Rfid readers systems and methods for hopping away from a frequency channel with rf interference

ABSTRACT

RFID readers, systems, and methods are provided for overcoming the effects of RF interference. While a system is communicating in a channel, RF interference is monitored. If it is low, then the next channel to be hopped onto is chosen in an unbiased manner. But if interference is high, then the next channel to be hopped onto is chosen in a biased manner that disfavors at least one channel over another, in view of the detected interference. The choice of the next channel can thus result in diminishing communication in channels with a lot of RF interference.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims priority from U.S.A. Provisional Application No.60/842,809, filed on 2006-Sep.-07, the disclosure of which is herebyincorporated by reference for all purposes.

This application claims priority from U.S.A. Provisional Application No.60/919,989, filed on 2007-Mar.-26, the disclosure of which is herebyincorporated by reference for all purposes.

This application is a Continuation-In-Part of co-pending U.S. patentapplication Ser. No. 11/412,172, filed 2006-Apr.-25, entitled“PERFORMANCE DRIVEN ADJUSTMENT OF RFID WAVEFORM SHAPE”, and commonlyassigned herewith. [Attorney Docket Number 2051.014US1/IMPJ-0186.]

This application may be found to be related to another application,filed on the same date as the present application, entitled “RFIDREADERS, SYSTEMS AND METHODS FOR EARLY HOPPING OUT OF A FREQUENCYCHANNEL IN THE PRESENCE OF RF INTERFERENCE”. [Attorney Docket Number50133.78USI1/IMPJ-0277.]

FIELD OF THE INVENTION

The present description addresses the field of Radio FrequencyIDentification (RFID) systems, and more specifically to RFID readersystems, devices and methods for overcoming the effects of RFinterference.

BACKGROUND

Radio Frequency IDentification (RFID) systems typically include RFIDtags and RFID readers. RFID readers are also known as RFIDreader/writers or RFID interrogators. RFID systems can be used in manyways for locating and identifying objects to which the tags areattached. RFID systems are particularly useful in product-related andservice-related industries for tracking large numbers of objects beingprocessed, inventoried, or handled. In such cases, an RFID tag isusually attached to an individual item, or to its package.

In principle, RFID techniques entail using an RFID reader to interrogateone or more RFID tags. The reader transmitting a Radio Frequency (RF)wave performs the interrogation. A tag that senses the interrogating RFwave responds by transmitting back another RF wave. The tag generatesthe transmitted back RF wave either originally, or by reflecting back aportion of the interrogating RF wave in a process known as backscatter.Backscatter may take place in a number of ways.

The reflected-back RF wave may further encode data stored internally inthe tag, such as a number. The response is demodulated and decoded bythe reader, which thereby identifies, counts, or otherwise interactswith the associated item. The decoded data can denote a serial number, aprice, a date, a destination, other attribute(s), any combination ofattributes, and so on.

An RFID tag typically includes an antenna system, a radio section, apower management section, and frequently a logical section, a memory, orboth. In earlier RFID tags, the power management section included anenergy storage device, such as a battery. RFID tags with an energystorage device are known as active tags. Advances in semiconductortechnology have miniaturized the electronics so much that an RFID tagcan be powered solely by the RF signal it receives. Such RFID tags donot include an energy storage device, and are called passive tags.

A problem in RFID communication arises from RF interference. Such occursfrom other RF sources, but is received by RFID readers and RFID tags,resulting in errors.

BRIEF SUMMARY

The invention improves over the prior art.

Briefly, the present invention provides RFID readers, systems, andmethods for overcoming the effects of RF interference. While a system iscommunicating in a channel, RF interference is monitored. If it is low,then the next channel to be hopped onto is chosen in an unbiased manner.But if interference is high, then the next channel to be hopped onto ischosen in a biased manner that disfavors at least one channel overanother, in view of the detected interference.

The choice of the next channel can thus result in diminishingcommunication in channels with a lot of RF interference. This results inimproved system performance.

These and other features and advantages of the invention will be betterunderstood from the specification of the invention, which includes thefollowing Detailed Description and accompanying Drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

The following Detailed Description proceeds with reference to theaccompanying Drawings, in which:

FIG. 1 is a block diagram of components of an RFID system.

FIG. 2 is a diagram showing components of a passive RFID tag, such as atag that can be used in the system of FIG. 1.

FIG. 3 is a conceptual diagram for explaining a half-duplex mode ofcommunication between the components of the RFID system of FIG. 1.

FIG. 4 is a block diagram of a whole RFID reader system according toembodiments.

FIG. 5 is a flowchart for illustrating methods according to embodiments.

FIG. 6 is a flowchart for illustrating performing an operation of amethod of FIG. 5.

FIG. 7 is a diagram showing a spectrum of frequency channels availablefor transmitting, and a channel among them that is being used in anembodiment of a method of FIG. 5.

FIG. 8 is a diagram showing probabilities among the channels of FIG. 7for being the next one to be hopped on to from the present one.

FIG. 9A is a diagram showing a history of chosen channels made byvarious embodiments.

FIG. 9B is a diagram showing how probabilities among the channels ofFIG. 9A are determined.

FIG. 10 is a diagram for illustrating attempting to detect a specificinterferer channel according to embodiments.

FIG. 11 is a diagram for illustrating an interferer channel detectedinterferer channel according embodiments.

DETAILED DESCRIPTION

The present invention is now described. While it is disclosed in itspreferred form, the specific embodiments of the invention as disclosedherein and illustrated in the drawings are not to be considered in alimiting sense. Rather, these embodiments are provided so that thisdisclosure will be thorough and complete, and will fully convey thescope of the invention to those skilled in the art. Indeed, it should bereadily apparent in view of the present description that the inventionmay be modified in numerous ways. Among other things, the presentinvention may be embodied as devices, methods, software, and so on.Accordingly, the present invention may take the form of an entirelyhardware embodiment, an entirely software embodiment, an entirelyfirmware embodiment, or an embodiment combining aspects of the above.This description is, therefore, not to be taken in a limiting sense.

As has been mentioned, the present invention provides RFID readers,systems, and performance-based methods for overcoming the effects of RFinterference. The invention is now described in more detail.

FIG. 1 is a diagram of components of a typical RFID system 100,incorporating aspects of the invention. An RFID reader 110 transmits aninterrogating Radio Frequency (RF) wave 112. RFID tag 120 in thevicinity of RFID reader 110 may sense interrogating RF wave 112, andgenerate wave 126 in response. RFID reader 110 senses and interpretswave 126.

Reader 110 and tag 120 exchange data via wave 112 and wave 126. In asession of such an exchange, each encodes, modulates, and transmits datato the other, and each receives, demodulates, and decodes data from theother. The data is modulated onto, and decoded from, RF waveforms.

Encoding the data in waveforms can be performed in a number of differentways. For example, protocols are devised to communicate in terms ofsymbols, also called RFID symbols. A symbol for communicating can be adelimiter, a calibration symbol, and so on. Further symbols can beimplemented for ultimately exchanging binary data, such as “0” and “1”,if that is desired. In turn, when the waveforms are processed internallyby reader 110 and tag 120, they can be equivalently considered andtreated as numbers having corresponding values, and so on.

Tag 120 can be a passive tag or an active tag, i.e. having its own powersource. Where tag 120 is a passive tag, it is powered from wave 112.

In some instances, in addition to wave 126, RFID reader 110 alsoreceives RF interference 128. This may be generated by other readers inthe vicinity, and so on. Sometimes, interference 128 is detected, and insome instances it is determined to be objectionable, as per embodimentsof the invention.

FIG. 2 is a diagram of an RFID tag 220, which can be the same as tag 120of FIG. 1. Tag 220 is implemented as a passive tag, meaning it does nothave its own power source. Much of what is described in this document,however, applies also to active tags.

Tag 220 is formed on a substantially planar inlay 222, which can be madein many ways known in the art. Tag 220 includes an electrical circuit,which is preferably implemented in an integrated circuit (IC) 224. IC224 is arranged on inlay 222.

Tag 220 also includes an antenna for exchanging wireless signals withits environment. The antenna is usually flat and attached to inlay 222.IC 224 is electrically coupled to the antenna via suitable antenna ports(not shown in FIG. 2).

The antenna may be made in a number of ways, as is well known in theart. In the example of FIG. 2, the antenna is made from two distinctantenna segments 227, which are shown here forming a dipole. Many otherembodiments are possible, using any number of antenna segments.

In some embodiments, an antenna can be made with even a single segment.Different places of the segment can be coupled to one or more of theantenna ports of IC 224. For example, the antenna can form a singleloop, with its ends coupled to the ports. When the single segment hasmore complex shapes, it should be remembered that, at the frequencies ofRFID wireless communication, even a single segment could behave likemultiple segments.

In operation, a signal is received by the antenna, and communicated toIC 224. IC 224 both harvests power, and responds if appropriate, basedon the incoming signal and its internal state. In order to respond byreplying, IC 224 modulates the reflectance of the antenna, whichgenerates the backscatter from a wave transmitted by the reader.Coupling together and uncoupling the antenna ports of IC 224 canmodulate the reflectance, as can a variety of other means.

In the embodiment of FIG. 2, antenna segments 227 are separate from IC224. In other embodiments, antenna segments may alternately be formed onIC 224, and so on.

The components of the RFID system of FIG. 1 may communicate with eachother in any number of modes. One such mode is called full duplex.Another such mode is called half-duplex, and is described below.

FIG. 3 is a conceptual diagram 300 for explaining the half-duplex modeof communication between the components of the RFID system of FIG. 1,especially when tag 120 is implemented as passive tag 220 of FIG. 2. Theexplanation is made with reference to a TIME axis, and also to a humanmetaphor of “talking” and “listening”. The actual technicalimplementations for “talking” and “listening” are now described.

RFID reader 110 and RFID tag 120 talk and listen to each other by takingturns. As seen on axis TIME, when reader 110 talks to tag 120 thecommunication session is designated as “R→T”, and when tag 120 talks toreader 110 the communication session is designated as “T→R”. Along theTIME axis, a sample R→T communication session occurs during a timeinterval 312, and a following sample T→R communication session occursduring a time interval 326. Of course interval 312 is typically of adifferent duration than interval 326—here the durations are shownapproximately equal only for purposes of illustration.

According to blocks 332 and 336, RFID reader 110 talks during interval312, and listens during interval 326. According to blocks 342 and 346,RFID tag 120 listens while reader 110 talks (during interval 312), andtalks while reader 110 listens (during interval 326).

In terms of actual technical behavior, during interval 312, reader 110talks to tag 120 as follows. According to block 352, reader 110transmits wave 112, which was first described in FIG. 1. At the sametime, according to block 362, tag 120 receives wave 112 and processesit, to extract data and so on. Meanwhile, according to block 372, tag120 does not backscatter with its antenna, and according to block 382,reader 110 has no wave to receive from tag 120.

During interval 326, tag 120 talks to reader 110 as follows. Accordingto block 356, reader 110 transmits a Continuous Wave (CW), which can bethought of as a carrier signal that ideally encodes no information. Asdiscussed before, this carrier signal serves both to be harvested by tag120 for its own internal power needs, and also as a wave that tag 120can backscatter. Indeed, during interval 326, according to block 366,tag 120 does not receive a signal for processing. Instead, according toblock 376, tag 120 modulates the CW emitted according to block 356, soas to generate backscatter wave 126. Concurrently, according to block386, reader 110 receives backscatter wave 126 and processes it.

In the above, an RFID reader/interrogator may communicate with one ormore RFID tags in any number of ways. Some such ways are calledprotocols. A protocol is a specification that calls for specific mannersof signaling between the reader and the tags.

One such protocol is called the Specification for RFID Air Interface—EPC(TM) Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFIDProtocol for Communications at 860 MHz-960 MHz, which is alsocolloquially known as “the Gen2 Spec”. The Gen2 Spec has been ratifiedby EPCglobal, which is an organization that maintains a website at:<http://www.epcglobalinc.org/> at the time this document is initiallyfiled with the USPTO.

It was described above how reader 110 and tag 120 communicate in termsof time. In addition, communications between reader 110 and tag 120 maybe restricted according to frequency. One such restriction is that theavailable frequency spectrum may be partitioned into divisions that arecalled channels. Different partitioning manners may be specified bydifferent regulatory jurisdictions and authorities (e.g. FCC in NorthAmerica, CEPT in Europe, etc.).

Reader 110 typically transmits with a transmission spectrum that lieswithin one channel. In some regulatory jurisdictions the authoritiespermit aggregating multiple channels into one or more larger channels,but for all practical purposes an aggregate channel can again beconsidered a single, albeit larger, individual channel.

Tag 120 can respond with a backscatter that is modulated directly ontothe frequency of the reader's emitted CW, also called basebandbackscatter. Alternatively, tag 120 can respond with a backscatter thatis modulated onto a frequency, developed by tag 120, that is differentfrom the reader's emitted CW, and this modulated tag frequency is thenimpressed upon the reader's emitted CW. This second type of backscatteris called subcarrier backscatter. The subcarrier frequency can be withinthe reader's channel, can straddle the boundaries with the adjacentchannel, or can be wholly outside the reader's channel.

A number of jurisdictions require a reader to hop to a new channel on aregular basis. When a reader hops to a new channel it may encounter RFenergy there that could interfere with communications.

Embodiments of the present disclosure can be useful in different RFIDenvironments, for example, in the deployment of RFID readers in sparse-or dense-reader environments, in environments with networked anddisconnected readers such as where a hand-held reader may enter thefield of networked readers, in environments with mobile readers, or inenvironments with other interference sources. It will be understood thatthe present embodiments are not limited to operation in the aboveenvironments, but may provide improved operation in such environments.

FIG. 4 is a block diagram of a whole RFID reader system 400 according toembodiments. System 400 includes a local block 410, and optionallyremote components 470. Local block 410 and remote components 470 can beimplemented in any number of ways. It will be recognized that reader 110of FIG. 1 is the same as local block 410, if remote components 470 arenot provided. Alternately, reader 110 can be implemented instead bysystem 400, of which only the local block 410 is shown in FIG. 1.

Local block 410 is responsible for communicating with the tags. Localblock 410 includes a block 451 of an antenna and a driver of the antennafor communicating with the tags. Some readers, like that shown in localblock 410, contain a single antenna and driver. Some readers containmultiple antennas and drivers and a method to switch signals among them,including sometimes using different antennas for transmitting and forreceiving. And some readers contain multiple antennas and drivers thatcan operate simultaneously. A demodulator/decoder block 453 demodulatesand decodes backscattered waves received from the tags via antenna block451. Modulator/encoder block 454 encodes and modulates an RF wave thatis to be transmitted to the tags via antenna block 451.

Local block 410 additionally includes an optional local processor 456.Processor 456 may be implemented in any number of ways known in the art.Such ways include, by way of examples and not of limitation, digitaland/or analog processors such as microprocessors and digital-signalprocessors (DSPs); controllers such as microcontrollers; softwarerunning in a machine such as a general purpose computer; programmablecircuits such as Field Programmable Gate Arrays (FPGAs),Field-Programmable Analog Arrays (FPAAs), Programmable Logic Devices(PLDs), Application Specific Integrated Circuits (ASIC), any combinationof one or more of these; and so on. In some cases some or all of thedecoding function in block 453, the encoding function in block 454, orboth, may be performed instead by processor 456.

Local block 410 additionally includes an optional local memory 457.Memory 457 may be implemented in any number of ways known in the art.Such ways include, by way of examples and not of limitation, nonvolatilememories (NVM), read-only memories (ROM), random access memories (RAM),any combination of one or more of these, and so on. Memory 457, ifprovided, can include programs for processor 456 to run, if provided.

In some embodiments, memory 457 stores data read from tags, or data tobe written to tags, such as Electronic Product Codes (EPCs), TagIdentifiers (TIDs) and other data. Memory 457 can also include referencedata that is to be compared to the EPC codes, instructions and/or rulesfor how to encode commands for the tags, modes for controlling antenna451, and so on. In some of these embodiments, local memory 457 isprovided as a database.

Some components of local block 410 typically treat the data as analog,such as the antenna/driver block 451. Other components such as memory457 typically treat the data as digital. At some point there is aconversion between analog and digital. Based on where this conversionoccurs, a whole reader may be characterized as “analog” or “digital”,but most readers contain a mix of analog and digital functionality.

If remote components 470 are indeed provided, they are coupled to localblock 410 via an electronic communications network 480. Network 480 canbe a Local Area Network (LAN), a Metropolitan Area Network (MAN), a WideArea Network (WAN), a network of networks such as the internet, and soon. In turn, local block 410 then includes a local network connection459 for communicating with network 480.

There can be one or more remote component(s) 470. If more than one, theycan be located at the same location, or in different locations. They canaccess each other and local block 410 via network 480, or via othersimilar networks, and so on. Accordingly, remote component(s) 470 canuse respective remote network connections. Only one such remote networkconnection 479 is shown, which is similar to local network connection459, etc.

Remote component(s) 470 can also include a remote processor 476.Processor 476 can be made in any way known in the art, such as wasdescribed with reference to local processor 456.

Remote component(s) 470 can also include a remote memory 477. Memory 477can be made in any way known in the art, such as was described withreference to local memory 457. Memory 477 may include a local database,and a different database of a Standards Organization, such as one thatcan reference EPCs.

Of the above-described elements, it is advantageous to consider acombination of these components, designated as operational processingblock 490. Block 490 includes those that are provided of the following:local processor 456, remote processor 476, local network connection 459,remote network connection 479, and by extension an applicable portion ofnetwork 480 that links connection 459 with connection 479. The portioncan be dynamically changeable, etc. In addition, block 490 can receiveand decode RF waves received via antenna 451, and cause antenna 451 totransmit RF waves according to what it has processed.

Block 490 includes either local processor 456, or remote processor 476,or both. If both are provided, remote processor 476 can be made suchthat it operates in a way complementary with that of local processor456. In fact, the two can cooperate. It will be appreciated that block490, as defined this way, is in communication with both local memory 457and remote memory 477, if both are present.

Accordingly, block 490 is location agnostic, in that its functions canbe implemented either by local processor 456, or by remote processor476, or by a combination of both. Some of these functions are preferablyimplemented by local processor 456, and some by remote processor 476.Block 490 accesses local memory 457, or remote memory 477, or both forstoring and/or retrieving data.

Reader system 400 operates by block 490 generating communications forRFID tags. These communications are ultimately transmitted by antennablock 451, with modulator/encoder block 454 encoding and modulating theinformation on an RF wave. Then data is received from the tags viaantenna block 451, demodulated and decoded by demodulator/decoder block453, and processed by processing block 490.

The invention also includes methods. Some are methods of operation of anRFID reader or RFID reader system. Others are methods for controlling anRFID reader or RFID reader system.

These methods can be implemented in any number of ways, including thestructures described in this document. One such way is by machineoperations, of devices of the type described in this document.

Another optional way is for one or more of the individual operations ofthe methods to be performed in conjunction with one or more humanoperators performing some. These human operators need not be collocatedwith each other, but each can be only with a machine that performs aportion of the program.

The invention additionally includes programs, and methods of operationof the programs. A program is generally defined as a group of steps oroperations leading to a desired result, due to the nature of theelements in the steps and their sequence. A program is usuallyadvantageously implemented as a sequence of steps or operations for aprocessor, such as the structures described above.

Performing the steps, instructions, or operations of a program requiresmanipulation of physical quantities. Usually, though not necessarily,these quantities may be transferred, combined, compared, and otherwisemanipulated or processed according to the steps or instructions, andthey may also be stored in a computer-readable medium. These quantitiesinclude, for example, electrical, magnetic, and electromagnetic chargesor particles, states of matter, and in the more general case can includethe states of any physical devices or elements. It is convenient attimes, principally for reasons of common usage, to refer to informationrepresented by the states of these quantities as bits, data bits,samples, values, symbols, characters, terms, numbers, or the like. Itshould be borne in mind, however, that all of these and similar termsare associated with the appropriate physical quantities, and that theseterms are merely convenient labels applied to these physical quantities,individually or in groups.

The invention furthermore includes storage media. Such media,individually or in combination with others, have stored thereoninstructions of a program made according to the invention. A storagemedium according to the invention is a computer-readable medium, such asa memory, and is read by a processor of the type mentioned above. If amemory, it can be implemented in a number of ways, such as Read OnlyMemory (ROM), Random Access Memory (RAM), etc., some of which arevolatile and some non-volatile.

Even though it is said that the program may be stored in acomputer-readable medium, it should be clear to a person skilled in theart that it need not be a single memory, or even a single machine.Various portions, modules or features of it may reside in separatememories, or even separate machines. The separate machines may beconnected directly, or through a network such as a local access network(LAN) or a global network such as the Internet.

Often, for the sake of convenience only, it is desirable to implementand describe a program as software. The software can be unitary, orthought in terms of various interconnected distinct software modules.

This detailed description is presented largely in terms of flowcharts,algorithms, and symbolic representations of operations on data bits onand/or within at least one medium that allows computational operations,such as a computer with memory. Indeed, such descriptions andrepresentations are the type of convenient labels used by those skilledin programming and/or the data processing arts to effectively convey thesubstance of their work to others skilled in the art. A person skilledin the art of programming may use these descriptions to readily generatespecific instructions for implementing a program according to thepresent invention.

An economy is achieved in the present document in that a single set offlowcharts is used to describe methods in and of themselves, along withoperations of hardware and/or software and/or firmware, and so on. Thisis regardless of how each element is implemented.

Methods are now described more particularly according to embodiments.

FIG. 5 is flowchart 503 illustrating a method according to an embodimentof the invention. The method of flowchart 503 is for communicating withRFID tags using the available communication channels, and may bepracticed by different embodiments of the invention, including but notlimited to RFID reader system 400, operational block 490, softwareaccording to embodiments, and so on.

At operation 510, a first wireless signal is transmitted to the RFIDtags at a present channel. Transmission can be accomplished by causing afirst wireless RF signal to be transmitted to the RFID tags via anantenna of an RFID reader system. This first wireless signal has afrequency carrier in the present channel, which is also called a firstone of the available channels for purposes of when frequency hoppingstarts to be considered. Of course, a system could be hopping throughmany channels, and at some point in time, operation 510 would be at achannel considered the first or present channel.

According to an optional next operation 530, tag signals are received.These received tag signals are typically backscattered from the RFIDtags in response to the first signal. When they are received by localblock 410, there is an attempt to decode them, also by using errorcorrection codes. This can be performed in a number of ways, for exampleas is described in copending U.S. patent application Ser. No.11/388,235, published on 2006-Oct.-19 as document No. 2006/0236203, dueto be assigned to the same assignee.

An optional next operation 540 is now described. Operation 540 isoptional, in that it need not take place in every embodiment of theinvention, although it is preferred. RF energy is received, which isassociated with transmitting in the first channel. This RF energy couldinclude the tag signals of operation 530, and also other energy such asnoise and other signals, and will be elaborated on later in thisdocument.

At a next operation 550, it is determined whether or not objectionableinterference has been detected for communicating in the first channel ofoperation 510. This can be performed in any number of ways, and someexemplary such ways are described later in this document. As will beunderstood, the level of interference that is found objectionable canusually be set to optimize system performance. In addition, it can beadjusted in some embodiments, sometimes dynamically. For example, higherinterference tolerance thresholds may be established where stronginterference is detected in many of the available communicationchannels.

After operation 550, execution may return to operation 510, or proceedto operation 560. In some embodiments, execution always returns tooperation 510, until there is an ordinary decision to hop to anotherchannel. Such an ordinary decision may be arrived at in any number ofways.

One such way includes that a determination is made from decoded tagsignals, of the type of signals that can be optionally received asdescribed in operation 530 later in this document. From such tag signalsit can be determined that an inventory round of the RFID tags iscomplete. Inventory rounds are discussed in U.S. patent application Ser.No. 11/210,384, published on 2005-Dec.-22 as Publication No.2005/0280505A1, with one of many possible examples given in FIG. 9 ofthat document.

Another such way includes that a determination is made that the firstsignal has been transmitted for a first dwell time, which furtherapproaches a preset limit dwell time for dwelling in a single channelcontinuously. Each system would have its own ways of so determining.

In other embodiments, if at operation 550 it is determined thatobjectionable interference has been detected, then execution may proceedto operation 560. In such embodiments, the ordinary decision will bebypassed. Upon determining that objectionable interference has beendetected, in some embodiments the second signal is transmitted withouttransmitting any more signals in the first channel. In others, the firstsignal is continued to be transmitted for some time interval in thefirst channel, and then there is the hopping that is now described.

Per operation 560, a next or second one of the available channels ischosen, other than the first channel. The second channel can be chosenin an unbiased manner if it is determined that no objectionableinterference has been detected at operation 550. This unbiased mannerincludes not favoring any channel over another so as to avoid anyinterference. The second channel is alternately chosen in a biasedmanner, which is different from the unbiased manner if it is determinedthat objectionable interference has been detected at operation 550. Thisbiased manner includes disfavoring at least one channel over another inview of the detected interference. The biased and unbiased manners canbe implemented in any number of ways. Some examples as to how thischoice is made are described later in this document.

At a next operation 590, an RFID reader system can hop to the nextchannel chosen at operation 560. After that, execution can return tooperation 510, and cause a second signal to be transmitted to the RFIDtags, where the present channel will now be the second or next chosenchannel. The second signal has a frequency carrier in the chosen secondchannel. Then there could be a repetition for the next hop, e.g. withdetermining whether subsequent objectionable interference is detected,etc. It will be understood that these full iterations of flowchart 503can happen many times, as an RFID reader hops channels.

As mentioned above, at operation 550 it is determined whether or notobjectionable interference has been detected. This determination cantake place in any number of ways, for example using one or both of thetag signals received at operation 530, and the RF energy received atoperation 540 if performed. Some examples are now described.

As mentioned above, at operation 550 it is determined whether or notobjectionable interference has been detected. This determination cantake place in any number of ways, for example using one or both of thetag signals received at operation 530, and the RF energy received atoperation 540 if performed. Some examples are now described.

First, one can use whether a proper reply by the tags has been receivedin response to a command by a reader. For example, in the Gen2 Spec,certain commands mandate specific respective tag replies. Thedetermination that the level of interference has become objectionablecan be made if one or more of such expected specific tag replies notreceived, among the other tag signals that are received.

Second, one can use a quality metric of a tag signal. For example, aquality metric is computed in association with one or more of thereceived tag signals. Then it can be determined whether or notobjectionable interference has been detected at least from the qualitymetric. The quality metric can measure any suitable attribute, such as asignal-to-noise ratio, or a measured signal from a decision threshold.The latter reflects a confidence in the decisions made using thethreshold, for example as to whether a received waveform segment isreally a “high” or a “low”.

Third, one can use how well a preamble of a tag signal is matched, forexample to an expected preamble. Many of the received tag signals startwith a preamble, as is well known in the art. Mismatches are indicativeof the presence of interference, and their extents are indicative of thelevel or amount of interference.

Accordingly, a tag preamble matching metric can be computed inassociation with one or more of the received tag signals. This metriccan be computed in any number of ways, for example reflecting how well apreamble of one or more of the received tag signals matches an expectedpreamble. Then it can be determined whether or not objectionableinterference has been detected from the tag preamble matching metric,either as computed, or further modified. For example, if the metriccrosses a threshold the interference is deemed objectionable, and so on.

Moreover, one can use error rates to determine whether objectionableinterference has been determined. Errors are indicative of the presenceof interference, and their rates are indicative of the level or amountof interference. An example is now described.

FIG. 6 is flowchart 650 illustrating a method according to an embodimentof the invention. The method of flowchart 650 can be used for operation550 of FIG. 5. The method of flowchart 650 may be practiced by differentembodiments of the invention, including but not limited to RFID readersystem 400, operational block 490, software according to embodiments,and so on.

At operation 651, it is determined whether an error has been detected inone of the received tag signals. This can be performed in any number ofways. A preferred way is by checking a Cyclic Redundancy Check (CRC) ofthe received tag signals. Such a CRC is included as a requirement by theGen2 Spec, when the tag signals include Electronic Product Codes (EPCs).If an error has indeed been detected, at optional next operation 653,error correction is applied to fix the detected error.

If an error has indeed been detected at operation 651, then at a nextoperation 655 an error detection count is updated. The error detectioncount is a statistic that can be implemented in any number of ways. Forexample, the error detection count can be treated as just a number. Orit can be rendered as a ratio with a total number of the tag signals,for example by counting all the replies received at operation 530. Or,as per optional operation 657, the error detection count can be modifiedaccording to a channel dwell time.

At next operation 659, it is determined whether or not the detectedinterference is objectionable, at least from the error detection count.It will be understood that the method of flowchart 650 can be practicedmany times, for updating the error detection count. So, at operation 651for example, it is determined whether an error has been detected in moreof the received tag signals. Operation 659 can be performed in a numberof ways, which in turn depend on how the error detection count has beendetermined in the first place. Some such ways are now described.

Moreover, the determination of whether the level of interference isobjectionable can be made from any RF energy received at operation 540.This energy can be received from any of the channels available forcommunicating with the RFID tags, e.g. all of them, only the presentchannel, or a group of them, such as a neighborhood of detectedchannels. In such cases, it can be determined that objectionableinterference has been detected if the RF energy is larger than a firstthreshold, and that objectionable interference has not been detectedotherwise. In the case of a neighborhood of detected channels, theneighborhood can have a suitable bandwidth, such as approximately 1.8MHz around a center frequency of the first or present channel, and thefirst threshold can be about −70 dBm.

In addition, the determination of whether the level of interference isobjectionable can be made from a combination of factors, including theabove factors. For example, an aggregate score can be maintained, whichis affected by one or more factors, like missing replies, qualitymetrics, tag preamble metrics, error counts, and received RF energy.

Returning briefly to FIG. 5, as already mentioned, a second one of theavailable channels is chosen per operation 560. The second channel canbe chosen in any number of ways, as is now described in more detail.

Referring to FIG. 7, a diagram 700 has horizontal axis that showsfrequency, as it may have been divided in channels. The channelsavailable for communication are shown as 710. Diagram 700 also has avertical axis showing amplitude or intensity of transmission perchannel. Channel 720 is the channel considered as the present channel ofoperation 510, the only one in which there is transmission.

According to a comment 773, the interferer has been guessed to be nearpresent channel 720, or in a neighborhood around present channel 720.This neighborhood is not necessarily the same as was described abovewith reference to operation 540, although they are related.

In some instances, the neighborhood of FIG. 7 is described as thechannels within a number N1 of present channel 720. It has been foundthat a good value for number N1 is 3 or 4, absent more information. Ofcourse, the number N1 can be adjusted. Adjustment can be depending onwhat works for the system, and also depending on other factors, such asa history of detecting objectionable interference in an environment ofthe RFID tags.

In addition, if at operation 540, RF energy has been received, a size ofthe neighborhood of FIG. 7 can also be determined from a manner ofreceiving or detecting the RF energy, or the amount of received RFenergy, or both. For example, if the total received RF energy is largerthan a suitable threshold, the neighborhood has at least 11 channels,with N1 being equal to 5. Such a suitable threshold can be −20 dBm. Foranother example, if the total detected RF energy is less than a suitablethreshold, the neighborhood has at least 7 channels, with N1 being equalto 3. Such a suitable threshold again can be −20 dBm.

Since the interferer has been guessed to be a neighborhood of presentchannel 720, it is optional but preferred that the second channel ischosen per operation 560 in a manner that disfavors all of the channelsin the neighborhood. For example, the channels in the neighborhood couldhave much less chance of being chosen, than the remaining ones of theavailable channels. In some instances, they could have no chance ofbeing so chosen, as illustrated in the following two examples.

FIG. 8 is a diagram 800 that shows probabilities among the channels ofFIG. 7 for being the next one to be hopped on to from channel 720. Thereis zero probability that the next channel will be 720. According toprofiles 875, every one of the channels other than channel 720 has asubstantially equal chance of being chosen as the second channel.

FIG. 8 shows what is also known as the neutral manner, and has to dowith the fact that prior choices have made it so that all channels arebeing used with the same frequency. One way, for example, is to havehopping tables that always make enough of a hop, for example the nextchannel is always 5 or more channels away. In the second example below,compensation is performed.

FIG. 9A is a diagram 910 showing channels 710, and a history of whichones have been chosen in the past and how often, as a bar chart. It willbe noted that, according to a comment 973, there are two regions thathave been used with lesser preference than the others. Such can happenif there are interferers that are localized, i.e. don't hop channelsthemselves.

FIG. 9B is a diagram 980 showing how probabilities among the channels ofFIG. 9A can be determined, so as to avoid the channels in theneighborhood of present channel 720, and so as to further compensate forthe lesser preference. The probabilities are a bar chart 985, which arethe complement of the bar chart of FIG. 9A. Thus, it favors heavilychannels that are pointed out in comment 973.

A further distinction should be made here, namely that the lesserpreference may be because of interferers that either hop channels, orare stationary. If they are stationary, the time to visit thempreferentially is when tags are not detected, which can be further donewith lesser transmitted power or even no power at all.

In some embodiments, an effort is made to detect one of the channels asthe interferer's channel. In this case, the interferer could be an RFIDreader operating according to the same channel scheme as shown in FIG.7, and the RF interference would be ideally confined to a singlechannel.

Detection can be attempted in any number of ways. For example, RF energycan be received for measuring in individual channels, and the RF energyof neighboring channels can be contrasted. In some embodiments, forexample, a certain channel can be detected as the interferer's channelif the certain channel has RF energy above a preset high threshold,while the energy in at least one of its neighboring channels are below apreset low threshold. An example is now described.

FIG. 10 is a diagram 1000 for illustrating attempting to detect aspecific interferer channel according to embodiments. The horizontalaxis is the same as in FIG. 7, showing the available channels. Thevertical axis shows RF energy detection thresholds.

A pattern 1015 is used to detect the interferer's channel, which spans aneighborhood of 9 detected channels. It has a high threshold of −20 dBm,and a low threshold of −70 dBm, although different values can be used,and a different pattern can be used. Pattern 1015 is optimized fordetecting the interferer's channel in the event the interferer isanother RFID reader, as per the above.

Pattern 1015 can be applied in the neighborhood of comment 773. Itscenter channel (channel “0”) can be at present channel 720, or atanother channel near it. Ideally, pattern 1015 is swept, to detect theinterferer. Sweeping is preferably near the neighborhood of presentchannel 720.

In some instances detection succeeds. FIG. 11 is a diagram 1194 forillustrating an interferer channel detected according embodiments. Theinterferer, unknown for FIG. 7, has now been located and is indicated bycomment 1196.

In these instances, the second channel is chosen in such a way that aresulting tag backscatter avoids a center frequency of the interferer'schannel. This can be accomplished in any number of ways. For example,the second channel can be chosen in a manner that disfavors all of thechannels in a neighborhood of the interferer's channel. Or, theinterferer's channel can be chosen as the second channel, and the RFIDtags can be commanded to backscatter on the subcarrier instead of on thecarrier.

Numerous details have been set forth in this description, which is to betaken as a whole, to provide a more thorough understanding of theinvention. In other instances, well-known features have not beendescribed in detail, so as to not obscure unnecessarily the invention.

The invention includes combinations and subcombinations of the variouselements, features, functions and/or properties disclosed herein. Thefollowing claims define certain combinations and subcombinations, whichare regarded as novel and non-obvious. Additional claims for othercombinations and subcombinations of features, functions, elements and/orproperties may be presented in this or a related document.

1. A Radio Frequency Identification (RFID) reader system forcommunicating with RFID tags using a plurality of communicationchannels, comprising: an antenna; and an operational processing blockcoupled to the antenna and operable to: cause a first wireless signal tobe transmitted via the antenna to the RFID tags, the first wirelesssignal having a frequency carrier in a first one of the channels;determine whether or not objectionable interference has been detectedfor communicating in the first channel; choose a second one of thechannels other than the first channel, the second channel being chosenin an unbiased manner if it is determined that no objectionableinterference has been detected, the unbiased manner including notfavoring any channel over another so as to avoid any interference, thesecond channel being alternately chosen in a biased manner differentfrom the unbiased manner if it is determined that objectionableinterference has been detected, the biased manner including disfavoringat least one channel over another in view of the detected interference;and cause a second signal to be transmitted to the RFID tags, the secondsignal having a frequency carrier in a second channel.
 2. The system ofclaim 1, in which the second signal starts being transmitted immediatelyupon determining that objectionable interference has been detected. 3.The system of claim 1, in which the first signal continues to betransmitted for a time interval before starting transmitting the secondsignal, after determining that objectionable interference has beendetected.
 4. The system of claim 1, in which the operational processingblock is further operable to: determine whether or not subsequentobjectionable interference has been detected for communicating in thesecond channel; choose a third one of the channels other than the secondchannel, the third channel being chosen in the unbiased manner if it isdetermined that no subsequent objectionable interference has beendetected, and in the biased manner if it is determined that subsequentobjectionable interference has been detected; and cause a third signalto be transmitted to the RFID tags, the third signal having a frequencycarrier in a third channel.
 5. The system of claim 1, in which theoperational processing block is further operable to: receive tag signalsfrom the RFID tags in response to the first signal; and in which it isdetermined whether or not objectionable interference has been detectedat least from the tag signals.
 6. The system of claim 5, in which thefirst signal includes a command that mandates a specific tag reply, andit is determined whether or not objectionable interference has beendetected at least from whether the tag signals include or not thespecific tag reply.
 7. The system of claim 5, in which a quality metricis computed in association with one of the received tag signals, and itis determined whether or not objectionable interference has beendetected at least from the quality metric.
 8. The system of claim 7, inwhich the quality metric is a signal-to-noise ratio.
 9. The system ofclaim 7, in which the quality metric is a distance of a measured signalfrom a decision threshold.
 10. The system of claim 5, in which a tagpreamble matching metric is computed in association with one of thereceived tag signals, and it is determined whether or not objectionableinterference has been detected at least from the tag preamble matchingmetric.
 11. The system of claim 10, in which the tag preamble matchingmetric is determined from how well a preamble of one of the received tagsignals matches an expected preamble.
 12. The system of claim 5, inwhich it is determined whether an error has been detected in one of thereceived tag signals, an error detection count is updated if it isdetermined that an error has been so detected, and it is determinedwhether or not objectionable interference has been detected at leastfrom the error detection count.
 13. The system of claim 12, in which itis determined that objectionable interference has been detected if theerror detection count exceeds a threshold, and that objectionableinterference has not been detected otherwise.
 14. The system of claim12, in which the error detection count is rendered as a ratio with atotal number of the tag signals.
 15. The system of claim 1, in which theoperational processing block is further operable to: receive RF energyassociated with transmitting in the first channel; and in which it isdetermined whether or not objectionable interference has been detectedat least from the received RF energy.
 16. The system of claim 15, inwhich the RF energy is received from all channels available forcommunicating with the RFID tags.
 17. The system of claim 15, in whichthe RF energy is received only from the first channel.
 18. The system ofclaim 15, in which the RF energy is received from a neighborhood ofdetected channels, and it is determined that objectionable interferencehas been detected if the RF energy is larger than a first threshold, andthat objectionable interference has not been detected otherwise.
 19. Thesystem of claim 1, in which the biased manner includes choosing thesecond channel in a manner that disfavors all of the channels in aneighborhood of the first channel.
 20. The system of claim 19, in whichthe neighborhood includes all channels within a number N1 of the firstchannel.
 21. The system of claim 19, in which the operational processingblock is further operable to: detect RF energy associated withtransmitting in the first channel; and in which it is determined whetheror not objectionable interference has been detected at least from thedetected RF energy, and a size of the neighborhood is determined by oneof a manner of detecting the RF energy and the amount of detected RFenergy.
 22. The system of claim 19, in which the channels in theneighborhood have much less chance of being chosen than the remainingones of the available channels.
 23. The system of claim 19, in which thechannels in the neighborhood have no chance of being chosen, and each ofthe remaining ones of the available channels has an approximately equalchance of being chosen.
 24. The system of claim 19, in which some of theavailable channels outside the neighborhood have been used with lesserpreference than others of the channels, and the second channel is chosenso as to further compensate for the lesser preference.
 25. The system ofclaim 1, in which the operational processing block is further operableto: detect one of the channels as an interferer's channel, and choosethe second channel in such a way that a resulting tag backscatter avoidsa center frequency of the interferer's channel.
 26. The system of claim25, in which a certain channel is detected as the interferer's channelif the certain channel has RF energy above a preset high threshold,while the RF energy in at least one of its neighboring channels arebelow a preset low threshold.
 27. The system of claim 25, in which thesecond channel is chosen in a manner that disfavors all of the channelsin a neighborhood of the interferer's channel.
 28. The system of claim25, in which the interferer's channel is chosen as the second channel.29. A method for communicating with Radio Frequency Identification(RFID) tags and using a plurality of communication channels, comprising:causing a first wireless signal to be transmitted to the RFID tags, thefirst wireless signal having a frequency carrier in a first one of thechannels; determining whether or not objectionable interference has beendetected for communicating in the first channel; choosing a second oneof the channels other than the first channel, the second channel beingchosen in an unbiased manner if it is determined that no objectionableinterference has been detected, the unbiased manner including notfavoring any channel over another so as to avoid any interference, thesecond channel being alternately chosen in a biased manner differentfrom the unbiased manner if it is determined that objectionableinterference has been detected, the biased manner including disfavoringat least one channel over another in view of the detected interference;and causing a second signal to be transmitted to the RFID tags, thesecond signal having a frequency carrier in a second channel.
 30. Themethod of claim 29, further comprising: determining whether or notsubsequent objectionable interference has been detected forcommunicating in the second channel; choosing a third one of thechannels other than the second channel, the third channel being chosenin the unbiased manner if it is determined that no subsequentobjectionable interference has been detected, and in the biased mannerif it is determined that subsequent objectionable interference has beendetected; and causing a third signal to be transmitted to the RFID tags,the third signal having a frequency carrier in a third channel.
 31. Themethod of claim 29, further comprising: receiving tag signals from theRFID tags in response to the first signal; and in which it is determinedwhether or not objectionable interference has been detected at leastfrom the tag signals.
 32. The method of claim 31, in which a qualitymetric is computed in association with one of the received tag signals,and it is determined whether or not objectionable interference has beendetected at least from the quality metric.
 33. The method of claim 31,in which it is determined whether an error has been detected in one ofthe received tag signals, an error detection count is updated if it isdetermined that an error has been so detected, and it is determinedwhether or not objectionable interference has been detected at leastfrom the error detection count.
 34. The method of claim 29, furthercomprising: receiving RF energy associated with transmitting in thefirst channel; and in which it is determined whether or notobjectionable interference has been detected at least from the receivedRF energy.
 35. The method of claim 29, in which the biased mannerincludes choosing the second channel in a manner that disfavors all ofthe channels in a neighborhood of the first channel.
 36. The method ofclaim 29, further comprising: detecting one of the channels as aninterferer's channel, and choosing the second channel in such a way thata resulting tag backscatter avoids a center frequency of theinterferer's channel.
 37. A machine-readable storage medium withinstructions encoded thereon for operating a Radio FrequencyIdentification (RFID) reader system to communicate with RFID tags usinga plurality of communication channels, the RFID reader system includingat least one antenna, the instructions such that, if read and executedby the RFID reader system, actions result comprising: causing a firstwireless signal to be transmitted via the antenna to the RFID tags, thefirst wireless signal having a frequency carrier in a first one of thechannels; determining whether or not objectionable interference has beendetected for communicating in the first channel; choosing a second oneof the channels other than the first channel, the second channel beingchosen in an unbiased manner if it is determined that no objectionableinterference has been detected, the unbiased manner including notfavoring any channel over another so as to avoid any interference, thesecond channel being alternately chosen in a biased manner differentfrom the unbiased manner if it is determined that objectionableinterference has been detected, the biased manner including disfavoringat least one channel over another in view of the detected interference;and causing a second signal to be transmitted to the RFID tags, thesecond signal having a frequency carrier in a second channel.
 38. Themedium of claim 37, in which the actions further comprise: determiningwhether or not subsequent objectionable interference has been detectedfor communicating in the second channel; choosing a third one of thechannels other than the second channel, the third channel being chosenin the unbiased manner if it is determined that no subsequentobjectionable interference has been detected, and in the biased mannerif it is determined that subsequent objectionable interference has beendetected; and causing a third signal to be transmitted to the RFID tags,the third signal having a frequency carrier in a third channel.
 39. Themedium of claim 37, in which the actions further comprise: receiving tagsignals from the RFID tags in response to the first signal; and in whichit is determined whether or not objectionable interference has beendetected at least from the tag signals.
 40. The medium of claim 39, inwhich a quality metric is computed in association with one of thereceived tag signals, and it is determined whether or not objectionableinterference has been detected at least from the quality metric.
 41. Themedium of claim 39, in which a tag preamble matching metric is computedin association with one of the received tag signals, and it isdetermined whether or not objectionable interference has been detectedat least from the tag preamble matching metric.
 42. The medium of claim39, in which it is determined whether an error has been detected in oneof the received tag signals, an error detection count is updated if itis determined that an error has been so detected, and it is determinedwhether or not objectionable interference has been detected at leastfrom the error detection count.
 43. The medium of claim 37, in which theactions further comprise: receiving RF energy associated withtransmitting in the first channel; and in which it is determined whetheror not objectionable interference has been detected at least from thereceived RF energy.
 44. The medium of claim 37, in which the biasedmanner includes choosing the second channel in a manner that disfavorsall of the channels in a neighborhood of the first channel.
 45. Themedium of claim 37, in which the actions further comprise: detecting oneof the channels as an interferer's channel, and choosing the secondchannel in such a way that a resulting tag backscatter avoids a centerfrequency of the interferer's channel.