Method and apparatus to select radio frequency identification devices in accordance with an arbitration scheme
First Claim
1. A method of establishing wireless communications between an interrogator and individual ones of multiple wireless identification devices, the wireless identification devices having respective identification numbers and being addressable by specifying identification numbers with any one of multiple possible degrees of precision, the method comprising utilizing a tree search in an arbitration scheme to determine a degree of precision necessary to establish one-to-one communications between the interrogator and individual ones of the multiple wireless identification devices, a search tree being defined for the tree search method, the tree having multiple selectable levels respectively representing subgroups of the multiple wireless identification devices, the level at which a tree search starts being variable the method further comprising starting the tree search at any selectable level of the search tree selectable level other than the top level of the search tree.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of establishing wireless communications between an interrogator and individual ones of multiple wireless identification devices, the method comprising utilizing a tree search method to establish communications without collision between the interrogator and individual ones of the multiple wireless identification devices, a search tree being defined for the tree search method, the tree having multiple levels respectively representing subgroups of the multiple wireless identification devices, the method further comprising starting the tree search at a selectable level of the search tree. A communications system comprising an interrogator, and a plurality of wireless identification devices configured to communicate with the interrogator in a wireless fashion, the respective wireless identification devices having a unique identification number, the ingerrogator being configured to employ a tree search technique to determine the unique identification numbers of the different wireless identification devices so as to be able to establish communications between the interrogator and individual ones of the multiple wireless identification devices without collision by multiple wireless identification devices attempting to respond to the interrogator at the same time, wherein the interrogator is configured to start the tree search at a selectable level of the search tree.RFID devices are selected by an interrogator. The interrogator sends a signal to a plurality of RFID devices. The signal indicates a bit string and a memory range comprising multiple bit locations. RFID devices compare the bits stored in their respective memory ranges to the bit string to determine which of the RFID devices are selected.
-
Citations
76 Claims
- 1. A method of establishing wireless communications between an interrogator and individual ones of multiple wireless identification devices, the wireless identification devices having respective identification numbers and being addressable by specifying identification numbers with any one of multiple possible degrees of precision, the method comprising utilizing a tree search in an arbitration scheme to determine a degree of precision necessary to establish one-to-one communications between the interrogator and individual ones of the multiple wireless identification devices, a search tree being defined for the tree search method, the tree having multiple selectable levels respectively representing subgroups of the multiple wireless identification devices, the level at which a tree search starts being variable the method further comprising starting the tree search at any selectable level of the search tree selectable level other than the top level of the search tree.
-
7. A method of addressing messages from an interrogator to a selected one or more of a number of communications device, the method comprising:
-
establishing for respective devices unique identification numbers respectively having a first predetermined number of bits;
establishing a second predetermined number of bits to be used for random values;
causing the devices to select random values, wherein respective devices choose random values independently of random values selected by the other devices;
determining the maximum number of devices potentially capable of responding to the interrogator;
transmitting a command from the interrogator requesting devices having random values within a specified group of random values to respond, by using a subset of the second predetermined number of bits, the specified group being chosen in response to the determined maximum number;
receiving the command at multiple devices, devices receiving the command respectively determining if the random value chosen by the device falls within the specified group and, if so, sending a reply to the interrogator; and
determining using the interrogator if a collision occurred between devices that sent a reply and, if so, creating a new, smaller, specified group. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method of addressing messages from an interrogator to a selected one or more of a number of communications devices, the method comprising:
-
causing the devices to select random values for use as arbitration numbers, wherein respective devices choose random values independently of random values selected by the other devices, the devices being addressable by specifying arbitration numbers with any one of multiple possible degrees of precision;
transmitting a command from the interrogator requesting devices having random values within a specified group of a plurality of possible groups of random values to respond, the specified group being less than the entire set of random values, the plurality of possible groups being organized in a binary tree defined by a plurality of nodes at respective levels, wherein the size of groups of random values decrease in size by half with each node descended, wherein the specified group is below a node on the tree selected based on the maximum number of devices capable of communicating with the interrogator;
receiving the command at multiple devices, devices receiving the command respectively determining if the random value chosen by the device falls within the specified group and, if so, sending a reply to the interrogator; and
, if not, not sending a reply; and
determining using the interrogator if a collision occurred between devices that sent a reply and, if so, creating a new, smaller, specified group by descending in the tree. - View Dependent Claims (13, 14, 15)
-
-
16. A method of addressing messages from an interrogator to a selected one or more of a number of RFID devices, the method comprising:
-
establishing for respective devices a predetermined number of bits to be used for random values, the predetermined number being a multiple of sixteen;
causing the devices to select random values, wherein respective devices choose random values independently of random values selected by the other devices;
transmitting a command from the interrogator requesting devices having random values within a specified group of a plurality of possible groups of random values to respond, the specified group being equal to or less than the entire set of random values, the plurality of possible groups being organized in a binary tree defined by a plurality of nodes at respective levels, wherein the maximum size of groups of random values decrease in size by half with each node descended, wherein the specified group is below a node on a level of the tree selected based on the maximum number of devices known to be capable of communicating with the interrogator;
receiving the command at multiple devices, devices receiving the command respectively determining if the random value chosen by the device falls within the specified group and, only if so, sending a reply to the interrogator, wherein sending a reply to the interrogator comprises transmitting both the random value of the device sending the reply and the unique a unique identification number of the device sending the reply;
using the interrogator to determine if a collision occurred between devices that sent a reply and, if so, creating a new, smaller, specified group using a level of the tree different from the level used in the interrogator transmitting, the interrogator transmitting a command requesting devices having random values within the new specified group of random values to respond; and
if a reply without collision is received from a device, the interrogator subsequently sending a command individually addressed to that device. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
- 24. A communications system comprising an interrogator, and a plurality of wireless identification devices configured to communicate with the interrogator in a wireless fashion, the wireless identification devices having respective identification numbers, the interrogator being configured to employ a tree search in a search tree having multiple selectable levels, to determine the identification numbers of the different wireless identification devices with sufficient precision so as to be able to establish one-on-one communications between the interrogator and individual ones of the multiple wireless identification devices, wherein the interrogator is configured to start the tree search at any selectable level of the search tree selectable level other than the top level of the search tree.
-
27. A system comprising:
-
an interrogator;
a number of communications devices capable of wireless communications with the interrogator;
means for establishing a predetermined number of bits to be used as random numbers, and for causing respective devices to select random numbers respectively having the predetermined number of bits;
means for inputting a predetermined number indicative of the maximum number of devices possibly capable of communicating with the receiver interrogator;
means for causing the interrogator to transmit a command requesting devices having random values within a specified group of random values to respond, the specified group being chosen in response to the inputted predetermined number;
means for causing devices receiving the command to determine if their chosen random values fall within the specified group and, if so, send a reply to the interrogator; and
means for causing the interrogator to determine if a collision occurred between devices that sent a reply and, if so, create a new, smaller, specified group. - View Dependent Claims (28, 29)
-
-
30. A system comprising:
-
an interrogator configured to communicate to a selected one or more of a number of communications devices;
a plurality of communications devices;
the devices being configured to select random values, wherein respective devices choose random values independently of random values selected by the other devices, different sized groups of devices being addressable by specifying random values with differing levels of precision;
the interrogator being configured to transmit a command requesting devices having random values within a specified group of a plurality of possible groups of random values to respond, the specified group being less than the entire set of random values, the plurality of possible groups being organized in a binary tree defined by a plurality of nodes at respective levels, wherein the size of groups of random values decrease in size by half with each node descended, wherein the specified group is below a node on the tree selected based on a predetermined maximum number of devices capable of communicating with the interrogator;
devices receiving the command being configured to respectively determine if their chosen random values fall within the specified group and, if so, send a reply to the interrogator; and
, if not, not send a reply; and
the interrogator being configured to determine if a collision occurred between devices that sent a reply and, if so, create a new, smaller, specified group by descending in the tree. - View Dependent Claims (31, 32, 33)
-
-
34. A system comprising:
-
an interrogator configured to communicate to a selected one or more of a number of RFID devices;
a plurality of RFID devices, respective devices being configured to store unique identification numbers respectively having a first predetermined number of bits, respective devices being further configured to store a second predetermined number of bits to be used for random values, respective devices being configured to select random values independently of random values selected by the other devices;
the interrogator being configured to transmit an identify command requesting a response from devices having random values within a specified group of a plurality of possible groups or random of random values, the specified group being less than or equal to the entire set of random values, the plurality of possible groups being organized in a binary tree defined by a plurality of nodes at respective levels, wherein the maximum size of groups of random values decrease in size by half with each node descended, wherein the specified group is below a node on a level of the tree selected based on the maximum number of devices known to be capable of communicating with the interrogator;
devices receiving the command respectively being configured to determine if their chosen random values fall within the specified group and, only if so, send a reply to the interrogator, wherein sending a reply to the interrogator comprises transmitting both the random value of the device sending the reply and the unique identification number of the device sending the reply;
the interrogator being configured to determine if a collision occurred between devices that sent a reply and, if so, create a new, smaller, specified group using a level of the tree different from the level used in previously transmitting an identify command, the interrogator transmitting an identify command requesting devices having random values within the new specified group of random values to respond; and
the interrogator being configured to send a command individually addressed to a device after communicating with a device without a collision.
-
-
35. A system in accordance with 34 wherein the interrogator is configured to input and store the predetermined number a number representing the specified group.
- 36. A system in accordance with 34 wherein the devices are configured to respectively determine if their chosen random values fall within a specified group and, if so, send a reply, upon receiving respective identify commands.
-
38. A method comprising:
-
disposing a plurality of radio frequency identification (RFID) tags in a communication field of an interrogator, each respective tag of the plurality of tags including respective memory storing a respective identification code that identifies a respective object to which each respective tag is affixed;
sending a select command from the interrogator to the plurality of tags after disposing the plurality of tags in the field and before any of the plurality of tags communicate to the interrogator, the select command including a set of parameters, the set of parameters including a bit string and describing a memory range, the memory range comprising multiple bit locations;
each respective tag of the plurality of tags receiving the select command and comparing the bit string against the memory range of the respective memory of each respective tag to determine if the respective tag is a member of a population of tags;
each respective tag of the population picking a respective random value and associating the random value with a respective slot, wherein a sequence in which the population of tags are to reply to the interrogator is determined by each respective slot;
each respective tag of at least a portion of the population backscattering a respective reply to the interrogator, each respective reply including a respective random number generated by each respective tag, each respective tag replying in accordance with the sequence; and
sending an acknowledge command from the interrogator in response to the interrogator receiving a respective reply from a respective tag and determining the respective reply to be collision-free. - View Dependent Claims (39, 40, 41, 42)
-
-
43. A method comprising:
-
affixing a radio frequency identification (RFID) tag to an object, the tag including tag memory;
disposing the tag in a communication field of an interrogator;
sending a first signal from the interrogator to the tag after disposing the tag in the field and before the tag communicates to the interrogator, the first signal including parameters that describe a memory range and a bit string;
receiving the first signal at the tag, and in response thereto, comparing the bit string against the memory range of the tag memory to determine if the tag is selected, the memory range of the tag memory storing a plurality of bits;
the tag picking a random value and associating the random value with a slot in accordance with an arbitration scheme for an inventory operation if the tag is determined to be selected;
sending a second signal from the interrogator to the tag;
backscattering a random number generated by the tag from the tag to the interrogator in accordance with the slot in response to receiving the second signal; and
sending a acknowledge command from the interrogator to the tag in response to the interrogator receiving the random number. - View Dependent Claims (44, 45, 46, 47)
-
-
48. A method comprising:
-
disposing a radio frequency identification (RFID) tag in a communication field of an interrogator, the tag including tag memory;
sending a select command from the interrogator to the tag after disposing the tag in the field and before the tag communicates to the interrogator, the select command including parameters that describe a memory range and a bit string;
receiving the select command at the tag, and in response thereto, comparing the bit string against the memory range of the tag memory to determine if the tag is selected, the memory range of the tag memory storing at least two bits; and
communicating a random number generated by the tag from the tag to the interrogator in accordance with an arbitration scheme if the tag is determined to be selected. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
-
63. A method comprising:
-
disposing a plurality of radio frequency (RFID) tags in a communication field of an interrogator;
sending a first signal from the interrogator to first and second tags of the plurality of tags after disposing the plurality of tags in the field and before any of the plurality of tags communicate to the interrogator, the first signal including a bit string and indicating a portion of memory, the portion of memory comprising multiple bit storage locations, the first tag having stored therein a first set of bits in bit storage locations corresponding to the portion of memory, and the second tag having stored therein a second set of bits in bit storage locations corresponding to the portion of memory;
the first tag receiving the first signal and comparing the bit string against the first set of bits to determine if the first tag is selected;
the second tag receiving the first signal and comparing the bit string against the second set of bits to determine if the second tag is selected;
the first tag picking a first random value and associating the first random value with a first slot in accordance with an arbitration scheme;
the second tag picking a second random value and associating the second random value with a second slot in accordance with the arbitration scheme;
the first tag backscattering a first identification code that identifies a first object to which the first tag is affixed; and
the second tag backscattering a second identification code that identifies a second object to which the second tag is affixed. - View Dependent Claims (64, 65, 66, 67, 68, 69)
-
-
70. A method comprising:
-
disposing a radio frequency identification (RFID) tag in a communication field of an interrogator;
sending a first command from the interrogator to the tag after disposing the tag in the field and before the tag communicates to the interrogator, the first command including a first set of fields comprising at least two first bit values;
the tag wirelessly receiving the first command;
the tag backscattering a first reply based, at least in part, on whether the two first bit values received from the interrogator match two corresponding bit values stored in the tag, the first reply including a random number generated by the tag;
sending a second command from the interrogator to the tag, the second command including a second set of fields comprising at least two second bit values;
the tag wirelessly receiving the second command; and
the tag backscattering a second reply based, at least in part, on whether the two second bit values received from the interrogator match the two corresponding bit values stored in the tag, the second reply including a random number generated by the tag. - View Dependent Claims (71, 72, 73, 74, 75, 76)
-
Specification