Active energy harvesting for radio-frequency identification devices
First Claim
Patent Images
1. A method for providing power to radio-frequency identification (RFID) devices through power lines and a wireless network, comprising:
- placing a passive RFID transponder that does not include a power source within a field generated by a power line and the wireless network; and
enabling the RFID transponder to communicate directly with an RFID reader that is outside of a normal operating range of the RFID transponder by powering the RFID transponder using the field generated by the power line and the wireless network;
the RFID transponder gaining a set of user rights and controls on the wireless network;
the RFID transponder gaining a higher priority on the wireless network using the set of user rights and controls;
the RFID transponder being configured to request a higher level of power;
from the power line; and
from the wireless network using the set of user rights and controls.
0 Assignments
0 Petitions
Accused Products
Abstract
In general, embodiments of the present invention provide approaches for providing power to RFID transponders. In one embodiment, the RFID transponder is powered using a magnetic field generated by power lines. In another embodiment, the RFID transponder is powered using a field generated by a wireless network. In the case of the latter, the RFID transponder acts as a member of the wireless network. In so doing, the RFID transponder is granted user rights and controls, and can control devices that are available on the network.
-
Citations
12 Claims
-
1. A method for providing power to radio-frequency identification (RFID) devices through power lines and a wireless network, comprising:
-
placing a passive RFID transponder that does not include a power source within a field generated by a power line and the wireless network; and enabling the RFID transponder to communicate directly with an RFID reader that is outside of a normal operating range of the RFID transponder by powering the RFID transponder using the field generated by the power line and the wireless network; the RFID transponder gaining a set of user rights and controls on the wireless network; the RFID transponder gaining a higher priority on the wireless network using the set of user rights and controls; the RFID transponder being configured to request a higher level of power; from the power line; and from the wireless network using the set of user rights and controls. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for providing power to radio-frequency identification (RFID) devices using a wireless network, comprising:
-
positioning a passive RFID transponder that does not include a power source in range of the wireless network; the RFID transponder acting as a member of the wireless network; and the RFID transponder communicating directly with an RFID reader that is outside of a normal operating range of the RFID transponder by drawing power from a field generated by the wireless network; the RFID transponder gaining a set of user rights and controls on the wireless network; the RFID transponder gaining a higher priority on the wireless network using the set of user rights and controls; the RFID transponder requesting a higher level of power using the set of user rights and controls. - View Dependent Claims (8, 9, 10)
-
-
11. A method for active energy harvesting for radio-frequency identification (RFID) devices, comprising:
-
positioning a passive RFID transponder that does not include a power source in a field generated by a non-RFID power source; and communicating directly with an RFID reader that is outside of a normal operating range of the RFID transponder by providing power to the RFID transponder using the non-RFID power source; the non-RFID power source being a wireless network; the RFID transponder gaining a set of user rights and controls on the wireless network, and the RFID transponder gaining a higher priority on the wireless network using the set of user rights and controls; the RFID transponder requesting a higher level of power using the set of user rights and controls. - View Dependent Claims (12)
-
Specification