Wireless rfid networking systems and methods

ABSTRACT

Embodiments of the present invention include a wireless access point that acquires and processes radio frequency identification (RFID) information. The wireless access point may be coupled to a network of RFID readers over a wireless network. The RFID readers may read a plurality of RFID tags and transmit information to one or more readers. The readers may, in turn, transmit the RFID information to a wireless access point. The wireless access point may include a middleware layer for performing a variety of RFID data processing functions. In one embodiment, the wireless RFID reader network may be used to improve positioning of readers and tags, and may include a GPS system or position assisted GPS system at the reader and/or tag level.

BACKGROUND

The present invention relates to radio frequency identification (“RFID”), and in particular, to wireless RFID networking systems and methods.

RFID systems are useful in a wide variety of applications. RFID systems are radio communication systems that include small low cost electronic devices that store information including identification (“ID”) information, for example. These devices are referred to as RFID tags. The RFID tags may be designed using backscattering circuit techniques, for example, so that another device can retrieve the ID wirelessly. The retrieving device is typically referred to as a “reader,” and sometimes “an interrogator.” The tags are typically very small, and may be placed on a variety of items including equipment, products, or even people, for example, and identification of such items may be made through a reader. Accordingly, RFID systems may be used to track inventory in a warehouse, the number of products on store shelves, or the location of equipment in a company, to name just a few example applications.

RFID systems may include large numbers of tags and readers spread out across potentially wide areas. The large number of tags and readers may result in a correspondingly large volume of information that may need to be processed. Such information may include large volumes of tag IDs. In order to process such information, powerful readers are typically used that include complex software capable of interfacing with backend systems that store and ultimately use the data.

FIG. 1 is an example of a prior art RFID system. Information from numerous RFID tags 101A-C is received wirelessly by RFID readers 102A-C. Each RFID reader includes an RFID client software component 103A-C (e.g., a Savant Client) that is designed to operate with an RFID central server software component 110 (e.g., a Savant Server) over a network 111. The central server 110 uses a client-server architecture for moving data between the readers and the server. Since all the RFID specific operations are included in two components, the readers are typically powerful systems that can work with the server to manage the data retrieved from the RFID tags. The RFID central server, in turn, is coupled to backend data storage and processing system 120 over network 150. Backend system 120 may be coupled to a database 130 for storing the RFID data, for example.

It is generally desirable to reduce the cost of the tags and the readers that access them. Additionally, it is desirable to improve the management of the RFID tags and the features and flexibility of the RFID system. Existing RFID systems are expensive because, as mentioned above, readers require powerful processors to execute the client software required to interface with the server to make the system operational. It would be beneficial if a new architecture were developed to lower the overall RFID system cost and improve the features and flexibility of the RFID system.

Thus, there is a need to improve RFID systems. Accordingly, the present invention provides improved wireless RFID networking systems and methods.

SUMMARY

Embodiments of the present invention include a wireless access point that acquires and processes radio frequency identification (RFID) information. The wireless access point may be coupled to a network of RFID readers over a wireless network. The RFID readers may read a plurality of RFID tags and transmit information to one or more readers. The readers may, in turn, transmit the RFID information to a wireless access point. The wireless access point may include a middleware layer for performing a variety of RFID data processing functions. In one embodiment, the wireless RFID reader network may be used to improve positioning of readers and tags, and may include a GPS system or position assisted GPS system at the reader and/or tag level.

According to one embodiment of the present invention, a wireless access point includes a first physical layer interface, a second physical layer interface, and middleware software. The first physical layer interfaces the wireless access point to a wireless link and communicates first RFID data to the wireless access point from a plurality of RFID readers. The RFID readers read a plurality of RFID tags. The first RFID data results from reading the RFID tags. The second physical layer interfaces the wireless access point to a wired or wireless link and communicates second RFID data from the wireless access point to a server. The middleware controls the wireless access point to receive and store tag information from the RFID tags. In this manner, the wireless access point offloads processing from the server.

According to another embodiment of the present invention, the middleware controls the wireless access point to process the tag information prior to transmission to the server.

According to yet another embodiment of the present invention, the middleware controls the wireless access point to estimate a position of a RFID tag.

According to still another embodiment of the present invention, the middleware controls the wireless access point to pre-process global positioning system (GPS) information for an RFID reader.

These and other features of the present invention are detailed in the following drawings and related description.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an example of a prior art RFID system.

FIG. 2 illustrates an RFID network according to one embodiment of the present invention.

FIG. 3 illustrates an RFID network according to another embodiment of the present invention.

FIGS. 4A-F illustrate examples of RFID middleware on a wireless access point according to other embodiments of the present invention.

FIG. 5 illustrates a network configuration according to one embodiment of the present invention.

FIG. 6 illustrates a network configuration according to another embodiment of the present invention.

FIG. 7 illustrates a network configuration according to another embodiment of the present invention.

FIG. 8 illustrates the position of tags within the coverage area of a reader according to another embodiment of the present invention.

FIG. 9 illustrates the position of readers within the coverage area of an access point according to another embodiment of the present invention.

FIG. 10 illustrates tag positioning according to another embodiment of the present invention.

FIG. 11A illustrates determining tag position according to another embodiment of the present invention.

FIG. 11B illustrates a method of determining tag position according to another embodiment of the present invention.

FIG. 12 illustrates reader positioning according to another embodiment of the present invention.

FIG. 13A illustrates determining reader position according to another embodiment of the present invention.

FIG. 13B illustrates a method of determining reader position according to another embodiment of the present invention.

FIG. 14 illustrates an RFID network with integrated GPS according to another embodiment of the present invention.

FIG. 15 illustrates an RFID network with integrated GPS according to another embodiment of the present invention.

DETAILED DESCRIPTION

Described herein are techniques for networking RFID system components. In the following description, for purposes of explanation, numerous examples and specific details are set forth in order to provide a thorough understanding of the present invention. It will be evident, however, to one skilled in the art that the present invention as defined by the claims may include some or all of the features in these examples alone or in combination with other features described below, and may further include obvious modifications and equivalents of the features and concepts described herein.

FIG. 2 illustrates an RFID network according to one embodiment of the present invention. A plurality of RFID tags 201A-C may receive signals from RFID readers 202A-C. The tags may be active or passive backscattering circuits (i.e., with or without an internal source of energy such as a battery), for example, or in some embodiments a more complex sensor network capable of wireless automatic identification. In response to the received signals, the RFID tags will transmit information back to the readers. Readers 202A may include a variety of devices such as application specific readers, personal digital assistants, cell phones, or other handheld devices. RFID readers 202A-C are coupled together over a wireless network link 210 (i.e., a communication channel). The wireless network link may be an 802.11 wireless network link, a Bluetooth network link, a Zigbee network link, cellular network link, backscattering link, or other wireless network link using radio frequency signals, for example. Thus, RFID reader 202A may communicate with wireless access point 220A over a wireless network 210. Similarly, RFID reader 202C may communicate with wireless access point 220B over a similar wireless network 210. Accordingly, the readers and wireless access points include physical layer circuits and systems for implementing the wireless transmissions, such as RF transceivers and baseband processors, for example. In some cases, an RFID reader may be within range of multiple access points. In this example, RFID reader 202B is within range of both access points 220A and 220B. Accordingly, information from RFID reader 202B may communicate wirelessly with both of access points 220A and/or 220B. In this example, wireless access points 220A and 220B are coupled to a server computer 230 over a wired (e.g., Ethernet or RS-485) or wireless network 225. However, in some applications the wireless access points may be coupled to a central server over a wireless network (in which case the central server may act as a central access point). The server computer 230 may, in turn, be coupled to backend applications and databases 260 over another network 250, such as the Internet or an intranet, for example.

In one embodiment, an application layer is added to wireless access points 220A-B. The application layer includes an access point middleware software component 221 that works with a middleware (“MW”) reader software component 203 to manage the network of RFID readers and related tags. In one embodiment, access point middleware 221A-B may be used for tag or reader registration, tag or reader positioning, or network and data management. Access point middleware 221A-B may be used to hide the network of RFID readers behind the access point thereby making the network more flexible and reducing the processing burden on the server 230. For example, in one embodiment, server computer 230 includes a middleware host 231 that is part of a distributed middleware system for simplifying management of the reader network. Server computer 230 may further include an RFID central server 232 that communicates with wireless access points 220 and applications 233 for managing and processing data associated with the RFIDs. Additionally, Access point software 221A-B may be used to offload network management and data processing from the reader, which lowers the cost of the reader, and accordingly, the entire RFID network.

FIG. 3 illustrates an RFID network according to another embodiment of the present invention. A plurality of RFID tags 301A-D may receive signals from RFID readers 302A-D. In response to the received signals, the RFID tags will transmit information back to the readers. RFID readers 302A-B are configured in a wireless network and communicate with wireless access point 320A over a wireless communication channel 310A, and RFID readers 302C-D are configured in a wireless network and communicate with wireless access point 320B over a wireless communication channel 310B. Wireless access points 320A and 320B are coupled to a server computer 330 over a wired or wireless network 325. RFID readers 302A-D include a middleware (“MW”) software component 303A-D, and the wireless access points 320A-B include a middleware application layer component 321A-B. In this example, the access points 320A-B further include RFID client software components 322A-B. Embodiments of the present invention may move software functions from the reader to software executed on an application layer on the access point. The RFID clients 322A-B perform transactions with an RFID central server software component 332 on server computer 330. Accordingly, the software architecture in this example distributes RFID network processing across the entire network to reduce the processing burden on the reader and thereby reduce the overall cost of the network.

FIG. 4A illustrates an example of a network model for an RFID network according to another embodiment of the present invention. This example shows the network model for a reader 410, access point 420, and server computer 430. The reader 410 and the access point 420 communicate over a wireless network link 490. The access point 420 and the server computer 420 communicate over a wired or wireless network link 491. The wired or wireless network link 491 may be, for example, a local area network connection such as Ethernet, an intranet, or a wide area network such as the Internet, or any of the wireless networks described above.

The network model for reader 410 includes a physical layer, data link layer, network layer, transport layer, and application layer. The application layer may include a reader middleware software component (“Reader MW”) as described above. The physical layer in this case is a wireless network link including a wireless receiver and transmitter coupled to an antenna.

Access point 420 includes a physical layer, data link layer, and network layer. In one embodiment of the present invention, an access point 420 is provided that further includes a transport layer and application layer 421 for running access point middleware software 422 (“AP MW”) described above for preprocessing the RFID data. The physical layer may include a wireless receiver and transmitter coupled to an antenna for communicating with one or more readers. The physical layer may also support wired or wireless communication with another computer 430 (e.g., Ethernet).

The AP MW 422 coordinates the input of RFID information 422 received from the reader 410, the storage of the RFID data in a storage unit 424, and the output of RFID information 425 to be sent to the server computer 430. Such coordination includes functions such as monitoring and management of the reader 410 (referred to as device management), connectivity management of the connection between the access point 420 and the server 430, connectivity management of the connection between the readers 410 and access point 420, fault detection of failures or other problems with the reader 410, maintenance and upgrades for the reader 410, and data management (processing) of RFID information. Such data processing may include data aggregation, data smoothing, data filtering, redundancy processing, multiprotocol format negotiation (for example, configuring the reader 410 to communicate with the RFID tags using different protocols, or responding to a request by the server 430 to read all tags having a certain set of protocols). The access point 420 may include a processor, controller, micro-controller, programmable logic device, or other integrated circuit device that executes the AP MW 422. The storage unit 424 may be a memory, hard disk, or other type of storage system.

Server computer 430 includes a physical layer, data link layer, network layer, transport layer, and application layer. The application layer on the server may include a central RFID server and other software for receiving and processing RFID applications.

FIG. 4B illustrates a method according to another embodiment of the present invention. At 401, tag IDs are received in an application layer of a wireless access point on an input 423 of middleware 422. At 402, information associated with the tag IDs (e.g., position information) may also be received in middleware 422. At 403, the tag IDs are stored in a repository, such as a database or other data storage facility, for example. At 404, the tag IDs and/or the associated information are processed by the middleware. As mentioned above, processing may include data or device monitoring or management, for example. At 405, the tag IDs and/or the associated information are transmitted on middleware output 425 over a wired or wireless link 491 to a server 430 for further processing if desired.

FIG. 4C illustrates an RFID network according to another embodiment of the present invention. A plurality of RFID tags 411 are located within a location (such as a building or warehouse) that is covered by a plurality of RFID readers 410 (labeled R1, R2, R3 and R4). The RFID tags 411 may receive signals from the RFID readers 410. In response to the received signals, the RFID tags 411 will transmit information back to the readers 410. The RFID readers 410 are configured in a wireless network and communicate with a wireless access point 420 over a wireless communication channel. The wireless access point 420 is coupled to a server computer 430 over a wired or wireless network. The access point 420 includes a MW software component (see above regarding FIG. 4A) that in this case may be configured to offload redundancy processing from the server 430, as discussed below with reference to FIG. 4D.

FIG. 4D illustrates redundancy offload processing according to another embodiment of the present invention. At 441, the wireless access point 420 configures the readers 410 to cover a common location. Such configuration may include sequencing the readers 410 for reading operations (of the tags 411) or data transmission operations (to the access point 420) to manage the likelihood of interference. For example, the access point 420 may configure the reader R1 to read tags during a first time segment, the reader R2 to read tags during a second time segment, etc. As another example, the access point 420 may configure the reader R1 to transmit its information to the access point 420 during a first time segment, the reader R2 to transmit its information during a second time segment, etc. Alternatively, the access point 420 may configure the readers 410 to communicate with tags and/or the access point 420 at different frequencies. In yet other embodiments, communication between wireless access point 420, readers 410, and tags may be at different time slots and different frequencies. Readers 410 may also use beamforming techniques and directional antennas to communicate with tags, for example, so different beams and/or different polarizations may also be used.

With reference to FIG. 4C, a particular RFID tag 411 may be in range of more than one of the readers 410. Including more than one reader 410 allows for redundancy to improve reliability of the RFID system. For example, a particular RFID tag 411 may be blocked by shelving, etc. from receiving signals from the readers R1, R2 and R3, but may be situated such that it receives signals from the reader R4. As another example, if the reader R1 fails, the other readers R2, R3 and R4 are still operational, allowing the RFID system to continue to function.

At 442, according to the particulars of the configuration (see 441 above), the readers 410 receive the tag IDs from the tags 411 in the common area. At 443, according to the particulars of the configuration (see 441 above), the readers 410 transmit the tag IDs from each reader to the wireless access point 420. The access point 420 may store the tag IDs in the repository 424 (see FIG. 4A) along with an identifier that identifies which of the readers 410 read that tag. As multiple ones of the readers 410 may read the same tag 411, the storage unit 424 may contain redundant tag data.

At 444, the access point 420 filters the redundant tag information. At 445, the access point 420 sends the unique tag IDs to the server 430. In this manner, the access point 420 offloads redundancy processing from the server 430. The server 430 need not be aware of the specifics of the configuration of the readers 410.

FIG. 4E illustrates an RFID network according to another embodiment of the present invention. A plurality of RFID readers 410A, 410B and 410C and a plurality of RFID tags 411A, 411B and 411C are located in an area. The readers 410A, 410B and 410C communicate with a wireless access point 420 over a wireless communication channel. The readers 410A, 410B and 410C have a range represented by “r” in the figure. Thus, tag 411B is within range of reader 410B, tag 411A is within range of reader 410A, and tag 411C is within range of both reader 410A and reader 410C. The readers 410A, 410B and 410C are separated by a distance, represented in the figure by “d1” as the distance between the readers 410A and 410C, and by “d2” as the distance between the readers 410A and 410B. The access point 420 includes a MW software component (see above regarding FIG. 4A) that in this case may be configured to offload read request processing from the server 430, as discussed below with reference to FIG. 4F.

FIG. 4F illustrates read request offload processing according to another embodiment of the present invention. At 451, the access point 420 determines the position of the readers within range of the access point. With reference to FIG. 4E as an example, the readers 410A, 410B and 410C are within range of the access point 420. The access point may use a variety of techniques for determining the position of the readers, as discussed below.

At 452, the access point 420 determines the distance(s) between the readers. The access point 420 may determine the distances based on the position information (see 451 above). With reference to FIG. 4E as an example, the distance between the readers 410A and 410C is d1, and the distance between the readers 410A and 410B is d2. According to one embodiment, the distance between a particular reader and the next-closest reader is relevant for the process of FIG. 4E, so the distance between the readers 410B and 410C is not relevant for the process.

At 453, the access point 420 determines whether the distance between readers (referred to as “d”) is greater than the range of the readers (referred to as “r”). If not, the access point 420 proceeds to 454; if so, the access point proceeds to 455. With reference to FIG. 4E as an example, the distance d1 between the readers 410A and 410C is not greater than the range r (so proceed to 454); the distance d2 between the readers 410A and 410B is greater than the range r (so proceed to 455).

At 454, the access point 420 instructs the readers identified in 453 to sequence their read requests of the tags. In the case where d is not greater than r, a particular tag may be within range of more than one reader. In such a case, by the access point 420 instructing the readers to perform read requests sequentially, a particular tag does not receive more than one read request at the same time. With reference to FIG. 4E as an example, the access point 420 instructs the readers 410A and 410C to perform their read requests sequentially. When the reader 410A performs its read request, it reads tags 411A and 411C. When the reader 410C performs its read request, it reads tag 411C. Sequenced read requests avoid the tag 411C being read simultaneously.

At 455, the access point 420 instructs the readers identified in 453 to read tags in parallel. In the case where d is greater than r, there is no risk that a particular tag may be within range of more than one reader. Thus, the access point 420 may instruct the readers to perform their read requests in parallel without a particular tag receiving more than one read request at the same time. With reference to FIG. 4E as an example, the access point 420 instructs the reader 410B to perform its read requests in parallel with either the reader 410A or the reader 410C.

Performing read requests in parallel increases the throughput of reading tags.

Namely, if one reader can read N tags within a time period, M readers in parallel can read a number of tags equal to M*N in the same time period. In the manner described above, the access point 420 offloads read request configuration processing from the server 430 (see FIG. 4A). The server 430 need not be aware of the specifics of the configuration of the readers 410A, 410B and 410C.

FIG. 5 illustrates a network configuration according to one embodiment of the present invention. Embodiments of the present invention may be implemented using a variety of network configurations. In FIG. 5, RFID readers 510A-E communicate directly with wireless access points 520A-B over a wireless network. In come cases, a reader may be within range of a plurality of access points, such as reader 510C, and may communicate directly with multiple access points. The wireless access points 520A-B, in turn, communicate with a server computer 530 over a wired or wireless connection. FIG. 6 illustrates a network configuration according to another embodiment of the present invention. In this example, a plurality of readers 610A-F may communicate wirelessly with the wireless access point through a local network coordinator reader 610G. Reader 610G may connect to access point 620 for providing all reader network traffic over a wireless communication channel. Wireless access point 620, in turn, communicates with server computer 630. The configuration of RFID readers in FIG. 6 is referred to as a “star” network. FIG. 7 illustrates a network configuration according to another embodiment of the present invention. In this example, all readers 710A-G include router components and can communicate directly with all other readers. One reader 710G may act as the local network coordinator for communicating with wireless access point 720. The configuration of readers 710A, 710B, 710D, 710F, and 710G is referred to as a “complete mesh” network. Various modifications on the above configurations are possible, including hybrid networks. In this example, readers 710C and 710E communicate through readers 710B and 710D, respectively, which results in a hybrid network.

FIG. 8 illustrates the position of tags within the coverage area of a reader according to another embodiment of the present invention. The range of an RFID reader 810 is illustrated in FIG. 8. Different RFID readers may have different ranges depending on the particular technologies selected to implement the system. The maximum range at which a reader can send out a signal and receive a response from an RFID tag is depicted by R1. Tags 801A-D within this range will receive a signal from the reader and provide a response signal to the reader. The distance between reader 810 and tag 801E is greater than R1. Therefore, tag 801E may not receive a sufficiently large signal to provide a response, or the response signal may be too small to be detected by reader 801E. In either case, tag 801E is outside the coverage area of reader 810 and will not be detected.

FIG. 9 illustrates the position of readers within the coverage area of an access point according to another embodiment of the present invention. The range of an access point 920 is illustrated in FIG. 9. Different access point-reader combinations may have different ranges depending on the particular wireless communication technologies selected to implement the system. The maximum range at which an access point can establish a wireless communication with an RFID reader is depicted by R2. Readers 910A-D are within range, and accordingly may establish a communication link to the access point 920. The distance between access point 920 and reader 910E is greater than R2. Therefore, reader 910E may not communicate with access point 902. Accordingly, reader 910E is outside the coverage area of access point 920.

FIG. 10 illustrates tag positioning according to another embodiment of the present invention. When a tag is within a reader's coverage area, information stored on the tag and transmitted to the reader in response to a read request may be processed by software on the reader, the access point, or both. To initiate the process, a reader sends out a read request signal and the tag responds by transmitting tag information. At 1001, the reader receives the tag information (e.g., tag IDs). At 1002, the tag information is stored locally on the reader. In one embodiment, the reader may include a local database for storing tag information, for example.

Features of the present invention include determining the position of tags. Accordingly, at 1003 an initial position of the tag is determined. For example, in one embodiment the tag position may be determined to within the range of the reader based on the position of the reader (e.g., if the position of the reader is known). In particular, some readers may reside in known fixed locations. The location may be programmed into the reader, for example, and used to identify the position of the tag (e.g., if a reader with a range of 25 ft is located in the North corner of a warehouse at a certain address, then any tag detected by the reader is within 25 ft of that location). In other embodiments described in more detail below, tag positions may be determined more accurately from the power of the tag signal received in the reader, the angle of reception, the time of arrival, the time difference of arrival (e.g., between multiple readers as discussed below), a carrier phase measurement, triangulation with other readers, or through a global positioning system (“GPS”). In one embodiment, differential measurement techniques may be used to more accurately determine tag positions. For example, If one tag is within range of two readers, the power, angle, time of arrival and carrier phase may be measured by both readers, and middleware in the access point may be used to more accurately calculate the tag position relative to each reader. Similarly, if two tags are read by one reader, differential calculations may be applied. In one embodiment, multiple tags read by at least two readers may be read, and the middleware may calculate measured differences between tags in each reader and again between different readers to obtain a double difference calculation of the parameter of interest, thereby improving the position calculation even more.

At 1004, received tag IDs are entered into a local tag location register in the reader. In one embodiment, the tag IDs are transmitted to the access point at 1005. The tag IDs may be entered into a global tag location register on the access point, for example, at 1006. In some embodiments, an RFID system may include readers with overlapping coverage areas. Accordingly, a tag may respond to multiple readers. If a tag responds to multiple readers, the tag ID may be entered into a local tag location register on a plurality of readers. Additionally, if each reader is communicating wirelessly with the same access point, the tag ID and an identification of each reader (i.e., a reader ID) will be sent to the access point. The access point may store the tag ID multiple times—once for each reader—together with each reader's ID.

In some applications, the tag is attached to an object that may move from one location to another. Alternatively, the tags may be in fixed locations and the readers move from one location to another. Accordingly, at 1007, tags may move from one reader's coverage area to another reader's coverage area. At 1008, tags that leave a coverage area are de-registered from the local tag location register. At 1009, the global tag location register is updated. Accordingly, tags that have left the coverage area are de-registered and tags that enter the coverage area are registered. In one embodiment, tag registration may be updated with each read cycle initiated by a reader, for example.

FIG. 11A illustrates determining tag position according to another embodiment of the present invention. As mentioned above, a tag may be detected by more than one reader. For example, as shown in FIG. 11A, a tag 1140 is within the coverage area of three (3) readers 1110, 1120, and 1130. A method of determining tag position according to another embodiment of the present invention is shown in FIG. 11B. At 1101, the tag ID is received on multiple readers. If each reader's position is known, then the position of the tag may be estimated based on the reader positions. For example, if the positions of reader 1110 and 1120 are known, then the distances between these positions may be calculated. Additionally, if the range of each reader is known, then the region of overlapping coverage may also be determined. If a tag is detected by multiple readers, the position of the tag can be estimated to within the region of overlapping coverage. In other embodiments, the range of the tag from each reader may be estimated by the power of the tag signal received in the reader, the angle of reception, the time of arrival, the time difference of arrival, and carrier phase as mentioned above. At 1102, the ranges from the tag to each reader are determined. At 1103, the ranges are transmitted to an access point. At 1104, location software may be used to estimate the position of the tag from data received from each reader. This may include calculating overlapping regions, determining ranges, or performing triangulation based on three tag-to-reader ranges to improve the accuracy of the tag position. In one embodiment, optimization techniques, such as least squares estimates may be used to further improve the tag position accuracy.

At 1105, the tag position is stored in a global tag location register (“GTLR”) on the access point. At 1106, the tag position may be transmitted back to each reader over the wireless channel. At 1107, the tag position may be stored in local tag location registers (“LTLR”) for each reader. Tag position updates may be performed under the control of each reader or under the control of the access point. Tag position updates may occur periodically at predetermined intervals, after each read cycle, or in response to user commands or other events (e.g., automatically when a reader comes within the coverage area of a new access point). For example, in one embodiment, when an access point detects that a new reader has entered its coverage area, the access point may send commands to the new reader or all readers in the area to scan for tags in each reader's coverage area specifically for a position update. After new tag information is received by each reader, tag positions may be determined and the information may be updated on the access point or readers or both (e.g., in the GTLR or LTLR).

FIG. 12 illustrates reader positioning according to another embodiment of the present invention. In some embodiments, readers may be moved from one location to another, or the readers may be integrated on mobile devices such as personal digital assistants (“PDA”), cell phones, or any other handheld electronic device. If the readers are movable, then a reader may move between coverage areas of different access points. Embodiments of the present invention may track reader positions dynamically to improve RFID system performance. At 1201, a reader may enter the coverage area of an access point. At 1202, the reader registers with the access point. At 1203, the initial reader position is determined based on the known position of the access point. At 1204, the reader ID is entered into a local reader location register (“LRLR”) in the access point. At 1205, the reader ID is transmitted to a server computer system, which may be coupled to multiple access points, for example. Embodiments of the present invention include coupling a remote server to the access point over a computer network, such as the Internet or an intranet. At 1206, the reader ID is entered into a global reader location register (“GRLR”) on the server. At 1207, the reader may move from one access point coverage area to another. At 1208, the reader is de-registered from the LRLR on the access point. At 1209, the GRLR on the server is updated to reflect that the reader is no longer in the access point's area.

FIG. 13A illustrates determining reader position according to another embodiment of the present invention. As mentioned above, a reader may be detected by more than one access point. For example, as shown in FIG. 13A, a reader 1340 is within the coverage area of three (3) access points 1310, 1320, and 1330. A method of determining reader position according to one embodiment of the present invention is shown in FIG. 13B. At 1301, the reader ID is received on multiple access points. If each access point's position is known, then the position of the reader may be estimated based on the access point positions. For example, if the positions of access points 1310 and 1320 are known, then the distances between these positions may be calculated. Additionally, if the range of each access point is known, then the region of overlapping coverage may also be determined. If a reader is detected by multiple access points, the position of the reader can be estimated to within the region of overlapping coverage. In other embodiments, the range of the reader from each access point may be estimated. At 1302, the ranges from the reader to each access point are determined. At 1303, the ranges are transmitted to a server. At 1304, location software may be used to estimate the position of the reader from data received from each access point. This may include calculating overlapping regions, determining ranges, or performing triangulation based on three different reader-to-access point ranges to improve the accuracy of the reader position. In one embodiment, optimization techniques, such as least squares error minimization of the distance estimates, may be used to further improve the triangulation results and the reader position accuracy.

At 1305, the reader position is stored in a global reader location register (“GRLR”) on the server. At 1306, the reader position may be transmitted back to each access point over the wired or wireless network. At 1307, the reader position may be stored in local reader location registers (“LRLR”) for each access point. Reader position updates may be performed under the control of each access point or under the control of the server. Reader position updates may occur periodically at predetermined intervals, after each read cycle, or in response to user commands or other events (e.g., automatically when a reader enters or leaves the coverage area of an access point). For example, in one embodiment, when an access point detects that a new reader has entered its coverage area, it may send a signal to the server to trigger all access points to perform a scan for readers in each area specifically for a position update. After new reader information is received by each access point, reader positions may be determined and the information may be updated on the server or access points or both (e.g., in the GRLR or LRLR).

FIG. 14 illustrates an RFID network with integrated GPS according to another embodiment of the present invention. In some embodiments, the tags 1401, readers 1402, or access points 1420 may include limited or full GPS functionality, and the wireless RFID reader network may be used to improve positioning of readers and tags using the GPS system or assisted GPS system at the reader level (i.e., between the access point and reader) or at the tag level (i.e., between the reader and the tag). For example, access points 1420 may have full GPS systems 1422 integrated into the access point, readers may have no GPS, partial GPS or full GPS integrated into the reader, and tags may have no GPS, partial GPS or full GPS integrated into the tag. In one embodiment, a full GPS receiver is included in one or more access points 1420A-B and the GPS receiver included in each reader 1402A-C may support any combination of three modes, namely, autonomous mode, reader-based mode, and reader-assisted mode. Access point GPS 1422 tracks signals from satellites to determine the position of the access point. In the autonomous mode, the reader also includes a full GPS receiver, which is used to track all or a number of the visible satellite signals and calculate the reader position and possibly velocity internally in the reader. In reader-based mode or reader-assisted modes, the position and satellite information from the access point are used to improve the speed and accuracy in determining the reader locations. The reader may receive information as to which satellites to track. The readers may be provided with a smaller range of code and frequency offsets to search, thereby reducing the GPS acquisition time for the reader and enabling the GPS acquisition for the reader in regions with lower received GPS signal SNR. The readers may also receive GPS navigation data to enable the GPS receiver 1403A-C embedded in readers 1402A-C to increase the coherent correlation interval as described below, and thereby track weaker GPS signals (i.e., improving sensitivity). In the reader-based mode, the reader obtains the assisting data from the access point and tracks all or a number of visible satellite signals to obtain the GPS raw measurements (any combination of pseudoranges, pseudodopplers, and accumulated carrier phase) and to calculate the reader position and possibly velocity internally in the reader. In reader-assisted mode, on the other hand, the final reader position and/or velocity are calculated inside the access point and not in the reader. Specifically, the reader uses the assisting data from the access point to improve its signal acquisition and tracking performance and to obtain the GPS raw measurements or just the GPS signal correlations. The GPS raw measurements or GPS correlation outputs are then transmitted back to the access point where the reader position and/or velocity are calculated which may then be communicated back to the reader.

For example, in one embodiment, the GPS in the access point may use a tracking loop and a correlation scheme to track the signals from different satellites. However, the process of tracking and correlating data in a GPS can be computationally intensive. In one embodiment, the access point transmits the tracking information to the reader over the wireless communication channel so that the reader can track satellites faster and with reduced processing. For example, the access point may correlate data signals from satellites with a locally generated pseudo-random (“PN”) code (e.g., a high speed pulse train) in order to track each satellite. If the GPS signal comprises 50 Hz data modulated into a 1 MHz spread spectrum code, then the correlation length cannot be more than 20 ms ( 1/50 Hz) or the data will change and the correlation may become destructive. However, since the access point is decoding and correlating the GPS data, the access point may pass on this information to the reader over the wireless network so that the reader will not be required to decode the data from the satellite. This allows the reader to correlate over longer time periods (i.e., greater than 20 ms), thereby improving the processing gain, allowing averaging to occur over a longer period of time, and thereby allowing the reader to track weaker signals. After the reader receives the GPS information from the access point, it performs the correlation as described above to obtain the GPS raw measurements. The reader then may use the GPS raw measurements to obtain the reader position and/or velocity internally (reader-based) or may communicate the GPS raw measurements to the access point where the reader position and/or velocity are calculated (reader-assisted).

In another embodiment, GPS information transmitted to readers 1402A-C may be further transmitted to tags 1401. FIG. 15 illustrates another embodiment of the present invention. In this example, each tag 1501 includes limited GPS functionality (e.g., a correlation engine). Access point GPS 1505 tracks signals from satellites to determine the position of the access point. The position and satellite information from the access point may be used to improve the speed and accuracy in determining both the reader locations and the tag location. Similar to reader-access point GPS related interactions, the embedded GPS functionality in the tags may support autonomous, tag-based, and tag-assisted modes. In autonomous mode, a full GPS receiver functionality should be embedded in the tags. For tag-based mode, the tags still have a full GPS receiver embedded in them, except that they can also get the assisting data from the reader to improve their GPS signal acquisition and tracking. In tag-assisted mode, the tags only have a limited functionality GPS receiver such as a correlation engine embedded in them to only obtain the GPS raw measurements or possibly just the correlation results and communicate them back with the reader where the tag position and/or velocity are calculated. The tag may receive information from the reader as to which satellites to track. The tags may be provided with a smaller range of code and frequency offsets to search, thereby reducing the GPS acquisition time for the tag and enabling the GPS acquisition for the tag in regions with lower received GPS signal SNR. The tags may also receive GPS navigation data to enable the GPS receiver 1502 embedded in tag 1501 to increase the coherent correlation interval as described above, and thereby track weaker GPS signals (i.e., improving sensitivity). In some embodiments, each reader 1503 may have a full GPS system to interact directly with the tag's limited GPS system 1502.

The above description illustrates various embodiments of the present invention along with examples of how aspects of the present invention may be implemented. The above examples and embodiments should not be deemed to be the only embodiments, and are presented to illustrate the flexibility and advantages of the present invention as defined by the following claims. Based on the above disclosure and the following claims, other arrangements, embodiments, implementations and equivalents will be evident to those skilled in the art and may be employed without departing from the spirit and scope of the invention as defined by the claims. The terms and expressions that have been employed here are used to describe the various embodiments and examples. These terms and expressions are not to be construed as excluding equivalents of the features shown and described, or portions thereof, it being recognized that various modifications are possible within the scope of the appended claims. 

1-32. (canceled)
 33. A method for managing a set of wireless communication devices by a connection management device, each wireless communication device having a coverage area for monitoring a corresponding set of wireless electronic devices comprising data, the method comprising: for each particular wireless communication device, determining a range of coverage of the particular device and a distance between the particular device and a closest wireless communication device to the particular device; based on said determination, grouping the wireless communication devices by the connection management device into a plurality of groups, each wireless communication device within a group having a coverage area that overlaps coverage areas of other wireless communication devices in the group, wireless communication devices from different groups not having coverage areas that overlap each other; for each group, configuring all wireless communication devices within the group to sequentially communicate with the corresponding set of wireless electronic devices in the coverage area of each wireless communication device in order to prevent simultaneous communications with wireless electronic devices positioned in overlapping coverage areas of at least two wireless communication devices; and configuring a plurality of wireless communication devices that do not belong to a same group to wirelessly communicate with the corresponding set of wireless electronic devices in parallel. 