WO2009058122A1 - An rfid system for providing data and power - Google Patents

An rfid system for providing data and power Download PDF

Info

Publication number
WO2009058122A1
WO2009058122A1 PCT/US2007/064155 US2007064155W WO2009058122A1 WO 2009058122 A1 WO2009058122 A1 WO 2009058122A1 US 2007064155 W US2007064155 W US 2007064155W WO 2009058122 A1 WO2009058122 A1 WO 2009058122A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
frequency
optical media
antenna
state
Prior art date
Application number
PCT/US2007/064155
Other languages
French (fr)
Inventor
Paul Atkinson
James R. Kruest
Original Assignee
Kestrel Wireless Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kestrel Wireless Inc. filed Critical Kestrel Wireless Inc.
Priority to PCT/US2007/064155 priority Critical patent/WO2009058122A1/en
Publication of WO2009058122A1 publication Critical patent/WO2009058122A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0701Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07766Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card comprising at least a second communication arrangement in addition to a first non-contact communication arrangement
    • G06K19/07767Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card comprising at least a second communication arrangement in addition to a first non-contact communication arrangement the first and second communication means being two different antennas types, e.g. dipole and coil type, or two antennas of the same kind but operating at different frequencies
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • G08B13/1418Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2431Tag circuit details

Definitions

  • the present invention relates to a target that is capable of providing an ID to a scanner using an RF communication.
  • the invention uses radio frequency (RF) devices and processes to provide sufficient coupling with the target for confidently retrieving the ID, or to operate activation circuitry.
  • RF radio frequency
  • Theft is a serious and growing problem in the distribution of products.
  • electronic devices continue to shrink in size, while increasing their utility. As these electronic devices become smaller and more capable, they also become easier and more attractive to steal.
  • Devices such as digital cameras, DVD players, MP3 players, and game devices are popular targets of theft, not only in the retail store by consumers, but also by others in the distribution chain. For example, retail store employees, shippers, warehousers, and even employees of the manufacturer often steal products, and even boxes of products, for their own use or to sell.
  • Other types of products are also subject to theft, such as DVDs, CDs, game discs, game cartridges, and other types of media. These types of products are also in high demand, and being relatively small and valuable, are easy and attractive to steal.
  • manufacturers often manufacture a product in several difference models, with each model having a different set of features. Although this is desirable from the consumer's standpoint, it complicates the manufacturing, shipping, inventorying, shelving, and retailing processes.
  • This problem exists in the configuration of electronic products, computers, gaming systems, DVDs, CDs, game cartridges, for example.
  • a DVD movie disc may be available in a family version, a theater version, and an "uncut" version.
  • Each has a different age restriction, and will appeal to different and significant markets. Accordingly, three different versions must be manufacture, shipped, inventoried, shelved, and managed. A similar problem exists with feature sets for games, computers, and other products.
  • a typical example of a rental business model is the rental of optical media, such as DVDs.
  • Rental models for content stored in physical media i.e. movies recorded on video tape or optical disc, are typically dependent on the physical distribution of the media and in particular the checking-out and checking-in of the media out of, or into the retailer's inventory.
  • charges are related to how long the consumer has the media, e.g. the period between when the media is checked-out and when it is checked-in.
  • charges are based on the number of media checked-out to a customer less those that have been checked-in.
  • the video rental business illustrates the some of the limitations of these models.
  • traditional video rental stores every time a customer rents a movie he must go to the store to pick-up the movie and then must go back to the store to return it.
  • the time-period for which the consumer is charged depends on when the movie is checked-out and when it is returned and checked-in to inventory.
  • the consumer bears the transport cost in the form of trips to and from the video store.
  • the consumer also incurs delays between the rental and selection decisions and the actual watching of the movie.
  • the video store incurs high costs too in the form of rent, inventory and the cost of checking- out and checking in each movie rented.
  • An RFID system for providing data and power.
  • the RFID system has a target that is configured to receive RF signals on multiple frequencies, and a corresponding multi-frequency scanner.
  • the RF scanner is configured to transmit an RF signal to the target and, in response, receive an ID message from the target.
  • the scanner may use one or both frequencies to communicate with the target.
  • the target may include a switch that may be set to enable the target to have a defined level of utility.
  • the target may receive, on one of the frequencies, sufficient or supplemental power to change the state of the switch.
  • the RFID system uses the second frequency to supplement power transmission to the target.
  • the RFID system may use the second frequency to enhance data communication with the target.
  • the present invention provides a target having a controlled utility, and a method for changing the utility of the target.
  • the target with controlled utility may be an electronic device, or alternatively, may be a tangible media, such as an optical disc.
  • the controlled target has a change effecting device that is set to a first state, which allows the target to operate according to a first utility.
  • the controlled target also has a receiver operating at a first RF frequency for receiving an authorization key, and logic which, responsive to the authorization key, selectively changes the change effecting device to a second state. When the change effecting device is in the second state, the target may operate according to a second utility.
  • the controlled target has a restricted access key that was stored during manufacture, and the restricted access key is used by the logic in changing the state of the change effecting device.
  • the controlled target is placed proximate to an activation device.
  • the activation device may read an accessible identifier from the controlled target using the first RF frequency system, and retrieve or generate an authorization key that is associated with the target.
  • the activation device may cooperate with a network operation center or other entity to retrieve the authorization key, and to obtain approval to change the utility of the controlled target. If approved, the activation device may then send the authorization code to the controlled target using one of the two available RF systems.
  • the second RF frequency may be used to provide additional power to the target for effecting the change in the switch. For example, additional power may be supplied by the second frequency to permanently change an electro-chromic material from opaque to substantially transparent.
  • a distribution control system is provided to support the controlled and selective changing of utility for a target.
  • the target with controlled utility may be an electronic device, or alternatively, may be a tangible media, such as an optical disc.
  • the distribution control system has a target with a change effecting device and a restricted access key.
  • An activation device retrieves or generates an authorization key, and sends the authorization key to the target.
  • the authorization key may be sent to the target wirelessly, for example, using a radio frequency signal.
  • the target has logic that uses the restricted access key and the authorization key to change the utility of the target.
  • the activation device retrieves the authorization key from a network operation center (NOC) by sending a target identifier to the NOC, and the NOC retrieves the authorization key for the identified target.
  • NOC network operation center
  • the activation device may also connect to other systems for obtaining approval to change the utility of the target.
  • the authorization key may be sent to the target upon receiving payment, password, or other confirmation.
  • a target is manufactured with a change effecting device set to compromise the utility of the target.
  • the compromised target would be nearly useless to a thief, and therefore would be less likely to be a target of theft.
  • the manufacturer has also stored an identifier and a restricted access key with the target.
  • the manufacturer also stores the accessible identifier and its associated key for later retrieval by a party authorized to restore the utility to the target.
  • the identifiers and keys are stored at a network operation center (NOC).
  • NOC network operation center
  • the compromised target may be moved and transferred through the distribution chain with a substantially reduced threat of theft. When a consumer decides to purchase the target, the target is passed proximally to an activation device.
  • Its accessible ID is read by activation device, and using a network connection to the NOC, sends the accessible ID.
  • the NOC retrieves the authorization key for the target. Additional approvals may be obtained, for example, confirmation of payment, identification, password, or age.
  • the activation device transmits the authorization key to the target, typically using a wireless communication.
  • the target receives the authorization key, and using its logic, compares the authorization key to its stored restricted access key. If the keys match, then the target uses an activation power source to switch the state of the change effecting device. Then, the target will have full utility available to consumer.
  • the RF system which has provided the data link between the target and the activation device may not be able to provide sufficient activation power. In this case, a second RF system may be used to supplement the activation power so that sufficient power is available to switch the state of the change effecting device.
  • Fig. 1 is a block diagram of an RFID system for a target device having controlled utility in accordance with the present invention.
  • Fig. 2 is a block diagram of an RFID system for a target device having controlled utility in accordance with the present invention.
  • Fig. 3 is a flowchart of a process of using an RFID system for a target device having controlled utility in accordance with the present invention.
  • Fig. 4 is a flowchart of a process of using an RFID system for a target device having controlled utility in accordance with the present invention.
  • Figs. 5A, 5B, and 5C are illustrations of optical discs with an RFID system having controlled utility in accordance with the present invention.
  • Figs. 6A and 6B are block diagrams of a dual antenna for an RFID system in accordance with the present invention.
  • Fig. 7 is a block diagram of an RFID system for a target device in accordance with the present invention.
  • Fig. 8 is a flowchart of a process of using an RFID system for a target device in accordance with the present invention.
  • Fig. 9 is a flowchart of a process of using an RFID system for a target device in accordance with the present invention.
  • Fig. 10 is a block diagram of a network for distributing a target with controlled utility.
  • Fig. 11 is a block diagram of a process for changing the utility state of a target with controlled utility.
  • Fig. 12 is a block diagram of a process for changing the utility state of a target with controlled utility..
  • Fig. 13 is a flowchart of a process for changing the utility state of a target with controlled utility
  • Fig. 14 is a block diagram of an electronic device with controlled utility.
  • Fig. 15 is a block diagram of a processor with controlled utility.
  • System 10 includes a target device 12 which may be, for example, an electronic device, an optical disk, or a consumer product.
  • target device 12 may be an electronic product that has had its utility 51 compromised at the time of manufacture and during distribution. Accordingly, device 12 is less likely to be a target of theft or pilfering since it would have no or only limited use to a thief.
  • the level of utility 51 is set according to the state of switch 49.
  • Switch 49 may have two or more states, with each state enabling a different level of utility 51. For example, one state may be a fully compromised state where the target device 12 has no or only limited utility.
  • Switch 49 may have another state that provides a demonstration capability, but does not enable full use of the device 12. Also, the switch 49 may have a state enabling full utility 51 for device 12. [0031] At some point in the distribution chain it will be desirable to enable, activate, or restore the full utility 51 for target device 12. Often, this activation may be done as part of a point-of-sale transaction. In performing the point-of- sale transaction, the target device 12 is brought near an activating device 14. Activating device 14 has a controller 53 for controlling operations, as well as managing local area and wide area communications. For example, the activating device 14 may be coupled to other point-of-sale terminals, to in-store servers, or to a network operations center (NOC) at a remote site.
  • NOC network operations center
  • the activating device has two radio frequency systems, with each system operating at a different radio frequency.
  • the first RF system 55 transmits, using transmitter 57, a signal to a first RF antenna 22 for device 12.
  • the RF signal is received by transceiver 27, and the received RF signal may contain data 35 and energy sufficient to activate power converter 37.
  • Power converter 37 supplies sufficient power to enable retrieval of readable ID 44, as well as transmission of the readable ID 44 through the transmitter and RF antenna 122 back to the receiver 59. In this way, an RFID process similar to known RFID processes has been established.
  • the activating device 14 has used a first frequency to signal and interrogate the target device 12 for an identification value.
  • the controller 53 may use its network connections to confirm the target device 12 is properly authorized, and if authorized, to retrieve an activation key or code.
  • the readable ID is transmitted to a network operations center, where a secure database is used to look up an activation key.
  • the controller 53 receives the activation key, and local events indicate that the target device 12 may be in a condition for activation, the first RF system 55 communicates the activation key to logic 45 using transceiver 27.
  • the logic 45 may compare the received activation key to a restricted access key 47 stored on the target device, and if the keys match, enabled the switch 49 to change states.
  • the first RF system 55 may not provide sufficient energy to enable the changing of the switch 49.
  • the first RF system 55 may operate at a UHF band, for example such as at 902 to 928 MHz, and therefore energy distribution may be subject to fadeouts and inconsistent densities. Accordingly, if target device 12 is in an area having a lower energy density, then sufficient power may not be available to effect the change. Further, for safety reasons, the power transmitted by first RF receiver 55 may be attenuated.
  • the activation device 14 has a second RF system 61 having a transmitter 63.
  • the second RF system 61 may be activated to provide an additional energy signal from transmitter 63 through RF antenna 21 into RF receiver 25.
  • the second RF transmitter may be constructed to operate at a lower frequency, for example in the high frequency or very high frequency band and preferably provides a continuous wave signal.
  • the second RF transmitter is chosen to transmit a more uniform power density field that is less sensitive to orientation and local environmental conditions.
  • the second frequency may be 13.56 MHz, although other frequencies may be used.
  • the receiver 29 has a power converter 33 for converting the second RF energy into local electrical power for powering the low-power circuit, including switch 49.
  • the RF transmitter 63 may be activated during the entire activation process, or may be activated concurrent with sending the activation key.
  • the target device 12 will only be activated upon having both sufficient power to change the switch, as well as an authorization from local logic 45. In this way, even though the second RF transmitter 63 may be transmitting sufficient power, the switch at 49 will not change states unless allowed by logic 45.
  • the antenna structure 16 may be constructed as a single antenna having different matching circuits for each frequency, or may be constructed as two separate antennas.
  • the antenna may be external to the target device, or may be integrally formed.
  • the antenna, receivers, and low-power circuit structures may be provided as an integrated circuit and incorporated into a device's electronics.
  • the activation circuitry may be external to a device, while the switch is internally formed. It will be appreciated that the physical form for the activation circuitry, receivers, antennas, and target device may take many alternative forms.
  • the target device 12 is an optical media with the switch being a change effecting device in the form of an electrochromic material.
  • the electrochromic material When set to an opaque state, the electrochromic material blocks a player's ability to effectively read stored content on the disk. Upon activation, the electrochromic material is made substantially transparent, thereby enabling a player to read the disk.
  • an electrochromic film may require about 3 to 5 volts at 2 to 4 milliamp for about one second to permanently change state.
  • the presence of a second RF transmitter enables the delivery of sufficient power to permanently change an EC film. More specifically, the second RF transmitter may be constructed at a lower frequency, for example in the high frequency or very high frequency band that is preferably provided as a continuous wave signal. The transmission is chosen to transmit a more uniform power density field that is less sensitive to orientation and local environmental conditions.
  • a frequency of about 13.56 MHz will satisfy this requirement, but the concept is not limited to this frequency, and may involve other frequencies such as 125 kHz or 125 MHz.
  • the coupling between the activating device and the targets RF antenna will be primarily in the magnetic field, and the RF antenna may be designed in a loop fashion for coupling to the h field.
  • the same coiled antenna may operate sufficiently well as the UHF antenna.
  • Activation of a disc using this duel frequency system generally involves three phases.
  • a communication may be established again with the UHF system to receive a confirmation message that activation has been successfully completed. Further, the UHF communication system may be used to download and store additional information in the target device, such as date and time of activation. Such information may be useful for repair or warranty purposes.
  • RFID system 100 has a target device 102 and an activating device 104.
  • the activating device 104 has a controller 123, a first RF system 125, and a second RF system 127.
  • the RF system 2 has a receiver 131, thereby enabling full communication using the second frequency.
  • the second frequency may provide supplemental power as previously described, but may also be used to establish more robust data communication.
  • the second RF system 127 may enable communications at different ranges or in different environments as compared to the first RF system 125.
  • the first RF system 125 may be a high frequency communication system enabling communications over a distance of several meters, thereby enabling communications in warehouses and for distance scanning of pallets.
  • RF system 127 may be constructed as a lower frequency system for establishing communication at a point-of-sale terminal or in a local area of about 1 foot.
  • the activating device 104 may be able to select, using controller 123, one of the transmission systems according to the particular requirements of a target. For example, the activating device 104 may recognize that a target has entered a scanning area, and be unable to retrieve accurate ID information using the first transmission system 125. In response, the activating device 104 may activate the second RF system 127 and attempt to retrieve the ID with the second RF system.
  • the activation device 104 has two RF systems with which to provide data or power to the target 102.
  • the first RF system 125 communicates to the first RF transceiver 111 through the RF antenna 108.
  • the second RF system 127 communicates to the second RF transceiver 110 through RF antenna 106. Since the second RF transceiver 110 has both a transmitter and a receiver portion, the second transceiver 110 is able to receive and transmit data 115.
  • Antennas 106 and 108 may be formed separately, or in another example may share a common structure. Both the RF subsystems may be used to provide both power and data to the low-power circuit 119.
  • the low-power circuit may have an onboard temporary power source 113, such as a battery, for providing additional battery power for the low-power circuit 119.
  • an onboard temporary power source 113 such as a battery
  • power supplied by one or both of the RF subsystems may be combined with battery power 113 to toggle the switch to change utility 121.
  • Process 150 may operate on a scanning or activation device, for example, at a point-of-sale terminal.
  • Process 150 first retrieves a readable ID from a target device using a first wireless system, as shown in block 152.
  • This first wireless system may operate, for example at a UHF frequency of about 902 to 928 MHz. This frequency range corresponds to frequencies currently used for RFID applications, and have been approved by most governmental agencies for RFID purposes.
  • An activation device receives the readable ID and determines if the target is authorized for activation as shown in block 154.
  • An activation key may be sent by one of the wireless systems to the target as shown in block 153.
  • the activation key is sent through the UHF antenna to the logic in the target device, and the UHF antenna may provide sufficient power to operate the logic.
  • a second wireless system is activated to provide supplemental power to the target as shown in block 156. This supplemental power is used by logic in the target device to change the state of a switch, which enables a different utility for the target device.
  • the target may respond with a confirmation message that the device has been properly activated as shown in block 158.
  • This activation message may be transmitted using the first wireless system, the second wireless system, or may include making a perceptible change to the target itself.
  • Method 175 preferably operates on a target device.
  • a readable ID is first retrieved from memory in the target device and is transmitted using a first wireless system as shown in block 177.
  • the retrieval and transmission of the ID is responsive to receiving an RF signal from an RFID scanning or activation device.
  • the target device may receive an activation key 185 from one of the wireless systems, such as wireless system 1.
  • wireless system 1 operates at a UHF frequency.
  • the wireless system 1 may also provide sufficient energy to power at least some of the local logic as shown in block 179.
  • the target also has a second wireless system operating at a second RF frequency, which is typically at a much lower frequency, such as an HF or VHF frequency.
  • This second wireless system 183 is used to receive supplemental power useful for changing the state of the switch as shown in block 189.
  • the logic may allow the switch to be changed. Accordingly, when the logic confirms that the target may be activated as shown in block 187, and sufficient power is available from wireless system 2 as shown in block 189, then the state of the switch may permanently change. In this way, the switch may set the level of available utility for the target device as shown in block 192.
  • System 200 includes an optical disc 202, which may be, for example a DVD, an HD DVD, a blu-ray DVD, an audio DVD, a software DVD, or a gaming disk.
  • a switch 206 in the form of an electro chromic material is positioned over an important area of the content area such that when the electrochromic material is opaque, a typical player will be unable to read the stored content. However, when the electrochromic material 206 has changed state to be substantially transparent, then the stored content may be read by a player.
  • a UHF antenna 205 is provided for receiving UHF energy and data from an activation device, as well as transmitting a readable ID back to the activation device.
  • the readable ID is stored in the logic 204, or may be stored on another area of the disc 202.
  • the UHF antenna 205 and the logic 204 also cooperate to receive an activation key, and make a determination that the switch 206 may be appropriately set to its transparent state. However, sufficient power may not be available through the UHF antenna 205 alone.
  • a HF or VHF antenna 207 is provided for providing additional energy for changing the state of the electrochromic material.
  • the supplemental antenna 207 may be arranged in a meandering pattern in the space between the spindle opening and the content area. It will be appreciated that the antenna may substantially extend around the spindle, or may take an alternative shape. Because the antenna 207 is intended to interact with a magnetic field, the meandering pattern facilitates a more efficient magnetic coupling. In some cases, the meandering antenna 207 may also be constructed in a way to sufficiently receive and transmit UHF communications. In this way, a single antenna may be used. However, greater efficiency may be enabled using two antenna structures as illustrated. [0043] Referring now to figure 5B, another optical disc target 225 is illustrated.
  • Optical disc 226 has an electrochromic switch 230 coupled to logic 228 and a UHF antenna 229 as discussed with reference to figure 5A. However, instead of a meandering antenna, the disc 226 has an HF or VHF antenna 233 constructed near the circumference or perimeter of disc 226. This perimeter area of an optical disc is typically unused, and is available for forming a metallic or other conductive antenna member. The antenna may be constructed on the surface of the disc, or may be integrally formed in an internal layer.
  • the circumference antenna 233 is connected to the logic 228 through conductors 231.
  • the conductors 231 may be conductive lines, for example, made from a transparent conducting ink.
  • the conductors 231 may be an opaque conducting material, such as a metal trace, etched into the surface of the disc 232.
  • a metal trace etched into the surface of the disc 232.
  • the error introduced to a typical player is minimal, and may be readily corrected by correction algorithms in the player.
  • the use of a narrow etch 232 facilitates using a metallic conductor, which is less costly than running transparent conductors radially across the disc. It will be appreciated that multiple etches may be made, thereby allowing a single smaller trace to extend radially through the content area. By sufficiently spacing these etches, potential reading errors may be reduced.
  • Optical disc 252 has an electrochromic material 256 coupled to logic 254 and a UHF antenna 255 as previously illustrated.
  • the supplemental antenna is not included on the disc itself, but is included external to the disc, for example on the disc packaging.
  • the disc has contact points 257 for coupling to the external antenna.
  • the supplemental antenna is included in the packaging for the disc, and makes contact with the contacts 257. In this way, the antenna is externally positioned and more readily couples to the radio frequency or magnetic energy.
  • an antenna configuration 300 is illustrated for an activation device or scanner.
  • the activation device or scanner has a UHF antenna 302 sized and tuned for transmitting and receiving UHF frequency communications, for example in the 902 to 928 MHz range.
  • a meandering HF or VHF antenna 303 is also provided.
  • the supplemental antenna 303 is provided in a meandering or looping construction for increased efficiency and coupling with the magnetic field of a lower frequency RF system.
  • the UHF antenna plane is separated from the ground plane 328 by an insulator 327.
  • Another insulator 331 separates the UHF antenna plane 302 from the individual high frequency or very high frequency lines of antenna 303.
  • An additional insulating layer 333 may be provided to protect the entire antenna structure. It will be appreciated that other antenna structures may be used for a scanning device.
  • the antenna structure 300 provides a compact structure that enables UHF communication and magnetically coupled power transmission in an effective and robust manner.
  • RFID system 350 has a target device 352, which may be in the form of an RFID tag.
  • the RFID tag 352 may be adhered to various devices, or may be integrally formed in other devices.
  • the RFID tag 352 is constructed to communicate with a scanner device 354.
  • the scanner device 354 has a controller 373 for controlling a first RF transmitter system 368 and a second RF communication system 371.
  • the first RF transmission system 368 operates at a UHF frequency
  • the second RF communication system 371 operates at a lower frequency, such as an HF or VHF frequency.
  • the RFID tag has a first antenna 358 coupled to a first RF transceiver 360.
  • the RFID tag 352 also has a second RF antenna 356 coupled to a second RF transceiver 362. Both the first and second transceivers couple to a low-power circuit 364, which includes a readable ID 366.
  • scanner 354 may use one of the RF systems to interrogate and read the ID from the RFID tag 352.
  • the scanner may use RF system 368 to communicate to RF transceiver 360 through RF antenna 358. This system may then retrieve the readable ID.
  • the scanner may select to use the second RF system 371 to communicate with the second RF transceiver 362 through the antenna 356 to read the readable ID 366.
  • the decision on which RF subsystem to use may be made dependent on the distance to the RFID tag, or may be made responsive to the failure of one of the RF systems to properly read the ID.
  • the systems may simply toggle back and forth to act as confirmation that a proper ID has been read.
  • the scanner may be set by a human or other controlling device to operate in one of the frequencies. In this way, the scanner may be set by a human to read palettes using the high frequency UHF system 368 when the palettes are several meters away. However, if the same scanning device is used for reading individual products that are only a few inches away, then the scanner may be manually set to use the lower frequency system 371. Irrespective of which frequency is selected on the scanner 354, the RFID tag 352 responds with the proper ID message.
  • Process 400 has a scanning device that is able to select a close or far read mode as shown block 404.
  • the selection may be made responsive to human input, or may be made responsive to application needs.
  • the close and far modes are simply toggled.
  • the far read mode uses a UHF antenna and frequency
  • the close mode uses an HF or VHF antenna and frequency.
  • a request may be sent using the first radio frequency as shown in block 406 and an ID received using RF 1 as shown in block 408, or the ID request may be set using the second RF system as shown in block 411, and the second ID received using the second RF system as shown in block 413.
  • Method 450 transmits a first request for an ID using a first RF system as shown in block 452.
  • the first RF system may be a UHF system.
  • An ID or partial ID may be received using the first RF system as shown in block 454.
  • the ID is analyzed to determine if additional interrogation activity is needed as shown in block 456.
  • the analysis of the ID may indicate there is an error in the first ID and the ID should be retrieved using a second wireless system.
  • the ID may indicate that the tag is capable of storing additional information, and may require that additional information be sent to the tag.
  • the ID may indicate that the target needs additional power to perform an additional activity, such as activating the device by changing an electrochromic switch or other switch device.
  • a second wireless system is activated as shown in block 461.
  • the second RF system may be used to 1) transmit additional energy or power to the RFID tag, 2) may send additional data, or 3) may send additional power and data.
  • the RFID tag may respond with a confirmatory message as shown in block 463. This confirmatory message may be received on either the RF one system or the RF two system.
  • Target 512 may be an electronic device such as a computer, TV, appliance, MP3 player, camera, game counsel, or toy.
  • the target may be a tangible media, such as an optical disc, DVD, CD, or game cartridge.
  • the change effecting device is used to control the utility available for the target or for use of the target. More particularly, the change effecting device has multiple states, with each state being associated with an available state of utility for the target. In a specific application, the change effecting device may be switched between two available states of utility.
  • the target when the target enters the distribution chain, the target is set to have one utility.
  • this utility could be a severely comprised utility, where the target has no useful function available.
  • the set utility may be to a demonstration utility that allows limited demonstration functionality. It will be appreciated that the available utility may be set according the requirements of the specific distribution chain. At some point in the distribution chain, for example, when the target is transferred to a consumer, it may be desirable to change the available utility. Accordingly, block 512b shows the target in the presence of an activation device 16 at a point-of-sale or other transfer location 514.
  • the activation device or another reader is able to read an identifier value or other identification from the target, for example, using an RF system operating at a first frequency.
  • the activation device uses the identifier to generate or retrieve an authorization key.
  • This authorization key may be stored locally at the point-of-sale device 514, or may be retrieved through a network connection to a network operations center or other remote server.
  • the point-of- sale terminal 514 may have a connection to an operations center 518.
  • the operation center may be in the same facility as the point-of-sale terminal 514, or may be in another facility at a different location.
  • the operation center 518 may also have multiple computer servers, and may distribute processes and databases throughout the network system.
  • the operation center 518 stores a set of associated identifications and authorization keys 521.
  • the operation center 518 operates algorithmic processes to generate keys responsive to information received from activation device 516. Whether generated or retrieved, the operation center 518 sends an authorization key for the target to the point-of-sale terminal 514 where it may then be available to activation device 516.
  • a point-of-sale terminal at the point-of-sale 514 which typically is coupled to the activation device, may also perform various other tasks or processes as a precondition to determining that the target has been approved to have its utility changed. For example, the point-of-sale terminal may confirm payment for the target, or may confirm that the consumer is age-appropriate for the particular target being purchased.
  • the activation device 516 transmits the authorization key to the target as shown in block 512c. In one example, the activation device 516 reads the ID from the target and transmits the authorization key to the target using an RF (radio frequency) communication.
  • the authorization key may be sent, for example, using the RF system operating at the first frequency. It will be appreciated that other types of wireless communication may be used. For example, the communication may use infrared (IR) communication in one or both directions. In another example, the target may make physical contact with the activation device for effecting the communications.
  • IR infrared
  • the target then uses the received authorization key to switch the change effecting device to another state.
  • the activation device may activate a second RF system operating at a different frequency.
  • This second RF system provides energy for effecting the change in the switch.
  • This second RF system may provide all or most of the power required for effecting the change, or may provide supplemental power for the first RF system.
  • the target has a different utility than when the change effecting device was in the first state.
  • the target has logic coupled to the change effecting device that uses the authorization key to effect a change in the target's utility.
  • the target has a restricted access key that was defined and stored with the target during the manufacturing process.
  • target 512 is illustrated to be an MP3 player.
  • a restricted access key is stored in the MP3 player.
  • a change effecting device is installed in the MP3 player, and set to a state so that the MP3 player's utility is compromised. More specifically, the change effecting device has a first state in which the MP3 player does not power on or otherwise properly function, and a second state where the MP3 player is allowed to be fully operational.
  • the change effect device may be, for example, a printed circuit board trace coupled to ground. This grounded trace may then be coupled to a pin on a processor of the MP3 player, and as long as that pin is held to ground, the MP3 player will not power on or initialize. It will be appreciated that the utility of the MP3 player may be compromised in several alternative ways and by several alternative change effecting structures.
  • the MP3 player is also manufactured with a power source associated with the change effecting device for selectively decoupling the trace to ground. This power source may be a battery, an electromagnetic or RF converter, or may be power obtained from the MP3 player's operational battery. [0055] The MP3 player is thereby manufactured and ready for sale as a compromised MP3 player that will not properly power on or function.
  • the compromised MP3 player would be nearly useless to a consumer, and therefore would be less likely to be a target of theft.
  • the manufacturer has also applied an accessible identification to the MP3 player.
  • the accessible identifier may be a bar code, or may be another stored value that is accessible through, for example, an RFID reader system.
  • the manufacturer stores the accessible identifier and its associated key value for later retrieval by a retailer or other party authorized to restore the utility to the MP3 player.
  • the compromised MP3 player may be shipped through the distribution chain and to the retailer with a substantially reduced threat of theft.
  • the retailer may display and make the MP3 player available for customer handling in a retail environment with reduce risk of theft. In this way, reduced security measures may be taken at the retail level, such as using locked cases or sophisticated packaging, since the consumer would obtain no benefit by stealing a nonworking, compromised MP3 player.
  • the consumer may take the MP3 player to the point-of-sale terminal 514 and have it passed proximally to an activation device 516.
  • its accessible ID is read by activation device 516, either using the bar code value or by retrieving the stored accessible ID using a wireless or EM (electromagnetic) communication.
  • the communication may be an RF (radio frequency) communication operating in the UHF range of 902-928 MHz.
  • the point-of-sale terminal may have a network connection to an operation center 518, and sends the accessible ID to the operation center.
  • the operation center which has a database of MP3 player identifications associated with their restricted access keys, retrieves the particular authorization key for the MP3 player that is at the point-of-sale device.
  • additional confirmation actions may be taking place. For example, a clerk may be accepting payment from the consumer, or may be checking a consumer's identification or age. These other confirmation criteria may then be used to confirm that the point-of-sale terminal is ready to restore the utility of the MP3 player.
  • the activation device 516 determines restoration is appropriate, the activation device 516 transmits the authorization key to the MP3 player, typically using the UHF wireless communication system.
  • the activation device activates a second RF system, which may operate, for example, at 13.56 MHz.
  • the MP3 player receives the authorization key, and using its logic, compares the authorization key to its pre-stored restricted access key. If the keys match, then the MP3 player uses power from the 13.56 MHz signal to open the trace to ground. With the ground trace now open, when the MP3 player is next turned on, full utility will be available to consumer.
  • the MP3 player may have additional circuitry for confirming that the utility has been restored. For example, the state of the change affecting device may be measured, or another test or measurement may be taken. According to whether or not activation was successful, a different value may be placed in a confirmation memory.
  • the confirmation memory may be read by the UHF system for activation device 16 to confirm to the consumer and to the network operations center that activation was successful. By confirming successful activation, the retailer may have a higher degree of confidence of consumer satisfaction, and may accurately and timely report and authorize payment to the supplier of the MP3 player.
  • a target is provided in a non- operating state, for example, with its main power in an off condition.
  • the target also has been manufactured with a controlled utility, which causes the target to operate only in a first level of utility as shown in block 602.
  • the first utility may be a highly compromised utility level where the target has no practical useful value to a consumer. In this way, a consumer, or someone in the distribution chain, will be unlikely to shoplift or steal the device.
  • the target receives an authorization key as shown in block 604.
  • this key will be received at a retail point-of-sale through a UHF wireless communication, although other locations and processes may be used.
  • the electrical device uses its logic and activation power to determine if it is authorized to change from the first utility level as shown in block 606. It will be appreciated that an HF/ VHF system may be used to provide supplemental power for effecting the change.
  • the electrical device uses its activation power and logic to change the state of a change effecting device from a first state to a second state as shown in block 608.
  • the consumer may plug in or power-on the electronic device as shown in block 611. Since the change effecting device is now in its second state, the target operates according to the second- level of available utility as shown in block 613.
  • the second utility may be a full operational utility.
  • the first utility may be a demonstration utility, and the second utility may be full operational utility.
  • the first utility may be a full operational utility, and the second utility may be restricted utility for an age restricted product.
  • a retailer may disable certain features or functions in an electronic device according to the age of the consumer.
  • a consumer may purchase a device according to a list of desired features.
  • the full operational device may be placed with the activating device, and undesired features compromised. In this way, a flexible configuration of electronic devices may be accomplished at a point-of-sale or service area in a retail environment.
  • a manufacturer may use the change effecting device to particularly configure an electronic device prior to shipment. In this way, a standard version of an electronic device may be made, and the utility selectively added or removed using one or more change effecting devices. It will also be understood that this dynamic configuring process may be performed at other times, for example, by service personnel at the retail outlet.
  • a manufacturer may prepare an optical media, such as an optical disk, with multiple change effecting devices, with each change effecting device arranged to affect a particular utility of the media. Then, at some point in the manufacturing or distribution process, the utility of the media may be changed. In this way, a standard version of a media, and media content, may be made, and the utility selectively added or removed using one or more change effecting devices. It will also be understood that this dynamic configuring process may be performed at other times, for example, by service personnel at the retail outlet.
  • Method 615 has an electronic device in its non-operating state as shown in block 616. This state may be for example, when the electronic device is not plugged in or when its power button is in an off configuration.
  • the electronic device may be placed in its operating state as shown in block 617.
  • the electronic device may be plugged in or have its power switch turned to on.
  • the level of utility available in the electronic device would be different. For example, if the change effecting device is in a first state as shown in block 619, then the electronic device is allowed to operate at a first level of utility as shown in block 621.
  • the electronic device operates at a second- level of utility as shown in block 620.
  • the electronic device has a level of utility which is always dependent on the state of the change effecting device. Accordingly, the change effecting device may cause an electronic device to be always unusable unless it has received the proper authorization key. If the authorization key is never received, the electronic device remains at its first state of utility. In a specific example, if the first level of utility is a highly compromised level, then the electronic device would have no practical usability by a consumer in its first state. In this way, risk of theft is dramatically reduced as no benefit can be derived from the electronic device if stolen and it is in its first state.
  • Method 625 has an electronic device target that has an operating state and a non-operating state. Typically, the non operating state will be a power off condition, while the operating state will be a normal power on condition.
  • the electronic device has also been manufactured to have its utility controlled and initially set to a first level of utility as shown in block 626. The electronic device moves through the distribution chain until it reaches a point where one of the parties in the distribution chain determines it is appropriate to change the utility of the electronic device. For example, this may be at a point-of-sale when a retailer transfers the electronic device to a consumer, or may be done by a distributor to add or delete particular utilitarian functions.
  • the utility of the electronic device Since the utility of the electronic device has been initially set to the first level of utility, if the electronic device is placed into its operating state, its utility will only be available as the first level of utility. For example, if the electronic device has had its utility fully compromised, then the electronic device may fail to power on, or will have its utility disabled to a point of being functionally useless.
  • the electronic device When the electronic device is in its non operating state, and it is desired to change to a second state of utility, the electronic device is moved proximate to an activating device.
  • This activating device may be, in one example, an activating terminal at a point-of-sale stand, or may be a device at another location.
  • the electronic device receives a query for an accessible ID using a UHF system as shown in block 627.
  • This accessible ID may be stored as a memory value to be read wirelessly by the UHF system, or may be a barcode value to be scanned.
  • the ID is sent back to the activating device as shown in block 629.
  • the activation terminal may cooperate with other local or remote systems to approve changing the target's utility as shown in block 631.
  • the activation terminal may confirm credit card payment, confirm password, confirm membership in an organization, confirm the activation terminal is authorized, or confirm the age of the consumer.
  • the activation terminal sends an authorization key using the UHF system that is received by the target as shown in block 633.
  • the authorization key will be received wirelessly, for example, using an electromagnetic process such as a radio frequency communication.
  • the target which is still in its non operating state, retrieves a restricted access key stored with the target. This restricted access key is not available to be read by an external device, and is in a non-alterable and nonvolatile memory.
  • the restricted access key typically has been stored with the target at the time of manufacturing, and a copy of the authorization key, along with the associate ID was stored for retrieval by the activation device. Accordingly, the logic within the target may retrieve or otherwise use the restricted access key and compare the restricted access key to the authorization key as shown in blocks 636 and 638. If the keys are the same, then the target has determined that the utility of the target should be changed as shown in block 640. The logic then cooperates with a change effecting device to change the state of the change effecting device to a second state as shown in block 642. A second RF system may be used to provide supplemental power for effecting the change to the switch. This change effecting device is coupled to a utility means, which is used to direct the particular utility available to the electronic device. Accordingly, when the electronic device is placed in the operating state as shown in block 644, the electronic device operates according to its second utility as shown in block 646.
  • Electronic device 702 has been manufactured with its principle utility compromised. In this way, as electronic device 702 moves through the distribution chain, it has little or no perceived value to a potential thief or shoplifter. Accordingly, the risk of theft is substantially reduced.
  • the electronic device 702 is constructed to have its utility means enabled through a logic circuit, power circuit, a value stored in memory, or processor operation as shown in block 724.
  • the particular utility means being used has no utility when an electronic connection is grounded as shown in block 722.
  • switch 719 closes, which pulls a reset pin to ground when the printed circuit board trace 717 is shorted to ground.
  • the electronic device 702 has its processor or logic circuit constantly in a state of reset, so that the electronic device has no useful utility. Accordingly, any time the electronic device 702 is turned on when the change effecting device 717 is in its first state, the key functionality or utility of electronic device is compromised.
  • an RF transmitter 704 such as a UHF transmitter, takes an ID value 706 and transmits it to the activation device. It will be appreciated although RF communication is illustrated, other types of wireless communication may be used.
  • the activation device may then cooperate with remote servers, network operating centers, clerks, and the consumer to determine that the target 702 is approved to have its utility restored.
  • the activation terminal has been properly authorized and the interested parties have determined that the electronic device may be restored, then the activation device sends an authorization key, which is received by UHF receiver 708.
  • the UHF receiver 708 passes the received authorization code to logic 715, where the authorization code is compared to a restricted access key 713.
  • the restricted access key 713 was stored in the electronic device during the manufacturing process. Provided the restored restricted access key 713 and the authorization key match, the logic causes the PCB trace to be opened.
  • a power source 711 is used to power the transmitter 704, the receiver 708, logic 715, and the change effecting device 717 when the electronic device is not in its operational condition.
  • This power source may be, for example, a battery, an RF/ EM power converter or may even be a connection to the operational power source 726.
  • the RF receiver 708 acts as a receiver for RF/EM power converter 711. Since this power may not be sufficient in some cases, an additional HF/ VHF receiver 709 is provided, which receives additional RF energy from the activation device. This additional power may be made continuously available, or may be provided at times selected by the activation device. This additional RF energy may be used to supplement power available for opening the PCB trace for the change effecting device 717.
  • Processor 752 may be, for example, a microprocessor, a gate array device, a DSP, or other processor circuit. Although a processor is illustrated, it will be appreciated that other logical and memory devices may be used. Processor 752 has been manufactured with a restricted access key 761. The restricted access key has also been stored in a database and associated with the processor ID value 756. Processor 752 has a change effecting device in the form of a logic value 765. The logic value may not be read externally, and is stored in a nonvolatile and nondestructable way.
  • the logic value is set such that when the logic value is set to a first state, the boot circuit 774 of the processor causes a boot failure.
  • the initially set value may cause the processor to only boot into a restricted mode, so that simple operations may be performed, but full utility is not available.
  • operational power 777 will be a pin or trace receiving power from an external source.
  • the activation circuits are protected from the operational power, and the operational circuits are protected from the activation circuits through an isolation transistor 768.
  • an operational transistor 768 may be properly biased and coupled to the operational power 777, so that the logic value may be read by boot circuit 774 when operational power is applied. In this way, each time processor 752 is powered up, it checks to see what level of utility it should provide.
  • the processor 752 may be sold as a discrete component, or may be installed as a component in a larger device, such as a computer system, camera, or MP3 player. In some cases, it may be useful to have the wireless communication and power circuits external to the processor device itself.
  • the processor or integrated device holding the processor are desired to be activated, the processor uses its UHF transmitter 754 to transmit a processor ID 756 to an activation device.
  • the activation device generates or retrieves an authorization key, which may be the same value as the restricted access key 761.
  • the authorization key is received by UHF receiver 757, which cooperates with logic 763 to set a new logic value into logic value area 765.
  • a power source such as an RF/ EM power converter 759 is provided to power the activation circuitry and to assist in setting the new logic value. Since this power may not be sufficient in some cases, an additional HF/ VHF receiver 709 is provided, which receives additional RF energy from the activation device. This additional power may be made continuously available, or may be provided at times selected by the activation device. This additional RF energy may be used to supplement power available for setting the change effecting device.
  • processor 752 has been illustrated with the UHF transmitter 754, the UHF receiver 757, and the power source 759 integrally arranged in the processor, it will be appreciated that all or some of these structures may be provided external to the processor housing.
  • the transmitter 754, receiver 757, and power source 759 may be positioned on the outside of the processor housing, or positioned on packaging holding the processor.
  • some of the structures may be placed external to the processor on supporting printed circuit boards, for example.

Abstract

An RFID system for providing data and power is provided. The RFID system has a target that is configured to receive RF signals on multiple frequencies, and a corresponding multi-frequency scanner. The RF scanner is configured to transmit an RF signal to the target and, in response, receive an ID message from the target. Depending on the particular application, the scanner may use one or both frequencies to communicate with the target In some applications, the target may include a switch that may be set to enable the target to have a defined level of utility. The target may receive, on one of the frequencies, sufficient or supplemental power to change the state of the switch. Accordingly, the RFID system uses the second frequency to supplement power transmission to the target In other cases, the RFID system may use the second frequency to enhance data communication with the target.

Description

An RFID System for Providing Data and Power
BACKGROUND FIELD
[0001] The present invention relates to a target that is capable of providing an ID to a scanner using an RF communication. In a particular example, the invention uses radio frequency (RF) devices and processes to provide sufficient coupling with the target for confidently retrieving the ID, or to operate activation circuitry.
DESCRIPTION OF RELATED ART
[0002] Theft is a serious and growing problem in the distribution of products. In one example, electronic devices continue to shrink in size, while increasing their utility. As these electronic devices become smaller and more capable, they also become easier and more attractive to steal. Devices, such as digital cameras, DVD players, MP3 players, and game devices are popular targets of theft, not only in the retail store by consumers, but also by others in the distribution chain. For example, retail store employees, shippers, warehousers, and even employees of the manufacturer often steal products, and even boxes of products, for their own use or to sell. Other types of products are also subject to theft, such as DVDs, CDs, game discs, game cartridges, and other types of media. These types of products are also in high demand, and being relatively small and valuable, are easy and attractive to steal.
[0003] From the facility where they are manufactured to the retail point-of-sale (POS) where they are sold many high-value consumer products are vulnerable to theft. Various security techniques are used to minimize the losses (video cameras, security staff, electronic tagging, storing high-value items behind locked cabinets etc.). Despite these efforts theft of high- value targets such as DVD's, CD's and video games; portable video game players, DVD players, digital cameras, computers, printers, televisions and the like cost manufacturers and retailers billions of dollars per year.
[0004] Such rampant theft increase the cost of manufacturing, shipping, and selling of products. Each entity in the distribution chain is at risk for theft, and must take steps to reduce or control the level of theft. This cost is ultimately borne by the legitimate purchaser, which places an unfair "theft tax" on purchased products. Also, since may products are so easily stolen from a retail environment, retailers must take extraordinary steps to secure products. For example, DVDs, CDs, and small electronic devices are often packaged in oversized holders to make them more difficult to hide. These holders, however, also interfere with a consumers ability to interact with the product, ultimately making the product less attractive to the consumer. In another example, retail stores may place their most valuable and easily stolen products in locked cases. In this way, retail consumers are completely distanced from these products, which reduces theft, but also makes the products difficult to purchase. The consumer cannot read the full labeling on these locked-up products, can not physically interact with them, and must get the attention of a retail clerk, who might have a key, in order to get to the product. In another attempted solution, retail stores put security tags on products, which are intended to be disabled at the check stand upon purchase. If a consumer leaves the store with a live tag, then an alarm sounds. A guard or clerk is expected to stop the consumer and determine if the consumer has shoplifted a product. This process may be dangerous for the guard or clerk, and, since many of the alarms are false, causes undo stress for law-abiding consumers.
[0005] None of these attempts to stop retail theft has worked, and all make the retail experience less attractive to the consumer. In this way, the retailer is in the untenable position of having to accommodate and accept a certain (and sometimes significant) level of theft in order to maintain an attractive and desirable retail environment for paying customers. Further, neither the oversized holders, the locked cases, nor the guards address the significant level of theft that occurs between the manufacturer's dock to the retail shelf. Accordingly, the entire distribution chain has resigned itself to an "acceptable" level of theft, and passes the cost of theft on to the legitimate consumer. [0006] The distribution of products faces other challenges. For example, consumers want to choose products that have a particular set of functions or utility, and find it desirable to purchase products matched to their specific needs. Accordingly, manufacturers often manufacture a product in several difference models, with each model having a different set of features. Although this is desirable from the consumer's standpoint, it complicates the manufacturing, shipping, inventorying, shelving, and retailing processes. This problem exists in the configuration of electronic products, computers, gaming systems, DVDs, CDs, game cartridges, for example. For a specific example, a DVD movie disc may be available in a family version, a theater version, and an "uncut" version. Each has a different age restriction, and will appeal to different and significant markets. Accordingly, three different versions must be manufacture, shipped, inventoried, shelved, and managed. A similar problem exists with feature sets for games, computers, and other products.
[0007] In another challenge for the distribution of products, it is sometimes desirable to rent a product to a customer for a set period of time. A typical example of a rental business model is the rental of optical media, such as DVDs. Rental models for content stored in physical media, i.e. movies recorded on video tape or optical disc, are typically dependent on the physical distribution of the media and in particular the checking-out and checking-in of the media out of, or into the retailer's inventory. In time- period based rental models, charges are related to how long the consumer has the media, e.g. the period between when the media is checked-out and when it is checked-in. In max-out subscription models, charges are based on the number of media checked-out to a customer less those that have been checked-in. In a max-turn model, charges are related to how frequently media are checked-out, or checked-in, by the retailer. These rental models suffer from several significant limitations. First the transport costs for each rental are substantial no matter how often the item is rented. Second they impose delays between the rental and selection decisions and the consumption of the item rented.
[0008] The video rental business illustrates the some of the limitations of these models. With traditional video rental stores, every time a customer rents a movie he must go to the store to pick-up the movie and then must go back to the store to return it. The time-period for which the consumer is charged depends on when the movie is checked-out and when it is returned and checked-in to inventory. In this model, the consumer bears the transport cost in the form of trips to and from the video store. The consumer also incurs delays between the rental and selection decisions and the actual watching of the movie. The video store incurs high costs too in the form of rent, inventory and the cost of checking- out and checking in each movie rented.
[0009] Even with alternative transport methods such as the US mail, there are always delays from the time when the movie is selected, when it is rented and when it is watched by the consumer. And if it is a max-out or max-turn model, there is a further delay until the movie is returned to the retailer, checked into inventory and another movie distributed to them. In both cases the retailer also incurs substantial recurring shipping and handling costs. Other transactions such as authorization, activation or authentication of tangible media such as tickets, coupons, vouchers, credit cards, product labels and tags, security devices, memory cards, removable computer storage devices (optical and electromagnetic), etc. share similar limitations. [0010] Challenges also exist for non-commercial distribution of goods. For example, the military stores, transports, and maintains weapons and gear that is subject to theft and misuse. These weapons and gear must be available for rapid deployment and use, but yet must be sufficiently controlled so that they do not fall into enemy hands, or used in ways not approved by military command.
SUMMARY
[0011] An RFID system for providing data and power is provided. The RFID system has a target that is configured to receive RF signals on multiple frequencies, and a corresponding multi-frequency scanner. The RF scanner is configured to transmit an RF signal to the target and, in response, receive an ID message from the target. Depending on the particular application, the scanner may use one or both frequencies to communicate with the target. In some applications, the target may include a switch that may be set to enable the target to have a defined level of utility. The target may receive, on one of the frequencies, sufficient or supplemental power to change the state of the switch. In this way, the RFID system uses the second frequency to supplement power transmission to the target. In other cases, the RFID system may use the second frequency to enhance data communication with the target.
[0012] In one example, the present invention provides a target having a controlled utility, and a method for changing the utility of the target. The target with controlled utility may be an electronic device, or alternatively, may be a tangible media, such as an optical disc. The controlled target has a change effecting device that is set to a first state, which allows the target to operate according to a first utility. The controlled target also has a receiver operating at a first RF frequency for receiving an authorization key, and logic which, responsive to the authorization key, selectively changes the change effecting device to a second state. When the change effecting device is in the second state, the target may operate according to a second utility. In one example, the controlled target has a restricted access key that was stored during manufacture, and the restricted access key is used by the logic in changing the state of the change effecting device. To change the utility of the controlled target, the controlled target is placed proximate to an activation device. The activation device may read an accessible identifier from the controlled target using the first RF frequency system, and retrieve or generate an authorization key that is associated with the target. The activation device may cooperate with a network operation center or other entity to retrieve the authorization key, and to obtain approval to change the utility of the controlled target. If approved, the activation device may then send the authorization code to the controlled target using one of the two available RF systems. The second RF frequency may be used to provide additional power to the target for effecting the change in the switch. For example, additional power may be supplied by the second frequency to permanently change an electro-chromic material from opaque to substantially transparent.
[0013] A distribution control system is provided to support the controlled and selective changing of utility for a target. The target with controlled utility may be an electronic device, or alternatively, may be a tangible media, such as an optical disc. The distribution control system has a target with a change effecting device and a restricted access key. An activation device retrieves or generates an authorization key, and sends the authorization key to the target. The authorization key may be sent to the target wirelessly, for example, using a radio frequency signal. The target has logic that uses the restricted access key and the authorization key to change the utility of the target. In one example, the activation device retrieves the authorization key from a network operation center (NOC) by sending a target identifier to the NOC, and the NOC retrieves the authorization key for the identified target. The activation device may also connect to other systems for obtaining approval to change the utility of the target. For example, the authorization key may be sent to the target upon receiving payment, password, or other confirmation.
[0014] In a specific example of the distribution control system, a target is manufactured with a change effecting device set to compromise the utility of the target. In this way, the compromised target would be nearly useless to a thief, and therefore would be less likely to be a target of theft. The manufacturer has also stored an identifier and a restricted access key with the target. The manufacturer also stores the accessible identifier and its associated key for later retrieval by a party authorized to restore the utility to the target. In one example, the identifiers and keys are stored at a network operation center (NOC). The compromised target may be moved and transferred through the distribution chain with a substantially reduced threat of theft. When a consumer decides to purchase the target, the target is passed proximally to an activation device. Its accessible ID is read by activation device, and using a network connection to the NOC, sends the accessible ID. The NOC retrieves the authorization key for the target. Additional approvals may be obtained, for example, confirmation of payment, identification, password, or age. When approved, the activation device transmits the authorization key to the target, typically using a wireless communication. The target receives the authorization key, and using its logic, compares the authorization key to its stored restricted access key. If the keys match, then the target uses an activation power source to switch the state of the change effecting device. Then, the target will have full utility available to consumer. In some cases, the RF system which has provided the data link between the target and the activation device may not be able to provide sufficient activation power. In this case, a second RF system may be used to supplement the activation power so that sufficient power is available to switch the state of the change effecting device. BRIEF DESCRIPTION OF DRAWINGS
[0015] Fig. 1 is a block diagram of an RFID system for a target device having controlled utility in accordance with the present invention.
[0016] Fig. 2 is a block diagram of an RFID system for a target device having controlled utility in accordance with the present invention.
[0017] Fig. 3 is a flowchart of a process of using an RFID system for a target device having controlled utility in accordance with the present invention. [0018] Fig. 4 is a flowchart of a process of using an RFID system for a target device having controlled utility in accordance with the present invention. [0019] Figs. 5A, 5B, and 5C are illustrations of optical discs with an RFID system having controlled utility in accordance with the present invention. [0020] Figs. 6A and 6B are block diagrams of a dual antenna for an RFID system in accordance with the present invention.
[0021] Fig. 7 is a block diagram of an RFID system for a target device in accordance with the present invention.
[0022] Fig. 8 is a flowchart of a process of using an RFID system for a target device in accordance with the present invention.
[0023] Fig. 9 is a flowchart of a process of using an RFID system for a target device in accordance with the present invention.
[0024] Fig. 10 is a block diagram of a network for distributing a target with controlled utility.
[0025] Fig. 11 is a block diagram of a process for changing the utility state of a target with controlled utility.
[0026] Fig. 12 is a block diagram of a process for changing the utility state of a target with controlled utility..
[0027] Fig. 13 is a flowchart of a process for changing the utility state of a target with controlled utility [0028] Fig. 14 is a block diagram of an electronic device with controlled utility. [0029] Fig. 15 is a block diagram of a processor with controlled utility.
DETAILED DESCRIPTION
[0030] Referring now to figure 1, an RFID system 10 is illustrated. System 10 includes a target device 12 which may be, for example, an electronic device, an optical disk, or a consumer product. In one example, target device 12 may be an electronic product that has had its utility 51 compromised at the time of manufacture and during distribution. Accordingly, device 12 is less likely to be a target of theft or pilfering since it would have no or only limited use to a thief. The level of utility 51 is set according to the state of switch 49. Switch 49 may have two or more states, with each state enabling a different level of utility 51. For example, one state may be a fully compromised state where the target device 12 has no or only limited utility. Switch 49 may have another state that provides a demonstration capability, but does not enable full use of the device 12. Also, the switch 49 may have a state enabling full utility 51 for device 12. [0031] At some point in the distribution chain it will be desirable to enable, activate, or restore the full utility 51 for target device 12. Often, this activation may be done as part of a point-of-sale transaction. In performing the point-of- sale transaction, the target device 12 is brought near an activating device 14. Activating device 14 has a controller 53 for controlling operations, as well as managing local area and wide area communications. For example, the activating device 14 may be coupled to other point-of-sale terminals, to in-store servers, or to a network operations center (NOC) at a remote site. The activating device has two radio frequency systems, with each system operating at a different radio frequency. When device 12 is first brought near activating device 14, the first RF system 55 transmits, using transmitter 57, a signal to a first RF antenna 22 for device 12. The RF signal is received by transceiver 27, and the received RF signal may contain data 35 and energy sufficient to activate power converter 37. Power converter 37 supplies sufficient power to enable retrieval of readable ID 44, as well as transmission of the readable ID 44 through the transmitter and RF antenna 122 back to the receiver 59. In this way, an RFID process similar to known RFID processes has been established.
[0032] More particularly, the activating device 14 has used a first frequency to signal and interrogate the target device 12 for an identification value. Once the activating device 14 has become aware of the ID for target device 12, the controller 53 may use its network connections to confirm the target device 12 is properly authorized, and if authorized, to retrieve an activation key or code. In one example, the readable ID is transmitted to a network operations center, where a secure database is used to look up an activation key. Provided the controller 53 receives the activation key, and local events indicate that the target device 12 may be in a condition for activation, the first RF system 55 communicates the activation key to logic 45 using transceiver 27. The logic 45 may compare the received activation key to a restricted access key 47 stored on the target device, and if the keys match, enabled the switch 49 to change states. However, in many cases the first RF system 55 may not provide sufficient energy to enable the changing of the switch 49. For example, the first RF system 55 may operate at a UHF band, for example such as at 902 to 928 MHz, and therefore energy distribution may be subject to fadeouts and inconsistent densities. Accordingly, if target device 12 is in an area having a lower energy density, then sufficient power may not be available to effect the change. Further, for safety reasons, the power transmitted by first RF receiver 55 may be attenuated. [0033] In order to assist the changing of switch 49, the activation device 14 has a second RF system 61 having a transmitter 63. During the activation transaction, the second RF system 61 may be activated to provide an additional energy signal from transmitter 63 through RF antenna 21 into RF receiver 25. The second RF transmitter may be constructed to operate at a lower frequency, for example in the high frequency or very high frequency band and preferably provides a continuous wave signal. The second RF transmitter is chosen to transmit a more uniform power density field that is less sensitive to orientation and local environmental conditions. In one example, the second frequency may be 13.56 MHz, although other frequencies may be used. The receiver 29 has a power converter 33 for converting the second RF energy into local electrical power for powering the low-power circuit, including switch 49. The RF transmitter 63 may be activated during the entire activation process, or may be activated concurrent with sending the activation key. Of course, the target device 12 will only be activated upon having both sufficient power to change the switch, as well as an authorization from local logic 45. In this way, even though the second RF transmitter 63 may be transmitting sufficient power, the switch at 49 will not change states unless allowed by logic 45.
[0034] The antenna structure 16 may be constructed as a single antenna having different matching circuits for each frequency, or may be constructed as two separate antennas. Alternatively, the antenna may be external to the target device, or may be integrally formed. In some cases, the antenna, receivers, and low-power circuit structures may be provided as an integrated circuit and incorporated into a device's electronics. In another example, the activation circuitry may be external to a device, while the switch is internally formed. It will be appreciated that the physical form for the activation circuitry, receivers, antennas, and target device may take many alternative forms. [0035] In one specific example, the target device 12 is an optical media with the switch being a change effecting device in the form of an electrochromic material. When set to an opaque state, the electrochromic material blocks a player's ability to effectively read stored content on the disk. Upon activation, the electrochromic material is made substantially transparent, thereby enabling a player to read the disk. Typically, an electrochromic film may require about 3 to 5 volts at 2 to 4 milliamp for about one second to permanently change state. Advantageously, the presence of a second RF transmitter enables the delivery of sufficient power to permanently change an EC film. More specifically, the second RF transmitter may be constructed at a lower frequency, for example in the high frequency or very high frequency band that is preferably provided as a continuous wave signal. The transmission is chosen to transmit a more uniform power density field that is less sensitive to orientation and local environmental conditions. For example, a frequency of about 13.56 MHz will satisfy this requirement, but the concept is not limited to this frequency, and may involve other frequencies such as 125 kHz or 125 MHz. At these lower frequencies the coupling between the activating device and the targets RF antenna will be primarily in the magnetic field, and the RF antenna may be designed in a loop fashion for coupling to the h field. In some constructions, the same coiled antenna may operate sufficiently well as the UHF antenna.
[0036] Activation of a disc using this duel frequency system generally involves three phases. First, communication is established using a UHF communication on a first RF system, which identifies the target device, loads the activation keys to the targets low-power circuitry, and provides data or instructions sufficient for the target logic to determine that the target is authorized to be activated. Second, the supplemental energy frequency, for example the 13.56 MHz transmitter, is applied for a time sufficient to activate the product by permanently changing the switch. Third, a communication may be established again with the UHF system to receive a confirmation message that activation has been successfully completed. Further, the UHF communication system may be used to download and store additional information in the target device, such as date and time of activation. Such information may be useful for repair or warranty purposes. [0037] Referring now to figure 2, another RFD system 100 is illustrated. RF ID system 100 is similar to RF ID system 10 describe with reference to figure 1, so will not be described in detail. RFID system 100 has a target device 102 and an activating device 104. The activating device 104 has a controller 123, a first RF system 125, and a second RF system 127. The RF system 2 has a receiver 131, thereby enabling full communication using the second frequency. Accordingly, the second frequency may provide supplemental power as previously described, but may also be used to establish more robust data communication. For example, the second RF system 127 may enable communications at different ranges or in different environments as compared to the first RF system 125. In a specific example, the first RF system 125 may be a high frequency communication system enabling communications over a distance of several meters, thereby enabling communications in warehouses and for distance scanning of pallets. In contrast, RF system 127 may be constructed as a lower frequency system for establishing communication at a point-of-sale terminal or in a local area of about 1 foot. In this way, a single activation of scanning device 104 may be used in different environments. The activating device 104 may be able to select, using controller 123, one of the transmission systems according to the particular requirements of a target. For example, the activating device 104 may recognize that a target has entered a scanning area, and be unable to retrieve accurate ID information using the first transmission system 125. In response, the activating device 104 may activate the second RF system 127 and attempt to retrieve the ID with the second RF system.
[0038] The activation device 104 has two RF systems with which to provide data or power to the target 102. The first RF system 125 communicates to the first RF transceiver 111 through the RF antenna 108. The second RF system 127 communicates to the second RF transceiver 110 through RF antenna 106. Since the second RF transceiver 110 has both a transmitter and a receiver portion, the second transceiver 110 is able to receive and transmit data 115. Antennas 106 and 108 may be formed separately, or in another example may share a common structure. Both the RF subsystems may be used to provide both power and data to the low-power circuit 119. In another example, the low-power circuit may have an onboard temporary power source 113, such as a battery, for providing additional battery power for the low-power circuit 119. In this way, power supplied by one or both of the RF subsystems may be combined with battery power 113 to toggle the switch to change utility 121.
[0039] Referring now to figure 3, a process for using an RFID system is illustrated. Process 150 may operate on a scanning or activation device, for example, at a point-of-sale terminal. Process 150 first retrieves a readable ID from a target device using a first wireless system, as shown in block 152. This first wireless system may operate, for example at a UHF frequency of about 902 to 928 MHz. This frequency range corresponds to frequencies currently used for RFID applications, and have been approved by most governmental agencies for RFID purposes. An activation device receives the readable ID and determines if the target is authorized for activation as shown in block 154. This determination may be made locally at the activation device, with cooperation with other point- of-sale terminals or servers in the store, or by accessing a central network operations center. An activation key may be sent by one of the wireless systems to the target as shown in block 153. In one example, the activation key is sent through the UHF antenna to the logic in the target device, and the UHF antenna may provide sufficient power to operate the logic. At some point in the activation process a second wireless system is activated to provide supplemental power to the target as shown in block 156. This supplemental power is used by logic in the target device to change the state of a switch, which enables a different utility for the target device. After the switch has been changed, the target may respond with a confirmation message that the device has been properly activated as shown in block 158. This activation message may be transmitted using the first wireless system, the second wireless system, or may include making a perceptible change to the target itself.
[0040] Referring now to figure 4, a method for activating a target is illustrated. Method 175 preferably operates on a target device. A readable ID is first retrieved from memory in the target device and is transmitted using a first wireless system as shown in block 177. Typically, the retrieval and transmission of the ID is responsive to receiving an RF signal from an RFID scanning or activation device. After transmitting the readable ID, the target device may receive an activation key 185 from one of the wireless systems, such as wireless system 1. In one example, wireless system 1 operates at a UHF frequency. The wireless system 1 may also provide sufficient energy to power at least some of the local logic as shown in block 179. The target also has a second wireless system operating at a second RF frequency, which is typically at a much lower frequency, such as an HF or VHF frequency. This second wireless system 183 is used to receive supplemental power useful for changing the state of the switch as shown in block 189. Provided the activation key matches a stored key in the target device as shown in block 187, then the logic may allow the switch to be changed. Accordingly, when the logic confirms that the target may be activated as shown in block 187, and sufficient power is available from wireless system 2 as shown in block 189, then the state of the switch may permanently change. In this way, the switch may set the level of available utility for the target device as shown in block 192.
[0041] Referring now to figure 5A, a specific implementation of an RFID system on an optical disc is illustrated. System 200 includes an optical disc 202, which may be, for example a DVD, an HD DVD, a blu-ray DVD, an audio DVD, a software DVD, or a gaming disk. A switch 206 in the form of an electro chromic material is positioned over an important area of the content area such that when the electrochromic material is opaque, a typical player will be unable to read the stored content. However, when the electrochromic material 206 has changed state to be substantially transparent, then the stored content may be read by a player. Provided the eletromchromic material is placed over an important segment of the stored content, for example, the menu or directory area, a relatively small electrochromic film may control access by the player. [0042] A UHF antenna 205 is provided for receiving UHF energy and data from an activation device, as well as transmitting a readable ID back to the activation device. The readable ID is stored in the logic 204, or may be stored on another area of the disc 202. The UHF antenna 205 and the logic 204 also cooperate to receive an activation key, and make a determination that the switch 206 may be appropriately set to its transparent state. However, sufficient power may not be available through the UHF antenna 205 alone. Accordingly, a HF or VHF antenna 207 is provided for providing additional energy for changing the state of the electrochromic material. The supplemental antenna 207 may be arranged in a meandering pattern in the space between the spindle opening and the content area. It will be appreciated that the antenna may substantially extend around the spindle, or may take an alternative shape. Because the antenna 207 is intended to interact with a magnetic field, the meandering pattern facilitates a more efficient magnetic coupling. In some cases, the meandering antenna 207 may also be constructed in a way to sufficiently receive and transmit UHF communications. In this way, a single antenna may be used. However, greater efficiency may be enabled using two antenna structures as illustrated. [0043] Referring now to figure 5B, another optical disc target 225 is illustrated. Optical disc 226 has an electrochromic switch 230 coupled to logic 228 and a UHF antenna 229 as discussed with reference to figure 5A. However, instead of a meandering antenna, the disc 226 has an HF or VHF antenna 233 constructed near the circumference or perimeter of disc 226. This perimeter area of an optical disc is typically unused, and is available for forming a metallic or other conductive antenna member. The antenna may be constructed on the surface of the disc, or may be integrally formed in an internal layer. The circumference antenna 233 is connected to the logic 228 through conductors 231. The conductors 231 may be conductive lines, for example, made from a transparent conducting ink. In another example, the conductors 231 may be an opaque conducting material, such as a metal trace, etched into the surface of the disc 232. Provided this etch 232 is sufficiently narrow, the error introduced to a typical player is minimal, and may be readily corrected by correction algorithms in the player. The use of a narrow etch 232 facilitates using a metallic conductor, which is less costly than running transparent conductors radially across the disc. It will be appreciated that multiple etches may be made, thereby allowing a single smaller trace to extend radially through the content area. By sufficiently spacing these etches, potential reading errors may be reduced.
[0044] Referring now to figure 5C, a target device in the form of a readable disc is illustrated. Optical disc 252 has an electrochromic material 256 coupled to logic 254 and a UHF antenna 255 as previously illustrated. However, the supplemental antenna is not included on the disc itself, but is included external to the disc, for example on the disc packaging. The disc has contact points 257 for coupling to the external antenna. In one example, the supplemental antenna is included in the packaging for the disc, and makes contact with the contacts 257. In this way, the antenna is externally positioned and more readily couples to the radio frequency or magnetic energy.
[0045] Referring now to figure 6A, an antenna configuration 300 is illustrated for an activation device or scanner. The activation device or scanner has a UHF antenna 302 sized and tuned for transmitting and receiving UHF frequency communications, for example in the 902 to 928 MHz range. A meandering HF or VHF antenna 303 is also provided. The supplemental antenna 303 is provided in a meandering or looping construction for increased efficiency and coupling with the magnetic field of a lower frequency RF system. As illustrated in figure 6B by side view 325, the UHF antenna plane is separated from the ground plane 328 by an insulator 327. Another insulator 331 separates the UHF antenna plane 302 from the individual high frequency or very high frequency lines of antenna 303. An additional insulating layer 333 may be provided to protect the entire antenna structure. It will be appreciated that other antenna structures may be used for a scanning device. Advantageously, the antenna structure 300 provides a compact structure that enables UHF communication and magnetically coupled power transmission in an effective and robust manner.
[0046] Referring now to figure 7, an RFID system 350 is illustrated. RFID system 350 has a target device 352, which may be in the form of an RFID tag. The RFID tag 352 may be adhered to various devices, or may be integrally formed in other devices. The RFID tag 352 is constructed to communicate with a scanner device 354. The scanner device 354 has a controller 373 for controlling a first RF transmitter system 368 and a second RF communication system 371. In one example, the first RF transmission system 368 operates at a UHF frequency, while the second RF communication system 371 operates at a lower frequency, such as an HF or VHF frequency. The RFID tag has a first antenna 358 coupled to a first RF transceiver 360. The RFID tag 352 also has a second RF antenna 356 coupled to a second RF transceiver 362. Both the first and second transceivers couple to a low-power circuit 364, which includes a readable ID 366. [0047] In one example, scanner 354 may use one of the RF systems to interrogate and read the ID from the RFID tag 352. For example, the scanner may use RF system 368 to communicate to RF transceiver 360 through RF antenna 358. This system may then retrieve the readable ID. In a similar manner the scanner may select to use the second RF system 371 to communicate with the second RF transceiver 362 through the antenna 356 to read the readable ID 366. The decision on which RF subsystem to use may be made dependent on the distance to the RFID tag, or may be made responsive to the failure of one of the RF systems to properly read the ID. In another example, the systems may simply toggle back and forth to act as confirmation that a proper ID has been read. In another example, the scanner may be set by a human or other controlling device to operate in one of the frequencies. In this way, the scanner may be set by a human to read palettes using the high frequency UHF system 368 when the palettes are several meters away. However, if the same scanning device is used for reading individual products that are only a few inches away, then the scanner may be manually set to use the lower frequency system 371. Irrespective of which frequency is selected on the scanner 354, the RFID tag 352 responds with the proper ID message.
[0048] Referring now to figure 8, a system for reading an RFID is illustrated. Process 400 has a scanning device that is able to select a close or far read mode as shown block 404. In some cases, the selection may be made responsive to human input, or may be made responsive to application needs. In another example, the close and far modes are simply toggled. In one example, the far read mode uses a UHF antenna and frequency, while the close mode uses an HF or VHF antenna and frequency. Depending upon the active read mode, a request may be sent using the first radio frequency as shown in block 406 and an ID received using RF 1 as shown in block 408, or the ID request may be set using the second RF system as shown in block 411, and the second ID received using the second RF system as shown in block 413. Either way, the ID is retrieved from an RFID tag. [0049] Referring now to figure 9, a method for retrieving an ID from an RFID tag is illustrated. Method 450 transmits a first request for an ID using a first RF system as shown in block 452. In one example, the first RF system may be a UHF system. An ID or partial ID may be received using the first RF system as shown in block 454. The ID is analyzed to determine if additional interrogation activity is needed as shown in block 456. For example, the analysis of the ID may indicate there is an error in the first ID and the ID should be retrieved using a second wireless system. Also, the ID may indicate that the tag is capable of storing additional information, and may require that additional information be sent to the tag. Finally, the ID may indicate that the target needs additional power to perform an additional activity, such as activating the device by changing an electrochromic switch or other switch device. Provided additional activity is needed, a second wireless system is activated as shown in block 461. Depending upon the particular activity needed, the second RF system may be used to 1) transmit additional energy or power to the RFID tag, 2) may send additional data, or 3) may send additional power and data. In some cases, the RFID tag may respond with a confirmatory message as shown in block 463. This confirmatory message may be received on either the RF one system or the RF two system.
[0050] Referring now to figure 10, a system for controlling the utility of a target is illustrated. System 500 is illustrated with a target 512 at various points in a chain of distribution. Target 512 may be an electronic device such as a computer, TV, appliance, MP3 player, camera, game counsel, or toy. In another example, the target may be a tangible media, such as an optical disc, DVD, CD, or game cartridge. During manufacture or preparation of the target 512, the target has been associated with a change effecting device. The change effecting device is used to control the utility available for the target or for use of the target. More particularly, the change effecting device has multiple states, with each state being associated with an available state of utility for the target. In a specific application, the change effecting device may be switched between two available states of utility.
[0051] As shown at block 512a, when the target enters the distribution chain, the target is set to have one utility. For example, this utility could be a severely comprised utility, where the target has no useful function available. In another example, the set utility may be to a demonstration utility that allows limited demonstration functionality. It will be appreciated that the available utility may be set according the requirements of the specific distribution chain. At some point in the distribution chain, for example, when the target is transferred to a consumer, it may be desirable to change the available utility. Accordingly, block 512b shows the target in the presence of an activation device 16 at a point-of-sale or other transfer location 514. As the target is brought into proximity of activation device 516, the activation device or another reader is able to read an identifier value or other identification from the target, for example, using an RF system operating at a first frequency. The activation device uses the identifier to generate or retrieve an authorization key. This authorization key may be stored locally at the point-of-sale device 514, or may be retrieved through a network connection to a network operations center or other remote server. The point-of- sale terminal 514 may have a connection to an operations center 518. The operation center may be in the same facility as the point-of-sale terminal 514, or may be in another facility at a different location. The operation center 518 may also have multiple computer servers, and may distribute processes and databases throughout the network system. The operation center 518 stores a set of associated identifications and authorization keys 521. In another example, the operation center 518 operates algorithmic processes to generate keys responsive to information received from activation device 516. Whether generated or retrieved, the operation center 518 sends an authorization key for the target to the point-of-sale terminal 514 where it may then be available to activation device 516.
[0052] A point-of-sale terminal at the point-of-sale 514, which typically is coupled to the activation device, may also perform various other tasks or processes as a precondition to determining that the target has been approved to have its utility changed. For example, the point-of-sale terminal may confirm payment for the target, or may confirm that the consumer is age-appropriate for the particular target being purchased. Provided the point-of-sale device has authorization to change the utility of the target, the activation device 516 transmits the authorization key to the target as shown in block 512c. In one example, the activation device 516 reads the ID from the target and transmits the authorization key to the target using an RF (radio frequency) communication. The authorization key may be sent, for example, using the RF system operating at the first frequency. It will be appreciated that other types of wireless communication may be used. For example, the communication may use infrared (IR) communication in one or both directions. In another example, the target may make physical contact with the activation device for effecting the communications.
[0053] As shown in block 512d, the target then uses the received authorization key to switch the change effecting device to another state. To facilitate changing the state of the switch, the activation device may activate a second RF system operating at a different frequency. This second RF system provides energy for effecting the change in the switch. This second RF system may provide all or most of the power required for effecting the change, or may provide supplemental power for the first RF system. In this other state, the target has a different utility than when the change effecting device was in the first state. The target has logic coupled to the change effecting device that uses the authorization key to effect a change in the target's utility. In one example, the target has a restricted access key that was defined and stored with the target during the manufacturing process. This restricted access key may not be externally read, altered, or destroyed, but may be read or otherwise used by the target's logic. This restricted access key may be compared or otherwise used with the received authorization key to determine if the target is enabled to change states. [0054] In a specific example of system 500, target 512 is illustrated to be an MP3 player. During manufacture of the MP3 target device, a restricted access key is stored in the MP3 player. Also, a change effecting device is installed in the MP3 player, and set to a state so that the MP3 player's utility is compromised. More specifically, the change effecting device has a first state in which the MP3 player does not power on or otherwise properly function, and a second state where the MP3 player is allowed to be fully operational. The change effect device may be, for example, a printed circuit board trace coupled to ground. This grounded trace may then be coupled to a pin on a processor of the MP3 player, and as long as that pin is held to ground, the MP3 player will not power on or initialize. It will be appreciated that the utility of the MP3 player may be compromised in several alternative ways and by several alternative change effecting structures. The MP3 player is also manufactured with a power source associated with the change effecting device for selectively decoupling the trace to ground. This power source may be a battery, an electromagnetic or RF converter, or may be power obtained from the MP3 player's operational battery. [0055] The MP3 player is thereby manufactured and ready for sale as a compromised MP3 player that will not properly power on or function. In this way, the compromised MP3 player would be nearly useless to a consumer, and therefore would be less likely to be a target of theft. The manufacturer has also applied an accessible identification to the MP3 player. For example, the accessible identifier may be a bar code, or may be another stored value that is accessible through, for example, an RFID reader system. The manufacturer stores the accessible identifier and its associated key value for later retrieval by a retailer or other party authorized to restore the utility to the MP3 player. The compromised MP3 player may be shipped through the distribution chain and to the retailer with a substantially reduced threat of theft. Also, the retailer may display and make the MP3 player available for customer handling in a retail environment with reduce risk of theft. In this way, reduced security measures may be taken at the retail level, such as using locked cases or sophisticated packaging, since the consumer would obtain no benefit by stealing a nonworking, compromised MP3 player.
[0056] When a consumer decides to purchase the MP3 player, the consumer may take the MP3 player to the point-of-sale terminal 514 and have it passed proximally to an activation device 516. As the MP3 player is close to the activation device, its accessible ID is read by activation device 516, either using the bar code value or by retrieving the stored accessible ID using a wireless or EM (electromagnetic) communication. For example, the communication may be an RF (radio frequency) communication operating in the UHF range of 902-928 MHz. The point-of-sale terminal may have a network connection to an operation center 518, and sends the accessible ID to the operation center. The operation center, which has a database of MP3 player identifications associated with their restricted access keys, retrieves the particular authorization key for the MP3 player that is at the point-of-sale device. At the point-of-sale terminal 514, additional confirmation actions may be taking place. For example, a clerk may be accepting payment from the consumer, or may be checking a consumer's identification or age. These other confirmation criteria may then be used to confirm that the point-of-sale terminal is ready to restore the utility of the MP3 player. Provided the activation device 516 determines restoration is appropriate, the activation device 516 transmits the authorization key to the MP3 player, typically using the UHF wireless communication system. At the same time, or after a brief delay, the activation device activates a second RF system, which may operate, for example, at 13.56 MHz. The MP3 player receives the authorization key, and using its logic, compares the authorization key to its pre-stored restricted access key. If the keys match, then the MP3 player uses power from the 13.56 MHz signal to open the trace to ground. With the ground trace now open, when the MP3 player is next turned on, full utility will be available to consumer.
[0057] In some cases, the MP3 player may have additional circuitry for confirming that the utility has been restored. For example, the state of the change affecting device may be measured, or another test or measurement may be taken. According to whether or not activation was successful, a different value may be placed in a confirmation memory. The confirmation memory may be read by the UHF system for activation device 16 to confirm to the consumer and to the network operations center that activation was successful. By confirming successful activation, the retailer may have a higher degree of confidence of consumer satisfaction, and may accurately and timely report and authorize payment to the supplier of the MP3 player.
[0058] Referring now to figure 11, a method of controlling the distribution of an electronic device is illustrated. In method 600, a target is provided in a non- operating state, for example, with its main power in an off condition. The target also has been manufactured with a controlled utility, which causes the target to operate only in a first level of utility as shown in block 602. For example, the first utility may be a highly compromised utility level where the target has no practical useful value to a consumer. In this way, a consumer, or someone in the distribution chain, will be unlikely to shoplift or steal the device. At a time selected by the retailer or another authorized person in the distribution chain, the target receives an authorization key as shown in block 604. Typically, this key will be received at a retail point-of-sale through a UHF wireless communication, although other locations and processes may be used. The electrical device uses its logic and activation power to determine if it is authorized to change from the first utility level as shown in block 606. It will be appreciated that an HF/ VHF system may be used to provide supplemental power for effecting the change. Provided the proper authorization key was received, the electrical device uses its activation power and logic to change the state of a change effecting device from a first state to a second state as shown in block 608. At a later time, for example, when the consumer takes the electrical device home, the consumer may plug in or power-on the electronic device as shown in block 611. Since the change effecting device is now in its second state, the target operates according to the second- level of available utility as shown in block 613. For example, the second utility may be a full operational utility.
[0059] In another example, the first utility may be a demonstration utility, and the second utility may be full operational utility. In yet another example, the first utility may be a full operational utility, and the second utility may be restricted utility for an age restricted product. In this way, a retailer may disable certain features or functions in an electronic device according to the age of the consumer. In another example, a consumer may purchase a device according to a list of desired features. The full operational device may be placed with the activating device, and undesired features compromised. In this way, a flexible configuration of electronic devices may be accomplished at a point-of-sale or service area in a retail environment. Although the electronic device has been described as having its utility change upon transfer to a consumer, it will be appreciated that utility may be changed at other times. For example, a manufacturer may use the change effecting device to particularly configure an electronic device prior to shipment. In this way, a standard version of an electronic device may be made, and the utility selectively added or removed using one or more change effecting devices. It will also be understood that this dynamic configuring process may be performed at other times, for example, by service personnel at the retail outlet. In a similar manner, a manufacturer may prepare an optical media, such as an optical disk, with multiple change effecting devices, with each change effecting device arranged to affect a particular utility of the media. Then, at some point in the manufacturing or distribution process, the utility of the media may be changed. In this way, a standard version of a media, and media content, may be made, and the utility selectively added or removed using one or more change effecting devices. It will also be understood that this dynamic configuring process may be performed at other times, for example, by service personnel at the retail outlet.
[0060] Referring now to 12, a process of using an electronic device target is illustrated. Method 615 has an electronic device in its non-operating state as shown in block 616. This state may be for example, when the electronic device is not plugged in or when its power button is in an off configuration. The electronic device may be placed in its operating state as shown in block 617. For example, the electronic device may be plugged in or have its power switch turned to on. Then, depending upon the state of the change effecting device, the level of utility available in the electronic device would be different. For example, if the change effecting device is in a first state as shown in block 619, then the electronic device is allowed to operate at a first level of utility as shown in block 621. However, if the change effecting device is in a second state as shown in block 618, then the electronic device operates at a second- level of utility as shown in block 620. As illustrated in method 615, the electronic device has a level of utility which is always dependent on the state of the change effecting device. Accordingly, the change effecting device may cause an electronic device to be always unusable unless it has received the proper authorization key. If the authorization key is never received, the electronic device remains at its first state of utility. In a specific example, if the first level of utility is a highly compromised level, then the electronic device would have no practical usability by a consumer in its first state. In this way, risk of theft is dramatically reduced as no benefit can be derived from the electronic device if stolen and it is in its first state. [0061] Referring now to figure 13, a specific method for controlling the distribution of an electronic device target is illustrated. Method 625 has an electronic device target that has an operating state and a non-operating state. Typically, the non operating state will be a power off condition, while the operating state will be a normal power on condition. The electronic device has also been manufactured to have its utility controlled and initially set to a first level of utility as shown in block 626. The electronic device moves through the distribution chain until it reaches a point where one of the parties in the distribution chain determines it is appropriate to change the utility of the electronic device. For example, this may be at a point-of-sale when a retailer transfers the electronic device to a consumer, or may be done by a distributor to add or delete particular utilitarian functions. Since the utility of the electronic device has been initially set to the first level of utility, if the electronic device is placed into its operating state, its utility will only be available as the first level of utility. For example, if the electronic device has had its utility fully compromised, then the electronic device may fail to power on, or will have its utility disabled to a point of being functionally useless.
[0062] When the electronic device is in its non operating state, and it is desired to change to a second state of utility, the electronic device is moved proximate to an activating device. This activating device may be, in one example, an activating terminal at a point-of-sale stand, or may be a device at another location. The electronic device receives a query for an accessible ID using a UHF system as shown in block 627. This accessible ID may be stored as a memory value to be read wirelessly by the UHF system, or may be a barcode value to be scanned. The ID is sent back to the activating device as shown in block 629. The activation terminal may cooperate with other local or remote systems to approve changing the target's utility as shown in block 631. For example, the activation terminal may confirm credit card payment, confirm password, confirm membership in an organization, confirm the activation terminal is authorized, or confirm the age of the consumer. Provided the target is approved to have its utility changed, the activation terminal sends an authorization key using the UHF system that is received by the target as shown in block 633. Typically, the authorization key will be received wirelessly, for example, using an electromagnetic process such as a radio frequency communication. The target, which is still in its non operating state, retrieves a restricted access key stored with the target. This restricted access key is not available to be read by an external device, and is in a non-alterable and nonvolatile memory. The restricted access key typically has been stored with the target at the time of manufacturing, and a copy of the authorization key, along with the associate ID was stored for retrieval by the activation device. Accordingly, the logic within the target may retrieve or otherwise use the restricted access key and compare the restricted access key to the authorization key as shown in blocks 636 and 638. If the keys are the same, then the target has determined that the utility of the target should be changed as shown in block 640. The logic then cooperates with a change effecting device to change the state of the change effecting device to a second state as shown in block 642. A second RF system may be used to provide supplemental power for effecting the change to the switch. This change effecting device is coupled to a utility means, which is used to direct the particular utility available to the electronic device. Accordingly, when the electronic device is placed in the operating state as shown in block 644, the electronic device operates according to its second utility as shown in block 646.
[0063] Referring now to figure 14, an electronic device target 700 is illustrated. Electronic device 702 has been manufactured with its principle utility compromised. In this way, as electronic device 702 moves through the distribution chain, it has little or no perceived value to a potential thief or shoplifter. Accordingly, the risk of theft is substantially reduced. The electronic device 702 is constructed to have its utility means enabled through a logic circuit, power circuit, a value stored in memory, or processor operation as shown in block 724. The particular utility means being used has no utility when an electronic connection is grounded as shown in block 722. When operational power 726 is applied, for example when the target's power-on switch is activated, switch 719 closes, which pulls a reset pin to ground when the printed circuit board trace 717 is shorted to ground. In this way, even though operational power has been applied to the utility means 724, the electronic device has its processor or logic circuit constantly in a state of reset, so that the electronic device has no useful utility. Accordingly, any time the electronic device 702 is turned on when the change effecting device 717 is in its first state, the key functionality or utility of electronic device is compromised. [0064] When a consumer purchases the electronic device at a retail outlet, the electronic device 702 is brought into proximity with an activating device. The activation device makes a request for an ID value, and then an RF transmitter 704, such as a UHF transmitter, takes an ID value 706 and transmits it to the activation device. It will be appreciated although RF communication is illustrated, other types of wireless communication may be used. The activation device may then cooperate with remote servers, network operating centers, clerks, and the consumer to determine that the target 702 is approved to have its utility restored. Provided the activation terminal has been properly authorized and the interested parties have determined that the electronic device may be restored, then the activation device sends an authorization key, which is received by UHF receiver 708. The UHF receiver 708 passes the received authorization code to logic 715, where the authorization code is compared to a restricted access key 713. The restricted access key 713 was stored in the electronic device during the manufacturing process. Provided the restored restricted access key 713 and the authorization key match, the logic causes the PCB trace to be opened. A power source 711 is used to power the transmitter 704, the receiver 708, logic 715, and the change effecting device 717 when the electronic device is not in its operational condition. This power source may be, for example, a battery, an RF/ EM power converter or may even be a connection to the operational power source 726. In one example, the RF receiver 708 acts as a receiver for RF/EM power converter 711. Since this power may not be sufficient in some cases, an additional HF/ VHF receiver 709 is provided, which receives additional RF energy from the activation device. This additional power may be made continuously available, or may be provided at times selected by the activation device. This additional RF energy may be used to supplement power available for opening the PCB trace for the change effecting device 717. It will also be appreciated that different types of power sources may be concurrently used. [0065] Once the PCB trace 717 has been opened, then each time operational power is applied 726, the switch 719 will close. In this way, the voltage on the reset pin will be allowed to float and not pulled to ground. Accordingly, the logic circuit will not be reset. The electronic device may then proceed normally with its power up or initialization routine and function with full utility. It will also be appreciated that multiple authorization keys or multiple change effecting devices may be used. In this way, several utility states may be selectively enabled.
[0066] Referring now to figure 15, a computer processor target 750 is illustrated. Processor 752 may be, for example, a microprocessor, a gate array device, a DSP, or other processor circuit. Although a processor is illustrated, it will be appreciated that other logical and memory devices may be used. Processor 752 has been manufactured with a restricted access key 761. The restricted access key has also been stored in a database and associated with the processor ID value 756. Processor 752 has a change effecting device in the form of a logic value 765. The logic value may not be read externally, and is stored in a nonvolatile and nondestructable way. The logic value is set such that when the logic value is set to a first state, the boot circuit 774 of the processor causes a boot failure. In another example, the initially set value may cause the processor to only boot into a restricted mode, so that simple operations may be performed, but full utility is not available. Typically, operational power 777 will be a pin or trace receiving power from an external source. The activation circuits are protected from the operational power, and the operational circuits are protected from the activation circuits through an isolation transistor 768. For example, an operational transistor 768 may be properly biased and coupled to the operational power 777, so that the logic value may be read by boot circuit 774 when operational power is applied. In this way, each time processor 752 is powered up, it checks to see what level of utility it should provide.
[0067] The processor 752 may be sold as a discrete component, or may be installed as a component in a larger device, such as a computer system, camera, or MP3 player. In some cases, it may be useful to have the wireless communication and power circuits external to the processor device itself. When the processor or integrated device holding the processor are desired to be activated, the processor uses its UHF transmitter 754 to transmit a processor ID 756 to an activation device. The activation device generates or retrieves an authorization key, which may be the same value as the restricted access key 761. The authorization key is received by UHF receiver 757, which cooperates with logic 763 to set a new logic value into logic value area 765. A power source, such as an RF/ EM power converter 759 is provided to power the activation circuitry and to assist in setting the new logic value. Since this power may not be sufficient in some cases, an additional HF/ VHF receiver 709 is provided, which receives additional RF energy from the activation device. This additional power may be made continuously available, or may be provided at times selected by the activation device. This additional RF energy may be used to supplement power available for setting the change effecting device. Once the processor has a new value set in logic value area 765, then each time the processor is powered on, the processor will perform at a utility level set by the new logic level. Typically, the new logic level will enable full use of the processor. It will be appreciated that various levels of utility may be set in this arrangement. It will also be appreciated that utility may be added or deleted from the processor according to the received authorization code. In this way, multiple restricted access codes 761 may be stored, with each being associated with a different level of processor utility. Although processor 752 has been illustrated with the UHF transmitter 754, the UHF receiver 757, and the power source 759 integrally arranged in the processor, it will be appreciated that all or some of these structures may be provided external to the processor housing. For example, the transmitter 754, receiver 757, and power source 759 may be positioned on the outside of the processor housing, or positioned on packaging holding the processor. Further, in the case where processor 752 is integrated into a larger device, some of the structures may be placed external to the processor on supporting printed circuit boards, for example. It will be understood that the illustrated structures may be alternatively placed according to application specific requirements. [0068] While particular preferred and alternative embodiments of the present intention have been disclosed, it will be appreciated that many various modifications and extensions of the above described technology may be implemented using the teaching of this invention. All such modifications and extensions are intended to be included within the true spirit and scope of the appended claims.

Claims

CLAIMSWhat is claimed is:
1. An RFID tag, comprising: a first antenna configured to receive a first RF signal at a first frequency; a second antenna configured to receive a second RF signal at a second frequency; control circuitry coupled to both antennas, and configured to retrieve a stored data; and a transceiver coupled to the control circuitry and configured to transmit the stored data using one of the antennas.
2. The RFID tag according to claim 1, further including a power converter connected to the first antenna and configured to provide power to the control circuitry.
3. The RFID tag according to claim 2, further including a power converter connected to the second antenna and configured to provide power to the control circuitry.
4. The RFID tag according to claim 1, further including a power converter connected to the second antenna and configured to provide power to the control circuitry.
5. The RFID tag according to claim 1, further including a data receiver connected to the first antenna and configured to provide data to the control circuitry.
6. The RFID tag according to claim 5, further including a data receiver connected to the second antenna and configured to provide data to the control circuitry.
7. The RFID tag according to claim 1, further including a data receiver connected to the second antenna and configured to provide data to the control circuitry.
8. The RFID tag according to claim 1, wherein the RFID tag is integrally formed with a target device.
9. The RFID tag according to claim 8, wherein the target device is an optical disk, and electronic device, a tangible media, or product packaging.
10. The RFID tag according to claim 1, wherein the stored data is an ID value.
11. A method of providing data from an RFID tag, comprising: a first RF transmission process, further comprising: receiving RF energy on at least one of a plurality of antennas; converting the received RF energy to power a transmission circuit; a second RF transmission process, further comprising: receiving RF energy on at least another one of a plurality of antennas; converting the received RF energy to power the transmission circuit; and
transmitting stored data using the transmission circuit.
12. The method according to claim 11, wherein the stored data is an ID value.
13. The method according to claim 11, wherein the first RF transmission process and the second transmission process are performed substantially simultaneously.
14. The method according to claim 11, wherein the first RF transmission process and the second transmission process are performed sequentially.
15. The method according to claim 11, wherein the first RF transmission process and the second transmission process have RF energy signals operating at different RF frequencies, respectively.
16. The method according to claim 11, wherein the first RF transmission process has an RF signal operating at or near the UHF band, and the second transmission process has an RF signal operating at or near the HF/ VHF bands.
17. The method according to claim 11, wherein the first RF transmission process has an RF signal operating at about 850-950MHz, and the second transmission process has an RF signal operating at about 10 to 150MHz.
18. The method according to claim 11, wherein the first RF transmission process has an RF signal operating at or near the UHF band, and the second transmission process has an RF signal operating at or near another frequency in the UHF band.
19. The method according to claim 11, wherein the first RF transmission process has an RF signal operating at about 850-950MHz, and the second transmission process has an RF signal operating at about 2.45GHz.
20. A target that has an operating state and a non- operating state, comprising: a change effecting device set to one of a plurality of states; a receiver for receiving data; logic coupled to the change effecting device, and configured to use the data to selectively switch the change effecting device from the one state to another one of the states; a first RF power converter operating at a first RF frequency; a second RF power converter operating at a second RF frequency; a utility means coupled to the change effecting device, and configured to act according to the state of the change effecting device; and wherein the utility means are configured to affect the utility of the target when the target is in the operating state.
21. The target according to claim 20, wherein the second RF power converter is used to supplement the amount of power provided by the first power converter.
22. The target according to claim 20, wherein the second RF power converter is used to switch the change effecting device from the one state to another one of the states.
23. The target according to claim 20, wherein the receiver is constructed to operate at the first RF frequency or the second RF frequency.
24. The target according to claim 20: wherein the receiver is constructed to operate at the first RF frequency; and a second receiver for receiving data constructed to operate at the second RF frequency.
25. The target according to claim 20, wherein the target is an electronic device.
26. The target according to claim 20, further including: a predefined key code stored with the target; and wherein the logic uses the predefined key code to selectively switch the change effecting device from the one state to another one of the states.
27. The target according to claim 20, further including a predefined key code stored with the target; and wherein the logic compares the predefined key code to the received data to selectively switch the change effecting device.
28. The target according to claim 20, further including a predefined identifier readable by an external reader.
29. The target according to claim 20, wherein the change effecting device is an electronic switch, a electromechanical switch, a relay, or a power switch.
30. The target according to claim 20, wherein the change effecting device is a logic state setting, or is a value in a memory location.
31. The target according to claim 20, wherein the change effecting device is a fuse or a setting conditional break in a trace on a printed circuit board.
32. The target according to claim 20, wherein at least one of the RF power converters operates as an electromagnetic converter device.
33. The target according to claim 20, wherein the target is an electronic device selected from the group consisting of: computer; game console; integrated circuit chip; processor; camera; television; phone; PDA (personal data/ digital assistant); calculator; portable music, video, or game player; electronically controlled appliance or tool; watch; printer; fax machine; machinery, instrument; and computer peripheral.
34. The target according to claim 20, further comprising: means for detecting a current state of the change effecting device; and a transmitter for transmitting a signal indicative of the current state.
35. An optical media, comprising: a first RF antenna operating at a first RF frequency; a second RF antenna operating at a second RF frequency; a power converter connected to at least one of the RF antennas; and stored content.
36. The optical media according to claim 35, wherein the first RF antenna is a UHF antenna and the second antenna is a HF/ VHF antenna.
37. The optical media according to claim 35, wherein both antennas are arranged in the space between the spindle hole and the area of the optical media storing the content.
38. The optical media according to claim 35, wherein at least one of the antennas is arranged in the space between the spindle hole and the area of the optical media storing the content, and extends substantially around the spindle hole.
39. The optical media according to claim 35, wherein at least one of the antennas is arranged in the space between the spindle hole and the area of the optical media storing the content, and is arranged in a meandering pattern.
40. The optical media according to claim 35, wherein at least one of the antennas is arranged in the space between the spindle hole and the area of the optical media storing the content, and is arranged in a regular geometric shape.
41. The optical media according to claim 35, wherein at least one of the antennas is arranged near the circumference of the optical media, and a conductor extends from the circumference antenna to circuitry arranged in the space between the spindle hole and the area of the optical media storing the content.
42. The optical media according to claim 41, wherein the conductor comprises a transparent conducting ink.
43. The optical media according to claim 41, wherein the conductor comprises an ITO.
44. The optical media according to claim 41, wherein the conductor is confined to a radial pattern that is sufficiently narrow to induce only recoverable errors in an expected media player.
45. The optical media according to claim 31, further comprising: a change effecting device having a first state and a second state, the change effecting device arranged on the media to interfere with accessing the stored content when the change effecting device is in the first state;
46. The optical media according to claim 45, further comprising: a receiver for receiving data; logic coupled to the change effecting device, and configured to use the data to selectively switch the change effecting device from its current state to the other state.
47. The optical media according to claim 46, further including a predefined key code stored with the optical media ; and wherein the logic uses the predefined key code to selectively switch the change effecting device to the second state.
48. The optical media according to claim 46, further including a predefined key code stored with the optical media; and wherein the logic compares the predefined key code to the received data to selectively switch the change effecting device to the second state.
49. The optical media according to claim 46, further including a predefined identifier readable by an external reader.
50. The optical media according to claim 46, wherein the change effecting device comprises an electrically switchable optical material
51. The optical media according to claim 50, wherein the electrically switchable optical material is an electrochromic material.
52. The optical media according to claim 45, further comprising: means for detecting a current state of the change effecting device; and a transmitter for transmitting a signal indicative of the current state.
53. The optical media according to claim 45, further comprising: means for detecting a current state of the change effecting device; and a transmitter for transmitting a signal indicative of the current state.
54. The optical media according to claim 35, wherein the optical media is one selected from the group consisting of optical disc, digital video disc (DVD), and compact disc (CD).
55. The optical media according to claim 35, wherein the power converter comprises a radio frequency (RF) converter device or an electromagnetic converter device.
56. The optical media according to claim 35, wherein the first RF antenna operates at a first frequency and the second antenna operates at a second frequency.
57. The optical media according to claim 56, wherein the first frequency is selected from the group consisting of 850-950MHz, 2.45GHz, and 13.56MHz; and the second frequency is selected from the group consisting of 850- 950MHz, 2.45GHz, and 13.56MHz.
58. The optical media according to claim 56, wherein the first frequency is selected from the group consisting of UHF, VHF, and HF; and the second frequency is selected from the group consisting of UHF, VHF, and HF.
59. The optical media according to claim 56, wherein the first frequency and the second frequency are different.
60. The optical media according to claim 56, wherein the first frequency and the second frequency are the same.
61. A method for changing the utility of a target, the target having a switch that sets the level of utility for the target, comprising: retrieving, using a first frequency RF communication, stored data from the target; determining that the target is authorized to continue in the process of having its utility changed; and making available, using a second frequency RF communication, sufficient power to change the state of a switch.
62. The method according to claim 61, wherein the second frequency is activated responsive to determining step.
63. The method according to claim 61, further including the step of transmitting a predefined key code to the target responsive to the determining step.
64. The method according to claim 63, wherein the first frequency is used to transmit the predefined key code to the target.
65. The method according to claim 63, wherein the second frequency is used to transmit the predefined key code to the target.
66. The method according to claim 61, further including the step of receiving a confirmation message from the target that the state of the switch has been changed.
67. The method according to claim 66, wherein the first frequency is used to receive the confirmation message from the target.
68. The method according to claim 66, wherein the second frequency is used to receive the confirmation message from the target.
69. The method according to claim 61, wherein the first frequency is at or near the UHF band, and the second frequency is at or near the HF/ VHF bands.
70. The method according to claim 61, wherein the first frequency is at about 850-950MHz, and the second frequency is at about 10 to 150MHz.
71. The method according to claim 61, wherein the first frequency is at about 850-950MHz, and the second frequency is at about 2.45GHz.
72. The method according to claim 61, wherein the stored data is an ID value.
73. A scanner, comprising: a first transmitter operating at a first frequency and configured to transmit when a target device is in a first range; a second transmitter operating at a second frequency and configured to transmit when the target device is in a second range; a receiver configured to receive a data from the target device; and a controller configured to selectively activate the transmitters.
74. The scanner according to claim 73, wherein: the first transmitter has a UHF antenna; and the second transmitter has a coiled HF/ VHF antenna.
75. The scanner according to claim 73, wherein: the first transmitter has a UHF antenna; and the second transmitter has another UHF antenna.
76. The scanner according to claim 73, wherein: the first transmitter communicates with the target device using a far- field coupling; and the second transmitter communicates with the target device using a near- field coupling.
77. The scanner according to claim 73, wherein the data is an ID value.
PCT/US2007/064155 2007-03-16 2007-03-16 An rfid system for providing data and power WO2009058122A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2007/064155 WO2009058122A1 (en) 2007-03-16 2007-03-16 An rfid system for providing data and power

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2007/064155 WO2009058122A1 (en) 2007-03-16 2007-03-16 An rfid system for providing data and power

Publications (1)

Publication Number Publication Date
WO2009058122A1 true WO2009058122A1 (en) 2009-05-07

Family

ID=40591321

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/064155 WO2009058122A1 (en) 2007-03-16 2007-03-16 An rfid system for providing data and power

Country Status (1)

Country Link
WO (1) WO2009058122A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011055738A1 (en) * 2011-11-25 2013-05-29 Infineon Technologies Ag Communication method between electronic devices and corresponding devices
EP3196807A1 (en) * 2016-01-20 2017-07-26 Nxp B.V. Smart objects
EP3710851B1 (en) * 2017-11-17 2023-10-04 Dimeq AS System and method for supervising a person

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194072A1 (en) * 2001-06-14 2002-12-19 Blink Russell P. Multi-function customer satisfaction survey device
US20030183697A1 (en) * 2000-05-11 2003-10-02 Porter Jeffrey Wayne System and method for automated, wireless short range reading and writing of data for interconnected mobile systems, such as reading/writing radio frequency identification (RFID) tags on trains
US20040260470A1 (en) * 2003-06-14 2004-12-23 Rast Rodger H. Conveyance scheduling and logistics system
US20050136972A1 (en) * 2003-12-09 2005-06-23 Smith Derek M. Plug-in network appliance
US20060005035A1 (en) * 2004-06-22 2006-01-05 Coughlin Michael E Keystroke input device for use with an RFID tag and user verification system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030183697A1 (en) * 2000-05-11 2003-10-02 Porter Jeffrey Wayne System and method for automated, wireless short range reading and writing of data for interconnected mobile systems, such as reading/writing radio frequency identification (RFID) tags on trains
US20020194072A1 (en) * 2001-06-14 2002-12-19 Blink Russell P. Multi-function customer satisfaction survey device
US20040260470A1 (en) * 2003-06-14 2004-12-23 Rast Rodger H. Conveyance scheduling and logistics system
US20050136972A1 (en) * 2003-12-09 2005-06-23 Smith Derek M. Plug-in network appliance
US20060005035A1 (en) * 2004-06-22 2006-01-05 Coughlin Michael E Keystroke input device for use with an RFID tag and user verification system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011055738A1 (en) * 2011-11-25 2013-05-29 Infineon Technologies Ag Communication method between electronic devices and corresponding devices
US8977198B2 (en) 2011-11-25 2015-03-10 Infineon Technologies Ag Communication method between electronic appliances, and corresponding appliances
DE102011055738B4 (en) 2011-11-25 2021-10-21 Infineon Technologies Ag Communication method between electronic devices and related devices
EP3196807A1 (en) * 2016-01-20 2017-07-26 Nxp B.V. Smart objects
US10083386B2 (en) 2016-01-20 2018-09-25 Nxp B.V. Smart objects
EP3710851B1 (en) * 2017-11-17 2023-10-04 Dimeq AS System and method for supervising a person

Similar Documents

Publication Publication Date Title
US20060100983A1 (en) Method and system for selectively controlling the utility a target
US20070194945A1 (en) Mobile Device for Selectively Activating a Target and Method of Using Same
US20060131432A1 (en) Method and system for identifying a target
US20060192653A1 (en) Device and method for selectively controlling the utility of an integrated circuit device
US7447143B2 (en) RFID security device for optical disc
US7482929B2 (en) Point-of-sale activation of consumer electronics
US20070011033A1 (en) System and process for providing insurance
EP2759975B1 (en) Tag system, sellable item and method for facilitating the purchase of a sellable item
US20070008169A1 (en) A Radio Frequency Activated Integrated Circuit and Method of Disabling the Same
US20080106385A1 (en) Method and system for protecting rfid tags on purchased goods
US20160125380A1 (en) Apparatus and methods for communicating asset information
US20070016462A1 (en) System and process for distributing products
WO2009058122A1 (en) An rfid system for providing data and power
WO2004036521A2 (en) Security status indication for consumer equipment
EP1854240A2 (en) Device and method for selectively controlling the utility of an integrated circuit device
WO2008036546A2 (en) System and method for packaging and distributing media
CN101438528A (en) Method, system, and network for selectively controlling the utility a target
CN101444034A (en) Device and method for selectively controlling the utility of a taget
EP1817712B1 (en) Method and apparatus for transferring a data carrier of a first system to a second system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07863333

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07863333

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15/03/10

122 Ep: pct application non-entry in european phase

Ref document number: 07863333

Country of ref document: EP

Kind code of ref document: A1