Unlock instant, AI-driven research and patent intelligence for your innovation.

Radio frequency identification multiple tag anti-collision method

A radio frequency identification and multi-tag technology, applied in the field of radio frequency identification and wireless communication in wireless communication, can solve the problems of loss of access tags, low efficiency of multi-tag access, and low reliability, so as to improve reliability and improve tags Access efficiency and the effect of avoiding label loss

Inactive Publication Date: 2008-03-19
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the above-mentioned Binary Tree anti-collision method, the number of tag replies is too many, resulting in low efficiency of multi-tag access, and the loss of access tags may occur, resulting in low reliability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Radio frequency identification multiple tag anti-collision method
  • Radio frequency identification multiple tag anti-collision method
  • Radio frequency identification multiple tag anti-collision method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The invention effectively improves the Binary Tree, and improves the label access efficiency and reliability.

[0020] The process of adopting the method of the present invention to carry out multi-label anti-collision is as follows:

[0021] Step 1: The reader selects the tags in the effective radio frequency field area. The reader sends a selection command, and all tags perform condition matching after receiving the selection command, and the tags that meet the conditions enter the access process.

[0022] Step 2: The reader sends an instruction to start accessing. The reader sends an instruction to start accessing the tag, and initializes the tag, and at the same time starts to receive the signal from the tag in the specified time interval.

[0023] Step 3: After the selected tag receives the instruction to start accessing, start the counter and set the initial value to 0, and start the random number generator, all tags that generate 1 will add 1 to the counter; al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a method for multi-tag anti-collision used for radio frequency identification. First, a reader selects a tag needing an access and sends out a command of access. When receiving the command of access, the tags start a random number generator. The tag, which generates 1, causes 1 to be added to the counter, while the tag, which generates 0, has an unchanged counter value and replies to the tag information immediately. The reader, based on the received information replied to by the tag, sends out a confirm command of a successful or a failed access. The tag, which is transmitted and confirmed as a successful access, leaves the process of access, while the tag, which is not confirmed as a successful access, has an unchanged counter value of 0 and replies to the tag information immediately. The tag, which is not transmitted, 1 is subtracted from the counter value. When tags receive a confirm command of a failed access, the tag, of which the counter value is not 0, 1 is added to the counter value, while the tag, of which the counter value is 0, starts the random number generator, wherein, the tag, which generates 1, 1 is added to the counter value, while the tag, which generates 0, replies to the tag information immediately.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to the field of radio frequency identification in wireless communication. Background technique [0002] In the application of radio frequency identification (RFID) technology, usually one reader corresponds to multiple electronic tags. When multiple tags are connected to the reader at the same time, collisions will occur, so the information in the tags cannot be correctly transmitted to the reader. Therefore, certain mechanisms need to be adopted to avoid collisions or reduce collisions. [0003] In the current international standard ISO 18000-6, ALOHA and Binary Tree methods are used to solve collisions. The basic feature of ALOHA is that the system divides the channel where the tags reply by time into several intervals (the intervals are called time slots), and requires the tags to choose one of the replies. In operation, the reader gives each tag a transmission probabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K7/00
Inventor 王宏刚
Owner ZTE CORP