powered microradios; the modulating step including parasitically injecting energy into the area surrounding the container and determining any microradio emission such that if any other object in the area is coated with microradios having the predetermined code, it is ascertained that the container has been breached due to the emergence of the aerosol containing microradios away from the container, the microradios attaching to other surfaces, including human or animal surfaces, identifying the individual or object breaching the container. - View Dependent Claims (2)
-
-
3. A method for identifying articles, comprising the steps of:
parasitically powering microradios embedded in an article, the microradio having associated codes such that the microradios emit signals incorporating the codes, whereby articles are identified through the embedding of the ensembles of microradios each microradio including a rectifier, a capacitor to be parasitically powered coupled to the rectifier, an oscillator coupled to the capacitor, a hysteretic switch coupled between the rectifier and the capacitor, a radiative structure coupled to both said rectifier and said oscillator to permit the charging of the capacitor in the microradio when a sufficient charge has been collected on the capacitor and then to discharge the capacitor to permit release of sufficient energy to power the microradio, whereby the microradios can be powered with relatively low levels of incident energy. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11)
-
12. An anti-piracy method for establishing the authenticity of an article, comprising the steps of:
-
parasitically powering an ensemble of microradios provided within an aerosol within a container, the microradios having a predetermined code transmitted upon parasitic powering, the microradios having been provided with conductive adhesive about each of the microradios such that as they escape the container, they attach to a surface, thus to leave a trail to be able to track the location of the container, detecting the emissions from the ensemble of microradios to establish the existence of the code; and
,authenticating the container through the existence or non-existence of any code detected upon parasitic powering, whereby containers that have not been provided with microradios, upon parasitic powering emit no radiation, thus indicating a pirated or fake article breach of the container causing the microradios to be dispersed outside the container. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method for authentication comprising the step of positioning a parasitically powered microradio on or in an object to be authenticated, the microradio including a rectifier, a capacitor to be parasitically powered, coupled to the rectifier, an oscillator coupled to the capacitor, a hysteretic switch coupled between the rectifier and the capacitor, a radiative structure coupled to both said rectifier and said oscillator to permit the charging of the capacitor in the microradio when a sufficient charge has been collected on the capacitor and then to discharge the capacitor to permit release of sufficient energy to power the microradio, whereby the microradios can be powered with relatively low levels of incident energy.
Specification