Method and apparatus for initializing an rfid tag via an optical display

ABSTRACT

A method and apparatus for initializing a radio frequency identification tag are disclosed. For example, the method receives an optical signal having a unique identifier and an encryption key from a display by a radio frequency identification repeater associated with the radio frequency identification tag, wherein the radio frequency identification repeater comprises an optical reader. The method then transmits a communication comprising radio frequency identification information associated with the radio frequency identification tag and the unique identifier via the radio frequency identification repeater to a wireless access point, wherein the communication is encrypted using the encryption key.

This application is a continuation of U.S. patent application Ser. No.12/963,414, filed Dec. 8, 2010, now U.S. Pat. No. 9,042,281, which isherein incorporated by reference in its entirety.

The present disclosure relates generally to Radio FrequencyIdentification (RFID) and, more particularly, to a method and apparatusfor initializing an RFID tag via an optical display.

BACKGROUND

In an existing RFID network, an RFID tag is read by an RFID reader viaan RFID reader antenna. The RFID tag must be in close proximity to theRFID reader antenna to retrieve data from the RFID tag, particularly ifthe RFID tag is passive (does not have a self-contained power source,e.g., a battery). Thus, if the RFID tag physically moves around in alarge area, the tracking of the RFID tag potentially requires that alarge number of RFID antennas be deployed in all the areas that the RFIDtag traverses. The specialized RFID infrastructure that needs to bedeployed in a large scale can be very expensive. Further, RFID tags maybe associated with objects and/or people in order to provide monitoringand services. Often, the task of associating an RFID tag with an objector person to be tracked (i.e., initializing the RFID tag) is a timeconsuming and labor intensive process. In addition, the initializationusually requires manual entry at a location proximate to an RFID reader.However, RFID infrastructure is not widely deployed outside the businessenvironment, e.g., in homes/residences.

SUMMARY

The present disclosure provides a method and apparatus for initializinga radio frequency identification tag. For example, the method receivesan optical signal having a unique identifier and an encryption key froma display by a radio frequency identification repeater associated withthe radio frequency identification tag, wherein the radio frequencyidentification repeater comprises an optical reader. The method thentransmits a communication comprising radio frequency identificationinformation associated with the radio frequency identification tag andthe unique identifier via the radio frequency identification repeater toa wireless access point, wherein the communication is encrypted usingthe encryption key.

In an alternate embodiment, a method transmits an optical signal havinga unique identifier and an encryption key to a display, and receives acommunication comprising radio frequency identification informationassociated with the radio frequency identification tag and the uniqueidentifier, wherein the communication is encrypted using the encryptionkey.

BRIEF DESCRIPTION OF THE DRAWINGS

The teachings of the present disclosure can be readily understood byconsidering the following detailed description in conjunction with theaccompanying drawings, in which:

FIG. 1 illustrates an exemplary RFID repeater and associated wirelessnetworks;

FIG. 2 illustrates a flowchart of a method for initializing an RFID tagthrough a network based application using an optical signal presented ona display;

FIG. 3 illustrates a flowchart of a method for initializing an RFID tagby providing a unique identifier to an RFID tag via an optical signal ona display and correlating the unique identifier to the RFID taginformation; and

FIG. 4 illustrates a high level block diagram of a general purposecomputer suitable for use in performing the functions described herein.

To facilitate understanding, identical reference numerals have beenused, where possible, to designate identical elements that are common tothe figures.

DETAILED DESCRIPTION

As discussed above, if an RFID tag physically moves around in a largearea, the tracking of the RFID tag potentially requires a large numberof RFID antennas and readers to be deployed in all the areas that theRFID tag traverses. The specialized RFID infrastructure that needs to bedeployed in a large scale can be very expensive. Furthermore, an entityhaving a deployed RFID network that desires to provide servicesinvolving RFID tags and RFID tagged objects outside the coverage area ofthe RFID network is not able to do so. If an RFID tag can be read usingother existing wireless technologies, such as an Ethernet-like wirelessLocal Area Network such as IEEE 802.11 (Wi-Fi), a Personal Area Networksuch as UWB or ZigBee, a Metropolitan Area Network such as IEEE 802.16(WiMAX), or cellular Wide-Area Network, the cost of deployingspecialized RFID infrastructure can be minimized. In addition, servicesinvolving RFID tags and RFID tagged objects, such as initializing anRFID tag (e.g., by associating the RFID tag with an object or a person),can be extended outside the coverage area of the deployed RFID network.

To address this criticality, one embodiment of the present disclosureenables an RFID repeater to be used in conjunction with an RFID tag toallow information or data in the RFID tag to be read using existingwireless packet switched technologies. In one embodiment, an RFIDrepeater is installed over an RFID tag using a standard fasteningmaterial such as hook-and-loop fasteners (also known by the tradename,“Velcro” of Velcro Industries of the Netherlands). It should be notedother fasteners can also be used, e.g., detachable clips, snap onbuttons, screws, and the like. The RFID repeater reads and records thedata from the RFID tag and then transmits the retrieved data from theRFID tag over standard wireless packet network including, but notlimited to, a Wi-Fi network, wireless Personal Area Network, Local AreaNetwork, Metropolitan Area Network, and Wide-Area cellular network airinterfaces.

It should be noted that Wi-Fi refers to the underlying technology ofwireless Local Area Networks (WLANs) based on the IEEE 802.11 standard.UWB refers to a technology for transmitting information spread over alarge bandwidth, such as larger than 500 MHz, which enables spectrumsharing among multiple users. ZigBee refers to low power digital radiosbased on the IEEE 802.15.4 standard for wireless Personal Area Networks(WPAN). WiMAX refers to networks based on the IEEE 802.16 MetropolitanArea Network standard. Cellular refers to a radio network made up of anumber of radio cells where each radio cell is served by a cell site orbase station.

In one embodiment, the RFID repeater comprises a short range RFID readeras well as a radio frequency modem device, which can further be used toprovide identification, location, light, temperature, humidity, audio,and biological data. Once it has read the RFID tag to which it isattached, the embedded reader in the RFID repeater records the RFID tagdata to conserve power and to avoid collisions from other RFID tags. Itusually does not have to read the tag again, but can be commandedremotely to do so to verify that the repeater is still attached to itsassociated RFID tag, for example. The physical architecture positionsthe RFID tag in close and readable proximity to the RFID repeater, thusassociating both the RFID and repeater with a reference object, such asa package, an object, or a person to be tracked. One embodiment of thepresent disclosure creates an integrated platform to extend the abilityto associate RFID tag data with an object or person to environmentsoutside the coverage of RFID infrastructure (e.g., outside the range ofRFID readers of the relevant RFID network).

In particular, one embodiment provides a user with an RFID tag and anRFID repeater having a wireless transmitter and optical reader. Anetwork based application residing on an RFID network management serveris accessed remotely by the user using provided login credentials via auser device having a display screen. The user device may comprise, forexample, a personal computer, a laptop computer, a cellular telephone, asmart phone, a wireless phone, a tablet, a television with a set-topbox, and a personal data assistant. The network based applicationenables a display screen to provide an optical signal containing aunique identifier and an encryption key to the optical reader of theRFID repeater. Specifically, the user presents the optical reader to thedisplay which is in communication with the network based application.The display, under the instructions of the network based application,provides the optical signal having a unique identifier and an encryptionkey to the optical reader. The optical signal may also provideinstructions to the RFID repeater to upload information associated withthe RFID tag. Upon receiving the optical signal, the RFID repeatertransmits via the wireless transmitter the information contained in theRFID tag along with the unique identifier, and encrypts the transmissionusing the received encryption key. In one embodiment, the wirelesstransmission is sent to a wireless access point which forwards theinformation to the network based application. The network basedapplication begins the initialization of the RFID tag by storing anassociation between the RFID tag and the identifier. In addition, thenetwork based application provides further access to a secure portion ofthe network based application through which the RFID tag is furtherinitialized. It should be noted that the RFID tag itself may containonly a single piece of information comprising a serial number. Thus, allother data pertaining to the RFID tag may be maintained separately(e.g., in a database association the RFID tag information/serial numberwith the additional data).

The following example provides only an illustrative scenario in whichthe initialization of an RFID tag at a remote location using an opticalsignal on a display of a user device may be implemented advantageouslyin an RFID network environment. For example, an office building ownermay use an RFID network having a management server, RFID readers andRFID tags to provide security and to track the movement of people whovisit and work in the building. Workers who enter and leave the buildingon a regular basis, such as full time employees of a building tenant maybe given permanent RFID tags. Each RFID tag may contain information,such as a tag serial number, which is readable by an RFID reader whenthe RFID tag is in proximity to the RFID reader. The RFID network mayinclude a management server which stores associations between the RFIDtags and data pertinent to the employee. For instance, the stored datamay include the employee's name, company, regular hours, the floor(s)and/or zone(s) of the building in which the employee is permitted toenter, the elevator bank(s) which the employee is permitted to use, jobtitle, physical descriptions of the employee, images of the employee(e.g., a photo identification), and similar information. In oneembodiment, the building may be a “smart building” having automatedcontrol over such things as building access, elevator access, access toparticular floors, entry into restricted zones, and opening ofcontrolled doorways. The “smart building” may have such furtherfunctions as tracking of workers movements and locations within thebuilding.

The RFID network deployed in the building supports such functions asdescribed herein. For example, RFID readers deployed throughout thebuilding may read the RFID tags of employees/workers entering, leavingand utilizing the building and may forward the RFID tag information tothe RFID network management server. As an example, the management servermay look-up the data stored in connection with the RFID tag, such asauthorization data, to determine whether the worker is permitted toenter a doorway proximate to the RFID reader. The same or a similarprocedure may be used to determine whether a worker is authorized toenter a particular elevator or to exit the elevator at a particularfloor.

Alternatively, or in addition, RFID tags associated with various workersmay be scanned by a number or RFID readers deployed throughout thebuilding whenever the RFID tag comes within range of a particular RFIDreader. The whereabouts of an RFID tag, and hence a worker associatedwith the RFID tag, may be continuously or periodically monitored and thecurrent and past locations of the RFID tag maintained in a databaseassociated with the RFID management server. This allows management orsecurity personnel to know the present and/or past locations of variousworkers throughout the building.

On the other hand, visitors to the building may be provided temporaryRFID tags in order to allow the visitors to access the building, whilepermitting the building owner to provide relevant services and maintainan appropriate level of security. By way of example, a building tenantmay invite a visitor to a conference in the building in advance of thescheduled date. One way in which to provide the visitor with access tothe building is to have the visitor stop at a security check point uponfirst entering the building at a main entrance. The tenant who invitedthe visitor may notify the security personnel in advance of thisparticular visitor. In addition, the inviting tenant may indicate anapproximate arrival time in addition to a location in the building wherethe visitor is expected for the scheduled appointment. Upon the visitorarriving at the security point, security personnel may request that thevisitor provide identification, such as a driver's license, passport, orother photo ID, which the security personnel may verify with the visitorinformation provided by the inviting tenant. The security personnel maythen enter certain information relating to the visitor into the databaseof the RFID management system (e.g., via a session on computerworkstation or other device providing a connection to an RFID networkmanagement server). For example, the security personnel may enterpersonal information such as the visitor's name and driver's licensenumber, along with building security and access information. Thebuilding security and access information may indicate such things aspermitted areas of the building, the company and name of the tenant tobe visited, and/or an expiration time pertaining to the access to thebuilding.

Thereafter, the security personnel may associate an RFID tag with theentered information. For instance, upon completing entry of the relevantinformation, the security personnel may be prompted to scan anuninitialized RFID tag (i.e., an RFID tag that is not yet assigned toany person or object to be tracked) with an RFID scanner attached to theworkstation. The scanned RFID tag information is forwarded to the RFIDmanagement server which includes a database storing an associationbetween the RFID tag and the entered information. This completes theinitialization process for the RFID tag. The RFID tag may then beprovided to the visitor which permits the visitor to access designatedareas of the building in the same manner as a regular worker.

However, the above scenario is labor intensive, and requires thatsecurity personnel be engaged in the task of initializing RFID tags,instead of performing other more valuable activities. In addition, itrequires additional time from visitors to wait while information ispopulated into the database and the RFID tag is initialized.Accordingly, one embodiment of the present disclosure allows theinitialization of the RFID tag to take place remotely (i.e., at alocation removed from the RFID network and without its own RFIDinfrastructure). For example, a visitor may be provided an RFID tag inadvance, along with a login and a password to use in accessing a securenetwork based application. By way of example, a tenant of the buildingmay be hosting a relatively large conference with many anticipatedvisitors. The tenant may obtain a number of uninitialized RFID tags.Alternatively, or in addition, the RFID tags may be partiallypre-initialized. For example, the tenant may notify the building ownerthat 100 visitors will be visiting conference room A on December 10 from10:00 am to 4:00 pm. The building owner (e.g., the security personnel orother designee of the building owner) may obtain 100 unassigned (i.e.,uninitialized) RFID tags. Each of the tags is associated with limitedbuilding security and access information which would only permit accessto the appropriate portions of the building to reach conference room Aat the designated date and times. The RFID tags may then be given to thetenant who sends or otherwise distributes the RFID tags to each of thevisitors.

Upon receiving the RFID tags, each of the visitors may access aninitialization portion of a network based application. The network basedapplication then guides a visitor/invitee through a process in order tofurther complete the initialization of the particular RFID tag. Forinstance, each of the visitors may be provided an RFID tag, an RFIDrepeater with a wireless transmitter and an optical reader, and logincredentials in order to access the initialization procedure. Theinitialization procedure may be accessed via a user device, such as apersonal computer, a cellular phone, a smart phone, a tablet, or similardevice, by invoking a web session or similar mechanism to connect to thenetwork based application. Each of the visitors is given logincredentials which may be common login credentials used by all of thevisitors or may be individualized. Upon providing the login credentials,the network based application retrieves or creates a unique identifierand an encryption key, and prompts the visitor to place the opticalreader of the RFID repeater near a designated location, e.g., on adisplay screen of the user device. In one embodiment, the uniqueidentifier may comprise, for example, a signature key associated withthe login credentials.

In one embodiment, the network based application causes the user deviceto display an optical signal which contains the unique identifier and anencryption key via the display of the user device. The optical signalfurther includes instructions to the RFID repeater to upload RFID taginformation along with the unique identifier. The RFID repeater decodesthe instructions which cause the RFID repeater to transmit the RFID taginformation along with the unique identifier to an access point of alocal area network. Specifically, the RFID repeater includes a wirelesstransmitter for wireless communication (e.g., Wi-Fi, ZigBee, etc.) to awireless access point. The access point forwards the transmission to thenetwork based application (via one or more data networks such as a localarea network and a public data network). The transmission is encryptedby the RFID repeater using the obtained encryption key.

Upon receiving the RFID tag information along with the unique identifiervia the wireless access point, the network based application providesaccess to a secure portion of the network based application where thevisitor is prompted to provide (e.g., via the user device) furtherinformation required to complete initialization of the RFID tag. Forinstance, the visitor may be required to provide a name and driver'slicense number to be further correlated with the RFID tag information inorder to complete the initialization of the RFID tag. If the visitordoes not provide the required information, the initialization of theRFID tag may not be completed and the RFID tag may not be operable toobtain access the building at the designated date and/or times. Thisprovides a certain level of security insofar as the tenant is expectedto mail the RFID tags to its visitors (who are presumed to be trusted bythe tenant). Further, the building owner is notified in advance of theconference and provides RFID tags which are limited to providing accessonly to the portions of the building necessary to serve the purpose ofthe visit. In addition, the visitor is required to provide a certainamount of personal information in order to activate the RFID tag. Thetag may not be used for building access until such time as the visitorcompletes the initialization of the tag by providing the requiredpersonal information.

While still providing a measure of security, this embodiment allows thevisitor and the building owner to save time and resources by notrequiring that the visitor and the security personnel complete theinitialization of the RFID tag in-person when the visitor arrives at thebuilding. This is particularly useful when a large number ofvisitors/invitees are expected to arrive at the same time and mayoverwhelm the building personnel. When the RFID tag is initialized asdescribed, the RFID tag may be used in the same manner as the RFID tagof a full-time employee working in the building, including themonitoring of the whereabouts of the visitor using the tag.

In one scenario, an RFID reader at a building entrance may scan an RFIDtag of a visitor approaching the building. The information is relayed bythe RFID reader to the RFID management server. The RFID managementserver may be configured to determine that the visitor is approachingthe building entrance and to provide a notification to buildingpersonnel at the building entrance that a visitor is approaching. Thenotification may provide further information about the visitor includinghis or her name, the purpose of the visit and the intended destinationin the building (e.g., conference room A). Thus, the building personnelmay personally greet the visitor by name and may give the visitordirections for reaching conference room A, without any prompting by thevisitor.

Although an embodiment has been described involving the use of RFID tagsin a commercial building to provide security and monitoring of visitors,it should be understood that the foregoing is discussed by way ofexample only, and that the present disclosure is not limited to such anembodiment. Specifically, the initialization of RFID tags in remotelocations using an optical signal via a display of a user device may beused in numerous other applications. For example, a tour group visitinga large art museum may have a limited amount of time and cannot possiblyexperience the entire collection. However, each visitor in the group maybe provided an RFID tag in advance of the trip and may initialize thetags to include information on the visitor's favorite period or style ofart. Upon visiting the museum, the visitor may be automatically directedto the areas of greatest interest to the visitor. For example, themuseum may deploy an “electronic concierge” with one or more RFIDscanners to scan RFID tags. Upon scanning an RFID tag, the “electronicconcierge” may retrieve a visitor's preferences stored in associationwith the RFID tag information (e.g., in a database associated with anRFID network management server) and may direct the visitor based uponthe retrieved information.

FIG. 1 illustrates an exemplary RFID repeater and the associatedwireless networks of the present disclosure which provide a suitableenvironment for enabling the remote initialization of an RFID tag via anoptical signal presented on a display screen. In FIG. 1, RFID tag 120,comprising an antenna 121 and an RFID circuit 122, is associated with anobject (or an individual) 101 that is to be tracked or served by anetwork based application residing on server 135. In one embodiment,RFID tag 120 and RFID repeater 110 are adhered to each other using anadhesive material or device 102. Thus, the RFID repeater 110 can beselectively attached or detached from the RFID tag 120. The ability ofthe RFID repeater to be selectively attached to an RFID tag allows aparticular object or individual to be tracked, e.g., when outside therange of RFID readers of the relevant RFID network. Note that RFID tag120 can be a passive or an active RFID tag.

In one embodiment, RFID repeater 110 comprises an antenna 111 (e.g., afirst antenna), a low power RFID reader 112 (broadly implemented havinga processor), an active RF modem 113, antenna 114 (e.g., a secondantenna), a battery 115, a memory 116 and an optical reader 117. RFIDrepeater 110 is powered by the battery 115. If the RFID tag 120 is apassive tag, antenna 111 and antenna 121 are used to provide power andsignal transfer between RFID tag 120 and RFID repeater 110. Inparticular, low power RFID reader 112 can use antenna 111 to send power(e.g., a signal) to RFID 120 via antenna 121 and retrieve the dataembedded in RFID circuit 122 to be stored in the memory 116 of the RFIDrepeater 110. Once the data embedded in the RFID tag 120 has been readby the RFID reader 112, RFID reader 112 is deactivated to conserve thepower of battery 115. The data retrieved from RFID tag 120 can then becommunicated to a server 135 hosting a network based application usingactive RF modem 113 via standard wireless packet protocols. For example,active RF modem 113 in RFID repeater 110 may use antenna 114 tocommunicate with access points 131 and 132 via wireless links 141 and142 respectively.

For example, if the RFID repeater 110 is in an area covered by accesspoint 131, wireless link 141 is used to provide wireless access betweenRFID repeater 110 and access point 131. If the RFID repeater 110 is inan area covered by access point 132, wireless link 142 is used toprovide wireless access between RFID repeater 110 and access point 132.

Note further that, in one embodiment, access points 131 and 132 areconnected to Local Area Network (LAN) 134 which in turn is connected tothe server 135 hosting the network based application. LAN 134 can employwired or wireless LAN technologies. Data read from memory 116 residingin RFID repeater 110, via active RF modem 113 and antenna 114, iscommunicated to the network based application residing on server 135using flows 151 or 152, depending on the actual location of RFIDrepeater 110. The wireless packet access protocols used between RFIDrepeater 110 and the access points 131 and 132 include, but are notlimited to, UWB, ZigBee, Wi-Fi, and cellular protocols. In addition toproviding data retrieved from RFID 120, RFID repeater 110 can provideadditional data including, but not limited to, identification, location,light, temperature, humidity, audio, and biological data.

As mentioned above, the arrangement of FIG. 1 may provide a suitableenvironment for initializing an RFID tagged object, such as object 101,in a location without a dedicated RFID infrastructure. In oneembodiment, a user device 106 having a display 103 is connected (wiredor wirelessly) to the local area network 134. As mentioned above, thelocal area network is connected to wireless access points 131 and 132that are in communication with RFID repeater 110. The user device 106may be used by a user to access an initialization portion of the networkbased application residing on server 135. For example, the user device106 may include a web browser or other means for invoking a connectionover LAN 134 and a communication network 160 (e.g., the Internet) to thenetwork based application residing on server 135 of the RFID network170. In response, the network based application may be configured toretrieve or create a unique identifier and an encryption key to beassociated with an RFID tag. In addition, the network based applicationon server 135 may be configured to transmit instructions to the userdevice 106 which cause the user device to display on a portion ofdisplay 103 an optical signal containing the unique identifier and theencryption key along with further instructions intended for an RFIDrepeater, such as RFID repeater 110.

If a user places the optical reader 117 of RFID repeater 110 inproximity to the portion of display 103 displaying the optical signal,the instructions, unique identifier and the encryption key may bedownloaded into memory 116. The operating system, a softwareapplication, hardware or a combination of software and hardware residingin memory 116 may enable RFID repeater 110 to interpret, execute andissue basic instructions necessary for performing the tasks describedherein. Specifically, the RFID repeater 110 may decode the instructionswhich command the RFID repeater to transmit back to the network basedapplication via active RF modem 113 and antenna 114 the informationcontained in the RFID tag 120 along with the unique identifier, and toencrypt the transmission using the received encryption key. The wirelesstransmission may be received by wireless access point 131 or 132 overwireless link 141 or 142, respectively. Access point 131 or 132 may thenforward the communication to the network based application residing onserver 135 in the RFID network 170. This allows the network basedapplication to receive the necessary information in a secure manner inorder to begin the initialization of the RFID tag 120 by storing anassociation between the RFID tag 120 and the unique identifier.Thereafter, the network based application residing on server 135 mayprovide further access to a secure portion of the network basedapplication through which the RFID tag 120 is further initialized. Forexample, a user may be permitted via user device 106 to provideadditional information (e.g., user name, company name, job title, userpreference, user interest, user food preference, user contactinformation, and so on) via a web-based form to the network basedapplication to be further associated with the RFID tag 120. Theadditional information provided via user device 106 may also beencrypted using the same encryption key earlier sent by the networkbased application.

After the additional information is received and stored by the networkbased application residing on server 135, the RFID tag 120 is consideredinitialized and may be used or tracked in RFID network 170, just as ifthe RFID tag were initialized in a conventional manner (i.e., fromwithin the RFID network using an RFID scanner).

FIG. 2 illustrates a flowchart of a method 200 for initializing an RFIDtag. In particular, the method 200 initializes an RFID tag with an RFIDnetwork through a secure network based application which causes anoptical signal to be presented on a display of a user device. Method 200starts in step 205 and proceeds to step 210.

In step 210, the method presents an RFID repeater to a display. Forexample, the RFID repeater is attached to the RFID tag using an adhesivematerial such as Velcro or other appropriate adhesive medium. The RFIDtag can be a passive or an active tag. In one embodiment, the RFIDrepeater retrieves the data embedded in the RFID tag using anintermittently-activated low power RFID reader. If the RFID tag is apassive tag, the RFID repeater powers the RFID tag (e.g., via acommunication signal) via the antennae arrangement of the two attacheddevices. The data read by the RFID repeater is stored in the RFIDrepeater for later use. Thus, in one embodiment the low power RFIDreader embedded in the RFID repeater may be deactivated to conservebattery power in the RFID repeater.

In one embodiment, the RFID repeater further comprises an opticalreader, or photocell, configured to receive optical signals, e.g., froma display. For example, a user remote from the RFID network may be giventhe RFID tag and the RFID repeater with an attached or embeddedphotocell. In addition, the user may be provided login credentials inorder to access an initialization process associated with the securenetwork based application residing on a server coupled to the RFIDnetwork. The secure application may comprise a database storingassociations between RFID tag information, unique identifiers andencryption keys provided by the network based application to RFID tags,as described below. The database may further store associations betweenthe RFID tags, unique identifiers, and information entered by a user,e.g., via a web session.

For example, the user may invoke the initialization portion of thenetwork based application by navigating to a webpage, e.g., via a webapplication residing on a user device, or by initiating a similarconnection between the user device and the network based application.When prompted by the network based application, the user enters theprovided login credentials via the user device. Upon receipt of thelogin credentials, the network based application retrieves or creates aunique identifier to associate with the RFID tag, and an encryption keyto be used in later communication from the RFID repeater.

In step 220, the method receives an optical signal having the uniqueidentifier and the encryption key from the display. For example, thenetwork based application may provide instructions to the user devicewhich causes the display to depict an intensity modulated signal on aportion of a screen. The intensity modulated signal encodes informationcomprising the unique identifier and the encryption key retrieved by thenetwork based application. For example, the network based applicationcan cause the display to depict a white square on the screen with a timevarying intensity at a maximum rate up to the refresh rate of thedisplay. In one embodiment, the display may present the signal within awebpage window (or other application windows depending upon theparticular user device) appearing on all or a portion of the displayscreen of the user device. Thus, a low speed optical intensity modulateddata stream can be received by the optical receiver of the RFID repeaterand decoded.

Although one embodiment causes a white square to be displayed on thedisplay screen of the user device, it should be noted that other similarconfigurations (e.g., different color, different shapes, differentpatterns, and etc.) may provide the same functionality and that suchother embodiments are equally within the scope of present disclosure.For example, a circular, a triangular or other geometric configurationmay be used. In addition, the intensity modulated signal may be providedvia another color displayed on the user device display. For instance,blue, yellow, or even a combination of colors may be used.

In one embodiment, it is contemplated that the optical signal is anon-off intensity modulated signal where only two intensities (i.e., “on”at some positive level of intensity on the display, and “off” orblack/zero intensity) are used to convey the data stream. In analternative embodiment, a multi-level intensity coding scheme is used.For example, progressively higher data rates may be achieved by usingthree intensity levels (e.g., off, low, high), four intensity levels(e.g., off, low, medium, high), and so forth. The feasibility of suchmulti-level encoding schemes is limited only by current capabilities ofstandard display screens and optical receivers (e.g., photocells). Forexample, most displays have a refresh rate of 60 Hz up to 120 Hz, whilesome newer liquid crystal displays have refresh rates as high as 240 Hz,potentially limiting the rate of data transfer. The present disclosurecontemplates that more advanced multi-level encoding schemes may be usedas the pertinent display technology progresses. In any event, when usingmulti-level intensity modulation versus on-off modulation, greatermaximum intensity levels on the display side may be required.Additionally, or in the alternative, a shorter distance between theoptical receiver and the transmitting display screen is likely to berequired in order for the optical signal to be correctly received by theoptical receiver.

As mentioned, the intensity modulated signal may comprise a uniqueidentifier and an encryption key. The optical intensity modulated signalmay further comprise instructions which cause the RFID repeater todownload the unique identifier and encryption key (e.g., to a memory ofthe RFID repeater). In addition, the optical intensity modulated signalmay comprise instructions to the RFID repeater to wirelessly transmit aresponsive communication containing the tag information associated withthe attached RFID tag, along with the unique identifier, and to encodethe wireless transmission using the encryption key. To enable suchfunctionality, the memory of the RFID repeater may comprise an operatingsystem, a software application, hardware and/or a combination ofsoftware and hardware, which is capable of receiving and creatinginstructions necessary to perform the limited functions describedherein.

In step 230, the method initiates encrypted communication of theretrieved RFID tag information and the unique identifier from the RFIDrepeater to the network based application residing on the server usingstandard wireless packet access protocols via a wireless access point orbase station. For example, the method may invoke communication betweenthe RFID repeater and the wireless access point using ultra-wideband(UWB) communication, ZigBee, Wi-Fi, cellular, or the like via a wirelesstransmitter of the RFID repeater. The network based application may thenstore an association between the RFID tag information, and the uniqueidentifier sent to the RFID repeater via the optical intensity modulatedsignal. In addition, the network based application may provide access toa secure portion of the network based application upon receipt of theencrypted communication. For example, the user may be authorized tosecurely provide, via the user device, additional information to thesecure application to be further associated with the RFID taginformation and the identifier. The method ends in step 295.

FIG. 3 depicts a flowchart of a method 300 for initializing an RFID tag.In particular, the method 300 provides a unique identifier to an RFIDtag and correlates the unique identifier to the RFID tag information andother information provided by a user. Method 300 starts in step 305 andproceeds to step 310.

In step 310, the method 300 transmits an optical signal having a uniqueidentifier and an encryption key. For example, a user remote from anRFID network may be provided with an RFID tag and an RFID repeater withan attached or embedded optical reader, or photocell. In addition, theuser may be provided login credentials in order to access aninitialization procedure of a secure network based application residingon a server coupled to the RFID network. The user may invoke theinitialization procedure by navigating to a webpage or initiating asimilar connection between a user device and the network basedapplication. When prompted by the network based application, the usermay enter the provided login credentials via the user device. Uponreceipt of the login credentials, the method may create or retrieve aunique identifier to associate with the RFID tag and an encryption keyto be used in later communication from the RFID repeater.

Thereafter, the method may forward instructions, the unique identifierand the encryption key to the user device, the instructions causing thedisplay of the user device to display an optical signal containing theunique identifier, encryption key, and/or further instructions for anRFID repeater receiving the optical signal. In one embodiment, theoptical signal may be presented as an intensity modulated signalappearing in a white square visible on a portion of the screen of thedisplay.

The RFID repeater receives the optical intensity modulated signal fromthe display, via the attached or integrated optical receiver. The RFIDrepeater then decodes the instructions, the unique identifier and theencryption key. In one embodiment, the instructions, when decoded by theRFID repeater, cause the RFID repeater to wirelessly transmit anencrypted communication of the retrieved RFID tag information and theunique identifier to the network based application application residingon the server using standard wireless packet access protocols via awireless access point or base station.

Thus, in step 320, method 300 receives the encrypted communication ofthe retrieved RFID tag information and the unique identifier at thenetwork based application, where the encrypted communication isencrypted with the encryption key. For example, the communicationbetween the RFID repeater and the wireless access point may utilizeultra-wideband (UWB) communication, ZigBee, Wi-Fi, cellular, or the likevia a wireless transmitter of the RFID repeater. In addition, thecommunication may be encrypted using the encryption key provided to theRFID repeater via the optical intensity modulated signal.

In step 330, the method 300 allows access to a secure portion of thenetwork based application. For example, the method receives an encryptedcommunication from the RFID repeater comprising the RFID tag informationfrom the associated RFID tag along with the unique identifier. Themethod then stores an association between the unique identifier and theRFID tag information in a database residing on the server. In addition,the method authorizes the user device to access a secure part of thenetwork based application upon receiving back the unique identifier andthe RFID tag information.

In step 340, the method obtains further input information. For instance,the method permits the user, via the user device, to enter furtherinformation to be associated with the RFID tag information and theunique identifier. For example, the user may provide a name, birthday,address, and similar personal identifying information.

In step 350, the method correlates the obtained input information withthe RFID tag and the unique identifier. For example, the method mayreceive and store the additional input information in association withthe RFID tag information previously obtained. At this point, the RFIDtag may be considered initialized. This additional information stored bythe method can then be used to provide additional monitoring andservices when the RFID tag (and user) enters the RFID network space.

In step 360, the method tracks the RFID tag. For example, when the RFIDtag enters the RFID network space, the method may track the RFID tag andprovide services to the user carrying the RFID tag, just as if the RFIDtag were initialized in a conventional manner (i.e., from within theRFID network using an RFID scanner). The method ends in step 395.

It should be noted that the steps of the methods 200 and 300 may beperformed by any one or more of the components of the system 100depicted in FIG. 1. For example, one or more steps of the method 200 maybe implemented by the RFID repeater 110. In addition, one or more of thesteps of the method 300 may be performed by server 135 hosting a networkbased application. In another embodiment, one or more steps of themethod 300 may be performed by user device 106, or user device 106 inconjunction with server 135, for example. Alternatively, or in addition,one or more steps of the methods 200 or 300 may be implemented by ageneral purpose computer having a processor, a memory and input/outputdevices as illustrated below in FIG. 4.

In addition, although not expressly specified above, one or more stepsof methods 200 and 300 may include a storing, displaying and/oroutputting step as required for a particular application. In otherwords, any data, records, fields, and/or intermediate results discussedin the method can be stored, displayed and/or outputted to anotherdevice as required for a particular application. Furthermore, steps orblocks in FIGS. 2 and 3 that recite a determining operation or involve adecision do not necessarily require that both branches of thedetermining operation be practiced. In other words, one of the branchesof the determining operation can be deemed as an optional step.

FIG. 4 depicts a high level block diagram of a general purpose computersuitable for use in performing the functions described herein. Asdepicted in FIG. 4, the system 400 comprises a processor element 402(e.g., a CPU), a memory 404, e.g., random access memory (RAM) and/orread only memory (ROM), a module 405 for initializing a radio frequencyidentification tag, and various input/output devices 406 (e.g., storagedevices, including but not limited to, a tape drive, a floppy drive, ahard disk drive or a compact disk drive, a receiver, a transmitter, aspeaker, a display, a speech synthesizer, an output port, and a userinput device (such as a keyboard, a keypad, a mouse, and the like)).

It should be noted that embodiments of the present disclosure can beimplemented in software and/or in a combination of software andhardware, e.g., using application specific integrated circuits (ASIC), ageneral purpose computer or any other hardware equivalents. In oneembodiment, the present module or process 405 for initializing a radiofrequency identification tag can be loaded into memory 404 and executedby processor 402 to implement the functions as discussed above. As such,the present process 405 for initializing a radio frequencyidentification tag (including associated data structures) of the presentinvention can be stored on a non-transitory (e.g., physical or tangible)computer readable medium, e.g., RAM memory, magnetic or optical drive ordiskette and the like.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and notlimitation. Thus, the breadth and scope of a preferred embodiment shouldnot be limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

What is claimed is:
 1. A method, comprising: receiving an optical signalhaving a unique identifier and an encryption key from a display screenby a radio frequency identification repeater associated with a radiofrequency identification tag, wherein the radio frequency identificationrepeater comprises an optical reader, wherein the optical signal isdisplayed on the display screen, and wherein the optical signal isreceived by the radio frequency identification repeater via the opticalreader, wherein the optical signal comprises an intensity modulatedsignal, wherein the optical signal is provided by a network-based serverto the display screen; and transmitting a communication comprising radiofrequency identification information associated with the radio frequencyidentification tag and the unique identifier via the radio frequencyidentification repeater to the network-based server via a wirelessaccess point, wherein the communication is encrypted using theencryption key, wherein the wireless access point is coupled to a localarea network that is providing an access to the network-based server,wherein an access to a secure application residing on the network-basedserver is granted to a user device as a result of the transmitting theradio frequency identification information and the unique identifier. 2.The method of claim 1, wherein the transmitting via the wireless accesspoint employs a wireless fidelity protocol.
 3. The method of claim 1,wherein the transmitting via the wireless access point employs an ultrawideband protocol.
 4. The method of claim 1, wherein the transmittingvia the wireless access point employs a cellular protocol.
 5. The methodof claim 1, wherein the transmitting via the wireless access pointemploys a Zigbee protocol.
 6. The method of claim 1, further comprising:receiving the radio frequency identification information and the uniqueidentifier at the network-based server; storing an association betweenthe radio frequency identification information and the unique identifierat the network-based server; and authorizing the access by the userdevice to the secure application residing on the network-based server.7. The method of claim 6, further comprising: storing an associationbetween additional input information that is received from the userdevice and the radio frequency identification information.
 8. A tangiblecomputer-readable medium storing instructions which, when executed by aprocessor of a radio frequency identification repeater, cause theprocessor to perform operations, the operations comprising: receiving anoptical signal having a unique identifier and an encryption key from adisplay screen by the radio frequency identification repeater associatedwith a radio frequency identification tag, wherein the radio frequencyidentification repeater comprises an optical reader, wherein the opticalsignal is displayed on the display screen, and wherein the opticalsignal is received by the radio frequency identification reader via theoptical reader, wherein the optical signal comprises an intensitymodulated signal, wherein the optical signal is provided by anetwork-based server to the display screen; and transmitting acommunication comprising radio frequency identification informationassociated with the radio frequency identification tag and the uniqueidentifier via the radio frequency identification repeater to thenetwork-based server via a wireless access point, wherein thecommunication is encrypted using the encryption key, wherein thewireless access point is coupled to a local area network that isproviding an access to the network-based server, wherein an access to asecure application residing on the network-based server is granted to auser device as a result of the transmitting the radio frequencyidentification information and the unique identifier.
 9. The tangiblecomputer-readable medium of claim 8, wherein the transmitting via thewireless access point employs a wireless fidelity protocol.
 10. Thetangible computer-readable medium of claim 8, wherein the transmittingvia the wireless access point employs an ultra wideband protocol. 11.The tangible computer-readable medium of claim 8, wherein thetransmitting via the wireless access point employs a cellular protocol.12. The tangible computer-readable medium of claim 8, wherein thetransmitting via the wireless access point employs a Zigbee protocol.13. The tangible computer-readable medium of claim 8, furthercomprising: receiving the radio frequency identification information andthe unique identifier at the network-based server; storing anassociation between the radio frequency identification information andthe unique identifier at the network-based server; and authorizing theaccess by the user device to the secure application residing on thenetwork-based server.
 14. The tangible computer-readable medium of claim13, further comprising: storing an association between additional inputinformation that is received from the user device and the radiofrequency identification information.
 15. A method, comprising:transmitting, by a processor of a network-based server, an opticalsignal having a unique identifier and an encryption key to a displayscreen, wherein the optical signal is to be displayed on the displayscreen, wherein the optical signal comprises an intensity modulatedsignal; receiving, by the processor, a communication comprising radiofrequency identification information associated with a radio frequencyidentification tag and the unique identifier, wherein the communicationis encrypted using the encryption key, wherein the communication isreceived from a radio frequency identification repeater via a wirelessaccess point, wherein the radio frequency identification repeatercomprises an optical reader, wherein the optical signal is received bythe radio frequency identification repeater from the display screen viathe optical reader, wherein the wireless access point is coupled to alocal area network that is providing an access to the network-basedserver; and authorizing, by the processor, an access by a user device toa secure application residing on the network-based server as a result ofthe receiving the radio frequency identification information and theunique identifier.
 16. The method of claim 15, wherein the communicationis received via a Wi-Fi protocol.
 17. The method of claim 15, whereinthe communication is received via an ultra wideband protocol.
 18. Themethod of claim 15, wherein the communication is received via a cellularprotocol.
 19. The method of claim 15, wherein the communication isreceived via a Zigbee protocol.
 20. The method of claim 15, furthercomprising: storing an association between the radio frequencyidentification information and the unique identifier at thenetwork-based server.