throbber
US007667575B2
`
`(12) United States Patent
`I-Iusak et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,667,575 B2
`Feb. 23, 2010
`
`(54)
`
`(75)
`
`LOCATION VIRTUALIZATION IN AN RFID
`SYSTEM
`
`Inventors :
`
`David J. Husak, Windham, NH (US),
`Pattabhiraman Krishna, Westborough,
`MA (US); Peter Spreadborough,
`Haverhill, MA (US); Jeffrey H. Fischer,
`Boston, MA
`
`Assignee: Reva Systems Corporation,
`Chelmsford, MA (US)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 836 days.
`
`Appl. No.: 11/194,144
`
`Filed:
`
`Jul. 29. 2005
`
`Prior Publication Data
`
`US 2006/0170565 A1
`
`Aug. 3, 2006
`
`Related U.S. Application Data
`
`Provisional application No. 60/592,933, filed o11 Jul.
`30, 2004.
`
`Int. Cl.
`H04Q 5/22
`(2006.01)
`(2006.01)
`G08B 13/14
`(2006.01)
`G08C 19/00
`U.S. Cl.
`.............. .. 340/10.2; 340/1031; 340/572.4;
`340/825.69; 370/314; 708/250; 708/255
`Field of Classification Search .............. .. 340/10.2,
`340/1031, 572.1, 825.69; 370/314; 708/250,
`708/255; 707/1, 3
`See application file for complete search history.
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`4,636,950 A
`
`1/ 1987 Caswcll ct al.
`
`(55)
`
`5,745,037 A *
`
`4/1998 Guthrie eta].
`
`......... .. 340/573.4
`
`(Continued)
`FOREIGN PATJNI DOCUM
`
`1 727 042 A1
`EP
`W0 W0 2006/109700 A1
`
`11/2006
`10/2006
`
`OTHER PUBLICATIONS
`
`“Passive RFID Basics”. Pete Sorrells. © 1998 Microchip Technology
`111:.
`
`Primary Examiner—Brian A linnnennan
`Assistant E.mminer—Nam V Nguyen
`(74) Attorney, Agent, or Firm—Weingarten, Schurgin,
`Gagnebin & Lebovici LLP
`
`(57)
`
`ABSTRACT
`
`A system and method ofdetennining locations ofone or 111ore
`RFID tags within an RFID environment. The system includes
`a plurality of RFID readers, each operative to transmit and
`receive RF signals for scanning a tag disposed within an RF
`coverage region associated with the reader, and for receiving
`tag data in response to the scanning of the tag. A plurality of
`sub-locations is determined within the environment, each
`corresponding to at least a portion of at least one of a plurality
`of RF coverage regions associated with the readers. The sub-
`locatio11s are mapped to a plurality of predefined locations
`Within the environment. A reader scans a tag, and receives tag
`scan data from the tag in response to the scanning of the tag.
`The tag scan data includes a tag identifier associated with the
`scanned tag. The tag scan data is mapped to the sub-locations
`based on the RF coverage region associated with the reader.
`The location of the scanned tag is then determined with ref-
`erence to the predefined locations Within the enviromnent,
`based on the tag identifier included in the tag scan data, the
`mapping of the tag scan data to the sub-locatio11s, a11d the
`mapping of the sub-locations to the predefined locations.
`
`94 Claims, 27 Drawing Sheets
`
`Host Computerts)
`.’lA..1;1A.L
`
`Raw Tag Data
`Processed Tag Data
`Locations
`Business Events
`System Status
`Notifications
`
`RFC - Exhibit 1009
`
`1
`
`

`
`US 7,667,575 B2
`Page 2
`
`11/2007 Ishiguro et al.
`7,298,270 B2
`8/2008 Strong et al.
`.............. .. 370/328
`7,411,921 B2*
`3/2008 gate
`7,416,122 B2
`7,463,142 132* 12/2008 Lindsay ............... .. 340/539.12
`2005/0109844 A1
`5/2005 Hilliard
`2005/0154570 A1
`7/2005 Sweeney
`2005/0154572 A1
`7/2005 Sweeney, 11
`2005/0222999 A1
`10/2005 Nihei
`2005/0231370 A1
`10/2005 Tagato
`2005/0237157 A1
`10/2005 Cooper etal.
`2006/0049944 A1
`3/2006 Ishiguro et al.
`2006/0082444 A1
`4/2006 Sweeney, 11 et al.
`2006/0158313 A1
`7/2006 Satou
`2006/0175407 A1
`3/2006 Kinoshita
`2003/0022290 A1
`1/2008 Ochiaj et 31.
`2003/0234862 A1
`9/2003 Funada et 31.
`2008/0250117 A1
`10/2008 Nihei
`
`............ .. 340/10.2
`
`* cited by examiner
`
`U.S. PATENT DOCUMENTS
`
`1/2000 Kubo ....................... .. 348/725
`6,011,597 A
`3/2000 Schepps
`~~ 340/5721
`6,040,774 A *
`.... ..
`11/2000 Werb et al
`340/10.1
`6,150,921 A
`1/2001 MacLe11aneta1
`340/10.1
`6,177,861 B1
`6,480,108 B2* 11/2002 McDonald ...... ..
`340/505
`6,608,551 B1
`8/2003 Anderson et al.
`. 340/10.51
`6,714,121 B1
`3/2004 Moore ......... ..
`340/10.3
`6,724,308 B2
`4/2004 Nicholson
`340/5721
`6,784,789 B2
`8/2004 Eroglu et al.
`............ .. 340/10.6
`6,804,537 B1
`10/2004 Fujii
`6,828,902 B2
`12/2004 Casden .................... .. 340/10.3
`.
`6,860,422 B2*
`3/2005 Hull et al.
`235/376
`
`7,039,359 B2*
`5/2006 Martinez .
`455/41.2
`7/2006 Kabala ........................ .. 707/1
`7,080,061 B2*
`7,132,948 B2
`11/2006 Sweeney, 11
`7,253,717 B2*
`8/2007 Armstrong et al.
`7,256,682 B2
`8/2007 Sweeney, 11
`
`
`
`340/10.2
`
`2
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 1 of 27
`
`US 7,667,575 B2
`
`Users
`
`100
`
`14.1 - 14r
`
`Host Computer(s)
`
`Raw Tag Data
`Processed Tag Data
`Locations
`Business Events
`System Status
`Notifications
`
`RFID
`Reader
`Comm‘
`
`RFID
`
`Reader
`Control
`
`
`
`Mid Level Processor(s)
`102.1—102n
`
`Tag Data
`
`3
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 2 of 27
`
`US 7,667,575 B2
`
`Transmit
`
`Data
`
`Processor
`
`Sequencer
`346
`
`Transmit
`Data
`
`Control
`
`CEO‘
`
`Zfl Protocol
`
`Trigger
`
`Receive
`Data
`
`Receive
`
`Data
`
`Processor
`3-05
`
`Receive
`Data
`Processor
`Zfl
`
`Fig. 2a
`(Prior Art)
`
`4
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 3 of 27
`
`US 7,667,575 B2
`
`220 X
`
`E
`
`
`
`Tx Data
`
`Processor
`
`
`
`
`
`Sequencer
`&
`
`
`Tx Protocol
`
`
`
`
`
`Tunable Tx
`
`Reference
`
`Transmit
`
`Data
`
`Control
`
`E
`
`
`
`Tunable Rx
`Reference
`
`&
`
`
`
`Rx Protocol
`
`Timebase
`Sequencer
`Sync
`Sync
`E
`
`
`
`Receive
`
`
`Data
`
`Trigger
`Processor
`
`2.351.
`
`Receive
`
`
`Data
`
`Fig. 2b
`
`5
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 4 of 27
`
`US 7,667,575 B2
`
`\.8mm_oo_.
`
`cozfismccoo
`
`
`
` %co_=8__&<9____on_
`
`
`
`an.m_u_m.mSn_Eo0
`
`H3-v.3
`
`
`
`_o>m._-u__>__w>m._-u__>_
`
`
`
`
`
`Em.w>w_ommwo9n_Bmmwooi
`
`
`.m_..|
`
`mmmmfiu£.m:.mo+.Z;_n:o..f.o«o
`
`mmmnfimo
`
`mwmnfimo
`
`
`
`Eummm;o.=swco_.moo._€80mccoo:o:moo._
`
`
`
`
`3:o0mccoommmgfimomwmnmumommmnfimomwmnmfio
`
`
`.mm...Enmmm.._o.._>>mmm»
`
`
`
`mmmesmo8:_v:o>>v
`
`.moh
`
`e%$m||IIHIam.9”.
`ad7F.o_.\.VEumwmBummmEummmEnmmm.m_umomEummm
`
`
`
`
`
`
`
`mm.m.E
`
`
`
`
`._®_3U0£0wCO_wNN__N3t_>._0_DUO_.._0wCO_wNN__N3t_>
`
`
`
`
`
`Eummmmc_.B_:o_>_co_gmoo._Eummmm:_§_co_>_:o=moo._
`
`
`
`
`
`:o_§:m_.EooNmomwmomm_on_m_
`
`6
`
`
`
`
`
`
`
`

`
`U.S. Patent
`
`m23,2
`
`%mm
`
`US 7,667,575 B2
`
`oom
`
`
`
`9....m.E
`
`
`
`0magmacsémaomom§_;m
`
`
`
`m_,.Eoomccoo.9.200mccoo
`
`mE9».38a%_a>a
`
`F._omwoo9n_Bwmwooim_._<
`
`
`
`_o$._-_o__>__w>m._-c__>_
`
`
`
`mwmnfimommmnfimoommnflmommmnflmo
`
`
`
`
`
`.m_o._.5.
`mSam.048IHmmHm0:o_=5_:m_o23co_=5Em_o98Imm.m._u_
`
`
`
`
`Esnmcowco_.mN__m:t_>.m_:um_._owco_.m~__m:t_>
`
`
`
`
`
`Bummmm::9._co_>__._o=moo._$_ummm_m:_§_:o_>_co_..moo._
`
`Qoummm
`
`u.oE.S
`
`NEEEggé
`
`
`
`mm.9“..m_o»
`
`7
`
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 6 of 27
`
`US 7,667,575 B2
`
`«K2
`
`ALE
`
`Custom
`
`Services
`
`EPCIS,
`
`JDBC, ODBC
`
`RP
`
`Service Interface
`
`
`
`Application
`Interface
`
`Database
`Access
`
`
`
`
`
`
`Embedded
`Java
`Environment
`
`Services
` Location
`Database
`
`
`Information
`
`I i
`
`Fa? 7 7 _ "
` Data
`Distribution |ASs°°'at'°n
`and Trajectory :
`
`Switch
`
`Configuration
`
`Scan Data
`Receive and
`
`Smoothing
`
`Interswitch Communication
`.
`V
`A
`and Discovery
`
`
`
`-I Interswitch
`K
`@
`.
`’
`Fig. 4b
`L
`
`
`
`402.1
`
`RFID Switch
`
`'TDDP' + HTTP/TCP/IP
`RFID Switch
`402-2
`
`Fig, 4a
`
`8
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 7 of 27
`
`US 7,667,575 B2
`
`Direct Reader Reader
`Access
`Configuration
`
`Location
`Unified
`AP"."°a“°” Definitions
`Requlrments
`
`402
`
`Service Interfaces
`
`flfi
`
`A.
`Fig- 43
`
`E.
`
`Fig. 4a
`
`Administration Interfaces
`i
`
`N
`Fig 4c
`.
`
`Reader
`
`
`
`Configuration
`flfl
`
`
`
`
`
`Coverage Req.
`
`
`
`Logical Readers
`Demarcation
`Prioritization
`
`Operational
`Alerting
`Mapping
`
`
`
`
`Latency
`
` Configuration Database
`Location Benchmarks
`
`Reader'Types
`
`
`
`
`
`
`RF Monitoring
`Narrowband
` Acquisition
`Broadband
`Hand-off
`
`3-D Interference Interactions
`
`Reader Locations
`
`
`
`
`
`Reader Communication and Discovery
`
`
`
`10.1
`
`10.2
`
`RP/TCP(UDP)/IP = DHCP +
`SNMP/UDP/IP + HTTP/TCP/IP
`
`10.q
`
`Fig. 4b
`
`9
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 8 of 27
`
`US 7,667,575 B2
`
`CLI
`
`HTTP
`
`402
`
`Reader Coordination
`
`E
`
`Constraint Sets
`
`Time Latency
`
`I Multistatic Operation I
`I RF Channelization I
`I Emitted Power I
`
`Power Consumption
`
`Data Patterns
`
`I TriggerEvents
`
`Sched uler
`
`:1§_4_a_
`
`Computer:
`Transmitter Vectors
`
`Frequency
`Time
`Power
`
`Steering/Nulling
`
`Receiver Vectors
`
`Frequency
`Bandwidth
`Time
`
`Steering/Nulling
`
`Data Vectors
`Accelerated
`
`Singulation
`Tag Search
`
`Schedule/Operate
`Reader Array
`
`10
`
`10
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 9 of 27
`
`US 7,667,575 B2
`
`L1
`
`B1
`
`S1
`
`S2
`
`S3
`
`Fig. 5
`
`
`
`1006
`
`Reader
`
`1002
`
`11
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 10 of 27
`
`US 7,667,575 B2
`
`Determine a plurality of segments from interrogation zones associated
`with a plurality of readers
`6_0Z
`
`Map the plurality of segments to predefined locations within an
`environment in which the readers are deployed
`@
`
`Collect tag data over -a predetermined time interval by the plurality of
`readers
`
`§_lE
`
`Map the tag data to the plurality of segments based on a reader identifier
`included in the tag data and the interrogation zone associated with the
`respective reader
`Q03;
`
`Determine the location of each tag within the environment using tag
`identifiers included in the tag data, the mapping of the tag data to the
`plurality of segments, and the mapping of the segments to the
`predefined locations within the environment
`610
`
`Fig. 6
`
`12
`
`12
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 11 of 27
`
`US 7,667,575 B2
`
`13
`
`13
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 12 of 27
`
`US 7,667,575 B2
`
`n.m..lM0SeR..lnem
`
`9
`
`
`
` nnuananun
`
`mnnnnunummm
`
`mnnnnnnummm
`
`munnnnnnnnm
`Ennmmmmmmm.mmmmmunnnnm
`
`
`
`14
`
`
`
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 13 of 27
`
`US 7,667,575 B2
`
`Reader 10.1
`
`Reader 10.2
`
`Reader 10.q
`
`Time framing
`
`Po[er
`
`Frequency
`
`Fig. 15a
`
`
`
`F1 F2 F3 F4 F5
`
`Frequency
`
`Fig. 15b
`
`15
`
`15
`
`

`
`U.S. Patent
`
`41LI.6ehS
`
`US 7,667,575 B2
`
`
`
`
`
`:o__.moo._:o_..moo._08$SOSrwofiMw>=.o®Qm._wn_m>_..omq2mn_m>=omqm.mn_Nco=moo._
`
`
`
`
`
`3,m.m.o«N_.1|:n—.I.qw.|_\
`
`
`
`
`ab,”m>_uomam.mn_m>_Ho.nmnfi_V%Nww_m>_8mEma.M_a_§3s.@.=.8o._E=w8:80..3:9
`
`:o_§o._3=wv
`
`«noF.Sm>:omg.w_wn_
`
`«.89
`
`m_o..oEm.mn:m£O
`m:_E_mAm_2wE§mn_.m£O
`
`9___..a_m
`
`Wow.
`
`m.mumEm_mn:m£O
`
`
`20022;ton_m:m_._.vm:o=owccoo
`
`coo9.9n_toam:m_.:m:o_..omc:oo
`
`A_oo9o.n_toamcwcpwcozomccoo
`
`AmEo>>mmma.wmEmEmm3w.ww:
`AmEo>>mmma.mmEmc.mm3m.mw:
`Am_Eo>>mmmd.mmEmEmm3m.mmD
`
`
`
`3:_E_m:o_§__&<
`
`
`
`:§E_m:o:8__o_.__<
`
`
`
`:2__E_m_:o:8__&<
`
`Nm>=omam.mn_
`
`NN_.N_.
`
`.35
`
`:5
`
`2.9...
`
`3:9
`
`_mo_m>cn_
`
`m>_..omaw.mn_
`
`E39
`
`_mo_w>.._n_
`
`u>=om%_mn_
`
`_mo_m>cn_
`
`o>_..omgm._mn_
`
`83
`
`16
`
`16
`
`
`
`
`
`
`
`
`
`
`
`

`
`U.S. Patent
`
`eF
`
`US 7,667,575 B2
`
`_OwOv_mQwvmwm_SmEmcoaEoo
`n..uuuuuuu_M36_mmoo_>._mm:o_.m5m_..Eoo__o>_._.
`
`
`
`m_m_oo._.flWmmo_>moo.r3EmEmmmcm_>__B_EwEm_m_boIIIIII
`
`
`
`m._ommmoo.n__m>m._-n_.>__oaéeooofi
`
`2.9...
`
`:o_.moo__<
`
`mm>:om:_o
`
`
`
`mo5ommm».>._.>:__omn_>_>_
`
`17
`
`82
`
`82K
`
`
`39.5399.:
`
`toqasm2BmmwwowcmwE_>._.9.:__<
`
`
`
`mcozmoiqm.6Em
`
`17
`
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 16 of 27
`
`US 7,667,575 B2
`
`1400
`
`
`
`Processor
`
`1406
`
`Fig. 14a
`
`Processor
`
`1406
`
`Fig. 14b
`
`18
`
`18
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 17 of 27
`
`US 7,667,575 B2
`
`For each logical reader, compute a probability band around
`the reader
`
`1602
`
`Compute the areas or volume of overlap and non-overlap
`of RF coverage of the logical readers
`1604
`
`Identify a plurality of connected reader sets (CRSs)
`1606
`
`Store segment information including segment identifiers
`and logical reader identifiers contributing to the creation of
`the segments as observation vectors in each CRS
`1608
`
`For each CRS, compute the likelihood of the segment for
`the different values of the observation vector
`1610
`
`Fig. 16
`
`19
`
`19
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 18 of 27
`
`US 7,667,575 B2
`
`
`
`
`
`NN—..ommmoo.n__®>0.._..U__>_
`
`at.9".
`
`Nwt,ort
`
`
`
`_m>_ooom.w=_EwcmC
`
`“E
`
`_m>>on_
`
`mSmmm_>_
`
`3.:
`
`
`
`wot.%$m
`
`
`
`ctovacmfi.mmm.m><
`
`c___m_>_%_Emm
`
`mC?oKw
`
`
`
`B__m:OEmumm
`
`
`
`o..mE=mm_co_w_own_
`
`amtmm:
`
`at.m.E
`
`Bumwm
`
`wot
`
`«.8:
`
`mm_u:m;o._m_>_
`
`20
`
`20
`
`
`
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 19 of 27
`
`US 7,667,575 B2
`
`Power
`
`Sequential Sample
`
`Fig. 183
`
`Power
`
`Sequential Sample
`
`Fig. 18b
`
`21
`
`21
`
`

`
`U.S. Patent
`
`b.e
`
`72fl.002
`
`US 7,667,575 B2
`
`2,:o=m_o:ooBson.
`
`0mm?Mmcfimmooi
`
`FNoam_.
`
`:o_..o_>_
`
`mcfimmooi
`
`:o=os_
`
`mcfimmooi
`
`tom:
`
`
`
`
`
`|~omFBmmmooi_m>m._-u__>_
`
`
`
`W....mw.3.E
`
`me:m.o_mN66_,.o_m
`
`o86
`
`8at
`
`Enmmm
`
`cozfimao
`
`wu:mEmn_
`
`Eoi
`
`«.3258mm
`
`$9.9...:
`
`Eoi
`
`:525.8mm
`
`$2.9“;
`
`825868
`K.82S2
`
`
`
`
`
`
`
`m:_mmmoo_n_:o=o_>_:o_..mE__.mm_E_o..
`
`$2
`
`
`
`._omwooo.m_®>®|_uU_—>_
`
`2:.m.E
`
`
`
`
`
`Ammw.m_u_VAm?.9“;
`
`Eummm
`
`N32
`
`mccmE<
`
`N82
`
`m::mE<
`
`$2:
`
`Eummm
`
`252
`
`
`
`Bmmmooi_w>o._-u__>_
`
`S2
`
`.2:.9".
`
`EO._n_F_O._n_
`
`
`
`2.2:mummy.N32msmom
`
`22
`
`22
`
`
`
`
`
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 21 of 27
`
`US 7,667,575 B2
`
`
`
`Fig. 21
`
`2200
`
`3030"‘ Facing
`Antenna
`
`The other antennas
`are side/outward
`
`2205
`
`2206
`
` 2204
`
`facing
`2207
`
`2208
`
`2209
`
`Fig. 22
`
`23
`
`23
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 22 of 27
`
`US 7,667,575 B2
`
`2201
`
`Loc1
`
`Loc2
`
`'__"_7 I F - " — " " -7
`I
`BMTag1
`I
`/__\\ FR,
`I FR3///"‘\\ |
`I//Sa
`\\
`|
`/
`5“
`‘J
`’
`|
`
`\
`
`‘\ //—‘\
`/\Se
`
`\__/
`
`I
`‘\
`
`'
`|
`|
`/
`I
`/l
`\ sr
`|
`\\
`I
`FR4 ”"
`|
`_ _ _ _ _ J
`
`//
`
`/
`
`j?’
`
`\>//gb\\\//
`_!
`I L\\
`’_/..\o‘._
`I
`BMTag2
`[
`’
`|
`I‘
`/
`IX
`I
`I
`I
`Loc3
`BMTag3
`I I... _ _ _ _ _ _ _
`
`3°
`\“’/
`
`X
`
`Fig. 24
`
`24
`
`24
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 23 of 27
`
`US 7,667,575 B2
`
`25
`
`25
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 24 of 27
`
`US 7,667,575 B2
`
`8 a
`
`t
`
`955;8=8._o
`
`
`
`Qzfimo.~_mcm.._.am»
`
`Eow.23:ma?
`
`.m.__n.9.»
`
`:o_E_._owoo
`
`ESE
`
`mEmz
`
`
`
`
`
`$_t89n_bmncsom:o=moo._
`
`
`
`mumm_E=m:__>_
`
`
`
`m~_wm_uc:m_xm_>_
`
`
`
`._2_Eo._:mo_ocm_
`
`
`
`
`
`$5.:ao_8s>9__=.§m
`
`Em:_mEoo
`
`§o:m:cm:u=mSm_
`
`
`
`.cm>mco_..mSn_.m5m.8.m._mnE:zVx:_n_
`
`
`
`
`
`
`
`
`
`6:3.E:_U®_>_Eocwvmmcmm
`
`
`
`
`
`.57mg582mg:Qahmomocmmmimm...
`
`5::mfl
`
`Ammmfi
`
`
`
`9__8_§eo___8>_.m_326
`
`
`
`mo_tmqo.n_co=moo._
`
`:o_E_.omon_
`
`mEmz
`
`
`
`29:.5285..2;b:o_._n_
`
`
`
`
`
`
`
`cam“..E3_U0_>_.>>o_w.momn_
`
`
`
`
`
`co:moo4
`
`88
`
`26
`
`26
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 25 of 27
`
`US 7,667,575 B2
`
`Time
`
`Fig.27
`
`‘<3
`.0
`
`1 Z
`E:
`
`27
`
`
`
`InterrogationsinLocationL
`
`27
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 26 of 27
`
`US 7,667,575 B2
`
`63.m.E
`
`
`
`2%.9“..<
`
`22o_2m2:m_.Eoo
`
`Qommeamo
`
`
`
`mo._cmommm»8.K.
`
`
`
`39.mlmfl
`
`6222_22m_n_
`
`'——I
`
`III
`
`I
`----...I|'n....
`
`
`
`:o_2mo_c_.2EEoommmn_m.2mn_1-.-
`
`
`m_>m2omwmoo2n_moov
`
`.2o2_2sw2o2:_I:682262.22262226220
`
`
`
`_m>m._mmmnflmo
`
`
`
`
`
`-_u__>_m>_2m2maooo21229.22Hvco
`
`E8
`
`
`
`
`
`nlrm_2..._mv2.8Iu.co_2m.m.:22mm.-.-.....-.emummm
`
`
`.....l...........«A22K.mv_2mSm=coo
`
`
`
`2w_:um22um
`
`$9.
`
`.232@fl2=._8
`
`
`
`2.22622.222.mv22__oo
`
`IIIII\\
`
`...A2.29ff.22Ev
`
`A2.2.2?.92V
`
`2cmEmmw
`
`:o_2:_owmm
`
`Sou
`
`222EVd.22%i5
`
`
`
`:O_umN__m3t_>_..2o=mN__m:t_>
`
`
`
`CO_uNOOI_:O_wm0O|_.
`
`
`
`n_Nmvw_.wNououuooaouu
`
`2,2m2
`
`§._2_flv2Ma
`
`
`
`.\.\.>._o2m_Imm...A22..mH_om2
`
`28
`
`28
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`
`U.S. Patent
`
`Feb. 23, 2010
`
`Sheet 27 of 27
`
`US 7,667,575 B2
`
`
`
`mm_H_EEo&oummm3dz
`
`
`
`>>ou..__2,9._£ooEm
`
`
`
`>>oE_;mc_:o_..moo._
`
`
`
`mc__u8u.mem>m#
`
`93Bmcwm
`
`gsmfimec.
`
`22.3%
`
`:o=m8._
`
`as?
`
`
`
` Ecoomzozv8:mmm_n_5D.
`
`aummm
`mcacao;
`
`u.n.
`O
`|—QZ+..QU)._l<‘(bl-Qt‘
`
`
`
`
`
`eewsemacmowEummm
`
`mmce<cowas5EmuEm<29...<_uoo£_9___
`:o=moo._
`
`mocmsoom.5Eaw
`
`
`
`82___e____$em$
`
`89___e___38¢
`
`U:
`n:
`:<<<
`
`K
`
`
`
`_2o_ao0%:
`
`A%._.a-J3
`
`
`
`mmcogmommE>>
`
`A..|u‘I.I
`
`mmw.9”..<
`
`msfimo
`
`
`
`Aisoemd.2.25..%6om?
`
`mc_£ooEm
`
`cmowmmh
`
`mmmafimocsmmfl
`
`1%ms?
`
`
`
`MamAH.2”:N:.mvv
`
`I!|o|o'O'0-v'o
`
`Azueoosmd...1_Giv5
`
`83
`
`Esflmo
`
`comm
`
`amDE
`
`
`
`
`
`983._%mwmm>_8mm_E9u_
`
`cmommm...
`
`mmmnzmw
`
`=o__.om__oo
`
`dam.A..2.2.9av
`
`m:_>>ou:_>>
`
`%__mE;o:om
`
`S8
`
`«X:6-:5.9iv589.m3.238
`
`n_Emoom.8_£8Emwc_£ooEw:o_.m._:m_.Eoo
`
`29
`
`Evmwm
`
`29
`
`
`
`
`
`
`
`
`
`
`
`

`
`US 7,667,575 B2
`
`1
`LOCATION VIRTUALIZATION IN AN RFID
`SYSTEM
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`This application claims benefit of U.S. Provisional Patent
`Application No. 60/592,933 filed Jul. 30, 2004 entitled
`ACCESSING RFID TAG DATA USING A READER
`ARRAY.
`
`STATEMENT REGARDING FEDERALLY
`SPONSORED RESEARCH OR DEVELOPMENT
`
`N/A
`
`BACKGROUND OF THE INVENTION
`
`The present invention relates generally to a radio frequency
`identification (RFID) system including a plurality of RFID
`readers, and more specifically to a system and method of
`determining locations of one or more RFID tags within an
`environment in which the plurality of readers is deployed.
`In recent years, radio frequency identification (RFID) sys-
`tems have been employed in an ever increasing range of
`applications. For example, RFID systems have been used in
`supply chain management applications to identify and track
`merchandise throughout manufacture, warehouse storage,
`transportation, distribution, and retail sale. RFID systems
`have also been used in security applications to identify and
`track personnel for controlling access to restricted areas of
`buildings and plant facilities, thereby prohibiting access to
`such areas by individuals without the required authorization.
`Accordingly, RFID systems
`have been increasingly
`employed in diverse applications to facilitate the identifica-
`tion and tracking of merchandise, personnel, and other items
`and/or individuals that need to be reliably monitored and/or
`controlled within a particular environment.
`A conventional RFID system typically includes at least one
`RFID transponder or tag, at least one RFID reader, and at least
`one controller or host computer. For example, in a manufac-
`turing environment, RFID tags can be attached to selected
`items of manufacture or equipment, and at least one RFID
`reader can be deployed in the environment to interrogate the
`tags as the tagged items pass predefined points on the manu-
`facturing floor. In a typical mode of operation, the reader
`transmits a radio frequency (RF) signal in the direction of a
`tag, which responds to the transmitted RF signal with another
`RF signal containing information identifying the item to
`which the tag is attached, and possibly other data acquired
`during the manufacture of the item. The tag may also include
`at least one integrated transducer or environmental sensor for
`providing data such as the temperature or humidity level of
`the ambient environment. The reader receives the information
`
`and data transmitted by the tag, and provides the tag data to
`the host computer for subsequent processing. In this typical
`operating mode, the reader can be configured as a peripheral
`connected to a serial port of the host computer.
`More recently, RFID readers have been developed that are
`capable of being connected via a communications network to
`enterprise computer resources running one or more RFID-
`enabled client software applications. Such readers have been
`deployed in complex systems including many readers (e.g.,
`greater than 10) connected via one or more communications
`networks to a number of host computers, which may be part
`of an enterprise network server. Such ho st computers can run
`client applications for processing tag data to control access to
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`building and plant facilities, the movement of personnel and
`property,
`the operation of lighting/heating/ventilation/air
`conditioning facilities, and/or other diverse functions.
`Whether implemented as computer peripherals or net-
`worked devices, conventional RFID readers generally collect
`data from RFID tags much like optical barcode readers collect
`data from barcode labels. However, whereas an optical bar-
`code reader typically requires a direct line of sight to a bar-
`code label to read the data imprinted on the label, the RF
`signals employed by the typical RFID reader can penetrate
`through and/or diffract around objects obstructing an RFID
`tag from the RF field of view of the reader, thereby allowing
`the reader to access data from a tag that, for example, might be
`buried beneath one or more boxes of merchandise. In addi-
`
`tion, unlike the optical barcode reader, the conventional RFID
`reader can operate on and distinguish between multiple RFID
`tags within the field of the reader.
`In the conventional RFID system, each RFID tag typically
`includes a small antenna operatively connected to a micro-
`chip. For example, in the UHF band, the tag antenna can be
`just several inches long and can be implemented with con-
`ductive ink or etched in thin metal foil on a substrate of the
`
`microchip. Further, each tag can be an active tag powered by
`a durable power source such as an internal battery, or a passive
`tag powered by inductive coupling, receiving induced power
`from RF signals transmitted by an RFID reader. For example,
`an RFID reader may transmit a continuous unmodulated RF
`signal (i.e., a continuous wave, CW) or carrier signal for a
`predetermined minimum period of time to power a passive
`tag. The volume of space within which a reader can deliver
`adequate power to a passive tag is known as the power cou-
`pling zone of the reader. The internal battery of active tags
`may be employed to power integrated environmental sensors,
`and to maintain data and state information dynamically in an
`embedded memory of the tag. Because passive tags do not
`have a durable power source, they do not include active semi-
`conductor circuitry and must therefore maintain data and
`state information statically within its embedded memory. In
`addition, passive tags have an essentially unlimited life span,
`while the life span of active tags is typically limited by the
`lifetime of the internal battery, which in some implementa-
`tions may be replaceable.
`In conventional RFID systems that employ passive tags,
`each RFID reader typically follows a predefined sequence or
`protocol to interrogate and retrieve data from one or more
`RFID tags within the RF field ofthe reader (also known as the
`interrogation zone of the reader). It is noted that the interro-
`gation zone of a reader is generally determined by the physi-
`cal positioning and orientation of the reader relative to the
`tags, and the setting of various parameters (e.g., the transmit
`power) employed by the reader during the interrogation
`sequence. In systems employing passive tags, the interroga-
`tion zone is typically defined by the power coupling zone. For
`example, a typical interrogation sequence performed by an
`RFID reader includes transmitting a CW to one or more
`passive tags within the reader’s interrogation zone to power
`the tags, and transmitting a message packet (e.g., a request or
`command) by modulating the carrier signal. The passive tag
`then reads the message packet while tapping some of the
`energy of the CW to maintain its power. The message packet
`typically identifies one or a subset of the tags within the
`interrogation zone as the designated target of the message
`packet, and provides a request or command that the desig-
`nated tag is expected to perform. After the passive tag reads
`the information carried by the modulated carrier signal, the
`tag appropriately modulates the CW, and reflects a portion of
`the modulated wave back to the reader by changing the reflec-
`
`30
`
`30
`
`

`
`US 7,667,575 B2
`
`3
`tion characteristics of its antenna via a technique known as
`backscatter modulation.
`In the event
`the interrogation
`sequence is employed in a system including active tags, the
`target active tag generates and transmits an appropriate
`response to the reader.
`During the typical interrogation sequence described above,
`the reader is tuned to detect changes in the small signals
`reflected from the antennae of the passive tags, or to receive
`the responses generated and transmitted by the active tags. In
`the event the reader detects changes in signal reflections or
`receives responses from more than one tag in response to a
`message packet, the reader refines the identification (e.g., the
`address) of the target of the message in an iterative manner
`until only one tag provides data or information in response to
`the request or command contained within the packet. For
`example, the tag address may be an electronic product code
`(EPC). This process of iterative refinement of the communi-
`cation between an RFID reader and a selected one of a plu-
`rality of RFID tags within the reader’s interrogation zone is
`known as singulation. Conventional singulation algorithms
`typically employ techniques similar to binary tree searches or
`randomized transmission delay techniques.
`After the reader has confirmed the presence ofand received
`data from the targeted tag,
`it may send another message
`packet to a next tag until all ofthe tags within its interrogation
`zone have been addressed. It is noted that some conventional
`
`interrogation protocols allow the creation of alias addresses
`for tags so that the reader is not required to transmit the actual
`tag address, which may carry private information. For
`example, a tag can indicate to the reader how its alias tag
`address is related to its actual tag address via the backscatter
`transmission. Further,
`the relationship between the alias
`address and the actual address can change each time the
`reader addresses that tag. The reader then typically sends the
`data provided by the tags to the ho st computer for sub sequent
`processing.
`However, the conventional RFID systems described above
`have a number of drawbacks. For example, in the event the
`system employs a single RFID reader, various factors such as
`(l) multi-path signal reflections from items, individuals, and/
`or other tags in the vicinity of a targeted tag, (2) dielectric
`loading of the tag antenna caused by the item or individual to
`which the tag is attached, and (3) shadowing of the RF signal
`transmitted by the reader caused by shielding and/or absorb-
`ing material near the tag, may prevent the single reader from
`successfully addressing and accessing data from each tag
`within its interrogation zone. The ability of an RFID reader to
`address RFID tags that may be at least partially obscured
`within its interrogation zone is known as the penetration
`ability ofthe reader. For an RFID system that includes a single
`RFID reader, the penetration ability of the reader is typically
`limited by the reader’s maximum transmit power.
`In addition, the interrogation zone of an RFID reader often
`changes depending upon the RF signal propagation charac-
`teristics in the environment in which the reader is deployed. It
`may therefore be virtually impossible to infer the actual inter-
`rogation zone of the reader directly from the reader’s trans-
`mission and reception settings and the transmission/reception
`capabilities of the tags. For example, a particular transmitter
`setting of an RFID reader may result in significantly different
`qualities of reception for two different RFID tags disposed in
`substantially the same location. Moreover, the interrogation
`zone of an RFID reader often fails to match the space that
`needs to be monitored in the RFID application.
`In addition, the conventional RFID system employing a
`single RFID reader is generally incapable of determining the
`location and/or direction of a moving RFID tag with preci-
`
`4
`
`sion. As described above, RFID systems have been used to
`identify and track merchandise, equipment, or personnel
`within a particular environment. Further, the tags attached to
`these items or individuals may be mobile or stationary, i.e.,
`moving or disposed at fixed locations in the environment. For
`example, in the event an RFID tag is attached to a forklift
`truck at a warehouse storage facility, a single RFID reader
`may be unable to determine whether the forklift is leaving or
`entering the facility at it passes the reader, which may be
`disposed at a dock bay. For this reason, a single RFID reader
`is often accompanied by one or more photoelectric (electric
`eye) detectors for determining the location and/or direction of
`movement of mobile tags. It is noted that an RFID reader can
`also be mobile (e.g., the reader may be a hand-held device or
`mounted to a vehicle) or stationary (e.g., the reader may be
`attached to a door, a wall, shelving, scaffolding, etc.).
`Conventional RFID systems that employ multiple RFID
`readers also have drawbacks. Such systems have included
`tens to hundreds of RFID readers and/or other input/output
`devices connected to a communications network controlled
`
`by tens to hundreds of host computers running specialized
`client applications. Such systems are frequently employed in
`applications that require many readers to perform tag moni-
`toring within a relatively large space, to provide adequate
`resolution for determining the physical locations of tags
`within the designated space, and/or to provide frequent or
`continuous operation as tagged items or individuals move
`briskly through the interrogation zones of the readers.
`However, such dense deployments of RFID readers are
`problematic due to RF interference and potentially conflict-
`ing charmel assignments of the readers. For example, the
`space within which the transmissions of a first reader may
`interfere with the reception of a second RFID reader operat-
`ing on the same channel as the first reader can be greater than
`the interrogation zones of the respective readers. Significant
`RF interference may also occur when readers operate on
`adjacent charmels. Even if multiple readers operate on chan-
`nels sufficiently far apart to avoid reader-to-reader interfer-
`ence, reader-to-tag interference may still occur since RFID
`tags are broadband devices capable ofreceiving RF transmis-
`sions from more than one reader at a time, which can confuse
`the tag circuitry.
`In addition, when multiple RFID readers are deployed
`within a conventional RFID system, the system is typically
`incapable of successfully coordinating the operation of the
`readers. Further, each ofthe multiple readers is limited in time
`and frequency usage to the transaction paradigms typically
`employed by conventional standalone readers. For example,
`each reader may only have access to its own information, and
`may therefore be unable to react to events detected by the
`other readers within the system. As a result, the multiple
`readers are generally incapable ofmanaging the large amount
`of potentially redundant information collected by the readers
`from the same group of tags within the same environment
`over an extended period of time. Further, such conventional
`systems are generally unable to discriminate between signifi-
`cant events and essentially meaningless movements of items
`and/or individuals within the RFID environment. Moreover,
`such conventional systems are generally incapable ofkeeping
`track of the various locations and functions of the many
`readers deployed within the environment, and assuring that
`all of the readers within the system are properly maintained
`and operational.
`It would therefore be desirable to have an improved system
`and method of accessing RFID tag data within an RFID
`environment. Such a system and method would have the
`capability of identifying and tracking tagged merchandise,
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`31
`
`31
`
`

`
`US 7,667,575 B2
`
`5
`personnel, and other items and/or individuals within the envi-
`ronment with increased reliability. It would also be desirable
`to have a system and method of determining locations of one
`or more tags within the environment in which the system is
`deployed.
`
`BRIEF SUMMARY OF THE INVENTION
`
`In accordance with the present invention, a system and
`method is provided that can identify and track tagged mer-
`chandise, personnel, and other items and/or individuals
`within an RFID environment with increased reliability. The
`presently disclosed system and method can also be employed
`to determine locations of one or more tags within the envi-
`ronment.
`
`In one embodiment, the system includes a plurality of
`RFID readers. Each of the readers is operative to transmit and
`receive RF signals for interrogating at least one RFID tag
`disposed within an RF coverage region associated with the
`reader, and to receive tag data in response to the interrogation
`of the tag. In one mode of operation, a plurality of sub-
`locations is determined within an RFID environment in which
`
`the plurality ofreaders is deployed. Each of the sub-locations
`corresponds to at least a portion ofat least one of a plurality of
`RF coverage regions associated with the readers. Next, the
`plurality of sub-locations is mapped to a plurality of pre-
`defined locations within the environment. At least one of the
`
`readers then interrogates at least one tag within the environ-
`ment, and receives tag data from the tag in response to the
`interrogation of the tag by the reader. The tag data includes a
`tag identifier associated with the interrogated tag. Next, the
`tag data is mapped to the plurality of sub-locations based on
`the RF coverage region associated with the reader that inter-
`rogated the tag. The location of the interrogated tag is then
`determined with reference to the predefined locations within
`the environment, based on the tag identifier included in the tag
`data, the mapping of the tag data to the sub-locations, and the
`mapping of the sub-locations to the predefined locations.
`Other features, functions, and aspects of the invention will
`be evident from the Detailed Description ofthe Invention tha

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket