Radio frequency identification communication and applications thereof

ABSTRACT

Embodiments of the present disclosure describe devices, methods, computer-readable media and system configurations for communicating and utilizing data received in radio frequency identification (“RFID”) signals to perform various actions. For example, a query signal may be transmitted to a plurality of RFID tags associated with a plurality of objects. A plurality of reply signals may be received from the plurality of RFID tags. Various actions may be performed based on one or more of the reply signals. In various embodiments, an RFID query device may include components such as a camera to capture image data and/or a global positioning system (“GPS”) component. Data from one or more of these components may be used in conjunction with received RFID data to perform various actions. RFID data may further be used to disarm and/or control weapons. Other embodiments may be described and/or claimed.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application claims priority to U.S. Provisional Patent Application No. 61/446,815, filed Feb. 25, 2011, entitled “Radio Frequency Communication and Applications Thereof,” the entire disclosure of which is hereby incorporated by reference in its entirety.

TECHNICAL FIELD

Embodiments herein relate to the field of wireless communications, and more specifically, to applications of radio frequency identification (“RFID”) technology.

BACKGROUND

RFID is a communication technology in which RFID tags may be associated with (e.g., placed on or inside of, affixed to, packaged with) objects and remotely queried, tracked and/or identified using radio frequency waves. An RFID query device may emit radio frequency waves to which RFID tags may respond. Some RFID tags may be considered “active” because they operate under their own power. Other RFID tags may be considered “passive” because they do not have their own power source and instead are powered by a signal received from an RFID query device. In either case, an RFID tag may receive the radio frequency waves emitted by the RFID query device and may respond thereto.

An RFID query device may be any device that includes one or more components to exchange RFID query signals with one or more RFID tags. A non-exclusive list of devices that may function as RFID query devices includes mobile telephones, smart phones, portable computers, scanners, entryway devices (e.g., to read name badges with RFID tags), cameras, other portable electronic devices, and so forth.

Near Field Communication (“NFC”) is a subset of RFID that limits the range of communications to a close range. NFC may be useful for applications where potentially sensitive data is exchanged between an RFID query device and an RFID tag, such as credit card and passport applications. Longer range applications of RFID may be useful in other applications where data exchanged is not sensitive and/or where RFID tags are likely to be distanced from an RFID query device, such as for animal tracking. Unless otherwise indicated, the term RFID as used herein encompasses NFC.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments will be readily understood by the following detailed description in conjunction with the accompanying drawings. Embodiments are illustrated by way of example and not by way of limitation in the figures of the accompanying drawings.

FIG. 1 illustrates an RFID query device as it may be used to query a plurality of objects having RFID tags, in accordance with various embodiments;

FIG. 2 schematically depicts an example method that may be implemented by various devices, including an RFID query device, in accordance with various embodiments;

FIG. 3 illustrates an RFID query device as it may be used to query RFID tags on an individual, in accordance with various embodiments;

FIG. 4 illustrates a roadside RFID query device and interactive billboard, in accordance with various embodiments;

FIG. 5 illustrates a smart phone equipped with an RFID query device and a digital camera, in accordance with various embodiments;

FIG. 6 illustrates a map used to track travel of an object having an RFID tag, in accordance with various embodiments;

FIG. 7 illustrates an object with an RFID tag as it may be tracked by multiple RFID query devices, in accordance with various embodiments; and

FIG. 8 depicts examples of an RFID trap-type weapon, in accordance with various embodiments.

FIG. 9 depicts an example of an RFID projectile weapon, in accordance with various embodiments.

FIG. 10 depicts an example of an RFID trap-type weapon configured to emit shaped attacks, in accordance with various embodiments.

FIG. 11 schematically depicts an example system, in accordance with various embodiments.

DETAILED DESCRIPTION OF DISCLOSED EMBODIMENTS

In the following detailed description, reference is made to the accompanying drawings which form a part hereof, and in which are shown by way of illustration embodiments that may be practiced. It is to be understood that other embodiments may be utilized and structural or logical changes may be made without departing from the scope. Therefore, the following detailed description is not to be taken in a limiting sense, and the scope of embodiments is defined by the appended claims and their equivalents.

Various operations may be described as multiple discrete operations in turn, in a manner that may be helpful in understanding embodiments; however, the order of description should not be construed to imply that these operations are order dependent.

The description may use perspective-based descriptions such as up/down, back/front, and top/bottom. Such descriptions are merely used to facilitate the discussion and are not intended to restrict the application of disclosed embodiments.

The terms “coupled” and “connected,” along with their derivatives, may be used. It should be understood that these terms are not intended as synonyms for each other. Rather, in particular embodiments, “connected” may be used to indicate that two or more elements are in direct physical or electrical contact with each other. “Coupled” may mean that two or more elements are in direct physical or electrical contact. However, “coupled” may also mean that two or more elements are not in direct contact with each other, but yet still cooperate or interact with each other.

For the purposes of the description, a phrase in the form “NB” or in the form “A and/or B” means (A), (B), or (A and B). For the purposes of the description, a phrase in the form “at least one of A, B, and C” means (A), (B), (C), (A and B), (A and C), (B and C), or (A, B and C). For the purposes of the description, a phrase in the form “(A)B” means (B) or (AB) that is, A is an optional element.

The description may use the terms “embodiment” or “embodiments,” which may each refer to one or more of the same or different embodiments. Furthermore, the terms “comprising,” “including,” “having,” and the like, as used with respect to embodiments, are synonymous.

In various embodiments, methods, apparatuses, computer-readable media and systems for exchanging RFID data with one or more RFID tags and taking various actions using received RFID data are provided. In various embodiments, a computing system and/or a portable electronic device may be equipped with one or more components of the disclosed apparatuses and/or systems and may be employed to perform one or more methods as disclosed herein.

Radio frequency communication protocols are broadly identified and utilized in embodiments herein, whether or not the signal is modulated by a suitable technique, such as a spread spectrum technique.

In one aspect, methods, systems and devices are provided to query a plurality of RFID tags with an RFID query device and perform one or more actions based on RDIF data received at the RFID query device from the plurality of RFID tags in response to the query.

For example, an RFID query device such as a smart phone may be used to query, e.g., using a broadcast a radio frequency signal, a plurality of objects having a plurality of RFID tags. A user who wishes to obtain more information about a particular object may hold the RFID query device closer to the object of interest than to other objects. The RFID query device may filter all the response RFID signals received from the plurality of objects and determine that the user is interested in the object having an RFID tag that provides the strongest return signal. In some embodiments, the RFID query device may only acknowledge RFID responses meeting a particular criterion, such as reply signals having a strength value that is above a threshold.

An example of this is illustrated schematically in FIG. 1. Objects 10, shown as products labeled A-F, are shown on shelves. Each object 10 has an RFID tag 12. An RFID query device in the form of a smart phone 14 is held closer to the object labeled “F” than to the other objects. Smart phone 14 includes an antenna 16 that broadcasts a signal containing an RFID query. RFID tags in proximity to smart phone 14, including RFID tags 12 on each of the plurality of objects 10, receive the signal containing the RFID query and transmit a reply signal containing RFID data, e.g., about objects 10.

Smart phone 14 may receive reply signals from RFID tags 12 on one or more of the plurality of objects 10. However, because smart phone 14 is closer to object 10 labeled “F” than it is to the other objects 10, the reply signal received from RFID tag 12 of the object 10 labeled “F” may be stronger than those received from RFID tags 12 of the other objects 10 labeled “A”-“E.” Using filters, comparisons or other suitable logic, smart phone 14 may identify the strongest reply signal—in this case, the signal from RFID tag 12 of the object 10 labeled “F”—and may determine information about the corresponding object 10. The fact that the strongest signal is received from an RFID tag 12 of a particular object may indicate that the user is more interested in that object 10 than other objects.

In some embodiments, an RFID query device such as smart phone 14 or another device in communication with the RFID query device may determine information about an object based on a reply signal received at the RFID query device. For example, in FIG. 1, smart phone 14 may identify, from a database 18, an object corresponding to RFID data contained in the reply signal smart phone 14 received from RFID tag 12 of the object labeled “F.” Database 18 may contain information about objects such as price, nutritional content, product specials, expiration dates, ingredients, applicable recipes, allergens, hyperlinks to pertinent websites, and so forth.

In various embodiments, database 18 may be indexed by RFID data associated with objects 10, so that RFID data received in a reply signal by smart phone 14 from RFID tag 12 may be readily located in database 18. Smart phone 14 may communicate with database 18 via a wireless connection 20 or by any other type of data connection, including a hard wire connection (e.g., a user connects smart phone 14 to a home computer via USB). Information may be exchanged between smart phone 14 and database 18 using any number of communication protocols.

Upon receipt of RFID data from an RFID tag, any number of actions may be performed, by the RFID query device and/or other devices in communication with the RFID query device. For example, an output may be selected, e.g., from a plurality of potential outputs, based at least in part on the received RFID data, and outputted, by the RFID query device or by another device. FIG. 1 depicts such an example, where the output is an image of the object that is displayed to the user of smart phone 14. Other visual output related to the object, such as its price, nutritional information, ingredients, recipes, allergens, and so forth may also be displayed to the user via smart phone 14.

Output may be visual, audio, tactile, olfactory, or a combination thereof. For example, an output such as a targeted advertisement may be selected and presented to the user, e.g., visually on an electronic display on smart phone 14 and/or audibly through a speaker of smart phone 14. The output may be selected based on the user's interest in a particular brand of product (e.g., the object in FIG. 1 labeled “F”).

In various embodiments, information about the user of the RFID query device may be conveyed to database 18. For example, the RFID data contained in a reply signal received at smart phone 14 from RFID tag 12 of object 10 nearest smart phone 14 (e.g., having the strongest reply signal) may be associated with the user of smart phone 14 at database 18. Additionally or alternatively, information received from RFID tags 12 of each of the plurality of objects 10 of FIG. 1—and in some cases an indication of which object had the strongest RFID reply signal—may be provided to database 18, for association with the user. A profile of the user may then be created/modified based on the user's interest in or association with particular objects and/or brands.

An example method 200 that may be implemented by a device such as smart phone 14 in FIG. 1 is schematically depicted in FIG. 2. At 202, a query signal may be transmitted, e.g., by smart phone 14, to a plurality of RFID tags associated with a plurality of objects. At 204, a plurality of reply signals may be received, e.g., by smart phone 14, from the plurality of RFID tags.

At 206, a strongest reply signal of the plurality of reply signals may be identified, e.g., by smart phone 14, using filters or other suitable components. As described above, the strongest reply signal may be received from an RFID tag associated with an object that is closer to the smart phone 14 than other objects having RFID tags.

At 208, information about at least one of the plurality of objects may be determined based on RFID data contained in the strongest reply signal. For example, at 210, an output may be selected, e.g., by smart phone 14 or by another device, from a plurality of outputs.

At 212, various actions may be taken with the information determined at 208. For example, at 214, the output selected at 210 may be output, e.g., on smart phone 14 or by another device. As noted above, the output may be visual, audio, tactile, olfactory, or any combination thereof. Additionally or alternatively, at 216, the information determined at 208 may be associated with user data in a database such as database 18 in FIG. 1.

In various embodiments, the output additionally or alternatively may be selected based on a commonality identified between a plurality of objects having RFID tags. For example, a targeted advertisement may be based on a user's interest in a class of objects.

FIG. 3 depicts an individual 300 wearing a hat 302, a shirt 304, pants 306 and shoes 308. Each of the articles of clothing includes an RFID tag 310. An RFID query device 312 is shown in proximity to individual 300 so that it may broadcast an RFID query that is received at the RFID tags 310 of the various pieces of clothing. RFID tag 310 of each piece of clothing may transmit a response to RFID query device 312 containing RFID data associated with the piece of clothing. For example, RFID tag 310 of hat 302 may return RFID data that may be used to determine information such as the brand of the hat, the original price of the hat, identification of a sports team or organization endorsed on or by the hat, the location where the hat was manufactured, and so forth.

Information obtained using RFID data received from RFID tags 310 on individual 300 may be used to create a user profile, similar to that described above. With the user profile, one or more targeted advertisements may be provided to individual 300. For example, the user profile may reflect a commonality between the objects; e.g., that shirt 304 endorses a sports team from a particular state and hat 302 endorses a musical group from the same state. This may suggest that individual 300 has an affinity for, is from, or lives within that state. Accordingly, output relevant to that state may be selected and provided to individual 300.

Similar to querying RFID tags on a person, an RFID query device may be placed on a roadway to query RFID tags on passing vehicles and/or passengers in the vehicle to generate profiles of the vehicles and/or passengers. The RFID query device may communicate with advertisement delivery devices (e.g., billboards, radio towers broadcasting radio advertisements to cars, etc.), directly or through one or more databases (e.g., database 18 in FIG. 1). The advertisement delivery devices may provide the driver of the vehicle with a targeted advertisement based on RFID information received from the vehicle.

An example of a roadside RFID query device and interactive billboard is shown in FIG. 4. A vehicle 400 is shown on a roadway 402 moving in the direction of the arrow. Vehicle 400 includes one or more RFID tags 404 that may be configured to provide information about vehicle 400, parts found in vehicle 400, the history of vehicle 400, and so forth, in response to an RFID query signal. One or more RFID query devices 406 may be positioned to the side of roadway 402 or above/over roadway 402 and may be configured to query RFID tags in vehicles such as vehicle 400. As vehicle 400 passes RFID query device 406, the signal broadcast from RFID query device is received and responded to by RFID tag 404. RFID query device 406 may receive this information and communicate (directly or through one or more intermediary computing systems) with an interactive billboard 408 to display an advertisement specifically targeted at the driver of the car. In this example the advertisement asks “Have you seen the new model of your car brand?”

In some embodiments, a determination may be made about a social or economic status of an individual based on objects (or an identified commonality between multiple objects) in which the user shows interest (e.g., FIG. 1), the clothing the user wears (e.g., FIG. 3) and/or a vehicle the user drives (e.g., FIG. 4). If an object in which the individual shows interest, clothing worn by the individual, and/or a vehicle driven by the individual is relatively expensive, a profile created for the individual may reflect relative affluence, or may reflect such preferences. Thus, advertisements relating to luxury or “high end” products may be directed to such an individual (e.g., on interactive billboard 408 in FIG. 4 or at the individual's smart phone 14 in FIG. 1).

On the other hand, if an object in which the individual shows interest, clothing worn by the individual, or a vehicle driven by the individual is relatively inexpensive, then a user profile created for the individual may reflect that the user may be more responsive to advertisements related to discount retailers and/or non-luxury goods.

The embodiments provided above are merely examples, and additional information may be received from RFID tags and incorporated into a profile and/or provide information about user preferences.

In various embodiments, RFID query devices may include other components for obtaining data that may be used in conjunction with RFID data. For example, RFID query devices may be provided with digital cameras, allowing the devices to capture digital image data. In various embodiments, a portion of the captured digital image data may be associated with at least one datum of RFID data received from an RFID tag on an object depicted in the digital image data. This association may be performed and/or facilitated by an RFID query device and/or another device. For example, image processing software may be provided, in an RFID query device (e.g., smart phone 14 of FIG. 1), at a home computer and/or at a computer hosting a database (e.g., database 18), that is configured to process captured digital image data and make various decisions. Various combinations of the digital image data, determinations made about the digital image data by the image processing software, and information obtained from RFID tags by an RFID query device may be used in various applications.

Referring back to FIG. 1, RFID data received by smart phone 14 from RFID tags 12 on objects 10 may be associated with object information in database 18. If a user were to use a camera on smart phone 14 to capture a digital image of objects 10, image processing software may perform object recognition to identify each object within the digital image data and/or portion of the digital image data relating to each object. An identified object/region may be associated with at least one RFID datum of RFID data received from RFID tags 12 on each of the plurality of objects 10. If an object identified by image recognition software does not have an RFID tag, then RFID data may be generated for the object using information in a database.

In some embodiments, all or a portion of captured digital image data may be associated, e.g., by an RFID query device or another device, with one or more hyperlinks based on received RFID data received from RFID tags in the vicinity when the image was taken. For example, a digital image of the plurality of objects 10 of FIG. 1 may be altered so that that each object, or region immediately surrounding each object, is “tagged” so that it operates as a hyperlink to a webpage about the object. A user viewing the digital image may move a cursor over the “tagged” objects to receive an indication that the region is a link and, in some cases, certain information about the object. If the user clicks on the “tagged” object, she may be redirected to a website related to the object. A cursor may be moved to select from multiple tags in various ways, such as with a mouse, a keyboard, or a hands-free controller such as the Kinect™ from Microsoft®.

Hyperlinks relating to an object may be determined in various ways. For example, when an RFID query device receives RFID data from an RFID tag, the RFID query device or a computing system in communication with the RFID query device may search a network such as the Internet using the received RFID data. One or more universal resource locators (“URL”) of relevant websites may then be gathered and used to create hyperlinks within a digital image. In some embodiments, one or more relevant URLs may be stored in a database, such as database 18 of FIG. 1, or even provided to an RFID query device by an RFID tag.

FIG. 5 illustrates an RFID query device in the form of a smart phone 500 having a display 502, an input 504 and a digital camera 506. Digital camera 506 has been used to take a digital image of some objects on shelves and is depicted on display 502. Image processing software executing on smart phone 500 has used object recognition to identify the objects in the digital image and to “tag” those objects with the boxes 508, 510, 512 and 514. In some embodiments, image processing software may recognize objects based purely on visual characteristics of objects. In some embodiments, image processing software may utilize RFID data received from RFID tags on objects in an area (e.g., queried from the objects on a shelf) to narrow down the list of objects that could potentially be shown in the digital image, thereby simplifying object recognition by the image processing software. In various embodiments, tagged objects may be selected to utilize a hyperlink associated with the tagged object to navigate to a website.

In some embodiments, an RFID query device is configured to keep or discard information received from RFID tags based on information in a digital photograph. For example, image processing software (on the RFID query device or elsewhere) may be configured to identify foreground distance in a digital image. Once the foreground is identified, information received from RFID tags on objects in the foreground of the digital image may be acknowledged and utilized as described above. Information received from RFID tags on objects that are not in the foreground may be discarded.

Similarly, because RFID may not depend on line of sight, some objects or other objects containing RFID tags that return information to an RFID query device may not be visible at all in a digital image taken by the device. An RFID query device may use information received from non-visible objects, or in some cases, the RFID query device may discard such information.

In various embodiments, an RFID query device may be configured to determine a location of an object. For example, an RFID query device may be configured to obtain a global positioning system (“GPS”) coordinate of the location of the RFID query device. In some embodiments, one or more RFID query devices may be configured to determine the location of an object using triangulation. In either case, geographic coordinates of the RFID query device, along with other information, such as RFID data returned from RFID tags and/or captured digital image data, may be used in various ways.

For example, while querying an RFID tag associated with an object at a particular location, an RFID query device may obtain a geographic coordinate of that location using GPS. RFID data received at the RFID query device from the RFID tag of the object may then be associated with the geographic coordinate. This information may be communicated to a database as a record of the object having been at that location. In some embodiments, the RFID query device may be configured to generate a timestamp, so that a database record may also reflect when the object was at that location. In some embodiments, the received RFID data may be associated with the timestamp and/or the geographic coordinate and stored in a database record.

In some embodiments, a travel route of the object with an identifier, particularly one that has a unique or semi-unique identifier stored in its RFID tag, may be tracked based on database records having matching identifiers. Information about the travel route may be used for various purposes. A map illustrating the route may be generated, at an RFID query device or elsewhere, with indicators of where a particular item has been detected by RFID query devices.

An exemplary map 600 is shown in FIG. 6. Map 600 includes indicators at geographic coordinates contained in database records with matching RFID identifiers, providing an indication of locations where an object was identified by RFID query devices. In this example, the tracked object was first detected in Eastern Europe at 602. The tracked object was next detected in Southern Europe at 604. The tracked object was then detected in Western Africa at 606, and then in Cuba at 608, and finally in the United States at 610.

A travel route, locations and timestamps of a particular object may be used to determine or estimate the object's travel velocity. This velocity may be compared to reference velocities of other objects that may be obtained, for example, from customs for various countries or territories. By performing such comparisons, it may be determined whether an object is genuine or counterfeit. For example, RFID tags may be embedded in currency for tracking purposes.

Accordingly, the travel route of FIG. 6 and estimated velocity of the object as it traveled through locations 602-610 may be compared with known and/or legitimate travel routes and expected travel velocities to determine, for instance, whether the object is a counterfeit good. In this example, because the object travelled from Cuba to the United States, a determination may be made that the object was imported illegally.

In some embodiments, multiple RFID query devices may be used cooperatively to track a single object (e.g., a product, a car, a document, etc.) in real time. A first RFID query device may be configured to hand off tracking of an object to a second RFID query device as the object travels away from the first device and towards the second.

For instance, multiple smart phones having RFID components may track an object as it travels within a facility or even in open country. Given the enormous proliferation of mobile telephones throughout the world, this type of tracking may be particularly useful to track objects of critical importance, such as weapons, hazardous chemicals and so forth.

FIG. 7 illustrates an object 700 with an RFID tag 702 travelling along a path 704. The travel of the object may be tracked by a plurality of portable devices 706-712. As shown in FIG. 7, various types of portable devices may be used for tracking, including but not limited to smart phones 706 and 712, tablet computer(s) 708, other types of mobile phones (e.g., 710), as well as other devices not shown in FIG. 7, including but not limited to cameras, portable GPS units, pagers, radios used by emergency personnel such as police officers and firefighters, and so forth. In various embodiments, portable devices 706-712 each may include a processor, memory operably coupled to the processor, and a control module to be operated by the processor to cooperate with one or more of the other similarly-equipped portable devices to track movement of an object, such as object 700, having an RFID tag. In various embodiments, the control module of each portable device 706-712 may be configured to facilitate transmission of a query signal to the RFID tag and facilitate reception of a reply signal from the RFID tag. In various embodiments, the reply signal may include RFID data associated with object 700.

In various embodiments, an apparatus, such as a server (not shown) in communication with the plurality of portable devices 706-712, may be configured to receive, from one or more RFID query devices such as plurality of portable devices 706-712, data including a plurality of tuples. In various embodiments, each tuple may include RFID data associated with an object and a geographic coordinate of the object. In various embodiments, each received tuple may further include a timestamp, usable in conjunction with the RFID data associated with the object and the geographic coordinate of the object, to determine that the object was at the geographic coordinate at a time represented by the timestamp. In various embodiments, the server may be configured to track a route such as path 704 travelled by at least one object having an RFID tag, such as object 700, based on these received tuples.

In various embodiments, the server may be configured to calculate a velocity of object 700 based on the received tuples. In various embodiments, the server may be configured to determine whether the at least one object, e.g., object 700, is counterfeit based on the tracked route and/or calculated velocity.

In various embodiments, the control module of an RFID device such as one of portable devices 706-712 may further be configured to hand off tracking of the object to another one of portable devices 706-712. For instance, the control module may be configured to hand over tracking of the object to a first of one or more other devices where the control module determines that the object is closer to the first of the one or more other devices than the device hosting the control module, or that the object has a trajectory towards the first of the one or more other devices.

In various embodiments, the RFID query device such as one of portable devices 706-712 likewise may be configured to take over tracking of the object from a second of the one or more other devices. For example, the control module may be further configured to facilitate transmission of a request to the first of the one or more other devices to take over tracking of the object. In various embodiments, the control module may be configured to take over tracking of the object from the second of the one or more other devices where the control module determines that the object is closer to the device than the second of the one or more other devices. In various embodiments, the control module may additionally or alternatively be configured to take over tracking of the object where the control module receives a communication from the second of the one or more other devices requesting that the device take over tracking of the object.

As another example, multiple RFID query devices may be placed along a road (similar to FIG. 3), and may track passage of a vehicle having an RFID tag as it passes. This information could be particularly useful to authorities in a high-speed chase.

Some embodiments may further be configured to follow the object, with a built-in camera. These embodiments may use triangulation to follow the object.

In some embodiments, an RFID query device may obtain RFID information from a plurality of objects in an area, geographic coordinates of the area and a digital image of the area and, using methods described above, display information to the user about the objects in various ways. For example, smart phone 14 of FIG. 1 may obtain information about each of plurality of objects 10 on the shelves, such as RFID data, a geographic location of the smart phone and digital image data captured by a camera on smart phone 14. Using this information, smart phone 14 and/or other devices may determine information about those objects using database 18, and output the information about the objects to a user in various ways (e.g., visual, audio, olfactory, tactile, etc.), as described above. In some embodiments, objects may be selectively displayed (or otherwise output) to the user based on whether their RFID tags have sufficient signal strength and whether the objects are identified as being visible or in the foreground. The geographic coordinates may be used to determine an appropriate price for each object (e.g., orange juice may be cheaper in Florida than Alaska). The geographic coordinates may also be used to determine which hyperlinks to associate with portions of captured digital image data. For example, if smart phone 14 is located in a Spanish-speaking country such as Mexico, smart phone 14 or another device may choose hyperlinks, for association with portions of captured image data, that lead to Spanish-language websites.

In various embodiments, a secure token may be created and stored in and/or transmitted by an RFID tag. The secure token may provide secure numerical access codes for various cryptographic schemes, such as public-key encryption, using various algorithms. One example algorithm used in public key cryptography is the Rivest, Shamir and Adleman (“RSA”) encryption algorithm described in U.S. Pat. No. 4,405,829 for a “Cryptographic communications system and method,” the entire content of which is incorporated by reference for all purposes. Secure tokens may be used in other technologies as well, such as the KeeLoq block cipher used in automobile systems.

A secure token stored in an RFID tag may be implemented in various applications, such as banking, network access, and/or other applications requiring secure access. An RFID tag may be embodied with or coupled with a device configured to generate the secure token. The secure token may then be used to gain access to a location or electronic network, etc., but with increased security using an encrypted signal.

In addition to advertising and marketing, RFID technology may be used in real warfare and simulated warfare (e.g., paintball). The following disclosure applies equally to both, and is directed to weapons that may be triggered and/or at least partially controlled using RFID.

In various embodiments, a mine or other trap-type weapon (e.g., claymore, unmanned firearm, etc.) may be equipped with an RFID query device. The RFID query device may be configured to broadcast a query signal and to facilitate activation (e.g., detonation) of the trap-type weapon upon receiving an RFID response with information that meets predetermined criteria. For example, in various embodiments, the predetermined criteria (which may be preset or reprogrammed at any time) may include whether RFID data received from a responding RFID tag contained in or on a passing object matches an identifier associated with RFID tags found in or on equipment (e.g., uniforms, vehicles, weapons, etc.). In such cases, logic (e.g., a hard-wired logic circuit, software, or a processor) in the RFID query device may compare the received RFID data to identifiers associated with RFID tags found in or on enemy equipment. If the logic finds a match, the RFID query device may cause the trap-type weapon to activate. For example, a mine may explode.

Alternatively, in various embodiments, the predetermined criteria may instead include whether an identifier returned from a responding RFID tag contained in a passing object matches an identifier associated with RFID tags found in/on equipment of friendly forces. The RFID query device (or trap-type weapon) may be equipped with a motion detector (e.g., vibration detector, infrared scope, body heat detector, motion-detecting camera, etc.) configured to detect when an object such as a soldier or vehicle passes by. The RFID query device may broadcast an RFID query to the object, e.g., in response to a signal from the motion detector that an object is in the vicinity. Upon receiving responsive RFID data, logic in the RFID query device may compare the received RFID data to identifiers associated with RFID tags found in or on equipment of friendly forces. If the logic finds a match, then it may refrain from activating the trap-type weapon. On the other hand, if the detected object does not return friendly RFID data, in various embodiments, the logic may facilitate activation of the trap-type weapon.

An example of this is seen in FIG. 8, in which an RFID mine 800 is placed alongside a road 802. When a friendly truck 804 passes by, the RFID mine 800 may transmit an RFID query to an RFID tag 806 on truck 804. RFID tag 806 may return a response that includes RFID data indicating truck 804 is friendly. Accordingly, mine 800 may not activate.

In contrast, at the bottom of FIG. 8, with the same mine 800 on the same road 802, an enemy truck 808 without an RFID tag is shown coming into proximity of mine 800. This time, when movement of truck 808 is detected (e.g., by a motion detector, not shown, associated with mine 800) but mine 800 but receives no RFID response, mine 800 may activate, damaging or destroying enemy truck 808. In various embodiments, even if an RFID response is received, if the RFID data contained therein does not indicate that the object is friendly, then the RFID query device may facilitate activation of the trap-type weapon.

In addition to activating a weapon, RFID may be used to at least partially control a weapon's attack. For example, some explosive weapons such as mines are configured to emit a shaped charge when activated. These weapons may be equipped with an RFID query device to broadcast a query signal. The direction to which the shaped charge ultimately is directed may be determined based on the direction from which RFID tag information (e.g., an identifier associated with RFID tags found in enemy uniforms) is received. In some embodiments, location of a target relative to a weapon equipped with an RFID query device may be determined using triangulation using RFID signals received from the target.

In some embodiments, RFID may be used to both determine when a weapon is activated and how it is activated. For example, a mine may be equipped with an RFID query device broadcasting a query signal. If an RFID response received at the query device meets a first criterion, for example, an indication of enemy personnel in all directions, the mine may simply detonate without regard for the direction of charge. If an RFID response received at the query device meets a second criterion, for example, an indication that friendly forces may also be present, the mine may only partially detonate to reduce potential damage to friendly forces. If an RFID response received at the query device meets a third criterion, for example, an indication that friendly forces lie in one direction and enemy forces in another, the mine may activate a shaped charge in the direction of the enemy.

RFID also may be used in warfare to reduce friendly fire. For example, assume a ship of unknown and possibly unfriendly origin lies in the distance. A shell equipped with an RFID query device broadcasting a query signal may be fired at the ship. If the ship is friendly it may be equipped with an RFID tag configured to provide identification information. As the shell approaches the ship, the shell may receive an RFID response from the RFID tag on the ship. The shell may be configured to determine whether the information received at the shell's RFID query device indicates a friendly target, and if so, the shell may disarm prior to impact with the ship.

An example of this is seen in FIG. 9. A friendly vehicle 900 is the target of a projectile weapon 902 (e.g., a shell from a cannon or a missile). Projectile weapon 902 may include an RFID query device 904 that is configured to transmit a query signal to an RFID tag 906 associated with a target such as vehicle 900. RFID query device 904 may transmit (e.g., broadcast) an RFID query signal, e.g., upon projection, and may receive one or more reply signals from RFID tag 906. In various embodiments, RFID query device 904 may disarm projectile weapon 902 prior to impact with vehicle 900 where RFID data contained in the reply signal from RFID tag 906 meets a criterion, e.g., contains an identifier associated with friendly forces. Although shown as a projectile, this is not meant to be limiting, and other types of weapons may be similarly equipped with RFID query devices.

In various embodiments, components similar to those shown in FIG. 9 may be reversed. For example, an RFID query device may be configured to transmit a query signal to one or more RFID tags associated with a weapon (such as a projectile weapon equipped with an RFID tag), and to receive one or more reply signals from the one or more RFID tags. In various embodiments, the RFID query device may be further configured to disarm the weapon where RFID data contained in the one or more reply signals meets the criterion (e.g., contains identifier matching friendly forces). In other words, a target may disarm an incoming projectile that is determined to be friendly.

In some embodiments, to ensure that enemy equipment (e.g., uniforms, weapons, vehicles) has RFID tags with identifiable and actionable information, enemy equipment may be anonymously provided to the enemy (e.g., sold to the enemy by a purported neutral third party). In other embodiments, equipment issued to friendly forces may include RFID tags, so that weapons such as mines may detect when passing objects are friendly, and not activate.

As noted above, in various embodiments, a weapon may be configured to emit a shaped attack. FIG. 10 depicts one example of such a weapon in the form of a mine 1000 having four portions, or “quadrants,” 1002, 1004, 1006 and 1008. Each portion may be configured to strike or not strike in a particular direction in response to certain events. For example, a portion may strike or not strike in a particular direction where an RFID query device associated with that portion receives, in response to a query signal in the particular direction, RFID data that meets a first criterion (e.g., matches data corresponding to enemy or friendly forces).

In some embodiments, for example, mine 1000 may include a motion detector 1010 configured to detect when an object such as a soldier or vehicle is within a particular proximity, and in which direction relative to mine 1000 the object is located. Upon detection of that motion and direction, an RFID query device that is configured to transmit a query signal in the detected direction may do so. If a reply signal is received with RFID data indicating the object is friendly, then mine 1000 may not be activated. However, if no reply signal is received, or a reply signal is received containing RFID data indicating the object is hostile, then a portion of mine 1000 associated with the RFID device that transmitted the signal in the detected direction may activate, emitting a shaped attack in the detected direction.

In FIG. 10, first portion 1002 may be equipped with a first RFID device 1012 configured to transmit a query signal in a first direction (e.g., between 0 and 90 degrees as shown in FIG. 10). Second portion 1004 may be equipped with a second RFID device 1014 configured to transmit a query signal in a second direction (e.g., between 90 and 180 degrees). Third portion 1006 may be equipped with a third RFID device 1016 configured to transmit a query signal in a third direction (e.g., between 180 and 270 degrees). Fourth portion 1008 may be equipped with a fourth RFID device 1018 configured to transmit a query signal in a fourth direction (e.g., between 270 and 360 degrees).

While four portions are shown corresponding to four quadrants in FIG. 10, this is not meant to be limiting, as more or less portions and associated RFID query devices may be included in a trap-type weapon. Moreover, while each portion in FIG. 10 appears approximately equal in size, this is not meant to be limiting, and various portions may have different sizes and RFID devices that transmit signals in various ranges of directions. Additionally, while the weapon in FIG. 10 is a mine 1000, similar techniques could be applied to other types of weapons with various shaped charges, such as cluster bombs.

In FIG. 10, second RFID query 1014 of second portion 1004 may have received hostile RFID data, or may not have received any RFID response when motion detector 1010 detected movement between 90 and 180 degrees. In either case, second portion 1004 is emitting a shaped attack 1020. In various embodiments, a control module or logic (not shown) of mine 1000 may be configured to calculate a desired radius of shaped attack 1020. This calculation may be based on various factors, such as a characteristic of the reply signal (e.g., its strength) or the RFID data (e.g., enemy tank versus enemy soldier), and to facilitate emission of the shaped attack having the desired radius.

In various embodiments, one or more RFID query devices associated with a weapon or target may be equipped with a safety mechanism. For example, one or more RFID query devices of mine 1000 in FIG. 10 may be switched off to prevent shaped attack in a direction in which the RFID device would normally transmit a query signal. For example, soldiers in a foxhole could place mine 1000 in front of them so that they are positioned between 270 and 360 degrees relative to mine 1000, and turn off fourth RFID query device 1018 so that no shaped charged will be emitted in their direction.

The techniques and apparatuses described herein may be implemented into a system using suitable hardware and/or software to configure as desired. FIG. 11 illustrates, for one embodiment, an example system 1100 comprising one or more processor(s) 1104, system control logic 1108 coupled to at least one of the processor(s) 1104, system memory 1112 coupled to system control logic 1108, non-volatile memory (NVM)/storage 1116 coupled to system control logic 1108, and one or more wireless communications interface(s) 1120 coupled to system control logic 1108.

System control logic 1108 for one embodiment may include any suitable interface controllers to provide for any suitable interface to at least one of the processor(s) 1104 and/or to any suitable device or component in communication with system control logic 1108.

System control logic 1108 for one embodiment may include one or more memory controller(s) to provide an interface to system memory 1112. System memory 1112 may be used to load and store data and/or instructions, for example, for system 1100. System memory 1112 for one embodiment may include any suitable volatile memory, such as suitable dynamic random access memory (“DRAM”), for example.

System control logic 1108 for one embodiment may include one or more input/output (“I/O”) controller(s) to provide an interface to NVM/storage 1116 and wireless communications interface(s) 1120.

NVM/storage 1116 may be used to store data and/or instructions, for example. NVM/storage 1116 may include any suitable non-volatile memory, such as flash memory, for example, and/or may include any suitable non-volatile storage device(s), such as one or more hard disk drive(s) (“HDD(s)”), one or more solid-state drive(s), one or more compact disc (“CD”) drive(s), and/or one or more digital versatile disc (“DVD”) drive(s) for example.

The NVM/storage 1116 may include a storage resource physically part of a device on which the system 1100 is installed or it may be accessible by, but not necessarily a part of, the device. For example, the NVM/storage 1116 may be accessed over a network via the wireless communications interface(s) 1120.

System memory 1112 and NVM/storage 1116 may include, in particular, temporal and persistent copies of a control module, respectively. The control module 1124 may include instructions that when executed by at least one of the processor(s) 1104 result in the system 1100 transmitting and/or receiving RFID signals, as well as performing actions based on received RFID data and/or data provided by other components, as described above. In some embodiments, the control module 1124 may additionally/alternatively be located in the system control logic 1108.

Wireless communications interface(s) 1120 may provide an interface for system 1100 to communicate with any other suitable device. Wireless communications interface(s) 1120 may include any suitable hardware and/or firmware, such as one or more RFID antenna(s) and/or NFC components.

For one embodiment, at least one of the processor(s) 1104 may be packaged together with logic for one or more controller(s) of system control logic 1108. For one embodiment, at least one of the processor(s) 1104 may be packaged together with logic for one or more controllers of system control logic 1108 to form a System in Package (“SiP”). For one embodiment, at least one of the processor(s) 1104 may be integrated on the same die with logic for one or more controller(s) of system control logic 1108. For one embodiment, at least one of the processor(s) 1104 may be integrated on the same die with logic for one or more controller(s) of system control logic 1108 to form a System on Chip (“SoC”).

The system 1100 may be an RFID query device such as smart phone 14 in FIG. 1, a desktop or laptop computer, a tablet computer system, a set-top box, a game console, or any other device adapted to transmit or receive an RFID signal. In various embodiments, system 1100 may have more or less components, and/or different architectures. For example, in FIG. 11, system 1100 includes a GPS module 1138 to determine a location of system 1100, a keyboard 1146, a liquid crystal display (“LCD”) screen 1150, a graphics processor 1158, speakers 1162, a touch screen 1166 (which in some cases may be the same as LCD display 1150), a motion detector 1168 (e.g., vibration detector, infrared scope, body heat detector, motion-detecting camera, etc.) and a camera 1172 that may be operated by the processor to capture digital image data for storage in NVM/storage 1116.

Although certain embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that a wide variety of alternate and/or equivalent embodiments or implementations calculated to achieve the same purposes may be substituted for the embodiments shown and described without departing from the scope. Those with skill in the art will readily appreciate that embodiments may be implemented in a very wide variety of ways. This application is intended to cover any adaptations or variations of the embodiments discussed herein. Therefore, it is manifestly intended that embodiments be limited only by the claims and the equivalents thereof. 

1. A radio frequency identification (“RFID”) query device, comprising: a logic; memory operably coupled to the logic and storing a criterion; a control module to be operated by the logic and configured to: facilitate transmission of a query signal to a RFID tag associated with a passing object; facilitate reception of a reply signal from the RFID tag; and facilitate activation or deactivation of a trap-type weapon where RFID data contained in the reply signal meets the criterion.
 2. The RFID query device of claim 1, further comprising a motion-detecting component configured to detect the passing object.
 3. The RFID query device of claim 1, wherein the criterion comprises whether the RFID data contained in the reply signal of the detected passing object matches an identifier associated with RFID tags found in or on equipment used by friendly forces.
 4. The RFID query device of claim 1, wherein the criterion comprises whether the RFID data contained in the reply signal of the detected passing object matches an identifier associated with RFID tags found in or on equipment used by enemy forces.
 5. The RFID query device of claim 2, wherein the trap-type weapon is a mine or a claymore.
 6. The RFID query device of claim 5, wherein the control module is further configured to facilitate emission of a shaped attack from the trap-type weapon when the trap-type weapon is activated.
 7. The RFID query device of claim 6, wherein the control module is further configured to facilitate emission of the shaped attack in a direction from which the reply signal is received.
 8. The RFID query device of claim 6, wherein the control module is further configured to determine a location of the passing object relative to the trap-type weapon using triangulation based on the reply signal.
 9. The RFID query device of claim 6, wherein the control module is further configured to calculate a desired radius of the shaped attack based on a characteristic of the reply signal or the RFID data, and to facilitate emission of the shaped attack having the desired radius.
 10. The RFID query device of claim 6, where the control module is further configured to facilitate emission of the shaped attack by the trap-style weapon towards a determined location of the passing object relative to the trap-type weapon.
 11. The RFID query device of claim 1, wherein the RFID device is separate from and configured to be operably coupled to the trap-type weapon.
 12. A radio frequency identification (“RFID”) query device, comprising: a logic; memory operably coupled to the logic and storing a criterion; a control module to be operated by the logic and configured to: transmit a query signal to an RFID tag associated with a target; receive a reply signal from the RFID tag; arm or disarm a weapon where RFID data contained in the reply signal meets the criterion.
 13. The RFID query device of claim 12, wherein the weapon is a projectile equipped with the RFID query device.
 14. The RFID query device of claim 13, wherein the control module is further configured to facilitate the transmission of the query signal upon projection of the projectile towards a target.
 15. A radio frequency identification (“RFID”) query device, comprising: a logic; memory operably coupled to the logic and storing a criterion; a control module to be operated by the logic and configured to: transmit a query signal to an RFID tag associated with a weapon; receive a reply signal from the RFID tag; arm or disarm the weapon where RFID data contained in the reply signal meets the criterion.
 16. The RFID query device of claim 15, wherein the weapon is a projectile equipped with the RFID tag.
 17. A trap-type weapon, comprising: a first radio frequency identification (“RFID”) query device configured to transmit a query signal in a first direction; a first portion configured to strike or not strike in the first direction where the first RFID query device receives, in response to the query signal in the first direction, RFID data that meets a first criterion; a second RFID query device configured to transmit a query signal in a second direction; and a second portion configured to strike or not strike in the second direction upon activation by the second RFID query device where the second RFID query device receives, in response to the query signal in the second direction, RFID data that meets a second criterion.
 18. The trap-type weapon of claim 17, wherein the first criterion and the second criterion are the same.
 19. The trap-type weapon of claim 17, wherein the first and second portions are shaped charges configured to inflict damage in the first and second directions, respectively.
 20. The trap-type weapon of claim 17, wherein the first or second RFID query device is configured to be turned off to prevent a strike in a particular direction. 