Language selection

Search

Patent 2266337 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2266337
(54) English Title: TAG SYSTEM WITH ANTI-COLLISION FEATURES
(54) French Title: SYSTEME D'ETIQUETTES AVEC DES CARACTERISTIQUES ANTI-COLLISION
Status: Expired
Bibliographic Data
(51) International Patent Classification (IPC):
  • G01S 13/76 (2006.01)
  • G06K 7/00 (2006.01)
  • G08B 13/22 (2006.01)
  • G08B 25/10 (2006.01)
(72) Inventors :
  • FEDERMAN, VLADIMIR (Canada)
(73) Owners :
  • XMARK CORPORATION (Not Available)
(71) Applicants :
  • DIVERSITY PRODUCTS LTD. (Canada)
(74) Agent: MBM INTELLECTUAL PROPERTY LAW LLP
(74) Associate agent:
(45) Issued: 2004-06-08
(22) Filed Date: 1999-03-23
(41) Open to Public Inspection: 2000-09-23
Examination requested: 2000-07-06
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): No

(30) Application Priority Data: None

Abstracts

English Abstract

A system of communicating between a master communication device and a plurality of slave communication devices is disclosed, whereby the master determines if any of the plurality of slave devices exist within a defined geographic area and, if so, sends a bit- by-bit command for the slaves to identify themselves; via a unique binary identification number. To avoid collision when the slaves respond, the slaves respond to the master's command within a predetermined time period of a time window providing the ID bit by bit. Responses are acknowledged by the master such that only one slave is able to respond with its complete full ID after a bit-by-bit command from the master.


French Abstract

Système de communication entre un dispositif de communication principal et plusieurs dispositifs de communication asservis. Dans ce système, le dispositif principal détermine si l'un ou l'autre des dispositifs asservis existe au sein d'une zone géographique définie; le cas échéant, il envoie une commande bit par bit pour que les dispositifs asservis s'identifient par l'intermédiaire d'un numéro d'identification binaire unique. Pour éviter toute collision lorsque les dispositifs asservis répondent, les dispositifs asservis répondent à la commande du dispositif principal au cours d'une période prédéterminée d'une fenêtre temporelle en transmettant leur ID bit par bit. Les réponses sont prises en compte par le dispositif principal de façon à ce que seul le dispositif asservi soit en mesure de répondre par son ID complet après avoir reçu une commande bit par bit du dispositif principal.

Claims

Note: Claims are shown in the official language in which they were submitted.



THE EMBODIMENTS OF THE INVENTION IN WHICH AN EXCLUSIVE PROPERTY
OR PRIVILEGE IS CLAIMED ARE DEFINED AS FOLLOWS:

1. A system of communicating between a master communication device and at
least one
slave communication device for determining if said at least one slave is
within a field of
coverage and for identifying said slave, the system comprising:
a master communication device, having transmitting and receiving means, said
master
establishing the field of coverage and initiating communications with slave
communication
devices within said field of coverage;
at least one slave communication device having transmitting and receiving
means and a
binary identification number, said at least one slave communicating with said
master to provide
said binary identification number; and
said master sending a command to said at least one slave for said at least one
slave to
provide said binary identification number, and
said at least one slave receiving said command and providing information
representative
of bits of said binary identification number to said master in a bit-by-bit
manner, said slave
continuing transmission of said information only during receipt of
acknowledgements of each bit
from said master.

2. The system of claim 1, wherein said at least one slave provides said
information
representative of bits of said binary identification number to said master
during a plurality of
time windows, each of said plurality of time windows having first and second
time periods, said
first time period of each time window starting simultaneously with its
corresponding
timewindow and ending before its corresponding time window, said second time
period of each
time window starting after said first time period of each window has ended and
said second time
period of each time window ending simultaneously with its corresponding time
window, said at
least one slave providing said information (i) within said first time period
of said plurality of
time windows to designate bits having a first binary value, and (ii) within
said second time
period of said plurality of time windows to designate bits having a second
binary value.

14




3. The system of claim 2, wherein said master sends an acknowledgment to said
at least one
slave within a predetermined time after receiving information representative
of a bit of said
binary identification number.

4. The system of claim 1, wherein a first set of one or more slaves provides
information
representative of a bit of said binary identification numbers to said master
within a first time
period of a time window after receiving said command, said first time period
starting
simultaneously with said time window and ending before said time window, and
wherein a
second set of one or more slaves provides information representative of a bit
of said binary
identification numbers to said master within a second time period of said time
window after
receiving said command, said second time period starting after said first time
period has ended
and ending simultaneously with said time window, and wherein said first set of
one or more
slaves receive an expected acknowledgment from said master within a
predetermined time period
after said first set of one or more slaves provide said information
representative of a bit of said
binary identification numbers, and said second set of one or more slaves
entering an idle state
after not receiving an expected acknowledgment from said master within a
predetermined time
period after said second set of one or more slaves provide said information
representative of a bit
of said binary identification numbers.

5. The system of claim 4, wherein said time window starts a predetermined time
after said
command is sent by said master.

6. The system of claim 4, wherein one slave of said first set of at least one
or more slaves
provides information representative of bits of said one slave's binary
identification number to
said master during subsequent time windows, each of said subsequent time
windows having first
and second time periods, said first time period of each said subsequent time
window starting
simultaneously with its corresponding time window and ending before its
corresponding time
window, and said second time period of each said subsequent time window
starting after said
first time period of each said subsequent time window has ended and said
second time period of
each said subsequent time window ending simultaneously with its corresponding
time window,

15




said one slave providing said information bit-by-bit during said subsequent
time windows until
said one slave's complete binary identification number has been provided to
said master.

7. The system of claim 6, wherein each of said subsequent time windows begins
at a
predetermined time after said one slave of said first set of one or more
slaves has provided
information representative of a bit of its binary identification number to
said master during the
immediately prior time window.

8. The system of claim 6, wherein said one slave of said first set of one or
more slaves does
not respond to subsequent commands by said master to provide its binary
identification number
unless said one slave has left and re-entered said field of coverage.

9. The system of claim 6, wherein each remaining slave in said field of
coverage provides
its complete binary identification number to said master after said one
slave's complete binary
identification number has been provided to said master, each of said remaining
slaves providing
its corresponding binary identification number bit-by-bit during said
subsequent time windows,
and wherein each of said remaining slaves is determined by said master as
still in said field of
coverage and commanded to identify itself.

10. In a communication system having a master communication device and at
least one slave
communication device, a method for determining if said at least one slave is
within a field of
coverage and for identifying said at least one slave, said method comprising
the steps of
establishing the field of coverage;
determining if said at least one slave is within said field of coverage, said
at least one
slave having a binary identification number;
sending a command requesting said binary identification number of said at
least one
slave; and
identifying said at least one slave via transmission of information
representative of bits of
said binary identification number to said master in a bit-by-bit manner, said
slave continuing
transmission of said information only during receipt of acknowledgements of
each bit from said
master.

16


11. The method of claim 10, wherein said information representative of bits of
said binary
identification number is provided during a plurality of time windows, each of
said plurality of
time windows having first and second time periods, said first time period of
each time window
starting simultaneously with its corresponding time window and ending before
its corresponding
time window, said second time period of each time window starting after said
first time period of
each window has ended and said second time period of each time window ending
simultaneously
with its corresponding time window, and providing said information (i) within
said first time
period of said plurality of time windows to designate bits having a first
binary value, and (ii)
within said second time period of said plurality of time windows to designate
bits having a
second binary value.

12. The method of claim 11, further comprising the step of providing an
acknowledgment
within a predetermined time after information representative of a bit of said
binary identification
number has been provided.

13. The method of claim 10, further comprising the step of providing an
acknowledgment
within a predetermined time period after information representative of a bit
of said binary
identification numbers of a first set of one or more slaves has been provided
within a first time
period of a time window after said command is sent, said first time period
starting
simultaneously with said time window and ending before said time window, and
intentionally
withholding an expected acknowledgment when information representative of a
bit of said binary
identification numbers of a second set of one or more slaves has been provided
within a second
time period of said time window after said command is sent, said second time
period starting
after said first time period has ended and ending simultaneously with said
time window, and
further comprising the step of not providing information representative of
bits of said binary
identification numbers of said second set of one or more slaves during time
windows occurring
after said acknowledgment has been intentionally withheld.

14. The method of claim 13, wherein said time window starts a predetermined
time after said
command is sent.

17




15. The method of claim 13, wherein information representative of bits of the
binary
identification number of one slave of said first set of one or more slaves is
provided to said
master during subsequent windows, each of said subsequent time windows having
first and
second time periods, said first time period of each said subsequent time
window starting
simultaneously with its corresponding time window and ending before its
corresponding time
window, and said second time period of each said subsequent time window
starting after said
first time period of each said subsequent time window has ended and said
second time period of
each said subsequent time window ending simultaneously with its corresponding
time window,
said binary identification number of said one slave being provided bit-by-bit
during said
subsequent time windows until one slave's complete binary identification
number has been
provided.

16. The method of claim 15, wherein each of said subsequent time windows
begins at a
predetermined time after information representative of a bit of said binary
identification number
of said one slave has been provided during the immediately prior time window.

17. The method of claiml5, further comprising the step of not responding to
subsequent
commands to provide the binary identification number of said one slave unless
said one slave has
left and re-entered said field of coverage.

18. The method of claim 15, further comprising the step of providing the
complete binary
identification number of each remaining slave in said field of coverage after
said one slave's
complete binary identification number has been provided, wherein the binary
identification
number of each of said remaining slaves is provided bit-by-bit during said
subsequent time
windows, and further comprising the steps of determining that said remaining
slaves are still in
said field of coverage and sending a command requesting the binary
identification numbers of
said remaining slaves.

19. A radio frequency (RF) communication system for determining if at least
one object is
within a field of coverage and for identifying said object, said system
comprising:

18




a RF communication device having a transmitter and a receiver, said device
generating a
RF transmission to said field of coverage and transmitting a request signal to
determine if there
are any objects within said field of coverage;
a tag capable of being affixed to said at least one object, said tag having a
transmitter, a
receiver and a binary identification number, and said tag receiving said
request signal and
transmitting a response signal to said communication device to provide said
binary identification
number to said device in a bit-by-bit manner, continuing transmission of
information only during
receipt of acknowledgements of each bit from said device; and
said device receiving transmissions that are representative of bits of said
binary
identification number and acknowledging said transmissions in a bit-by-bit
manner.

20. A method for communicating in a radio frequency (RF) communication system
for
determining if at least one object is within a field of coverage and for
identifying said at least one
object, said method comprising the steps of;
generating a RF transmission to said field of coverage and transmitting a
request to
determine if there are any objects within said field of coverage;
affixing a tag to at least one object, said tag receiving said request and
transmitting a
response to provide said binary identification number in a bit-by-bit manner,
continuing
transmission of information only during receipt of acknowledgements of each
bit; and
receiving transmissions representative of bits of said binary identification
number and
acknowledging said transmissions in a bit-by-bit manner.

19

Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02266337 2000-06-23
TAG S'i~STEM WITH ANTI-COLLISION FEATURES
BACKGROUND OF THE INVENTION
The Field of the Invention
The present invention relates, to communication devices. Particularly, the
present
invention relates to a method and apparatus for determining if a plurality of
communication
devices exist within a defined geographic area and for identifying the
communication devices.
2. The Relevant Art
There are known in the art of communication devices, systems for locating and
identifying
objects or tags that exist wi~:hin a defined area or field of coverage. The
systems serve varying
purposes, ranging from protecting assets in a store to recognizing for safety
reasons when persons
who are mentally challenged enter a particular locale.
Locating and identifying objects in a field of coverage presents particular
difficulties for
communication systems where a significant quantity of unknown devices must be
located, and
where each device requires a significantly lengthy unique identification
number. At any given
point in such systems, there may be numerous slave communication devices
within range of a
master communication device, with the slave communication devices moving into
and out of the
field of coverage either simultaneously or independently.
One method to obtain the identification number of the slaves in a master/slave
communication system is to sequentially scroll through each possible
identification number and
I

CA 02266337 2000-06-23
interrogate all possible slaves. However, if the possible combination of
addresses is great, this
process will be extremely cumbersome;. For example, in a system having slaves
with 24 bit
identifiers, the potential number of addresses is 16 million (2'4)
Alternatively, a slave entering ;a field, upon detecting that it is within
range of the field,
could immediately send its identification number to a master. Since multiple
tags might enter the
field at one time, however, their messages might collide and never reach the
master.
Other approaches in the art describe various methods for locating and
identifying objects
in a field of coverage and for handling collision when multiple objects in a
field respond to a single
remote interrogator.
U.S. Patent No. 5,751.570 issued to Stobbe et al. discloses a method of
automatically
identifying an unknown number of slave devices in a field. The slave devices
transmit their
corresponding identities to an interrogator. Particularly, the slave devices
are transponders that
are activated to send data when they are within the electromagnetic field of a
reader. When more
than one transponder responds upon being activated, all transponders are put
into a dead state by
a collision signal transmitted by the reader, thereby ceasing transmission of
transponder data.
Each transponder thereafter generates a random dead state for itself after
receiving the collision
signal, with each transponder resuming; transmission of its transponder data
at the end of the dead
state. After receiving the data from a transponder as a result of the
deviating dead states, the
reader transmits an occupied signal to put the remaining transponders in an
idle state in which
they no longer transmit transponder data due to the occupied signal. After
reception of the
complete transponder data from the individual transponder, the reader
transmits an acknowledge
signal to place the transponder into an idle state. The other transponders are
reactivated and the
2

CA 02266337 2000-06-23
process repeated until all transponder~~ have been identified individually and
successively by the
reader. Such a system would not be efficient in identifying and locating a
significant number of
transponders having significantly lengthy identification numbers due to the
numerous random
period dead states required after collision.
U.S. Patent 5,686,902 issued to Reis et al. discloses a communication device
or method
wherein an algorithm is used to reduce collision probability between tags. The
system provides
pit code sequencing techniques during the identification process. Reis
requires shorter
identification transmission times, as compared to the overall listening time,
to reduce the
likelihood of collision between tags. If there are a significant number of
tags, however, this
method requires extremely long listening periods which creates a problem if
tags are moving in
:end out of the field of coverage. Some: tags, for example, will have the
opportunity to enter the
Field and leave before the listening period is over. Also, while Reis shortens
the listening period as
~.ags are successfully identified, there is still significant inefficiency
when there are few tags to be
identified and the listening period remains relatively long.
U.S. Patent No. 5,030,807 issued to Landt et al. discloses an RF tag
identification system
wherein an interrogator unit is. able to identify a tag that enters a field of
coverage. The
interrogation device provides a bit by bit identification scheme.
Particularly, an interrogator sends
.an RF signal to a remote object where the signal includes data intended to be
received and stored
by the remote object. Upon receipt of the RF signal, one or more remote
objects return a
backscatter-modulated signal to the interrogator, the backscatter-modulated
signal being
modulated with data indicating the identity and other data stored in the
remote object. The
interrogator has the capability to recognize the identity and other data
stored in the remote object

CA 02266337 2000-06-23
from the returned backscatter-modulated signal. The interrogator also has the
capability to
transmit data to the identified remote object. Landt uses time division
multiplexing and multiple
frequency schemes to separate tag-to-interrogator and interrogator-to-tag
communications, and
to separate communications where multiple interrogators communicate in close
proximity with
one another. Time-division nnultiplexing, however, involves an automatic
"built-in" delay as each
tag in a system must respond, one after another, in time during an
interrogation. This built-in
delay would be inefficient in a system requiring location and identification
of many unknown tags
in a field of coverage at one tame. Furthermore, using multiple frequency tags
is impractical in a
system with numerous tags. ,also, while Landt focuses on collision avoidance,
Landt does not
directly provide a solution when there is an actual collision between two or
more tags responding
to the same interrogator.
U.S. Patent No. 5,673,037 issued to Cesar et al. discloses a method of
selecting RF tags
for querying, communicating., and/or identifying by an interrogator. The
method uses a bit code
type control logic algorithm to accomplish these functions. The tags in Cesar
are selected and
identified in specific groups based on known criteria. Thus, no method for
identifying and
locating individual unknown tags in a field of coverage is disclosed.
None of the above mentioned prior art systems describe a system or method to
effectively
handle the situation where numerous unknown slave communication devices enter
a field of
coverage and thereafter begin providing their respective unique identification
numbers
simultaneously, thus colliding.
Accordingly, it would be desirable to have a communication system and method
for
locating and identifying a significant number of unknown devices having unique
identification
4

CA 02266337 2000-06-23
numbers within a field of coverage in an,efficient and reliable manner.
Particularly, it would be
desirable for the same system and method to have an anti-collision feature
allowing numerous
slave communication devices to simply and efficiently provide unique
identification numbers to a
master communication device;.
SUMMARY OF THE INVENTION
The foregoing desired aspects and advantages are achieved in a system of
communicating
between a master communication device and at least one slave communication
device to
determine if there is at least one slave device within a defined geographic
area and to identify the
slave(s). The system comprises a masvter communication device that establishes
a field of
coverage and initiates a request to determine if there are any slave
communication devices within
the field of coverage. Each slave corrvmunication device has a unique binary
identification
number. After receiving the request, slaves in the defined geographic areas
send a response to the
master indicating that the slave is within the defined geographic area. The
master after receiving,
one or more responses from slaves in the defined geographic area, sends a
command to the
responding slaves to provide their unique binary identification numbers. After
receiving the
command, the responding slaves begun providing information representative of
bits of their
respective unique binary identification numbers to the master.
It is another aspect of the present invention for the information
representative of bits of
the unique binary identification numbers to be provided by responding slaves
within first and
second time periods of a plurality of time windows.
It is a further aspect of the present invention for the information
representative of bits of
the unique binary identification numbers to be provided by responding slaves
within the first time

CA 02266337 2000-06-23
period of the time windows to designate a bit that has a first binary value,
and within the second
time period of the time windows to designate a bit having a second binary
value, where the
>econd predetermined time period starts after the first predetermined time
period has ended.
It is yet a further aspect of the present invention for the master to send an
acknowledgment within a predetermined time period after slave responses
received during the
first and second time periods ~~f the time windows.
Still another aspect of the present invention is where a first slave responds
to the master's
command within the first time; period of a time window, and a second slave
responds to the
master's command within the second dime period of the time window, and further
where only the
first slave receives an acknowledgment from the master, the acknowledgment
being sent within a
predetermined time period after the response from the first slave during the
first time period of the
window.
Still yet another aspecn of the present invention is where a first slave
responds to the
master within the first or second time period of a time window, and a second
slave responds to
the master within the same time perioal of the window, and where both the
first and second
slaves receive an acknowledgment from the master, the acknowledgment being
sent within a
predetermined time period after the response from the first and second slaves.
Still a further aspect of the pre~~ent invention is where the first slave,
after receiving the
acknowledgment from the master, provides information representative of bits of
its unique binary
identification number during subsequent time windows.
Other aspects and advantages o~f the present invention will become apparent
when the
description of specific embodiments below are read in conjunction with the
accompanying figures.
6

CA 02266337 2000-06-23
BRII~F DESCRIPTION OF THE DRAWINGS
FIG. 1 is a diagram illustrating; a field of coverage generated by a master
communication
device in a master-slave comnnunication system, where the master must locate
and identify slaves
;tags in the preferred embodiment) that are within the field of coverage.
FIG. 2 is a flow chart of the fir<.~t phase of the exchange between a master
and one or more
slaves to locate slaves within ~~ field of coverage.
FIG 3. illustrates the second phase of the exchange between a master and two
tags,
a~hereby the tags, after being determinf~d as within the master's field of
coverage, provide their
unique binary identification numbers bit-by-bit according to a preferred
embodiment of the
s nvention.
DESCRIPTION OlF THE PREFERRED EMBODnvIENT
The present invention describes a mechanism for a master communication device
to locate
and identify unknown slave communication devices in a communication system.
The slave
communication devices are addressed using unique 24 bit identifier numbers.
The system assumes
a single master and multiple slaves, with the slave identification numbers
being unknown to the
master. A typical embodiment of a such a system is a RFID (Radio Frequency
Identification) tag
system.
Referring to FIG. 1, in. the preferred embodiment, the system is a wireless
two-way radio
system 10. In the system 10 , a master 12, equipped with a transmitter and a
receiver, generates
a radio frequency (RF) field of coverage 14 that defines a particular
geographic area by
transmitting a constant strength RF signal. Tags 16, 18 and 20 (slaves) can
enter or leave the
field of coverage 14 at any time, simultaneously with other tags or
independently. When a tag
7

CA 02266337 2000-06-23
enters the field of coverage, it responds to the master's constant RF signal
in a fashion detailed
further herein. The tags 16, 18 and 20 also are each equipped with means for
transmitting and
receiving. Tags 16 and 18 are shown within the field of coverage 14. Tag 20 is
outside the field
of coverage 14. While a radial frequency field of coverage is used in the
preferred embodiment,
other means for generating a field of coverage, such as electromagnetic
energy, could be used
without departing from the scope of the present invention. In such a case, the
tags would have to
be fitted with appropriate receiving and transmitting means. Also, while the
master 12 is fixed to
define a fixed field of coveral;e in the preferred embodiment, a mobile master
that defines a non-
stationary field of coverage could be substituted without departing from the
scope of the present
invention.
The anti-collision feature of the present invention resolves the problem
associated with a .
plurality of tags entering a field at the same time and provides a mechanism
for efficiently handling
collision when one or more of these tags simultaneously transmit their
identification numbers to
the master. This problem is particularly acute where there are a significant
number of tags, each
requiring a significant length unique binary identification number. In the
preferred embodiment,
the tags have 24 bit identifiers, meaning that the potential number of tags
with unique binary
identification numbers is 16 rnillion (22~). A large of number of these tags
may move in and out of
a field simultaneously, increasing the challenge to reliably and efficiently
locate and identify the
tags.
In the system of the present invention, the entire sequence involved for
locating and
identifying tags in a field of coverage involves an exchange of information
between the master and
8

CA 02266337 2003-08-26
t:he tags to determine if the tags are in the. field of coverage and, if so, a
"bit-by-bit" interrogation
of each tag's unique binary identification number.
The first phase of the exchange of information between the master and the tag
involves the
following exchange illustrated in the flowchart of FIG.2.
At block 21, the master transmits an "are you there" message which is detected
by any tag
which is within the field of coverage.
At block 22, if there is no response to the "are-you-there" message, then the
master knows
there are no tags in the field. The master will then wait a short period of
time before
starting the process over at block 21. If there is a response from any tag,
execution
continues at block 24.
- At block 24, when the master receives a response, the master knows that one
or more tags
have entered the field. Since the master cannot tell if the response came from
one or more
tags, the master begins a bit-by-bit interrogation to identify the tag(s).
In the preferred embodiment the response from any tag in the field is a short
transmitted
pulse. Upon receiving a transmitted pulse from one or more tags after sending
the "are you there
message," the master starts a hit-by-bit interrogation of the tags within the
field of coverage to
identify the tags. The master begins the "bit-by-bit" interrogation by sending
out a "bit-by-bit"
command to all tags within the field of coverage.
Referring to FIG. 3, the time lines tag t TX and tag2 TX illustrate the timing
of pulses
ransmitted by two tags, tagl and tag2, entering a field of coverage at the
same time. The time
line master TX/RX illustrates the timing of pulses transmitted and received by
a master. The
9

CA 02266337 2000-06-23
master TX/RX time line also shows the first three time windows (the bit 23
window, the bit 22
window and the bit 21 window) of the exchange between the master and the two
tags. The first
time window of any exchange between a master and one or more tags begins at a
predetermined
time period after the master sends the bit-by-bit command. Subsequent time
windows begin at a
predetermined time period following acknowledged pulses transmitted by tags
during an
interrogation. While the invewtion can be adequately explained using three
time windows, it
should be noted that in the preferred embodiment twenty-four time windows will
be required for a
tag to transmit its complete 24 bit unique binary identification number to a
master.
The time windows each consist of a first time period 26 and a second time
period 28. In
the preferred embodiment, a pulse received from a tag during a first time
period of a time window
designates a binary value of "1" for the corresponding bit position, while a
pulse received from a .
tag during a second time period of a time window designates a binary value of
"0" for the
corresponding bit position. A master will send an acknowledgment pulse within
a predetermined
time after receiving a pulse daring either the first time period or the second
time period of a time
window, but not both.
If a master receives pulses during the first and second time periods of the
same window,
the master will only send an acknowledgment pulse within a predetermined
period of the pulse
received during the first time period. Whenever tags transmit a pulse while
responding to a bit-
by-bit command, an acknowledgment pulse is expected so that the tags can
continue transmitting
their unique binary identification numbers. Accordingly, any tags in this case
that responded
during the first period of the time window will continue transmitting after
receiving the expected
acknowledgment. On the other hand, any tags that responded during the second
time period of

CA 02266337 2003-08-26
the window will enter an idle state, and thus will not transmit further during
the current exchange,
after failing to receive an expected acknowledgment.
FIG. 3 illustrates the second phase of the exchange between a master and two
tags. In
FIG. 3, it is assumed that tagl and tag2 have both responded to an "are you
there" message from
the master, and are now responding simultaneously to a bit-by-bit command 30
from the master,
thereby colliding. At the bit 23 window, both tagl and tag2 transmit pulses,
pulse 34 and 36
respectively, within a second time period 28 of the bit 23 window, designating
a binary value of
"0" for the bit 23 position of the unique binary identification number of both
tags. Within a
predetermined time period after the pulses are received by the master, the
master sends an
acknowledgment pulse 32 indicating that the pulse from the tags was received.
Receiving the
acknowledgment pulse 32 within a predetermined time period after transmitting
the pulses 34 and
36 indicates to tagl and tag2 that they may continue transmitting pulses
representative of the bits
of their unique binary i~ntification numbers. According to the invention, any
number of tags
responding with pulses during the second time period of the bit 23 window
would receive the
acknowledgment pulse 32 and would thereafter continue transmitting pulses
representative of the
bits of their respective unique binary identification numbers.
Tag2 will abort its exchange with the master when it fails to see an
acknowledgment pulse
in response to its "0" pulse 38 in the bit 22 window. The early acknowledgment
pulse in the bit
22 window indicates that the master has detected another tag, in this case the
transmitted pulse 40
from tag 1 in the time period 26 of bit 22 window. The master then does not
send tag2 the
acknowledgment that it expects in response to the pulse 38 that it sent. When
tag2 does not
receive an acknowledgment within a predetermined time after sending pulse 38,
tag2 enters an
11

CA 02266337 2000-06-23
idle state and will send no more responses ro the master during the current
"bit-by-bit" exchange.
This allows tagl to continue its exchange with the master and complete its
identification process,
as indicated by the transmitted pulse 40 from tagl during the bit 21 window.
Regardless of the
number of tags responding during a given exchange after a bit-by-bit command,
only one tag, in
this case tagl, will succeed in transmitting its unique 24-bit binary
identification number to the
master after 24 time windows. The present invention also ensures that one tag
will actually
succeed during every exchange after a bit-by-bit command, collision
notwithstanding.
Tag2 in FIG. 3 will remain idle until it receives a new "are-you-there"
message and a new
"bit-by-bit" command while in the field of coverage, and thereafter will begin
re-transmitting its
unique binary identification number back to the master. Similar to tag2, any
number of tags
responding with pulses during the second time period 28 of the bit 22 window
would not receive ,
an expected acknowledgment pulse and would enter an idle state, whereby the
respective tags
would send no further responses to the: master during the current "bit-by-bit"
exchange.
Tagl continues responding to the interrogation until all 24 bits of its unique
binary
identification number have been communicated to the master. A verification is
performed
between the master and tagl confirming that the correct ID has been
transmitted, and if so, tagl
will consider itself "identified." and will no longer need to respond to
subsequent "are-you-there"
messages and "bit-by-bit" connmands from the master. Accordingly, tagl will
not interfere while
the master proceeds to identify all other tags in the field. To accomplish
this, the process starts
over with the master issuing new "are you there" messages and new "bit-by-bit"
commands until
all tags in the field of coverage have been identified.
A tag that considers itself "identified" remains in this mode until it fails
to see a new "are-
12

CA 02266337 2000-06-23
you-there" message from the master within.a specific period of time. If this
occurs, the tag knows
it is no longer in the field of coverage .and then returns to the "un-
identified" state. If the tag re-
enters the field of coverage it will then respond to subsequent "are you
there" messages and "bit-
by-bit" commands in the same fashion as described before.
Although certain embodiments and examples have been used to describe the
present
invention, it will be apparent to those of skill in the art that various
changes can be made to the
embodiments and examples without departing from the scope or spirit of the
invention.
13

Representative Drawing
A single figure which represents the drawing illustrating the invention.
Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date 2004-06-08
(22) Filed 1999-03-23
Examination Requested 2000-07-06
(41) Open to Public Inspection 2000-09-23
(45) Issued 2004-06-08
Expired 2019-03-25

Abandonment History

There is no abandonment history.

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Registration of a document - section 124 $100.00 1999-03-23
Application Fee $150.00 1999-03-23
Registration of a document - section 124 $50.00 2000-03-28
Request for Examination $400.00 2000-07-06
Maintenance Fee - Application - New Act 2 2001-03-23 $100.00 2000-11-06
Maintenance Fee - Application - New Act 3 2002-03-25 $100.00 2002-03-08
Maintenance Fee - Application - New Act 4 2003-03-24 $100.00 2003-03-05
Maintenance Fee - Application - New Act 5 2004-03-23 $200.00 2004-03-08
Final Fee $300.00 2004-03-26
Maintenance Fee - Patent - New Act 6 2005-03-23 $200.00 2005-02-28
Registration of a document - section 124 $100.00 2005-07-18
Maintenance Fee - Patent - New Act 7 2006-03-23 $200.00 2006-03-17
Expired 2019 - Corrective payment/Section 78.6 $150.00 2007-01-31
Registration of a document - section 124 $100.00 2007-03-14
Registration of a document - section 124 $100.00 2007-03-14
Maintenance Fee - Patent - New Act 8 2007-03-23 $200.00 2007-03-19
Registration of a document - section 124 $100.00 2007-06-20
Registration of a document - section 124 $100.00 2008-03-11
Registration of a document - section 124 $100.00 2008-03-11
Maintenance Fee - Patent - New Act 9 2008-03-25 $200.00 2008-03-14
Registration of a document - section 124 $100.00 2008-07-18
Maintenance Fee - Patent - New Act 10 2009-03-23 $250.00 2009-03-06
Maintenance Fee - Patent - New Act 11 2010-03-23 $250.00 2010-02-18
Maintenance Fee - Patent - New Act 12 2011-03-23 $250.00 2011-02-17
Maintenance Fee - Patent - New Act 13 2012-03-23 $250.00 2012-02-08
Maintenance Fee - Patent - New Act 14 2013-03-25 $250.00 2013-02-13
Maintenance Fee - Patent - New Act 15 2014-03-24 $450.00 2014-02-14
Maintenance Fee - Patent - New Act 16 2015-03-23 $450.00 2015-02-25
Maintenance Fee - Patent - New Act 17 2016-03-23 $450.00 2016-03-02
Maintenance Fee - Patent - New Act 18 2017-03-23 $450.00 2017-03-02
Maintenance Fee - Patent - New Act 19 2018-03-23 $450.00 2018-03-01
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
XMARK CORPORATION
Past Owners on Record
DIVERSITY PRODUCTS LTD.
EXI WIRELESS SYSTEMS INC.
FEDERMAN, VLADIMIR
VERICHIP CORPORATION
VERICHIP SYSTEMS INC.
XMARK CORPORATION
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Representative Drawing 2000-09-15 1 7
Drawings 2003-08-26 2 49
Description 2003-08-26 13 533
Claims 2003-08-26 6 315
Abstract 2000-06-23 1 18
Description 2000-06-23 13 539
Claims 2000-06-23 8 301
Drawings 2000-06-23 2 49
Cover Page 2000-09-15 1 33
Abstract 1999-03-23 1 17
Description 1999-03-23 13 506
Claims 1999-03-23 8 282
Drawings 1999-03-23 3 44
Representative Drawing 2004-05-05 1 10
Cover Page 2004-05-05 1 37
Fees 2008-03-14 1 47
Assignment 1999-03-23 3 100
Correspondence 1999-05-04 1 35
Assignment 1999-05-20 2 89
Assignment 2000-03-28 2 91
Prosecution-Amendment 2000-06-23 25 939
Prosecution-Amendment 2000-07-06 1 39
Correspondence 2001-09-07 2 67
Correspondence 2001-10-10 1 14
Correspondence 2001-10-10 1 15
Prosecution-Amendment 2003-02-28 3 90
Fees 2003-03-05 1 31
Prosecution-Amendment 2003-08-26 13 572
Assignment 2007-03-14 4 177
Fees 2002-03-08 1 31
Correspondence 2004-03-26 1 33
Fees 2004-03-08 1 32
Fees 2005-02-28 1 27
Assignment 2005-07-18 2 76
Fees 2006-03-17 1 41
Prosecution-Amendment 2007-01-31 2 55
Correspondence 2007-03-22 1 13
Fees 2007-03-19 1 45
Assignment 2007-06-20 10 269
Assignment 2008-03-11 26 1,044
Correspondence 2008-05-21 2 2
Correspondence 2011-04-08 1 12
Correspondence 2011-03-23 1 15
Fees 2011-03-29 1 32
Assignment 2008-07-18 5 171
Correspondence 2012-03-13 1 17
Correspondence 2012-04-12 1 12
Correspondence 2012-03-20 1 31