RFID Contextual Location Determination and Sensing

ABSTRACT

In embodiments of RFID-based activation for wireless network communication, a mobile device includes a RFID reader to interrogate and communicate with a RFID tag to retrieve information associated with a wireless network. An activation module is implemented to receive a notification from the RFID reader that the wireless network is available based on communication with the RFID tag, which can also include receiving authentication credentials associated with the wireless network. The activation module can then activate a wireless transceiver of the mobile device and connect to the wireless network using the received authentication credentials.

BACKGROUND

Portable devices, such as mobile phones, tablet devices, digitalcameras, media playback, and other types of computing and electronicdevices can typically run low on battery power, particularly when adevice is utilized extensively between battery charges and devicefeatures unnecessarily drain battery power. For example, many of theportable devices include multiple radio transceivers to communicatewirelessly with other electronic and computing devices using well-knowncommunication protocols. Typically, a Wi-Fi transceiver is included in amobile device to allow the mobile device to connect to a wirelessnetwork via a Wi-Fi access point. However, many of the radiotransceivers included in a portable device unnecessarily drain thebattery power. For example, a Wi-Fi transceiver that is not connected toa wireless network consumes more battery power, such as when seekingavailable network connections, than when the Wi-Fi transceiver isconnected to a wireless network.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of RFID contextual location determination and sensing forwireless communication are described with reference to the followingFigures. The same numbers may be used throughout to reference likefeatures and components that are shown in the Figures:

FIG. 1 illustrates an example mobile device in which embodiments of RFIDcontextual location determination and sensing can be implemented.

FIG. 2 illustrates examples of RFID contextual location determinationand sensing in accordance with one or more embodiments.

FIGS. 3 and 4 illustrate example methods of RFID-based activation forwireless network communication in accordance with one or moreembodiments.

FIGS. 5 and 6 illustrate example methods of RFID-based locationdetermination for antenna power adjustment in accordance with one ormore embodiments.

FIG. 7 illustrates various components of an example device that canimplement embodiments of RFID contextual location determination andsensing.

DETAILED DESCRIPTION

Embodiments of RFID contextual location determination and sensing forwireless communication are described, such as for any type of mobiledevice that may be implemented with a RFID reader system and one or morewireless radio systems transceivers, such as a Wi-Fi transceiver forwireless communication via a wireless network. Typically, a Wi-Fitransceiver in a mobile device is connected to a wireless network, suchas when a user of the device is at home or at work, and Wi-Fitransceiver connects the mobile device to the home or work wirelessnetwork. However the Wi-Fi transceiver (and/or other wireless systemtransceivers) can unnecessarily drain the battery power of the mobiledevice if the Wi-Fi transceiver is not connected to the wireless networkor an antenna power of the Wi-Fi transceiver is not optimized based onthe wireless network signal strength.

In aspects of RFID-based activation for wireless network communication,a mobile device is implemented to communicate with an RFID tag andactivate or deactivate transceivers in the mobile device to conserve orefficiently utilize battery power of the device. For example, a RFID tagmay be placed near an entryway or doorway of a residence or building,and as a user of a mobile device enters the residence or building withthe device passing near the RFID tag, the mobile device communicateswith the RFID tag. In response to communicating with the RFID tag, aWi-Fi transceiver in the mobile device can then be activated, turned on,or enabled. Additionally, in response to communicating with the RFID tagas the user exits the residence or building, the Wi-Fi transceiver canthen be deactivated.

In implementations, a mobile device can implement an activation modulethat activates the Wi-Fi transceiver and connects to a wireless networkbased on the communication with the RFID tag. Additionally, theactivation module can deactivate the Wi-Fi transceiver based on thecommunication with the RFID and the previously connected wirelessnetwork is no longer available. Accordingly, utilizing the RFID tag foractivating or deactivating the Wi-Fi transceiver allows the activationmodule to manage power consumption of the Wi-Fi transceiver, and batterypower of the mobile device is conserved by utilizing the Wi-Fitransceiver based on communication with the RFID tag.

In aspects of RFID-based location determination for antenna poweradjustment, a mobile device is implemented to scan for RFID tags withinrange and adjust antenna power of a Wi-Fi transceiver (and/or otherwireless system transceivers) based on the signal strength of a wirelessnetwork and the location of the mobile device in relation to thedistance away from an access point. For example, the mobile device maybe located in an office that has a Wi-Fi access point, and the officecontains a desk with an RFID tag. When the mobile device communicateswith the RFID tag on the desk in the office, the antenna power of theWi-Fi transceiver in the mobile device can be decreased withoutnegatively impacting the data throughput of the Wi-Fi connection due tothe close proximity of the mobile device to the Wi-Fi access point.

In implementations, a mobile device includes a Wi-Fi transceiver and aRFID reader that communicates with an RFID tag. The mobile device canimplement a control module that includes a learning algorithm, whichcontextually learns about rooms within a residence or building based onthe communication with RFID tags in the residence or building. Thelearning algorithm can store and maintain RFID tag information in adatabase, as well as information regarding the rooms within theresidence or building, wireless networks, and associated signalstrengths of the wireless networks. Based on the information in thedatabase and the current location (determined room) of the mobile devicewithin the residence or building, the learning algorithm can invoke thecontrol module to adjust the antenna power of the Wi-Fi transceiver.Accordingly, utilizing the control module allows for optimization ofantenna power based on the current location of the mobile device withina residence or building, and battery power of the mobile device isefficiently utilized by the Wi-Fi transceiver based on the learningalgorithm.

While features and concepts of RFID contextual location determinationand sensing can be implemented in any number of different devices,systems, environments, and/or configurations, embodiments of RFIDcontextual location determination and sensing are described in thecontext of the following example devices, systems, and methods.

FIG. 1 illustrates an example mobile device 100 in which embodiments ofRFID contextual location determination and sensing for wireless networkcommunication can be implemented. The example mobile device 100 may beany type of mobile phone, tablet device, media playback, computing,communication, gaming, entertainment, digital camera, or other type ofcomputing and electronic device that is typically battery powered. Inthis example, the mobile device 100 implements components and featuresof a RFID reader 102 (also referred to as a RFID interrogator) that isimplemented for two-way wireless communication 104 with radio-frequencyidentification (RFID) tags, such as RFID tag 106 that is activated inthe presence of the RFID reader 102 when interrogated for sensor data.Generally, the RFID tags are small electronic tags or labels that can beprogrammed with identifying data or other information. The RFID reader102 can transmit an interrogation signal as a broadcast messagerequesting RFID tags that are in range to return the identifying data orinformation that the RFID tags have stored. The RFID tags can thenwirelessly communicate the data information to the RFID reader via aradio frequency (RF) communication channel.

In implementations, an RFID tag (e.g., RFID tag 106) can include anASIC/CPU module, as well as a transmitter and a receiver (or may beimplemented as a transceiver) for two-way communication with the RFIDreader 102. In response to receipt of an interrogation signal, theASIC/CPU module of the RFID tag formulates a response that may includedata from the RFID tag, and the response is wirelessly transmitted tothe mobile device 100. The response signals from a RFID tag can becommunicated using low frequency (LF), high frequency (HF), orultra-high frequency (UHF) radio waves. The RFID tag data can be storedin non-volatile memory, and the ASIC/CPU module can be implemented asfixed or programmable logic for processing the RFID tag data, as well asmodulating and demodulating the RF signals. The RFID reader 102 of themobile device 100 receives the response signals from the RFID tag, andthe response signals can include the data from the RFID tag. Theresponse signal and data received by the RFID reader 102 can includeinformation that an RFID tag is storing, has obtained, is producing, andso forth. Further, the response signal and data received from an RFIDtag can include identification information, such as a code or analphanumeric value, a parameter derived from a sensor including a sensorvalue, a parameter value, a descriptive indication, or some combinationthereof.

As described herein, the RFID reader 102 can interrogate one or moreRFID tags, represented by the RFID tag 106, which effectively requeststhe RFID tags to provide data or information wirelessly. In thisexample, the RFID tag 106 maintains wireless network information 108,which is communicated to the RFID reader 102 as RFID tag information110, wireless network availability 112, and wireless network credentials114.

The RFID tag information 110 includes information that describes and/oris associated with the RFID tag 106, an object associated with the RFIDtag, a physical location of the RFID tag 106, and so forth. The wirelessnetwork availability 112 is information that includes an indication awireless network is available based on the information read from theRFID tag. The wireless network credentials 114 can optionally be readfrom the RFID tag 106 and can be utilized by one or more wireless radiosystems 116 of the mobile device 100 to connect to a wireless network.Although shown as information associated with the RFID reader 102 inthis example, the RFID tag information 110, the wireless networkavailability 112, and the wireless network credentials 114 may bemaintained by other components in the mobile device 100 separate fromthe RFID reader 102, such as with device memory 118 of the mobiledevice.

The mobile device 100 can be implemented with various components, suchas a processing system 120 (e.g., one or more processors), the memory118, an integrated display device 122, and any number and combination ofvarious components as further described with reference to the exampledevice shown in FIG. 7. For example, the mobile device includes apositioning system 124 that is utilized to capture the geographicallocation of the mobile device 100, such as with a Global PositioningSystem (GPS) transceiver or another geo-location device. Although notshown, the mobile device 100 can also include a power source, such as abattery, to power the various device components. Further, the mobiledevice 100 can include the different wireless radio systems 116, such asfor Wi-Fi, Bluetooth™, Mobile Broadband, LTE, Near Field Communication(NFC), or any other wireless communication system or format, configuredfor communication via respective wireless networks. Generally, themobile device 100 implements the wireless radio systems 116 that eachincludes a transceiver 126 and an antenna 128 for wireless communicationwith other devices, networks, and services.

In this example, the mobile device 100 includes an activation module 130and/or a control module 132 to implement embodiments of RFID contextuallocation determination and sensing for wireless network communication,as described herein. The activation module 130 and the control module132 can each be implemented as a software application or module, such ascomputer-executable software instructions that are executable with aprocessor (e.g., with the processing system 120) to implementembodiments described herein. The activation module 130 and the controlmodule 132 can be stored on computer-readable storage memory (e.g., thedevice memory 118), such as any suitable memory device or electronicdata storage implemented in the mobile device. Although shown asseparate software applications or modules, the activation module 130 andthe control module 132 may be integrated as a module or component in themobile device 100 to implement the embodiments described herein.

In embodiments of RFID-based activation for wireless networkcommunication, the RFID reader 102 can interrogate and communicate withRFID tags, such as the RFID tag 106. The activation module 130 isimplemented to receive a notification from the RFID reader 102 that oneor more wireless networks are available based on communication with atleast one of the RFID tags. Further, the activation module 130 canreceive the wireless network credentials 114, such as authenticationinformation that allows a wireless radio system 116 of the mobile device100 to connect to one of the wireless networks based on a type of readof the RFID tag 106 performed by RFID reader 102. The activation module130 can then activate the transceiver 126 of the wireless radio system116 for communication via the wireless network that is determinedavailable based on communication with the RFID tag 106.

In implementations, the RFID reader 102 can transmit an authenticationkey, such as from information for wireless network authentication 134,to the RFID tag 106 and receive the wireless network credentials 114from the RFID tag, such as for a secure read of the RFID tag. Theactivation module 130 can then initiate the connection of thetransceiver 126 to the wireless network (e.g., a secure network) usingthe received wireless network credentials 114. Alternatively, the RFIDreader 102 can interrogate the RFID tag 106, receive the authenticationinformation (e.g., the wireless network information 108) that allows themobile device 100 to connect to a guest network, and the activationmodule 130 activates the transceiver 126 of the respective wirelessradio system to connect to the guest network utilizing the receivedinformation. The activation module 130 is also implemented to deactivatethe transceiver 126 that is connected to a wireless network based on adetermination that the wireless network is no longer available. Thecontrol module 132 is implemented to compute received signal strengthindicator (RSSI) values 136 for the wireless networks, and theactivation module 130 maintains corresponding wireless network signalstrengths of the wireless networks, as well as signal strengththresholds 140 of the wireless networks.

In embodiments of RFID-based location determination for antenna poweradjustment, the RFID reader 102 can interrogate and communicate withRFID tags, such as the RFID tag 106. The control module 132 isimplemented to determine a current location of the mobile device 100based on physical locations associated with each of the respective RFIDtags. The control module 132 can then adjust the power of an antenna 128of the transceivers 126 based on the current location of the mobiledevice, where the antenna power is adjusted for a signal strength 138 ofa wireless signal of a wireless network.

In this example, the control module 132 includes a learning algorithm142 that is implemented to maintain (e.g., generate and update) a RFIDtags database 144 (stored in device memory 118) that correlatesidentifiers of the RFID tags 106 and the wireless signal of the wirelessnetwork with respective physical locations of the RFID tags. Each of theRFID tags may also be associated with an object at a respective physicallocation of a RFID tag. The learning algorithm 142 can then referencethe identifiers of the RFID tags 106 in the database 144 and determinethe current location of the mobile device. The control module 132 caninitiate adjusting the antenna power of an antenna 128 of one of thetransceivers 126 such that the antenna power is adjusted for a signalstrength of a wireless network based on the current location of mobiledevice 100. In implementations, the RFID tags database 144 can alsoinclude information about one or more rooms within a residence,building, or general area, and the signal strength of the wirelesssignal corresponding to each of the rooms in residence or building.

In implementations, the learning algorithm 142 of the control module 132is implemented to compare a threshold count to a number of times thateach of the RFID tags 106 has been identified, and adjust the rate atwhich the RFID tags are identified. Additionally, the control module 132can initiate adjusting the antenna power of an antenna 128 of atransceiver 126 by comparing the signal strength of the wireless signalto a first threshold and a second threshold (e.g., signal strengththresholds 140) for the signal strength 138, where the first thresholdindicates that the signal strength is high and the second thresholdindicates that the signal strength is low. The control module 132 canthen decrease the antenna power of the transceiver 126 if the signalstrength meets or exceeds the first threshold, or increase the antennapower of the transceiver 126 if the signal strength does not at leastmeet the second threshold.

FIG. 2 illustrates an example 200 of RFID contextual locationdetermination and sensing for wireless network communication, asdescribed herein. A building, space, general area, or residence 202includes various areas that include an office 204, a bathroom 206, abedroom 208, a front room 210, a dining room 212, and a kitchen 214. Theresidence 202 also contains an access point 216 of a wireless network(e.g., a Wi-Fi network) that is located in the office 204 to broadcast aWi-Fi signal throughout the residence.

In this example, a RFID tag 218 is located in a doorway 220 of theresidence 202, and the RFID tag 218 can respond to an interrogation bythe RFID reader 102 of the mobile device 100. Additionally, the RFID tag218 can respond with the specific information based on the type of reador interrogation performed by the RFID reader 102. In implementations,the RFID tag 218 is a passive device which has a communication range upto approximately two meters. Alternatively, the RFID tag 218 is anactive device which contains an internal power source, such as abattery, to power the RFID tag to allow for a communication rangegreater than three meters.

The various areas in the residence 202 can each have an associated RFIDtag 222, and each of the RFID tags 222 may also be associated with anobject at a respective physical location of a RFID tag. For example, theoffice 204 includes desk 224 which has a RFID tag 222 for the officearea, and the bathroom area and the front room area has a RFID tag 222.Each object within residence 202 can also contain one or more RFID tags222, such as a bed 226 in the bedroom area, a dining table 228 in thedining room area, and a refrigerator 230 and stove 232 in the kitchenarea. Each of the RFID tags can respond with specific information to aninterrogation by the RFID reader 102 of the mobile device 100, where theinformation is associated with the RFID tag, the object associated withthe RFID tag, wireless network information, and/or wireless networkcredentials to connect to a particular wireless network (e.g., of theaccess point 216).

When the mobile device 100 is near the access point 216, a highest Wi-Fisignal 234 has a strength that is detected and determined by the mobile100 due to the close proximity to the access point in the office area.As the mobile device 100 learns the location proximate the office areawhen detecting and communicating with the RFID tag 222 located at thedesk 224, the Wi-Fi antenna power can be decreased so that the mobiledevice conserves battery power, yet maintains a strong wireless signal.When the mobile device 100 is further away, a lowest Wi-Fi signalstrength 236 is detected and determined by the mobile device 100 due tothe distance between the access point 216 and the mobile device 100. Asthe mobile device 100 learns the location proximate the kitchen areawhen detecting and communicating with the RFID tags 222 located at therefrigerator 230 and the stove 232, the Wi-Fi antenna power can beincreased so that the signal maintains the best possible coverage.

Example methods 300, 400, 500, and 600 are described with reference torespective FIGS. 3-6 in accordance with implementations of RFIDcontextual location determination and sensing for wireless networkcommunication. Generally, any services, components, modules, methods,and/or operations described herein can be implemented using software,firmware, hardware (e.g., fixed logic circuitry), manual processing, orany combination thereof. Some operations of the example methods may bedescribed in the general context of executable instructions stored oncomputer-readable storage memory that is local and/or remote to acomputer processing system, and implementations can include softwareapplications, programs, functions, and the like. Alternatively or inaddition, any of the functionality described herein can be performed, atleast in part, by one or more hardware logic components, such as, andwithout limitation, Field-programmable Gate Arrays (FPGAs),Application-specific Integrated Circuits (ASICs), Application-specificStandard Products (ASSPs), System-on-a-chip systems (SoCs), ComplexProgrammable Logic Devices (CPLDs), and the like.

FIG. 3 illustrates example method(s) 300 of RFID-based location andactivation for wireless network communication. The order in which themethod is described is not intended to be construed as a limitation, andany number or combination of the described method operations can beperformed in any order to perform a method, or an alternate method.

At 302, a signal is transmitted to initiate communication with an RFIDtag. For example, the RFID reader 102 of the mobile device 100 transmitsa signal to the RFID tag 106 to interrogate and perform a read of theRFID tag, such as when a user carries the mobile device 100 into theresidence 202 through the doorway 220. As the mobile device 100 passesnear the RFID tag 218, the RFID reader 102 of the mobile device 100transmits a signal 104 that is received by the RFID tag.

At 304, a notification is received that one or more wireless networksare available based on the communication with the RFID tag. For example,the RFID reader 102 of the mobile device 100 receives a notificationfrom the RFID tag 106 that one or more wireless networks are available,such as the wireless network availability 112 received as part of thewireless network information 108 that is maintained by the RFID tag 106.

At 306, information is received regarding at least one of the wirelessnetworks. For example, the RFID reader 102 of the mobile device 100receives additional information regarding one of the wireless networks,such as the wireless network credentials 114 and/or other informationregarding how to connect to a wireless network. The received informationcan be an authentication key that allows the mobile device 100 toinitiate a connection to a specific wireless network using a Wi-Fitransceiver 126 of a wireless radio system 116 in the mobile device.

At 308, a transceiver of a wireless radio system is activated in themobile device for communication via the wireless network. For example,the activation module 130 that is implemented in the mobile device 100activates one or more of the transceivers 126 responsive to receivingthe information regarding the wireless networks.

At 310, the wireless network is connected to using the receivedinformation and the activated transceiver. For example, the activationmodule 130 that is implemented in the mobile device 100 connects the oneor more transceivers 126 to the respective wireless networks that areavailable using the received information and the activated transceiver.In an implementation, the activation module 130 can utilize a Wi-Fitransceiver 126 to connect the wireless network without scanning forother wireless networks that may be available, thus conserving devicebattery power. Alternatively, the activation module 130 can utilize theWi-Fi transceiver 126 to scan for other available wireless networksbefore connecting.

At 312, the transceiver that is connected to the wireless network isdeactivated when the wireless network is no longer available. Forexample, the activation module 130 that is implemented in the mobiledevice 100 deactivates a transceiver that is connected to a wirelessnetwork when the wireless network is no longer available, such as when auser leaves the residence 202 with mobile device 100 and the wirelessnetwork that the Wi-Fi transceiver 126 was connected to is no longerwithin communication range. The activation module 130 can also beimplemented to deactivate a transceiver 126 after a specified amount oftime has elapsed and/or when the wireless network is no longeravailable.

FIG. 4 illustrates example method(s) 400 of RFID-based activation forwireless network communication. The order in which the method isdescribed is not intended to be construed as a limitation, and anynumber or combination of the described method operations can beperformed in any order to perform a method, or an alternate method.

At 402, a secure read or a generic read of a wireless tag is performed.For example, the RFID reader 102 that is implemented in the mobiledevice 100 performs a secure read or a generic read of the RFID tag 106.A transmitted signal to the RFID tag 106 can indicate a type of read asa secure read or a generic read, and the RFID tags can be implemented todifferentiate the type of reads and respond with a specific responsebased on the type of read (e.g., interrogation).

At 404, an authentication key is communicated to the RFID tag for thesecure read of the RFID tag. For example, the RFID reader 102 that isimplemented in the mobile device 100 communicates an authentication key(e.g., from the information stored as the wireless networkauthentication 134) to the RFID tag 106 to perform a secure read of theRFID tag. In implementations, the RFID reader 102 can communicate aspecified key to the RFID tag 106, and the RFID tag is programmed torespond with a specific response to the specified key. Other keys mayalso be transmitted to the RFID tag 106, invoking a specific responsefrom the RFID tag for each key that is transmitted to the RFID tag.

At 406, the mobile device receives credentials and/or authenticationinformation that allows the mobile device to connect to a guest networkor a secure network. For example, the RFID reader 102 receives thewireless network credentials 114 and/or other wireless networkauthentication 134 information from the RFID tag 106 responsive to asecure read or a generic read of the RFID tag, such as guest credentialsreceived from the RFID tag responsive to the generic read at 402. Theguest credentials allow the mobile device 100 to connect to a guestnetwork. Alternatively, the RFID reader 102 receives secure credentials(e.g., an authentication key) or other authentication informationresponsive to the secure read at 402, and the secure credentials allowthe mobile device 100 to connect to a secure network.

At 408, the mobile device connects to the secure network using thereceived credentials. For example, control module 132 initiates atransceiver 126 of a wireless radio system 116 in the mobile device 100to connect to the secure network using the secure credentials (e.g., thewireless network credentials 114) that are received from the RFID tag106.

At 410, the RFID tag is interrogated for a generic read of the RFID tag.For example, as an alternative to the secure read, the RFID reader 102that is implemented in the mobile device 100 interrogates the RFID tag106 as a generic read. The RFID reader 102 can transmit a predefinedsignal to perform the generic read of the RFID tag 106, and the RFID tagcan identify the predefined signal as a generic read. Again, the RFIDreader 102 of the mobile device 100 receives the authenticationinformation from the RFID tag at 406.

At 412, the mobile device connects to the guest network using thereceived authentication information. For example, control module 132initiates a transceiver 126 of a wireless radio system 116 in the mobiledevice 100 to connect to the guest network using the received guestcredentials from the RFID tag 106.

FIG. 5 illustrates example method(s) 500 of RFID-based locationdetermination for antenna power adjustment. The order in which themethod is described is not intended to be construed as a limitation, andany number or combination of the described method operations can beperformed in any order to perform a method, or an alternate method.

At 502, a mobile device scans for RFID tags. For example, the RFIDreader 102 that is implemented in the mobile device 100 scans for RFIDtags (e.g., the RFID tag 106) that are within communication range. Asdescribed with reference to FIG. 2, the RFID reader 102 can scan for theRFID tags 218 and 222 when a user enters and moves about the building.At 504, a determination is made as to whether an RFID tag has beendetected. For example, the control module 132 that is implemented in themobile device 100 determines whether a RFID tag 218 (or RFID tags 222)has been detected.

If a RFID tag has been detected (i.e., “Yes” from 504), then at 506, adetermination is made as to whether the RFID tag is associated with aspecific location. For example, the control module 132 determineswhether a detected RFID tag 222 is associated with a specific location,area, residence, and/or building room, which can be determined from theRFID tags database 144 that is maintained with device memory 118 in themobile device 100. The control module 132 can look up the RFID taginformation stored in the RFID tags database.

If a RFID tag has not been detected (i.e., “No” from 504), or if adetected RFID tag is not associated with a specific location (i.e., “No”from 506), then at 508, a default antenna power configuration is used.For example, the control module 132 maintains a default antenna powerconfiguration of an antenna 128 for a wireless radio system 116, such asto maintain the best possible coverage to receive the wireless systemsignal.

If a detected RFID tag is associated with a specific location (i.e.,“Yes” from 506), then at 510, the mobile device scans for a wirelesssignal. For example, the mobile device 100 scans for wireless signalsthat are within communication range utilizing a Wi-Fi transceiver 126(or other transceivers of the respective wireless radio systems 116responsive to the control module 132 determining an association betweenthe RFID tag and the specific location.

At 512, a determination is made as to whether the wireless signal ishigh (e.g., is a high wireless signal with good coverage). For example,the control module 132 that is implemented in the mobile device 100determines whether a detected wireless signal is a high wireless signal.If the wireless signal is determined to be a high wireless signal (i.e.,“Yes” from 512), then at 514, the antenna power is decreased and a valueof the decreased antenna power for the specific location is saved. Forexample, the control module 132 initiates decreasing the antenna powerof an antenna 128 for a wireless radio system 116, and saves the valueof the decreased antenna power in the RFID tags database 144.

In an example, the mobile device 100 may be located in the office 204and the RFID tag at the desk 224 is scanned and located (at 502 and 504)by the RFID reader 102 of the mobile device 100. The wireless network216 is determined by scanning for wireless networks utilizing a Wi-Fitransceiver 126 when the RFID tag 222 at the desk 224 is located. Thelearning algorithm 142 of the control module 132 can determine that thewireless signal for wireless network 216 is above a threshold, and thendecrease the antenna power of the Wi-Fi transceiver. The threshold valueof the antenna power can be an arbitrary value set by the user or adefault value. The decrease in the antenna power of the Wi-Fitransceiver 126 results in lower power consumption by the mobile device.

If the wireless signal is not determined to be a high wireless signal(i.e., “No” from 512), then at 516, a determination is made as towhether the wireless signal is low (e.g., is a wireless signal of lowstrength or poor quality). If the wireless signal is determined to be alow wireless signal (i.e., “Yes” from 516), then at 518, the antennapower is increased and the antenna value for the specific location issaved. For example, the control module 132 initiates increasing theantenna power of an antenna 128 for a wireless radio system 116, andsaves the value of the decreased antenna power in the RFID tags database144.

In an example, the mobile device 100 may be located in the kitchen 214and the RFID tags 222 at the refrigerator 230 and/or the stove 232 arescanned and located (at 502 and 504) by the RFID reader 102 of themobile device 100. The wireless network 216 is determined by scanningfor wireless networks utilizing a Wi-Fi transceiver 126 when the RFIDtag 222 at the refrigerator 230 and/or at the stove 232 is located. Thelearning algorithm 142 of the control module 132 can determine that thewireless signal for wireless network 216 is below a threshold, and thenincrease the antenna power of the Wi-Fi transceiver. The threshold valueof the antenna power can be an arbitrary value set by the user or adefault value. The increase in the antenna power of the Wi-Fitransceiver 126 results in higher power consumption and a higher RSSIvalue.

If the wireless signal is not determined to be a low wireless signal(i.e., “No” from 516), then at 520, the wireless signal is optimized forthe location of the mobile device. For example, the control module 132is implemented to optimize the antenna power of an antenna 128 for awireless radio system 116 of the mobile device 100, at the currentlocation of the mobile device, such as located in the residence 202. Themethod then continues at 502 with the mobile device scanning for RFIDtags.

FIG. 6 illustrates example method(s) 600 of RFID-based locationdetermination for antenna power adjustment. The order in which themethod is described is not intended to be construed as a limitation, andany number or combination of the described method operations can beperformed in any order to perform a method, or an alternate method.

At 602, the mobile device 100 utilizes the positioning system 124 tocapture the location of the residence 202, such as with a GPStransceiver 126 to determine the location of the residence.Alternatively, the positioning system 124 may utilize a cellular modemtransceiver 126 to determine the location of the residence usingcellular network information.

At 604, the mobile device 100 utilizes the activation module 130 and/orthe control module 132 to capture wireless signals and associated signalstrengths within the residence 202. For example, after determining thelocation of residence 202, the activation module 130 can activate theWi-Fi transceiver 126 to scan and capture wireless networks andassociated signal strengths for each wireless network found.

At 606, the mobile device 100 utilizes the RFID reader 102 to perform ascan for RFID tags that are within communication range of the mobiledevice 100. At 608, the learning algorithm 142 of the control module 132stores the RFID tags that are identified at 606 into a temp memory. Themethod proceeds to 610 using one of the RFID tags stored in the tempmemory and sequentially processes each RFID tag in temp memoryindividually for the remainder of the process.

At 610, the learning algorithm 142 determines if the RFID tag exists inthe RFID tags location database 144. If the RFID tag is found in theRFID tags location database 144, then the method proceeds to 620. If theRFID tag is not found in the RFID tags location database 144, then themethod proceeds to 612.

At 612, the learning algorithm 142 determines whether the RFID tag is onor in a stationary object. If the RFID tag is on or in a stationaryobject, then the method proceeds to 626. If the RFID tag is not on or ina stationary object, then the method proceeds to 614. At 614, thelearning algorithm 142 loads or stores the RFID tag identified at 606into the RFID tags location database 144.

At 616, the learning algorithm 142 determines if there are more RFIDtags in the temp memory from 608. If more RFID tags exist in the tempmemory, then the method proceeds to 610. If there are no additional RFIDtags in the temp memory, then the method proceeds to 618. At 618, thelearning algorithm 142 wakes up the processor 120 (e.g., of theprocessing system) or another module executed by the applicationprocessor and notifies that a new or updated RFID tags location database144 is available.

At 620, responsive to the RFID tag existing in the RFID tags locationdatabase 144, the learning algorithm 142 determines whether the currentresidence at 602 correlates or matches to RFID tag information stored inthe RFID tags location database 144. The RFID tag information includesresidence location, date and time the RFID tag was read, a type ofobject the RFID tag is on or in, a running count indicating the numberof times the RFID tag has been read, wireless signals and associatedsignal strengths for each wireless signal captured by the mobile device100, and/or a room type associated with the RFID tag.

At 622, responsive to the current residence and the RFID tag informationexisting and correlating in the RFID tags location database 144 at 620,the learning algorithm 142 updates the RFID tag information stored inthe RFID tag location database by incrementing a running count of thenumber of times the RFID tag has been detected, storing wireless signalscaptured at 604, and storing the signal strength for each wirelesssignal captured. The signal strength can be represented by a ReceivedSignal Strength Indication (RSSI) value 136 that is an indication of apower level being received by the mobile device 100. The RSSI value 136stored in the RFID tags location database 144 is a representation of thesignal strength of wireless network 216 in a particular room of theresidence 202.

For example, the mobile device 100 is in the office 204 which isrelatively close to the wireless network 216. Due to the close proximityof the mobile device 100 and the wireless network 216, the RSSI value136 of the wireless network 216 indicates a relatively high valuecorrelating to a high signal strength (e.g., indicated as the highestWi-Fi signal 234) when compared to the mobile device 100 being in otherrooms. For example, the mobile device 100 near the doorway 220 which isapproximately the furthest distance from wireless network 216. Thislocation in the residence 202 may be the lowest signal strength asindicated by the lowest Wi-Fi signal 236 and the RSSI value 136 of thewireless network 216 near the doorway 220 will be lower than the RSSIvalue when the mobile device is in the office 204.

At 624, the learning algorithm 142 determines if the running count ofthe number of times the RFID tag has been detected is greater than athreshold value. The threshold value can be an arbitrary value set bythe user or a default value. If the running count exceeds the threshold,then the method proceeds to 628. If the running count does not exceedthe threshold, then the method proceeds to 616.

At 626, responsive to the determination at 612 or at 620, the learningalgorithm 142 updates the RFID tags location database 144 with the RFIDtag information. The RFID tag information includes residence location,date and time the RFID tag was read, a type of object the RFID tag is onor in, a running count indicating the number of times the RFID tag hasbeen read, wireless signals and associated signal strengths for eachwireless signal captured by mobile device 100, and/or a room typeassociated with the RFID tag.

At 628, responsive to the determination that the number of times theRFID tag has been detected is greater than the threshold value, thelearning algorithm 142 determines a tag type associated with the objectthat the RFID tag is on or in. Based on the RFID tag type, a room typeis associated with the RFID tag. At 630, the learning algorithm 142updates the RFID tags location database 144 to store or update the roomtype associated with the RFID tag.

FIG. 7 illustrates various components of an example device 700 in whichembodiments of RFID contextual location determination and sensing forwireless network communication can be implemented. The example device700 can be implemented as any of the computing devices described withreference to the previous FIGS. 1-6, such as any type of client device,mobile phone, tablet, computing, communication, entertainment, gaming,media playback, and/or other type of device. For example, the mobiledevice 100 shown in FIG. 1 may be implemented as the example device 700.

The device 700 includes communication transceivers 702 that enable wiredand/or wireless communication of device data 704 with other devices.Additionally, the device data can include any type of audio, video,and/or image data. Example transceivers include wireless personal areanetwork (WPAN) radios compliant with various IEEE 802.15 (Bluetooth™)standards, wireless local area network (WLAN) radios compliant with anyof the various IEEE 802.11 (WiFi™) standards, wireless wide area network(WWAN) radios for cellular phone communication, wireless metropolitanarea network (WMAN) radios compliant with various IEEE 802.15 (WiMAX™)standards, and wired local area network (LAN) Ethernet transceivers fornetwork data communication.

The device 700 may also include one or more data input ports 706 viawhich any type of data, media content, and/or inputs can be received,such as user-selectable inputs to the device, messages, music,television content, recorded content, and any other type of audio,video, and/or image data received from any content and/or data source.The data input ports may include USB ports, coaxial cable ports, andother serial or parallel connectors (including internal connectors) forflash memory, DVDs, CDs, and the like. These data input ports may beused to couple the device to any type of components, peripherals, oraccessories such as microphones and/or cameras.

The device 700 includes a processing system 708 of one or moreprocessors (e.g., any of microprocessors, controllers, and the like)and/or a processor and memory system implemented as a system-on-chip(SoC) that processes computer-executable instructions. The processorsystem may be implemented at least partially in hardware, which caninclude components of an integrated circuit or on-chip system, anapplication-specific integrated circuit (ASIC), a field-programmablegate array (FPGA), a complex programmable logic device (CPLD), and otherimplementations in silicon and/or other hardware. Alternatively or inaddition, the device can be implemented with any one or combination ofsoftware, hardware, firmware, or fixed logic circuitry that isimplemented in connection with processing and control circuits, whichare generally identified at 710. The device 700 may further include anytype of a system bus or other data and command transfer system thatcouples the various components within the device. A system bus caninclude any one or combination of different bus structures andarchitectures, as well as control and data lines.

The device 700 also includes computer-readable storage memory 712 thatenable data storage, such as data storage devices that can be accessedby a computing device, and that provide persistent storage of data andexecutable instructions (e.g., software applications, programs,functions, and the like). Examples of the computer-readable storagememory 712 include volatile memory and non-volatile memory, fixed andremovable media devices, and any suitable memory device or electronicdata storage that maintains data for computing device access. Thecomputer-readable storage memory can include various implementations ofrandom access memory (RAM), read-only memory (ROM), flash memory, andother types of storage media in various memory device configurations.The device 700 may also include a mass storage media device.

The computer-readable storage memory 712 provides data storagemechanisms to store the device data 704, other types of informationand/or data, and various device applications 714 (e.g., softwareapplications). For example, an operating system 716 can be maintained assoftware instructions with a memory device and executed by theprocessing system 708. The device applications may also include a devicemanager, such as any form of a control application, softwareapplication, signal-processing and control module, code that is nativeto a particular device, a hardware abstraction layer for a particulardevice, and so on. In this example, the device 700 includes anactivation module 718 and/or a control module 720 that implementembodiments of RFID contextual location determination and sensing forwireless network communication, and may be implemented with hardwarecomponents and/or in software, such as when the device 700 isimplemented as the mobile device 100 described with reference to FIGS.1-6. An example of the activation module 718 is the activation module130, and an example of the control module 720 is the control module 132that is implemented by the mobile device 100.

The device 700 also includes an RFID reader 722, such as described withreference to the RFID reader 102 that is implemented in the mobiledevice 100. The device 700 also includes a positioning system 724 thatdetermines a geographical location of the device 700. The positioningsystem 724 can include a GPS transceiver and/or a cellular transceiver.The device 700 can also include one or more power sources 726, such aswhen the device is implemented as a mobile device. The power sources mayinclude a charging and/or power system, and can be implemented as aflexible strip battery, a rechargeable battery, a chargedsuper-capacitor, and/or any other type of active or passive powersource.

The device 700 also includes an audio and/or video processing system 728that generates audio data for an audio system 730 and/or generatesdisplay data for a display system 732. The audio system and/or thedisplay system may include any devices that process, display, and/orotherwise render audio, video, display, and/or image data. Display dataand audio signals can be communicated to an audio component and/or to adisplay component via an RF (radio frequency) link, S-video link, HDMI(high-definition multimedia interface), composite video link, componentvideo link, DVI (digital video interface), analog audio connection, orother similar communication link, such as media data port 734. Inimplementations, the audio system and/or the display system areintegrated components of the example device. Alternatively, the audiosystem and/or the display system are external, peripheral components tothe example device.

Although embodiments of RFID contextual location determination andsensing for wireless network communication have been described inlanguage specific to features and/or methods, the subject of theappended claims is not necessarily limited to the specific features ormethods described. Rather, the specific features and methods aredisclosed as example implementations of RFID contextual locationdetermination and sensing for wireless network communication, and otherequivalent features and methods are intended to be within the scope ofthe appended claims. Further, various different embodiments aredescribed and it is to be appreciated that each described embodiment canbe implemented independently or in connection with one or more otherdescribed embodiments.

1. A method for radio-frequency identification (RFID)-based activationof one or more transceivers in a mobile device, the method comprising:receiving a notification that one or more wireless networks areavailable based on communication with an RFID tag; receiving informationfrom the RFID tag regarding at least one of the wireless networks, theinformation comprising authentication to allow the mobile device toconnect to one of the wireless networks based on a type of read of theRFID tag performed by a RFID reader of the mobile device; and activatingat least one transceiver in the mobile device for communication via thewireless network.
 2. The method as recited in claim 1, furthercomprising: transmitting a key from the mobile device to the RFID tag;receiving credentials from the RFID tag; and connecting, using one ofthe transceivers, to the wireless network using the received credentialsfrom the RFID tag.
 3. The method as recited in claim 1, wherein thewireless network is a secure network and the type of read of the RFIDtag is a secure read, comprising: communicating an authentication key tothe RFID tag from the mobile device for the secure read of the RFID tag;receiving credentials from the RFID tag that allows the mobile device toconnect to the secure network; and connecting to the secure networkutilizing the received credentials.
 4. The method as recited in claim 1,wherein the wireless network is a guest network and the type of read ofthe RFID tag is a generic read, comprising: interrogating the RFID tagfrom the mobile device; said receiving the information comprising theauthentication to allow the mobile device to connect to the guestnetwork; and connecting to the guest network utilizing the receivedinformation.
 5. The method as recited in claim 1, wherein the one ormore transceivers in the mobile device include a Wi-Fi transceiver, aBluetooth™ transceiver, a Global Positioning System (GPS) transceiver, aNear Field Communication (NFC) transceiver, and a cellular networktransceiver.
 6. The method as recited in claim 1, further comprising:computing received signal strength indicator (RSSI) values for the oneor more wireless networks.
 7. The method as recited in claim 6, whereinsaid activating the at least one transceiver in the mobile device isbased on the computed RSSI value for the wireless network thatcorresponds to the at least one transceiver.
 8. The method as recited inclaim 1, wherein said activating the at least one transceiver in themobile device includes applying power to the at least one transceiver.9. A mobile device, comprising: a radio-frequency identification (RFID)reader configured to interrogate and communicate with RFID tags; one ormore transceivers configured for communication via respective wirelessnetworks; a memory and processing system to implement an activationmodule that is configured to: receive a notification from the RFIDreader that one or more wireless networks are available based oncommunication with at least one of the RFID tags; receive informationregarding at least one of the wireless networks, the informationcomprising authentication to allow the mobile device to connect to oneof the wireless networks based on a type of read of the RFID tagperformed by the RFID reader; and activate at least one transceiver inthe mobile device for communication via the wireless network.
 10. Themobile device as recited in claim 9, wherein: the RFID reader isconfigured to transmit an authentication key to the RFID tag and receivecredentials from the RFID tag; the activation module is configured to:initiate a connection of one of the transceivers to the wireless networkusing the received credentials from the RFID tag; and deactivate thetransceiver connected to the wireless network responsive to adetermination that the wireless network is no longer available.
 11. Themobile device as recited in claim 9, wherein the wireless network is asecure network and the type of read of the RFID tag is a secure read,and wherein: the RFID reader is configured to communicate anauthentication key to the RFID tag from the mobile device for the secureread of the RFID tag; the RFID reader is configured to receivecredentials from the RFID tag that allows the mobile device to connectto the secure network; and the activated transceiver is configured toconnect to the secure network utilizing the received credentials. 12.The mobile device as recited in claim 9, wherein the network is a guestnetwork and the type of read of the RFID tag is a generic read, andwherein: the RFID reader is configured to interrogate the RFID tag fromthe mobile device; the RFID reader is configured to said receive theinformation comprising the authentication to allow the mobile device toconnect to the guest network; and the activated transceiver isconfigured to connect to the guest network utilizing the receivedinformation.
 13. The mobile device as recited in claim 9, where the oneor more transceivers include a Wi-Fi transceiver, a Bluetooth™transceiver, a Global Positioning System (GPS) transceiver, a Near FieldCommunication (NFC) transceiver, and/or a cellular transceiver.
 14. Themobile device as recited in claim 9, wherein the activation module isfurther configured to compute received signal strength indicator (RSSI)values for the one or more wireless networks.
 15. A system, comprising:a radio-frequency identification (RFID) tag configured to maintaininformation associated with a Wi-Fi network; a RFID reader configured tointerrogate and communicate with the RFID tag to receive the informationassociated with the Wi-Fi network; an activation module that isconfigured to: receive a notification from the RFID reader that theWi-Fi network is available based on the information received from theRFID tag, the information comprising authentication to connect to theWi-Fi network; and activate a Wi-Fi transceiver for communication viathe Wi-Fi network.
 16. The system as recited in claim 15, wherein: theRFID reader is configured to transmit a key to the RFID tag and receivecredentials from the RFID tag; the activation module is configured toinitiate a connection of the Wi-Fi transceiver to the Wi-Fi networkusing the received credentials from the RFID tag.
 17. The system asrecited in claim 16, win the activation module is configured todeactivate the Wi-Fi transceiver connected to the Wi-Fi network if theWi-Fi network is no longer available.
 18. The system as recited in claim15, wherein the activation module is further configured to compute areceived signal strength indicator (RSSI) value for the Wi-Fi network.19. The system as recited in claim 15, wherein the Wi-Fi network is asecure network and the RFID reader is configured to: communicate anauthentication key to the RFID tag for a secure read of the RFID tag;receive credentials from the RFID tag that allows the Wi-Fi transceiverto connect to the secure network; and the Wi-Fi transceiver isconfigured to connect to the secure network utilizing the receivedcredentials.
 20. The system as recited in claim 15, wherein the Wi-Finetwork is a guest network, and wherein: the RFID reader is configuredto said receive the information comprising the authentication to allow aconnection to the guest network; and the Wi-Fi transceiver is configuredto connect to the guest network utilizing the received information.