throbber
United States Patent [19]
`Tuttle et al.
`
`[54] MODULATED SPREAD SPECTRUM IN RF
`IDENTIFICATION SYSTEMS METHOD
`
`[75] Inventors: John R. Tuttle, Corrales, N.M.;
`Eugene H Hoyt’ Colorado Springs,
`Colo; James C. Springett, La
`Crescenta, Calif.
`
`[73] Assignee: Micron Technology, Inc., Boise, Id.
`
`[21] Appll NO; 32,334
`_
`122] Fli?dl
`[51] Int Cl 6
`[52] U S Ci """"""""""""""
`
`Mar- 17, 1993
`
`[58] Field of Search
`
`[56]
`
`_
`375/203’ 204’ 208’ 367’ 370/18’ 19’ 107
`.
`References cued
`US, PATENT DOCUMENTS
`
`H04B 1/69
`375/367_
`37O/18
`375/200 202
`
`llllllllllllllIllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll
`[11] Patent Number:
`5,539,775
`[45] Date of Patent:
`Jul. 23, 1996
`
`I USOO5539775A
`
`.
`
`5,170,411 12/1992 Ishigaki ................................. .. 375/200
`.
`.
`Primary Examzner—Stephen Chm
`Assistant Examiner —_D on V0 _
`Attorney, Agent, or Fzrm~Henr1 J. A. Charmasson; John D.
`Buchaca
`[57]
`
`ABSTRACT
`
`A method for RF communication between transceivers in a
`radio frequency identi?cation system that improves range,
`decreases multipath errors and reduces the effect of outside
`RF source interference by employing spread spectrum tech—
`niques. By pulse amplitude modulating a spread spectrum
`carrier before transmission, the receiver can be designed for
`simple AM detection, suppressing the spread spectrum car
`rier and recovering the original data pulse code waveform.
`The data pulse code waveform has been further encrypted by
`a direct sequence pseudo-random pulse code. This addi
`tional conditioning prevents the original carrier frequency
`components from appearing in the broadcast power spectra
`and provides the basis for the clock and transmit carrier of
`the transceiver aboard an RFID tag. Other advantages
`include high resolution ranging, hiding transmissions from
`eavesdroppers, and Selective addressing
`
`3 Claims, 10 Drawing Sheets
`
`1/1989 Lundquist et a1. .................... .. 375/200
`4,817,113
`7/1990 Iwasaki .............. ..
`375/200
`4,941,150
`3/1992 Mikoshiba et a1.
`......... .. 375/202
`5,099,495
`5,157,688 10/1992 Dell-Imagine ........................ .. 375/200
`
`1 1
`
`6
`
`;
`
`
`234) 24W 25‘, EM, w 1+d0>PN101 ‘ .537 ____ N438 ........................... : q; {39 1,41
`
`
`
`
`224\ 65,
`it
`
`1
`DET —> ”>\<:
`A
`: x :1:
`J F”:
`a
`“'{E‘Q & RF
`‘MN’
`I
`LPF1
`K T 9—~——--— 1
`21
`,
`.
`
`'
`
`'
`
`'
`
`J
`
`1
`
`.
`1 2g :_35
`.
`a»
`
`31$
`
`DIRECTED
`FORWARD
`DATA BITS
`
`;
`;
`;
`
`40\\
`
`
`
`, DATA
`
`30,-"
`
`
`
`1 7
`
`LPF2
`
`--------------------------- "1
`
`1
`
`BIT CLK
`
`28
`,/’
`
`TRANsmoN
`PULSE
`GENERATOR
`(
`~26
`
`LOSQCED
`,
`(\
`27
`
`:YJK
`
`/
`
`PM 1
`GEN‘ "
`L
`I
`
`PN1
`
`-_
`PN1
`
`[47
`
`,f20
`
`1
`#17
`.
`/
`'
`‘ e
`11%
`= ~
`V0
`\18
`;
`LPF3
`r ------- w ---------------------- -
`
`SIGNAL PRESENT ‘
`1
`
`I
`i
`:
`.
`.
`‘
`I
`i
`1
`
`LPF4 % ~34
`’\I
`,_
`i
`. 32
`T1 8&H J
`#1
`
`PN SYNC.
`DETECTOR
`
`Q
`
`E
`
`r36
`/
`=1=
`
`T
`'2" 8,18:
`
`E
`ESYMW
`‘K33 2
`""""""""""""" "
`
`.
`1
`.
`:
`'
`.
`1
`;
`
`I
`
`;
`.
`2
`‘
`
`‘g
`
`
`
`y/ Lt‘
`
`
`
`(/46 (45 1,44 1
`
`PNCEIEEH
`
`
`
`SEQUENTIAL MODE LOGIC ~ - > - A e e * - - - e e e v - - --
`
`,
`
`AM
`
`PA
`
`xM 4
`
`T
`
`vRETURN DATABITS
`
`QB
`
`1
`
`. _ _ _ _ _ __-:|[M."\.K? . _ _ _ , H >412
`
`DATA MANAGEMENT LOGIC """""""""""""" " 4,3
`
`RAM/ROM
`-¢
`
`WVR 2003
`Volkswagen v. WVR
`IPR2016-00177
`
`1
`
`

`
`US. Patent
`
`Jul. 23, 1996
`
`Sheet 1 of 10
`
`5,539,775
`
`FIG. 1
`
`2
`
`

`
`US. Patent
`
`Jul. 23, 1996
`
`Sheet 2 0f 10
`
`5,539,775
`
`BALANCED
`‘
`OSCILLATOR —--- MODULATOR /
`
`POWER
`MP
`
`A
`
`4
`
`PN2
`GENERATOR
`3/
`
`X
`
`DATA
`um)
`5/
`
`FNMA)
`GENERATOR
`6/
`
`FIG. 2
`
`3
`
`

`
`US. Patent
`
`Jul. 23, 1996
`
`Sheet 3 of 10
`
`5,539,775
`
`LR R ME 2 2E
`ER P PR
`CC C
`RA BA
`IN N “R
`
`_ _ _ 0 o 0
`
`_ _ _ _ _ ~
`
`_ _ _
`* _ _ _
`
`
`
`\I: \l; 1 9 “H ,U" f(\
`
`_ _
`
`_
`
`_ 4|
`
`- m.
`
`FIG. 5
`
`L E V. E .L
`
`Fg_..5
`1‘-
`FIG. 4
`
`FREQUENCY
`
`4
`
`

`
`U.S. Patent
`
`Jul. 23, 1996
`
`Sheet 4 of 10
`
`5,539,775
`
`0.03
`
`0.00
`
`‘0'03 I
`0.0
`
`1
`1.0
`
`1
`2.0
`
`1
`3.0
`
`1
`4.0
`
`BIPHASE CARRIER MODULATION
`
`cos [wot + %PN2(’[)]
`
`-17.390
`
`‘
`
`-
`
`- H -
`
`'
`
`1.713e+000
`
`40.227
`
`.,_ ~ 25010-001
`
`09.104
`0.0
`
`12.0
`
`25.0
`
`30.4
`
`51.2
`
`35889-002
`04.0
`
`BIPHASE CARRIER MODULATION SPECTRUM
`
`FIG. 50
`
`5
`
`

`
`U.S. Patent
`
`Jul. 23, 1996
`
`Sheet 5 of 10
`
`5,539,775
`
`(12
`||m|| HIIH
`IIIHIII
`llllllll
`
`—____n-l
`
`1
`
`PN
`
`BPSK'SS
`CARRIER
`PAM'EO
`BY
`
`0 "
`
`6
`
`

`
`US. Patent
`
`Jul. 23, 1996
`
`Sheet 6 of 10
`
`5,539,775
`
`0.03
`
`0.00
`
`0.0
`
`1.0
`
`2.0
`
`3.0
`
`4.0
`
`AMPLITUDE ON-OFF CARRIER MODULATION
`
`[1+ PN1(t)]c0s[wot]
`
`41.816
`
`48.812
`
`I.662e+000
`
`92689-001
`
`-85.808
`0.0
`
`12.8
`
`25.6
`
`38.4
`
`51.2
`
`5.16?e-O01
`64.0
`
`AMPLITUDE ON-OFF CARRIER MODULATION SPECTRUM
`
`FIG. 7B
`
`7
`
`

`
`US. Patent
`
`Jul. 23, 1996
`
`Sheet 7 of 10
`
`5,539,7 75
`
`0.03
`
`0.00
`
`-0.03 I
`0.0
`
`I
`1.0
`
`I
`2.0
`
`I
`3.0
`
`l
`4.0
`
`AMPLITUDE 0mm: PLUS
`BIPHASE CARRIER MODULATION
`[1+ PN1(t)]c0s [wot + yéPwgm]
`FIG. 5A
`
`1 .5039 +000
`
`5.7209-001
`
`0.0
`
`21768-001
`64.0
`51.2
`38.4
`25.6
`12.8
`AMPLITUDE ON-OFF PLUS BIPHASE
`CARRIER MODULATION SPECTRUM
`FIG. 8B
`
`8
`
`

`
`U.S. Patent
`
`Jul. 23, 1996
`
`Sheet 8 of 10
`
`5,539,775
`
`om:omm_o
`
`Om<>>EOu.
`
`mtm<.r<D
`
`.oz>mZn.
`
`mopomfio
`
`§OE_._S_<m
`
`
`
`mtm.o§<Qzmsfim.
`
`
`
`NWf./_>2
`
`Eva?
`
`20_.:w2<rF
`
`mafia.
`
`moEEzm_o
`
`97.
`
`
`
`@#VI\...
`
`9
`
`
`
`
`
`
`

`
`US. Patent
`
`I
`
`Jul. 23, 1996
`
`Sheet 9 of 10
`
`5,539,775
`
`F'N
`1|1|1|-1|-1| 1|-1|-1 CHIPS
`
`FIG. 11
`
`FIG. 12
`
`10
`
`

`
`US. Patent
`
`Jul. 23, 1996
`
`Sheet 10 0f 10
`
`5,539,775
`
`FIG. 15
`
`FIG. 14
`
`FIG. 15
`
`FIG. 16
`
`11
`
`

`
`5,539,775
`
`1
`MODULATED SPREAD SPECTRUM IN RF
`IDENTIFICATION SYSTEMS METHOD
`
`FIELD OF THE INVENTION
`
`This invention relates to data communication with low
`power radio frequency (RF) transceivers, speci?cally to data
`communication between RF identi?cation (RFID) tags and
`an operator (interrogator), and more particularly, to using
`spread spectrum techniques to simplify the tag receiver
`design, reduce tag cost, increase the range and reduce
`interference on the RF communication channel.
`
`BACKGROUND OF THE INVENTION
`
`An RFID tag is a small radio transceiver that can be
`attached to a movable article to help keep track of its
`whereabouts and status. A small, light-weight inexpensive
`tag is desirable. To miniaturize the tag, the size of the
`circuitry is reduced by using an integrated circuit (IC)
`design. The simpler the circuit, the smaller the resulting IC
`becomes thereby reducing the cost.
`Operational environment factors can disrupt the reliability
`of these weak communication links. Re?ective and refrac
`tive properties of the environment introduce possible mul
`tipath errors, and outside RF sources introduce interference
`in the received signal.
`
`SUMMARY OF THE INVENTION
`
`The principle object of this invention is to provide a
`method by which an RFID tag can communicate more
`information over much greater distances through harsher RF
`environments than previously available, while reducing the
`size and cost of the tag IC.
`The secondary objects of this invention are to provide
`simple AM reception by the receiver circuit without having
`to use complex synchronization schemes, external frequency
`references such as quartz crystals and complex circuits like
`Costas loops;
`interrogator transmission power to be less than or equal to
`1 Watt, allowing unlicensed operation within FCC
`guidelines;
`extension of the range from interrogator to RFID tag;
`limitation of eavesdropping of signals by outside parties,
`and;
`selective addressing of particular tags or communicating
`with more than one tag simultaneously in any given
`transmission.
`These and other objects are achieved by modulating a
`spectrally spread carrier with a pulse code waveform rep
`resenting information pertaining to the article to which the
`tag is attached.
`One advantage of using a spread spectrum modulated
`signal is the enhanced interference rejection obtained during
`the demodulation process. The effect is a signal to noise gain
`over traditional narrow band broadcasting techniques.
`Using spread spectrum techniques gives good range with
`relatively little complexity on the tag. The high complexity
`is contained in the interrogator design.
`Other advantages are: selectively addressing a particular
`receiver, pulse code multiplexing allowing addressing of a
`plurality of receivers in any given transmission, broadcast
`transmissions with low density power spectra for signal
`hiding, message encryption to discourage eavesdroppers,
`and high resolution ranging between transmitter and
`receiver.
`
`2
`Although this invention was speci?cally designed for
`RFID tag communication, there are applications for it in
`hand-held walkie-talkies, pagers, mobile phones, cordless
`telephones, cordless microphones and musical instruments,
`cordless computer network communication links, and inter
`coms.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a simpli?ed drawing of the type of radio
`frequency identi?cation system to which this invention
`applies.
`FIG. 2 is a block diagram of the transmitter part of the
`interrogator.
`FIG. 3 is a series of time domain plots representing binary
`phase shift keying (BPSK) the carrier with a direct sequence
`pseudo-random pulse code.
`FIG. 4 is a frequency domain plot of an ideally spectrally
`spread carrier.
`FIGS. SA-SB are a realistic time domain plot and fre
`quency domain plot of the BPSK spectrally spread carrier.
`FIG. 6 is a series of time domain plots representing pulse
`amplitude modulating the spectrally spread carrier with a
`pulse code waveform.
`FIG. 7A-7B are a realistic time domain plot and fre
`quency domain plot of a pulse amplitude modulated non
`spectrally spread carrier.
`FIG. 8A-8B are a realistic time domain plot and fre
`quency domain plot of a pulse amplitude modulated spec
`trally spread carrier.
`FIG. 9 is a block diagram of the transceiver in the
`REMOTE RFID tag.
`FIG. 10 is a time domain plot representing one data bit
`period of the received signal l+PN1(t)d(t) after the carrier
`has been removed.
`FIG. 11 is a time domain plot representing one data bit
`period of the received signal without carrier that has been
`gated by PN1(t) in sync.
`FIG. 12 is a time domain plot representing one data bit
`period of the received signal without carrier that has been
`gated by PN1(t) that is 3 chips out of sync.
`FIG. 13 is a time domain plot representing one data bit
`period of the received signal without carrier that has been
`gated by the logical compliment of PN1(t) in sync when
`d(t)=l.
`FIG. 14 is a time domain plot representing one data bit
`period of the received signal without carrier that has been
`gated by PN1(t) in sync when d(t)=l.
`FIG. 15 is a time domain plot representing one data bit
`period of the received signal without carrier that has been
`gated by the logical compliment of PN1(t) in sync when
`d(t)=—l.
`FIG. 16 is a time domain plot representing one data bit
`period of the received signal without carrier that has been
`gated by PN1(t) in sync when d(t)=—l.
`
`20
`
`25
`
`30
`
`35
`
`45
`
`55
`
`DESCRIPTION OF THE PREFERRED
`EMBODIMENT OF THE INVENTION '
`
`65
`
`Referring now to FIG. 1, a typical arrangement of an
`RFID system includes a plurality of operator controlled
`interrogators A that communicate via RF links with a
`plurality of RFID tags B which are attached to articles C
`located somewhere in the vicinity of the interrogators.
`
`12
`
`

`
`3
`An interrogator transmits a signal to a particular tag
`requesting or updating the status of the article associated
`with that tag. Status information can include the article’s
`name, owner, address, destination, pertinent dates, weight,
`etc.
`The tag receives the signal and awakens from its power
`conserving quiescent sleep state. The tag interprets the
`request and decides on a response which is then transmitted
`back to the requesting interrogator. A receiver in the inter
`rogator analyzes the return signal, determining the status of
`the article. Its location can be determined by triangulation
`with multiple interrogators or multiple antennas. This infor
`mation is then displayed to the operator.
`Referring now to FIG. 2, a block diagram of the trans
`nritter part of the interrogator transceiver, a crystal con
`trolled oscillator 1 generates a constant amplitude sinusoidal
`carrier with a frequency of 2441.75 MHZ.
`This carrier is modulated in the balanced modulator 2 by
`a pseudo-random direct sequence pulse code, PN2, gener
`ated by the pseudo-noise (PN) generator 3. PN2 has a chip
`rate of about 40 Mega-chips per second.
`The resulting spectrally spread carrier is then modulated
`4 by another pulse code waveform generated by combining
`a data waveform 5 and another pseudo-noise waveform,
`PN1(t) 6. The resulting signal to be transmitted is sent to a
`power ampli?er 7, and then to the antenna 8.
`The data waveform, d(t) represents information to be
`transmitted to the REMOTE and has a data rate of about 2
`megabits per second. PH1(t) has a chip rate equal to or less
`than PN2. In this embodiment PN1(t) and d(t) are multiplied
`together to form the modulating unipolar waveform,
`l+PN1(t)d(t).
`The waveforms of FIG. 3 refer in detail to operation of the
`?rst balanced modulation of the carrier. Modulation occurs
`by binary phase shift keying (BPSK) the original constant
`amplitude carrier 9, with the PN2 pseudo-random direct
`sequence pulse code 10. During the time when PN2 is low,
`the carrier is keyed with a 180 degree phase shift from when
`PN2 is high 11. For illustration purposes, the sinusoidal
`carrier is shown at a much lower frequency than has been
`suggested for this embodiment.
`The resulting waveform has a power spectrum which is
`ideally spread according to the (sin(x)/x)**2 function shown
`in FIG. 4. The center of the main lobe is at the original
`carrier frequency Fe. The mainlobe bandwidth (null to null)
`is now twice the clock frequency of the PN2 waveform Fg.
`A more realistic representation of the time domain signal
`and its power spectra appears in FIG. 5a and FIG. 511
`respectively.
`FIG. 6 illustrates in detail the operation of the modulation
`of the spectrally spread carrier by the pulse code waveform
`1+PN1(t)d(t). The spectrally spread carrier 11 of FIG. 3 is
`viewed over a much greater time period 12. One must keep
`in mind that there are over 150 cycles of the original carrier
`for every bit (amount of time between possible changes,
`high-to-low or low-to~high) of the l+PN1 (t) d (t) modulat
`ing waveform 13.
`Pulse amplitude modulation involves multiplying the
`spread spectrum canier by the modulating waveform 14. It
`is important to note that pulse amplitude modulating a
`non-spectrally spread carrier results in a power spectrum
`with an undesirable spike 15 at the carrier frequency as
`shown in FIG. 7a and FIG. 7b. By spectrally spreading the
`carrier, the resultant power spectra is more acceptable as
`shown in FIG. 8a and FIG. 81;.
`Referring now to FIG. 9, the receiver portion of the
`remote RFID tag receives signals via an antenna 16. In order
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`5,539,775
`
`20
`
`25
`
`30
`
`4
`to sense the existance of a signal meaningful to the
`REMOTE, the signals are sent to a lowpass ?lter 17. This
`voltage is compared to a value V0 in a comparator 18. If the
`voltage is greater, the comparator outputs a true, informing
`the sequential mode logic 19 that a signal is present. The
`receiver is then initialized, awakening from its quiescent
`sleep state and the PN1(t) waveform generation circuitry is
`set to acquisition mode through the PN epoch controller 20.
`In an awakened REMOTE, the signal arriving at the
`antenna 16 is sent to several stages of RF (S-band) ampli
`?cation and ?ltering 21. As much RF ampli?cation as
`attainable is provided. The bandpass ?lter characteristics are
`a center frequency of the original carrier (2441.75 MHZ) and
`a bandwidth of around 84 MHz, which corresponds to the
`main lobe of the transmitted signal. Although this bandpass
`?ltering is shown as a single block 22, the circuitry accom
`plishing this ?ltering will likely be distributed throughout
`the RF ampli?er circuits.
`The resulting signal is sent to a full wave envelope
`demodulator 23, which recovers the amplitude modulating
`waveform as 1+PN1(t)d(t). Some added lowpass ?ltering 24
`and baseband ampli?cation 25 further increases the voltage
`level of the waveform to a more useful value (approx. 0.5
`Volts peak-to-peak).
`As seen in FIG. 10 the waveform l+PN1(t)d(t) is essen
`tially two-level in nature, exhibiting positive and negative
`transitions between the limits of 0 and Vs which correspond
`to the PN1(t) waveform, and a small amount of additive
`noise or interference. Here, PN1(t) is represented by the chip
`sequence: 1 l l—1—l l—l—1, and spans exactly one data bit
`period, Td. It can be assumed during this time period that
`d(t)=l; if it were a —l, the waveform would be inverted. In
`order to facilitate synchronization, d(t) is equal to l and thus
`non-transitioning during a preamble portion of the transmit
`ted signal.
`Referring back to FIG. 9, the transition pulse generator 26
`acts to differentiate the 1 +PN1(t)d(t) waveform, producing
`“spikes” at the transition times, which are then recti?ed
`(absolute value) to furnish a unipolar train of transition
`derived pulses. Spectrally, this waveform is rich in the
`PN1(t) code clock frequency. It’s injected into a free
`running multivibrator 27 (or a phase-locked loop oscillator)
`which produces a synchronized pulse for every chip of the
`received signal. In effect the waveform produced is a rela
`tively stable PN1 clock waveform used by the PN1 genera
`tor 28. Once synchronization to the incoming PN1 sequence
`is achieved, the locked multivibrator 27 is used as the tag’s
`clock for processing the incoming data and commands. If a
`return transmission is requested, the locked multivibrator 27
`becomes the source for the tag transmitter carrier frequency.
`The PN1 generator 28, running from the PN-clock wave
`form, generates the tag’s version of the PN1(t) chip
`sequence. This will initially be time offset by an integral
`number of chips (11) from the sequence that makes up the
`received waveform 1+PN1(t)d(t). The PN Sync Detector 29
`eleminates this offset.
`The PN Sync Detector accomplishes its objective by
`doing a sequential correlation comparison. A MOSFET
`switch 30 gates the l+PN1(t)d(t) code received using the
`PN1 code generated. If the two codes are in sync, the output
`of the gate is a waveform FIG. 11, having an average value
`around Vs/2. If the two codes are unaligned, say offset by
`three chips, the gate output is a waveform FIG. 12, having
`an average value around Vs/4 or less. By usual spread
`spectrum standards, correlation discrimination by a factor of
`two would be considered poor, but under very high signal to
`
`13
`
`

`
`5,539,775
`
`20
`
`25
`
`30
`
`5
`noise ratio (SNR) conditions, which are present in the
`forward link, it is acceptable.
`The proper, in-sync starting point for the PN1 code
`sequence is discovered by generating PN1 at all possible
`starting points and recording the results. Each starting point
`represents a waveform which is a possible candidate for
`being the correct insync PN1 waveform. The candidate
`having the largest correlation value will be the one used. A
`more detailed explanation of this process follows.
`Upon initialization, the Sequential Mode Logic 19, in
`conjunction with the timing events T1 and T2 31, initializes
`the sample-and-hold (S&H) memories 32 and 33. T2 occurs
`later than T1. The event of T1 causes the output of LPF4 34
`to be stored in S&H #1 as value El. Likewise, T2 results in
`E1 being stored in S&H #2 as value E2. LPF4 is responsible
`for smoothing the correlation voltage producing a more
`accurate representation of the correlation than what is avail
`able from the broader LPF2 35 which is matched to the bit
`period. Initially, the sequential mode logic sets the PN epoch
`controller 20 to produce a shift-register word which is
`loaded into the PN generator’s shift-register directing the
`generator to produce the PN1 code sequence at a particular
`staring point called epoch-1. If the code sequence is made up
`of L chips, there are L possible starting points and L possible
`epochs. (In the example waveform in FIG. 4, L=8). The PN
`sync detector must ?nd epoch-n corresponding to the largest
`correlation, with l<=n<=L. Once the generator is producing
`PN1 based on epoch-1, the correlation value output from
`LPF4 is transferred to S&H #1 at T1 and then to S&H #2 at
`T2.
`Next, the chip sequence based on epoch-2 is generated.
`The output from from LPF4 is again sent to S&H #1 at T1.
`If El is greater than E2, the correlation at epoch-2 is greater
`than the correlation at epoch-1. This is communicated by the
`output of the comparator 36 to the sequential mode logic
`which transfers El to S&H #2 and makes note of the epoch
`value It (in this case 2) for which the transfers occurred. If
`El had been less than E2, Then E2 remains unchanged. The
`acquisition search continues with epoch-3 and so on until all
`epoch values have been tried. In the end E2 will represent
`the largest correlation value found, and the sequential mode
`logic will know which epoch value to use.
`i
`There is the possibility that proper alignment was not
`achieved because a correlation value mistake was made due
`to noise. To avoid this, the entire aquisition process is
`repeated two more times. PN synchronization success is
`declared if the epoch chosen is the same for all three tries (or
`two out of three tries).
`Once PN1 has been synchronized with the received
`signal, the REMOTE is ready to detect data. Remember,
`throughout the acquisition period the LOCAL interrogator
`has been transmitting with d(t) equal to 1. This period will
`last for several hundred data bit periods. The start of a
`message packet will be indicated by a data transition from 1
`to —l, followed by a block of unique bits which the data
`management logic will recognize as packet synchronization.
`Data detection itself takes place as the received signal
`l+d(t)PN1(t) is gated 30 by the tag’s generated PN1 and sent
`to LPF2 35. Likewise, it is gated by PNl’s logical compli
`ment 37 and sent to LPFl 38. When d(t) is equal to l, the
`input to LPFl is the waveform seen in FIG. 13, and the
`corresponding input to LPF2 is seen as FIG. 14. The average
`value of the waveform sent to LPF2 is clearly greater. When
`d(t) is equal to —l, the inputs to LPFl and LPFZ are as shown
`in FIG. 15 and FIG. 16 respectively. Here, the average value
`of the waveform sent to LPFl is greater.
`
`45
`
`55
`
`65
`
`6
`The two low pass ?lters, LPFl and LPF2 are approxima
`tions to matched ?lters (if a simple RC ?lter is used, then RC
`=l.3/(2 pi*Td)). They function to maximize the SNR at the
`end of the bit period, Td, for input to the comparator 39. End
`of bit period timing is provided by a state AND gate 40
`operating from the PN1 generator. This gate toggles a J—K
`?ip-flop 41 which temporarily stores the value of d(t) until
`it can be transferred into data management logic 42 and
`RAM 43.
`Each sequential data bit provides its own detection ref
`erence to the comparator. Also, as the received signal level
`varies due to movement of the tag or interrogators or
`changes in the RF environment, the data detection decision
`reference is self-adjusting, giving rise to the designation
`“per-bit” reference for data detection.
`Once the forward link data has been detected, the data
`management logic 42 (executes required actions) and
`assembles the return link data packet message.
`The transmitter within the tag will generate the return link
`carrier by multiplying the PN1 clock frequency produced by
`the locked multivibrator 27 by a factor M using a frequency
`multiplying circuit 44. This carrier is then ampli?ed 45 and
`pulse amplitude modulated 46 by the return data packet
`waveform. Although an amplitude modulation scheme is
`shown, other modulation schemes using spread spectrum
`techniques are possible and desirable. This signal is then
`sent to the antenna 47. The power ampli?er stage may be
`less than 0.5 milliwatts due to the power available within the
`tag. Because of this low radiated power, spectrally spreading
`the return link carrier may not be necessary, and an addi—
`tional pseudo-noise waveform analogous to PN1 need not
`further encrypt d(t). When higher powers are desired, a
`spectrally spread scheme would be used to satisfy FCC
`unlicensed rules. To extend the range of the system, spread
`spectrum techniques are desirable in the tag transmitter.
`While the preferred embodiments of the invention have
`been described, modi?cations can be made and other
`embodiments may be devised without departing from the
`spirit of the invention and the scope of the appended claims.
`What is claimed is:
`1. A method for communicating pulse coded information
`between low power transceivers which comprises:
`spectrally spreading a carrier; and
`modulating the spectrally spread carrier with a data pulse
`code waveform comprising information to be transmit
`ted, to form a modulated spectrally spread (MSS)
`signal;
`wherein said modulating the spectrally spread carrier
`comprises pulse amplitude modulating and said MSS
`signal comprises a pulse amplitude modulated spec
`trally spread signal;
`wherein said method further comprises:
`modulating said data pulse code waveform with a
`second direct sequence pseudo-random pulse code
`waveform;
`transmitting said MSS signal,
`receiving said MSS signal, and
`extracting said data pulse code waveform from said
`MSS signal;
`wherein said extracting comprises:
`removing said spectrally spread carrier from said MSS
`signal resulting in a received pulse code waveform
`comprising said data pulse code waveform and said
`second direct sequence pseudo-random pulse code
`waveform;
`generating a third direct sequence pseudo-random
`pulse code waveform substantially similar to and in
`
`14
`
`

`
`5,539,775
`
`7
`synchronization with said second direct sequence
`waveform;
`gating said received pulse code waveform with said
`third direct sequence waveform; and
`?ltering the output of said gating step resulting in an
`average value representing one of two possible logi
`cal values for said data pulse code waveform;
`wherein said generating a third direct sequence psuedo
`random pulse code waveform (DSPPCW) comprises:
`transmitting a preamble portion of said MSS signal
`wherein said data pulse code waveform is non
`transitioning,
`producing a clock waveform in-sync with said second
`DSPPCW,
`performing a sequential correlation comparison
`between said received pulse code waveform and
`each of a plurality of candidate waveforms,
`recording the results of each comparison, and
`choosing the candidate with a highest correlation value
`as said third DSPPCW.
`2. The method of claim 1 which comprises:
`using said clock waveform as a return carrier frequency
`source.
`3. An apparatus for identifying and tracking the where
`abouts of moving bodies around a de?ned area which
`comprises:
`an interrogating station including a ?rst transceiver;
`said ?rst transceiver comprising:
`means for generating a carrier;
`means for spectrally spreading said carrier;
`means for generating a data pulse code waveform; and
`means for modulating said carrier with said data wave
`form resulting in a modulated carrier waveform;
`at least one tag associated with one of said bodies,
`said tag including a second transceiver,
`said second transceiver comprising:
`means for extracting said data pulse code waveform
`from said modulated carrier waveform;
`
`10
`
`15
`
`25
`
`35
`
`8
`wherein said apparatus further comprises means for
`modulating said data waveform with a second direct
`sequence pseudo-random pulse code waveform;
`wherein said means for extracting comprises:
`means for removing said spectrally spread carrier from
`said modulated carrier waveform resulting in a
`received pulse code waveform comprising:
`said data pulse code waveform and
`said second direct sequence pseudo-random pulse
`code waveform;
`means for generating a third direct sequence pseudo
`random pulse code waveform substantially similar to
`and in synchronization with said second direct
`sequence waveform;
`means for gating said received pulse code waveform
`with said third direct sequence waveform;
`means for ?ltering the output of said means for gating
`resulting in an average value representing one of two
`possible logical values for said data pulse code
`waveform;
`wherein said means for generating a third direct sequence
`psuedo-random pulse code waveform (DSPPCW) com
`prises:
`means for transmitting a preamble portion of said MSS
`signal wherein said data pulse code waveform is non
`transitioning,
`means for producing a clock waveform in-sync with said
`second DSPPCW,
`means for performing a sequential correlation comparison
`between said received pulse code waveform and each
`of a plurality of candidate waveforms,
`means for recording the results of each comparison,
`means for choosing the candidate with a highest correla
`tion value as said third DSPPCW.
`
`15

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket