Determining an environmental condition of an rfid tag

ABSTRACT

A method begins by a radio frequency identification (RFID) reader transmitting a first and second radio frequency (RF) signal of a plurality of RF signals, which each include a unique carrier frequency and an instruction to an RFID tag to respond with a received power level indication. The method continues by the RFID reader receiving, in response to the first and second signals sent at a first and second carrier frequency, a first and second response from the RFID tag that includes a first and second received power level indication. The method continues by the RFID reader determining an estimated resonant frequency of the RFID tag based on the first and second received power level indications and the first and second carrier frequencies. The method continues by the RFID reader determining an environmental condition based on the estimated resonant frequency.

CROSS REFERENCE TO RELATED PATENTS

The present U.S. Utility patent application claims priority pursuant to35 U.S.C. § 120 as a continuation of U.S. Utility patent applicationSer. No. 16/133,327, entitled “DETERMINING AN ENVIRONMENTAL CONDITION OFAN RFID TAG”, filed Sep. 17, 2018, issuing as U.S. Pat. No. 10,796,111on Oct. 6, 2020, which is a continuation-in-part of U.S. Utility patentapplication Ser. No. 12/845,654, entitled “METHOD AND APPARATUS FORAUTHENTICATING RFID TAGS”, filed Jul. 28, 2010, issued as U.S. Pat. No.10,079,825 on Sep. 18, 2018, which claims priority pursuant to 35 U.S.C.§ 119(e) to U.S. Provisional Application No. 61/273,227, entitled“METHOD AND APPARATUS FOR A SECURE RFID TAG”, filed Aug. 1, 2009, nowexpired, all of which are hereby incorporated herein by reference intheir entirety and made part of the present U.S. Utility patentapplication for all purposes.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

NOT APPLICABLE

INCORPORATION-BY-REFERENCE OF MATERIAL SUBMITTED ON A COMPACT DISC

NOT APPLICABLE

BACKGROUND OF THE INVENTION Technical Field of the Invention

The invention relates generally to radio-frequency identification(“RFID”) systems and, in particular, to a method and apparatus fordetermining an environmental condition of an RFID tag.

Description of the Related Art

As is known, a radio frequency identification (“RFID”) system mayinclude multiple tags and at least one reader. Shown in FIG. 1 is priorart RFID system 10 which includes a single, exemplary tag 12 and areader 14. Tag 12 includes an integrated circuit (not shown) for storingand processing information, and an antenna circuit (not shown) forexchanging data with reader 14. The integrated circuit of tag 12implements a unique identifier (“ID”) 18 and control logic (not shown)adapted to facilitate the operation of tag 12 in RFID system 10.Depending on the manufacturing technology selected to implement tag 12,ID 18 may be implemented using any of the known types of persistentmemory, such as read-only memory (“ROM”), programmable ROM (“PROM”),ultra-violet erasable PROM (“UV-PROM”), electrically-erasable PROM(“EE-PROM”), fast EE-PROM (“FLASH”), or the like. As may be desired, ID18 may be as simple as a unique binary bit string or as complex as anElectronic Product Code (“EPC”) as specified, e.g., by the EPC globalTag Data Standards (currently at Version 1.4) and as used in manypassive UHF RFID applications. As is known, the nature of ID 18 will besystem specific and will, in general, be determined by a host systemadapted to manage the RFID system 10.

In the illustrated form, the integrated circuit of tag 12 furtherincludes a store 16 adapted to store a system-specific data object,hereinafter referred to as data object 20. Depending on the application,store 16 may be implemented using any of the known types of persistentmemory, which may or may not be the same type as selected to implementthe ID 18. Data object 20 may include such information as the name ofthe manufacturer, product details, pricing information, and the like. Asis known, the nature of data object 20 will be system specific and will,in general, be determined by the host system.

During normal operation, reader 14 interrogates tag 12 [illustrated inFIG. 1 as transaction 1], and receives ID 18 and data object 20 from tag12 [transaction 2]. Depending on the application, tag interrogation maycomprise one or more transaction cycles. For example, in oneapplication, tag 12 can be adapted to provide both ID 18 and data object20 to reader 14 during a single transaction cycle. Alternatively, tag 12can be adapted to provide ID 18 during a first transaction cycle, and toprovide data object 20, if at all, during a second transaction cycle.

As is known, any of various security procedures may be employed withinreader 14 to validate the ID 18 received from tag 12, and within tag 12to verify that the reader 14 is entitled to receive the data object 20.If necessary, store 16 can be adapted to store any required control orsecurity information. In addition, the integrated circuit of tag 12 mayinclude special-purpose security logic, such as hash table logic andrandom number generation logic, to control access to data object 20.

As explained in “The Promising but Plodding RFID Industry”, StanfordGroup Company, 1 Apr. 2008, (“Stanford Paper”), a copy of which issubmitted herewith and incorporated herein in its entirety by reference:

-   -   “Radio Frequency Identification (RFID) technology promises to be        a transformational technology, replacing barcodes and other        supply chain management technologies with cheap chip-based tags        that can be instantaneously and accurately read from significant        distances.” [p. 1]    -   “Radio Frequency Identification (‘RFID’) technology refers to a        wide range of microchip-based systems that can transmit and        sometimes receive information via wireless interfaces.” [p. 5]    -   “Ranging from sophisticated government ID cards to simple asset        tracking tags, RFID chips are available in a large variety of        formats and security configurations, with each ‘flavor’ of RFID        chip tailored specifically for certain applications.” [p. 5]

The Stanford Paper discusses a tag as being “applied to or incorporatedinto a product, animal, or person for the purpose of identification andtracking using radio waves”. Far field tags, defined as operating at adistance less than 12 meters from the reader, and near field tags,defined as operating at a distance less than 0.5 meters from the readermay be used. Tags are initially powered down and will wake up uponreceipt of a sufficiently strong RF signal. A brief summary of thisprior art process is presented on page 7 of the Stanford Paper. TheStanford Paper then went on to note:

-   -   “Moreover, at last month's DoD RFID Summit, the Army described        its plans to shift away from the data-rich tags that it        currently buys . . . and instead migrate to ‘license plate tags’        that simply contain a unique number which ties to information        about a container in a DoD database. The basic concept is to get        away from having information across a distributed network and        instead simply use the tags as a pointer to information in a        centralized network. The end goal: cheaper tags available from        multiple vendors . . . ” [p. 16]

As shown in FIG. 2, a prior art RFID system 10A might include a tag 12A,a reader 14A, and a store 16A. During operation, reader 14A interrogatestag 12A [illustrated in FIG. 2 as transaction 1], and receives ID 18Afrom tag 12A [transaction 2]. Reader 14A then provides ID 18A to store16A [transaction 3], and receives data object 20A from store 16A[transaction 4]. As is known, any of various security procedures may beemployed within reader 14A to validate the ID 18A stored on tag 12A, andwithin store 16A to verify that the reader 14A is entitled to receivedata object 20A. In this embodiment, tag 12A is dumb, i.e., it stores nodata, per se, but simply includes the unique tag ID 18A comprisinginformation sufficient to access data object 20A now stored in store16A. In a typical commercial application, data object 20A will typicallyinclude vendor identification information, product details, pricing andavailability, etc. In a distributed network implementation,vendor-provided data object 20A may be stored locally within the reader14A, i.e., store 16A would be integrated into reader 14A. Alternatively,in a centralized network implementation, vendor-provided data object 20Amay be stored at a remote store 16A, typically provided by the vendor oran independent service provider (“ISP”). In both configurations, apublic communication network, such as plain old telephone service(“POTS”) or the Internet, provides a suitable medium for datadistribution. In both types of systems, however, sufficient informationis provided by tag 12A to directly access the respective data object20A.

As is known, objects may be accessed via a Uniform Resource Identifier(“URI”). A URI may comprise a Uniform Resource Locator (“URL”), aUniform Resource Name (“URN”), or a Uniform Resource Characteristic(“URC”). Each plays a specific role within the URI scheme, namely: (i)URLs are used for locating or finding resources; (ii) URNs are used foridentification; and (iii) URCs are used for including meta-information.Although the term typically refers to communication on the World WideWeb (“WWW”), it can also comprise communication over a general network.For example, a URI comprising an International Standard Book Number(“ISBN”) number may be used to retrieve a book stored in electronic formin store 16A, or a URL comprising a web link may be used to retrieve aweb page stored in electronic form (or dynamically generated) in store16A.

As is known, prior art RFID systems have several disadvantages. One suchdisadvantage is that smart tags tend to be relatively expensive andcomplex, and yet, in general, still have insufficient on-tag storagecapacity to accommodate the continuously-increasing data payload.Distributed RFID databases are typically complex, difficult tounderstand, and time-consuming to maintain. Further, sensitive data isdifficult to distribute reliably and difficult to maintain securely atall locations where the data may be stored.

Yet another disadvantage is in the area of security. In general,security issues fall into two basic categories for RFID systems: (i)privacy; and (ii) authentication. Privacy issues include the case ofunauthorized readers harvesting information from valid tags. In general,RFID tags silently respond to interrogation by a reader, i.e., withoutexpress notification to any party. Often, the unique ID for the tag willcomprise manufacturer, product, and serial number information. Thus,without proper security, clandestine scanning of information is aplausible threat. This threat becomes particularly sensitive whenpersonal or proprietary information is included with the RFID tag id, orwhen the RFID tag id can be readily associated with that information.

Authentication issues can arise when a reader harvests information fromcounterfeit tags. In general, RFID tags are vulnerable to copy andcounterfeit techniques because scanning and replicating tags and tag idsrequires relatively little money or expertise. For example, an EPC is awell-defined bit string, easily copied like any other, and simple toemulate via a personal computer (“PC”) equipped to transmit thecounterfeit codes.

In an attempt to eliminate these and other security threats, much hasbeen done to utilize existing security methods such as passwords definedby the International Organization for Standardization (“ISO”), publickey encryption, and other forms of cryptographic security. However, manysuch techniques add complexity and cost to the RFID tags. Optimally, toenable secure large-scale, item-level tagging, one would want to see thecost of the RFID tag driven down below what it is currently today.

These and related issues are discussed in the Parent Provisional. As aresult of these and related problems, RFID technology adoption has beenfar slower than originally anticipated and desired. We submit that whatis needed is a more efficient, reliable, and secure system for linking atag to a corresponding object.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 illustrates in block diagram form, a prior art RFID system,including a tag and a reader;

FIG. 2 illustrates in block diagram form, a prior art RFID system,including a tag, a reader, and a store;

FIG. 3 illustrates in block diagram form, an RFID system constructed inaccordance with a preferred embodiment of our invention;

FIG. 4 illustrates in flow diagram form, the sequencing of operations ofthe RFID system of FIG. 3;

FIG. 5 illustrates in block diagram form, an RFID authentication systemconstructed in accordance with a preferred embodiment of our invention;

FIG. 6 illustrates in flow diagram form, a process utilized by our RFIDauthentication system shown in FIG. 5;

FIG. 7 illustrates in block diagram form, an alternate embodiment of theRFID system shown in FIG. 5;

FIG. 8 illustrates in block diagram form, another alternate embodimentof the RFID system shown in FIG. 5; and

FIG. 9 illustrates in block diagram form, yet another alternateembodiment of the RFID system shown in FIG. 5;

FIG. 10 is a schematic block diagram of an embodiment of a wireless datacollecting device and a wireless sensor;

FIG. 11. is an illustration of receiving power level feedback from anRFID tag; and

FIG. 12 is a flowchart illustrating an example of a method ofdetermining an environmental condition.

In the drawings, similar elements will be similarly numbered wheneverpossible. However, this practice is simply for convenience of referenceand to avoid unnecessary proliferation of numbers, and is not intendedto imply or suggest that our invention requires identity in eitherfunction or structure in the several embodiments.

DETAILED DESCRIPTION OF THE INVENTION

In accordance with the preferred embodiment of our invention as shown inFIG. 3, our RFID system 10B includes tag 12B, reader 14B, store 16B, anda linker 22B. In general, reader 14B is adapted to interrogate tag 12B[illustrated in FIG. 3 as transaction 1], and to receive ID 18B providedby tag 12B [transaction 2] in response to that interrogation. Reader 14Bis further adapted to selectively provide ID 18B to linker 22B[transaction 3], and to receive a link 24B from linker 22B [transaction4]. Finally, reader 14B is adapted to selectively provide the link 24Bto store 16B [transaction 5], and to receive a data object 20B fromstore 16B [transaction 6].

As shown in FIG. 4, our preferred method 26 for linking tag 12B to adata object 20B comprises the following steps:

Step 1: we store a unique ID 18B in tag 12B (step 28).

Step 2: we store links 24B, each associated with a selected unique ID18B, in linker 22B (step 30).

Step 3: we store data objects 20B, each associated with a selected link24B, in store 16B (step 32).

Step 4: our reader 14B interrogates tag 12B (step 34).

Step 5: our reader 14B receives from tag 12B the ID 18B (step 36).

Step 6: our reader 14B transmits ID 18B to the linker 22B (step 38).

Step 7: our reader 14B receives from linker 22B the link 24B associatedwith ID 18B (step 40).

Step 8: our reader 14B transmits link 24B to the store 16B (step 42).

Step 9: our reader 14B receives from the store 16B the data object 20Bassociated with link 24B (step 44).

In accordance with our invention, linker 22B is adapted to store foreach unique ID 18B a corresponding link 24B. During normal operation,linker 22B receives each ID 18B provided by reader 14B, and, if thereceived ID 18B corresponds to link 24B, linker 22B provides link 24B toreader 14B. Storage of links 24B in linker 22B may be implemented usingany of several existing technologies, such as relational databases,associative array structures, lookup tables or the like. As may bedesired, linker 22B, including links 24B, may be implemented as either ahardware or software component within reader 14B. Alternatively, linker22B may be implemented as a stand-alone component either co-located withreader 14B or at a different location remote from reader 14B. Forexample, in our preferred embodiment, we implement linker 22B as a linkserver running on a stand-alone computer system and adapted to performtransactions 3 and 4 via the Internet. This configuration is welladapted to our preferred method of system operation in that maintenanceof links 24B is relatively centralized with respect to reader 14B(enabling us to easily support multiple readers 14B), thus facilitatingrapid posting of changes in links 24B as well as providing, if desired,a secure communication tunnel with both reader 14B and the ultimatesource of links 24B (not shown).

Also in accordance with our invention, store 16B is adapted to store foreach unique link 24B a corresponding data object 20B. During normaloperation, store 16B receives each link 24B provided by reader 14B, and,if the received link 24B corresponds to a data object 20B, store 16Bprovides data object 20B to reader 14B. Storage of data object 20Bs instore 16B may be implemented using any of several existing technologies,such as relational databases, associative array structures, lookuptables or the like. As may be desired, store 16B, including data objects20B, may be implemented as either a hardware or software componentwithin reader 14B. Alternatively, store 16B may be implemented as astand-alone component either co-located with reader 14B or at adifferent location remote from reader 14B. For example, in our preferredembodiment, we recommend implementing store 16B as a web server runningon a stand-alone computer system and adapted to perform transactions 5and 6 via the Internet. This configuration is well adapted to ourpreferred method of system operation in that maintenance of data object20Bs is relatively centralized with respect to reader 14B (enabling usto easily support multiple readers 14B), thus facilitating rapid postingof changes in data object 20Bs as well as providing, if desired, asecure communication tunnel with both reader 14B and the ultimate sourceof data objects 20B (not shown).

In accordance with our invention, we are able to provide thecontrollability and data coherence benefits of prior art centralizedsystems while simultaneously providing the flexibility and timeliness ofprior art distributed systems. In contrast to prior art distributed datasystems, in our preferred embodiment, only links 24B need to bedistributed, where they may be maintained in linker 22B in a relativelysimple, easily understood and maintained database structure. In contrastto prior art centralized data systems, in our preferred embodiment,relocation or reorganization of data objects 20B does not requiremodification of the corresponding ID 18B stored in tags 12B, but,rather, only the impacted links 24B. Also, our distributed-link,centralized-data organization is especially well suited to takeadvantage of the inherent benefits of the now-ubiquitous Internet.

Hidden Code Security

In accordance with our invention, the security issues described aboveare addressed by our system 10C illustrated in FIG. 5. In general, oursystem 10C is comprised of RFID tag 12C, reader 14C and store 16C. Inthe illustrated embodiment, tag 12C is adapted to store a unique tag ID18Ct, a tag hidden code 46Ct and tag control codes 48Ct. In addition,tag 12C includes a tag processor 50Ct adapted to selectively develop atag authentication code from the tag hidden code 46Ct as determined bythe tag control codes 48Ct. Also, as illustrated, store 16C is adaptedto store a unique master ID 18Cm, a master hidden code 46Cm and mastercontrol codes 48Cm. In addition, store 16C includes a master processor50Cm adapted to selectively develop a master authentication code fromthe master hidden code 46Cm as determined by the master control codes48Cm.

In one embodiment, reader 14C is adapted to selectively interrogate tag12C using, e.g., a singulation command [illustrated in FIG. 5 astransaction 1]. In response, tag 12C provides to reader 14C a tagidentification sequence comprising the concatenation of the tag ID 18Ctand the tag authentication code [transaction 2], which reader 14C thenforwards to store 16C [transaction 3]. Preferably, while the reader 14Cis interrogating the tag 12C, store 16C is developing a masteridentification sequence comprising the master ID 18Cm and the masterauthentication code. Upon receipt, store 16C compares the tagidentification sequence with the master identification sequence and thenprovides to reader 14C a validation signal that indicates either thattag 12C has been authenticated or not [transaction 4]. Optionally, inthe event that the tag 12C cannot be authenticated, reader 14C and store16C may selectively vary tag control codes 48Ct in an attempt todetermine the cause of the failure of authentication or to implement analternate or supplemental authentication process.

In one other embodiment, tag 12C may be adapted to provide only the tagID 18Ct in response to the singulation sequence. In response toreceiving ID 18Ct, reader 14C may thereafter selectively request tag 12Cto develop and provide the tag authentication code. Upon receipt, reader14C may then forward to the store 16C both the ID 18Ct and the tagauthentication code for authentication as discussed above. Optionally,the store 16C may be adapted to provide the master authentication codein response to receiving the ID 18Ct, so that the reader 14C may itselfperform the authentication.

As shown in FIG. 6, one other method 52 for implementing hidden codesecurity comprises the steps of:

Step 1: our reader 14C interrogates the tag 12C (step 54).

Step 2: our reader 14C receives from tag 12C the tag ID 18Ct (step 56).

Step 3: our reader 14C transmits the tag ID 18Ct to the store 16C (step58).

Step 4: our reader 14C receives from store 16C control codes 48Cmassociated with tag ID 18Cm (step 60).

Step 5: our reader 14C transmits control codes 48Cm to the tag 12C aspart of the authentication request (step 62).

Step 6: our reader 14C receives from the tag 12C the computedauthentication code (step 64).

Step 7: our reader 14C transmits the authentication code to the store16C (step 66).

Step 8: our reader 14C receives from the store 16C a validation signal(step 68).

In one other embodiment, illustrated in FIG. 7, the system operatessimilarly to the embodiment illustrated in FIG. 5. Again, the reader 14Dis adapted to selectively interrogate tag 12D using a singulationcommand [transaction 1]. In response, tag 12D provides to reader 14D thetag ID 18Dt, which reader 14D then transmits to store 16D [transaction2]. Using the received tag ID 18Dt, store 16D retrieves an associatedcontrol code 48Dm for transmission back to tag 12D via reader 14D[transaction 3]. Upon receipt of the control code, tag 12D usesprocessor 50Dt to develop a tag authentication code as a function of thereceived control code 48Dt and the tag hidden code 46Dt, fortransmission back to store 16D via reader 14D [transaction 4].Substantially independently, store 16D uses processor 50Dm to develop amaster authentication code as a function of the master control code 48Dmand a master hidden code 46Dm associated with the received tag ID 18Dt[transaction 5]. If the received tag authentication code comparesfavorably to the internally developed master authentication code[transaction 6], store 16D retrieves a data 52D associated with thereceived tag ID 18Dt for transmission to the reader 14D for furtherprocessing [transaction 7]. Optionally, in the event that tag 12D cannotbe authenticated, reader 14D and store 16D may selectively vary tagcontrol codes 48Dt in an attempt to determine the cause of thevalidation failure.

In one other embodiment, illustrated in FIG. 8, the system operatessimilarly to the embodiment illustrated in FIG. 7. Again, the reader 14Eis adapted to selectively interrogate tag 12E using a singulationcommand [transaction 1]. In response, tag 12E provides the tag ID 18Etto store 16E via reader 14E [transaction 2]. Within tag 12E, tagprocessor 50Et first generates a random number and then develops a tagauthentication code as a function, f_(t)( ) of that random number andthe tag hidden code 46Et. Preferably, as each is developed, tag 12Etransmits both the random number and the tag authentication code tostore 16E via reader 14E [transactions 3 and 4, respectively]. Withinstore 16E, store processor 50Em develops a master authentication code asa function, f_(m)( ) of the received random number and a master hiddencode 46Em associated with the received tag ID 18Et [transaction 5]. Ifthe received tag authentication code compares favorably to theinternally developed master authentication code [transaction 6], store16E transmits a data 52Em associated with the received tag ID 18Et tothe reader 14E for further processing [transaction 7]. Optionally, inthe event that tag 12E cannot be authenticated, reader 14E and store 16Emay selectively repeat this sequence in an attempt to determine thecause of the validation failure, each time using a new random numbergenerated by tag processor 50Et. If desired, tag processor 50Et may beadapted to implement the function, f_(t)( ) in a bit-serial manner, thusenabling, in some embodiments, both the random number and tagauthentication code to be transmitted substantially simultaneously tostore 16E using a suitable bit-serial transmission protocol.

In yet another embodiment, illustrated in FIG. 9, the system operatessimilarly to the embodiments illustrated in FIGS. 7 and 8. However, inthis embodiment, rather than storing a plurality of master controlcodes, reader 14F includes a generator 54Fm adapted to selectivelygenerate a substantially random number. As in FIGS. 7 and 8, the reader14F is adapted to selectively interrogate tag 12F using a singulationcommand [transaction 1]. In response, tag 12F provides the tag ID 18Ftto store 16F via reader 14F [transaction 2]. In one embodiment, inresponse to receiving the tag ID 18Ft, reader 14F transmits the randomnumber to both the processor 50Ft and the store 16F [transaction 3];alternatively, reader 14F may transmit the random number substantiallycoincident with the singulation command. In response to receiving therandom number, tag processor 50Ft develops the tag authentication codeas a function, f_(t)( ) of the tag hidden code 46Ft and the receivedrandom number, for transmission to the store 16F via reader 14F[transaction 4]. In response to receiving both the tag ID 18Ft and thegenerated random number, store processor 50Fm develops a masterauthentication code as a function, f_(m)( ) of the random number and amaster hidden code 46Fm associated with the received tag ID 18Ft[transaction 5]. If the received tag authentication code comparesfavorably to the developed master authentication code [transaction 6],store 16F transmits a data 52Fm associated with the received tag ID 18Ftto the reader 14F for further processing [transaction 7]. Optionally, inthe event that tag 12F cannot be authenticated, reader 14F and store 16Fmay selectively repeat this sequence in an attempt to determine thecause of the validation failure, each time using a new random numbergenerated by generator 54Fm. If desired, tag processor 50Ft may beadapted to implement the function, f_(t)( ) in a bit-serial manner, thusenabling, in some embodiments, both the incoming random number and theoutgoing tag authentication code to be transmitted using a suitablebit-serial transmission protocol.

In accordance with our invention, tag ID 18 xt may be a uniqueproprietary ID that does not contain any company or product specificinformation. (Note: for convenience of reference hereinafter, we willuse the generic place-holder, “x”, to indicate any of the severalembodiments A-E disclosed above and variants thereof) Tag ID 18 xt, aswell as the tag hidden code 46 xt may be initially registered atproduction, and may be programmed into a non-volatile form of memory, orallowed to randomly initialize based upon some processing variation andbiases; either way, the value are unique at registration. This lack ofspecific intelligence on the tag is of particular importance whenaddressing privacy issues. Using a tag ID 18 xt that lacks any specificinformation addresses the aforementioned privacy issue by securelystoring vendor information, product serial codes, stock keeping unit(“SKU”) information or the like elsewhere, preferably in the store 16 xwhere it can be quickly accessed using the unique tag ID 18 xt as anindex. In an alternate embodiment, tag ID 18 xt may be a unique 96-bitEPC tag ID. Although the tag control code 48 x has been described aboveas being purely static, our invention will accommodate other forms,including, for example, a tag control code comprising a first, fixedportion and a second, substantially random portion. The tag hidden code46 xt is stored so as to be inaccessible through normal commands, e.g.,via a standard singulation command. Rather, the tag hidden code 46 xtcan only be read from the tag 12 x after modification, encryption orscrambling by tag processor 50 xt in accordance with the control codes48 xt.

In one embodiment, our tag processor 50 xt includes, in addition toappropriate timing and control logic, a linear feedback shift register(“LFSR”) with programmable feedback logic. In general, a LFSRcoefficients portion of control codes 48 xt controls the programmablefeedback logic so as to define the polynomial implemented by the LFSR.Preferably, a LFSR seed portion of control codes 48 xt contain amulti-bit seed by which the LFSR is initialized. In an alternateimplementation, tag hidden code 46 xt may itself act as the initial seedfor the LFSR, while the LFSR coefficients portion of the tag controlcode 48 xt defines only the polynomial implemented by the LFSR. In yetanother embodiment, a seed select portion of control codes 48 xt mayselect one of a plurality of sources of the LFSR seed. Typically, theseveral bits of the LFSR will first be initialized using the selectedseed, and the feedback logic configured using the LFSR coefficientsportion of control codes 48 xt. In response to an authenticationrequest, the tag processor 50 xt will compute the authentication code byscrambling the hidden code 46 xt using the cyclical output patterngenerated by the LFSR. This authentication code is forwarded, togetherwith tag ID 18 xt, to the reader 14 x which then transmits the same tothe store 16 x. In one embodiment, the LFSR coefficients portion ofcontrol code 48 xt define a polynomial function in the following generalform:

f(h)=a+bh ^(c) +dh ^(e) +fh ^(g)  [Eq. 1]

where: h=seed bits

-   -   a, b, c, d, e, f, g=coefficients        As will be understood, the resulting transfer function will be        of the general form:

f(x)=x*f(h)  [Eq. 2]

Using the embodiment illustrated in FIG. 5 by way of example, store 16Cis adapted to store a master ID 18Cm corresponding to tag ID 18Ct, amaster hidden code 46Cm corresponding to tag hidden code 46Ct and amaster control code 48Cm corresponding tag control code 48Ct. Duringauthentication, store 16C uses master processor 50Cm to compute a masterversion of the authentication code for validating the authenticationcode received from the tag 12C. In normal operation, the tag hidden code46Ct is inaccessible via any other means after scrambling by the tagprocessor 50Ct. Preferably, a special transfer command sequence isimplemented in tag 12C and reader 14C whereby the tag processor 50Ct isplaced in a transfer mode of the form:

f(x)=x  [Eq. 3]

thus passing the hidden code 50Ct without scrambling or othermodification. In one embodiment, this sequence may consist of the reader14C selectively storing into tag 12C a new tag control code 48Ctspecially adapted to implement the desired transfer function. As will beclear, the specific control code 48Ct is dependent on the design of tagprocessor 50Ct and its internal configuration.

In accordance with our invention, the cyclical nature of the LFSR outputassures that the authentication code broadcast by tag 12C will bedifferent for each successive authentication cycle. Indeed, carefuldesign of the tag processor 50Ct and judicious selection of the controlcode 48Cx can provide operational variation very nearly resemblingrandom generation. As a further deterrent, our method facilitatesfrequent changes to the control code 48Cx. Without knowledge of thehidden code 46Cx and the current control code 48Cx, and without knowingthe specific configuration of the tag processor 50Ct, creating a cloneof tag 12C that will reliably pass authentication becomes quitedifficult.

As will also be evident to those skilled in the art, other embodimentsof the function f(x) are possible. Of particular interest are functionswhich are computationally intensive to invert or which are intrinsicallynon-invertible, such as hash tables (see, e.g., Ahson, et. al, RFIDHandbook: Applications, Technology, Security, and Privacy, CRC Press,Boca Raton, Fla., USA, 2008, p. 490) or chaotic delta-sigma modulators(see, e.g., Freely, “Nonlinear Dynamics of Chaotic Double-Loop SigmaDelta Modulation”, IEEE International Symposium on Circuits and Systems,1994, pp. 101-104) (which utilize nested, non-linear feedback). Usingchaotic delta-sigma modulators, some portion of the hidden code bits andthe control code bits can be used as the initial state variables whilethe remaining bits are used as the input sequence to the modulator for aprescribed number of modulator cycles.

As will be evident to those skilled in the art, our improved securitytechniques may be practiced in the prior art systems depicted in FIG. 1and FIG. 2, as well as in our RFID systems 10B-F depicted in FIGS. 3, 5,7 and 8, respectively. As is known, each of the illustrated embodimentswill typically include additional conventional components such as adisplay and a keyboard for interacting with the system 10 x, and, asappropriate, a router or the like to enable connectivity between thereader 14 x and the store 16 x. Additionally, those skilled in the artwill recognize that the master processor 50 x is not limited to itslocation in the store 16 x, but may also be incorporated into the reader14 x, or in some other location that allows it to interact with store 16x and the remainder of the components within the system 10 x. In analternate embodiment, store 16 x, including all of the variouscomponents described above, may be completely incorporated into thereader 14 x.

Other embodiments of our invention include, at a minimum, various typesof tags. For example, tags may include active RFID tags, which typicallyinclude a battery, and passive RFID tags, which may have no battery ormay be assisted by a battery. Our invention also includes tags withvarious read range capabilities.

Other embodiments of our invention include, at a minimum, various typesof readers that have the capability to manage data and to communicatewith tags and databases. For example, reader-enabled devices may includemobile phones, internet enabled phones, computers, smart phones, andPersonal Digital Assistants (“PDAs”).

Other embodiments of our invention include, at a minimum, various typesof linkers. For example, our linker may include an object-orienteddatabase.

FIG. 10 is a schematic block diagram of an embodiment of a wireless datacollecting device 90 (e.g., a radio frequency (RF) reader) and awireless sensor (e.g., a radio frequency identification (RFID) tag). Thewireless sensor 100 includes a power harvesting circuit 102, aprocessing module 108, memory 104, a receiver section 112, a transmittersection 110, an antenna structure 109, a power detection circuit 106, anenvironmental condition sensing circuit 116, and a tuning circuit 114.The wireless data collecting device 90 includes an antenna structure 99,a transmitter 96, a receiver 98, a transmit/receive splitter or switch(T/R), a processing module 91, memory 92, and an interface 94. Theinterface 94 may include firmware (e.g., software and hardware) tocommunicate with a computing device via a wired and/or wireless LANand/or WAN.

In an example of operation, the wireless sensor 100 is a passive RFIDtag and the wireless data collecting device 90 is an RFID reader. Thepassive RFID tag is associated with an object and an object identifieris stored in the memory 104 of the wireless sensor. For the RFID readerto communicate with the passive RFID tag, the tag first generates apower supply voltage (or multiple power supply voltages) from the RF(radio frequency) signal 101 transmitted from the RFID reader. Forexample, the RF signal 101 is a continuous wave signal and usesamplitude shift keying (ASK) or other modulation scheme to convey data.

The power harvesting circuit 102 receives the RF signal 101 via theantenna 109 and converts it into one or more supply voltages (Vs). Thesupply voltage(s) power the other components so that they may performtheir specific tasks. For instance, the receiver 112 is operable toconvert an inbound message received from the RFID reader into a basebandsignal that it provides to the processing module 108. The processingmodule 108 processes the baseband signal and, when appropriate,generates a response that is subsequently transmitted via the antenna109 by the transmitter 110. For example, the inbound message instructsthe wireless sensor to provide a response with a pressure measurementand the stored ID of the object.

To obtain a pressure measurement, the environmental condition sensingcircuit 116 senses the pressure within an area (e.g., within a tire ofan automobile). For example, as the environmental condition sensingcircuit 116 is subjected to different pressures (e.g., force per areameasured in pounds per square inch or other units), its electricalcharacteristics change (e.g., a capacitance, an inductance, animpedance, a resonant frequency, etc.).

The change of electrical characteristics of the environmental conditionsensing circuit 116 causes a change in an RF characteristic of thecombination of the antenna 109, the tuning circuit 114, and theenvironmental condition sensing circuit 116. Note that an RFcharacteristic includes an impedance (e.g., an input impedance) at afrequency (e.g., carrier frequency of the RF signal 101), a resonantfrequency (e.g., of the turning circuit and/or antenna), a qualityfactor (e.g., of the antenna), and/or a gain. As a specific example, theresonant frequency has changed from a desired resonant frequency (e.g.,matching the carrier frequency of the RF signal 101) as result of anenvironmental condition.

The processing module 108 detects a variance of the one or more RFcharacteristics from a desired value (e.g., the resonant frequencychanges from a desired frequency that corresponds to the carrierfrequency of the RF signal 101). When the processing module detects thevariance, it adjusts the tuning circuit to substantially re-establishthe desired value of the one or more RF characteristics. For example,the tuning circuit 114 includes an inductor and a capacitor, one ofwhich is adjusted to change the resonant frequency back to the desiredvalue.

The processing module 108 determines the amount of adjusting of thetuning circuit 114 and converts the amount of adjusting into a digitalvalue. For example, the digital value may be representative of thepressure sensed by the environmental condition sensing circuit 116. Theprocessing module 108 generates a message regarding the adjusting of thetuning circuit (e.g., the message includes the digital value or anactual pressure measurement if the processing module performs a digitalvalue to pressure measurement conversion function). The transmitter 110transmits the message to the data collecting device via the antenna 109or other antenna (not shown in FIG. 10).

Before the processing module processes the sensed environmentalcondition, it may perform a power level adjustment. For example, thepower detection circuit 106 detects a power level of the received RFsignal 101. In one embodiment, the processing module interprets thepower level and communicates with the RFID reader to adjust the powerlevel of the RF signal 101 to a desired level (e.g., optimal foraccuracy in detecting the environmental condition). In anotherembodiment, the processing module includes the received power level datawith the environmental sensed data it sends to the RFID reader so thatthe reader can factor the power level into the determination of theextent of the environmental condition. Using the power level todetermine the environmental condition is discussed in further detail inreference to FIGS. 11-12.

The processing module 108 may further operable to perform a calibrationfunction when the pressure in which the wireless sensor is known (e.g.,in a room at a certain altitude, in a calibration chamber having a setpressure, etc.). For example, the processing module 108 receives acalibration request from a data collecting device. In response, theprocessing module adjusts the tuning circuit to establish the desiredvalue of the RF characteristic(s) (e.g., resonant frequency, inputimpedance, etc.). The processing module then records a level of theadjusting of the tuning circuit to represent a pressure calibration ofthe wireless sensor (e.g., records a digital value). The processingmodule may communicate the calibration value to the data collectingdevice as part of the calibration process or send it along with thedigital value of a pressure measurement.

FIG. 10 is a graphical representation of an example of receiving powerlevel feedback of a radio frequency identification (RFID) tag. Asillustrated, an RFID reader 111 (which may be implemented by thewireless data collecting device 90 of FIG. 10) transmits a plurality ofradio frequency (RF) signals 101 to the RFID tag. Each RF signal 101 ofthe plurality of RF signals 101 may include a unique carrier frequencyand an instruction to the RFID tag to respond with a received powerlevel indication. For example, the RFID reader 111 may transmit a firstRF signal 101 at a first carrier frequency, a second RF signal 101 at asecond carrier frequency, and a third RF signal 101 at a third carrierfrequency, etc. The RFID reader receives responses from the RFID tagthat include a received power level. For example, the RFID tag transmitsa digital value of a received power level to the RFID reader. The RFIDreader may then use the received power levels to determine a resonantfrequency of the RFID tag, which is used to determine an environmentalcondition to which the RFID tag is exposed.

Also illustrated is the power level feedback of a calibrated conditionat various carrier frequencies and the power level feedback of anenvironmental condition at various carrier frequencies. For example,under known environment conditions (e.g., certain temperature, moisturelevel, etc.), the RFID reader 111 performs a calibration by sending aplurality of RF signals to an RFID tag. As shown, the RFID reader thenreceives responses from the RFID tag with received power levels that areused to determine the resonant frequency of the RFID tag. In oneexample, the RFID reader may select other carrier frequencies in therange of the carrier frequencies that responded with the highest powerlevels, and send additional RF signals to the RFID tag to furtherdetermine the resonant frequency of the RFID tag. In another example,the RFID reader may select other carrier frequencies in the range of thecarrier frequency that responded with a received power level (e.g., whenonly one response from the RFID tag to the first RF signal(s) wasreceived), and send additional RF signals to the RFID tag to furtherdetermine the resonant frequency of the RFID tag. In yet anotherexample, the RFID reader determines (e.g., performs a function on thereceived power levels) the resonant frequency of the RFID tag based onthe received power levels at the respective carrier frequencies.

When the RFID tag is exposed to an environmental condition (e.g., bottomportion of FIG. 11), the environmental condition may cause one or moreRF characteristics (e.g., frequency, impedance, etc.) of the tag tochange. In this example, the RF reader may determine an estimatedresonant frequency based on receiving responses from the RFID tag thatinclude received power level feedback at various frequencies. Forexample, the RFID reader 90 transmits a plurality of RF signals to theRFID tag that is exposed to an environmental condition. The RFID readerthen receives response (e.g., as shown, a first response through a fifthresponse) from the RFID tag that includes received power levelindications. Having received the received power level indications, theRFID reader determines an estimated resonant frequency of the RFID tagbased on at least one of the received power level indications and thecorresponding carrier frequencies. In the example shown, a Nth carrierfrequency of the received responses corresponds to the largest powerlevel. In one example, the RFID reader may use the Nth carrier frequencyas the estimated resonant frequency. In another example, the RFID readermay use an average (or other function) of two or more carrierfrequencies to estimate the resonant frequency of the RFID tag.

Having estimated the resonant frequency of the RFID tag exposed to theenvironmental condition, the RFID reader uses the estimated resonantfrequency to determine an environmental condition. For example, the RFIDreader compares (e.g., performs a look up) a resonant frequency of theknown calibrated condition with the estimated resonant frequency todetermine the environmental condition. As another example, the RFIDreader compares a first estimated resonant frequency at a first timewith a second resonant frequency at a second time (e.g., to determinepressure is increasing). Note the RFID reader may use more than tworeceived power level indications (e.g., to attain greater accuracy ofthe estimated resonant frequency).

FIG. 11 is a logic flow diagram of a method of determining anenvironmental condition based on received power level indications. Themethod begins at step 120, where a radio frequency identification (RFID)reader transmits a first radio frequency (RF) signal of a plurality ofRF signals. Each RF signal of the plurality of RF signals includes aunique carrier frequency and further includes an instruction to an RFIDtag to respond with a received power level indication. The instructionmay also include a request for the RFID tag to respond with a uniqueidentifier that identifies the RFID tag. The transmitting may includetransmitting the plurality of RF signals in one of a plurality ofpatterns. For example, a pattern of the plurality of patterns may be alow carrier frequency to a high carrier frequency pattern. As anotherexample, the pattern of the plurality of patterns may be a high carrierfrequency to a low carrier frequency pattern. As yet another example,the pattern of the plurality of patterns may be a random carrierfrequency pattern.

The method continues with step 122, where the RFID reader receives afirst response from the RFID tag in response to a first RF signal of theplurality of RF signals. The first response includes a first receivedpower level indication and the first RF signal has a first carrierfrequency. The method continues with step 124, where the RFID readertransmits a second RF signal of the plurality of RF signals. The methodcontinues with step 126, where the RFID reader receives a secondresponse from the RFID tag in response to the second RF signal of theplurality of RF signals. The second response includes a second receivedpower level indication, and the second RF signal has a second carrierfrequency. The method continues with step 128, where the RFID readerdetermines an estimated resonant frequency of the RFID tag based on thefirst and second received power level indications and the first andsecond carrier frequencies. The method continues with step 130, wherethe RFID reader determines an environmental condition (e.g.,temperature, pressure, moisture, etc.) based on the estimated resonantfrequency. Note the RFID reader may use more than two received powerlevels to estimate the resonant frequency of the RFID tag. For example,prior to the determining the estimated resonant frequency the RFIDreader may receive a third response from the RFID tag in response to athird RF signal of the plurality of RF signals. The third responseincludes a third received power level indication and the third RF signalhas a third carrier frequency. Then the RFID reader determines theestimated resonant frequency of the RFID tag based on the first, secondand third received power level indications and the first, second andthird carrier frequencies.

Alternatively, or in addition to the above method, the RFID reader maytransmit the RF signals based on a known environmental condition todetermine an estimated calibrated resonant frequency of the RFID tag.For example, the RFID reader transmits a plurality of RF signals, whereeach RF signal of the plurality of RF signals includes the uniquecarrier frequency and further includes the instruction to the RFID tagto respond with the received power level indication. Next, the RFIDreader receives the first response from the RFID tag in response to thefirst RF signal of the plurality of RF signals, where the first responseincludes the first received power level indication, where the first RFsignal has the first carrier frequency, and where the first RF signal ofthe plurality of signals is based on a known environmental condition.The method continues by receiving the second response from the RFID tagin response to the second RF signal of the plurality of RF signals,where the second response includes the second received power levelindication, where the second RF signal has a second carrier frequencyand where the second RF signal of the plurality of signals is based onthe known environmental condition. Having received the first and secondresponses, the RFID reader determines an estimated calibrated resonantfrequency of the RFID tag based on the first and second received powerlevel indications and the first and second carrier frequencies.

The RFID reader then receives a third response from the RFID tag inresponse to a third RF signal of the plurality of RF signals, where thethird response includes a third received power level indication, wherethe third RF signal has a third carrier frequency, and where the thirdRF signal of the plurality of signals is based on an unknownenvironmental condition. The RFID reader then receives a fourth responsefrom the RFID tag in response to a fourth RF signal of the plurality ofRF signals, wherein the fourth response includes a fourth received powerlevel indication, where the fourth RF signal has a fourth carrierfrequency, and where the fourth RF signal of the plurality of signals isbased on the unknown environmental condition.

Having received the third and fourth responses, the RFID readerdetermines the estimated resonant frequency of the RFID tag based on thethird and fourth received power level indications and the third andfourth carrier frequencies. The RFID reader may then determine theenvironmental condition based on a difference between the estimatedresonant frequency and the estimated calibrated resonant frequency.

It is noted that terminologies as may be used herein such as bit stream,stream, signal sequence, etc. (or their equivalents) have been usedinterchangeably to describe digital information whose contentcorresponds to any of a number of desired types (e.g., data, video,speech, audio, etc., any of which may generally be referred to as‘data’).

As may be used herein, the terms “substantially” and “approximately”provides an industry-accepted tolerance for its corresponding termand/or relativity between items. Such an industry-accepted toleranceranges from less than one percent to fifty percent and corresponds to,but is not limited to, component values, integrated circuit processvariations, temperature variations, rise and fall times, and/or thermalnoise. Such relativity between items ranges from a difference of a fewpercent to magnitude differences. As may also be used herein, theterm(s) “configured to”, “operably coupled to”, “coupled to”, and/or“coupling” includes direct coupling between items and/or indirectcoupling between items via an intervening item (e.g., an item includes,but is not limited to, a component, an element, a circuit, and/or amodule) where, for an example of indirect coupling, the intervening itemdoes not modify the information of a signal but may adjust its currentlevel, voltage level, and/or power level. As may further be used herein,inferred coupling (i.e., where one element is coupled to another elementby inference) includes direct and indirect coupling between two items inthe same manner as “coupled to”. As may even further be used herein, theterm “configured to”, “operable to”, “coupled to”, or “operably coupledto” indicates that an item includes one or more of power connections,input(s), output(s), etc., to perform, when activated, one or more itscorresponding functions and may further include inferred coupling to oneor more other items. As may still further be used herein, the term“associated with”, includes direct and/or indirect coupling of separateitems and/or one item being embedded within another item.

As may be used herein, the term “compares favorably”, indicates that acomparison between two or more items, signals, etc., provides a desiredrelationship. For example, when the desired relationship is that signal1 has a greater magnitude than signal 2, a favorable comparison may beachieved when the magnitude of signal 1 is greater than that of signal 2or when the magnitude of signal 2 is less than that of signal 1. As maybe used herein, the term “compares unfavorably”, indicates that acomparison between two or more items, signals, etc., fails to providethe desired relationship.

As may also be used herein, the terms “processing module”, “processingcircuit”, “processor”, and/or “processing unit” may be a singleprocessing device or a plurality of processing devices. Such aprocessing device may be a microprocessor, micro-controller, digitalsignal processor, microcomputer, central processing unit, fieldprogrammable gate array, programmable logic device, state machine, logiccircuitry, analog circuitry, digital circuitry, and/or any device thatmanipulates signals (analog and/or digital) based on hard coding of thecircuitry and/or operational instructions. The processing module,module, processing circuit, and/or processing unit may be, or furtherinclude, memory and/or an integrated memory element, which may be asingle memory device, a plurality of memory devices, and/or embeddedcircuitry of another processing module, module, processing circuit,and/or processing unit. Such a memory device may be a read-only memory,random access memory, volatile memory, non-volatile memory, staticmemory, dynamic memory, flash memory, cache memory, and/or any devicethat stores digital information. Note that if the processing module,module, processing circuit, and/or processing unit includes more thanone processing device, the processing devices may be centrally located(e.g., directly coupled together via a wired and/or wireless busstructure) or may be distributedly located (e.g., cloud computing viaindirect coupling via a local area network and/or a wide area network).Further note that if the processing module, module, processing circuit,and/or processing unit implements one or more of its functions via astate machine, analog circuitry, digital circuitry, and/or logiccircuitry, the memory and/or memory element storing the correspondingoperational instructions may be embedded within, or external to, thecircuitry comprising the state machine, analog circuitry, digitalcircuitry, and/or logic circuitry. Still further note that, the memoryelement may store, and the processing module, module, processingcircuit, and/or processing unit executes, hard coded and/or operationalinstructions corresponding to at least some of the steps and/orfunctions illustrated in one or more of the Figures. Such a memorydevice or memory element can be included in an article of manufacture.

One or more embodiments have been described above with the aid of methodsteps illustrating the performance of specified functions andrelationships thereof. The boundaries and sequence of these functionalbuilding blocks and method steps have been arbitrarily defined hereinfor convenience of description. Alternate boundaries and sequences canbe defined so long as the specified functions and relationships areappropriately performed. Any such alternate boundaries or sequences arethus within the scope and spirit of the claims. Further, the boundariesof these functional building blocks have been arbitrarily defined forconvenience of description. Alternate boundaries could be defined aslong as the certain significant functions are appropriately performed.Similarly, flow diagram blocks may also have been arbitrarily definedherein to illustrate certain significant functionality.

To the extent used, the flow diagram block boundaries and sequence couldhave been defined otherwise and still perform the certain significantfunctionality. Such alternate definitions of both functional buildingblocks and flow diagram blocks and sequences are thus within the scopeand spirit of the claims. One of average skill in the art will alsorecognize that the functional building blocks, and other illustrativeblocks, modules and components herein, can be implemented as illustratedor by discrete components, application specific integrated circuits,processors executing appropriate software and the like or anycombination thereof.

In addition, a flow diagram may include a “start” and/or “continue”indication. The “start” and “continue” indications reflect that thesteps presented can optionally be incorporated in or otherwise used inconjunction with other routines. In this context, “start” indicates thebeginning of the first step presented and may be preceded by otheractivities not specifically shown. Further, the “continue” indicationreflects that the steps presented may be performed multiple times and/ormay be succeeded by other activities not specifically shown. Further,while a flow diagram indicates a particular ordering of steps, otherorderings are likewise possible provided that the principles ofcausality are maintained.

The one or more embodiments are used herein to illustrate one or moreaspects, one or more features, one or more concepts, and/or one or moreexamples. A physical embodiment of an apparatus, an article ofmanufacture, a machine, and/or of a process may include one or more ofthe aspects, features, concepts, examples, etc. described with referenceto one or more of the embodiments discussed herein. Further, from figureto figure, the embodiments may incorporate the same or similarly namedfunctions, steps, modules, etc. that may use the same or differentreference numbers and, as such, the functions, steps, modules, etc. maybe the same or similar functions, steps, modules, etc. or differentones.

While the transistors in the above described figure(s) is/are shown asfield effect transistors (FETs), as one of ordinary skill in the artwill appreciate, the transistors may be implemented using any type oftransistor structure including, but not limited to, bipolar, metal oxidesemiconductor field effect transistors (MOSFET), N-well transistors,P-well transistors, enhancement mode, depletion mode, and zero voltagethreshold (VT) transistors.

Unless specifically stated to the contra, signals to, from, and/orbetween elements in a figure of any of the figures presented herein maybe analog or digital, continuous time or discrete time, and single-endedor differential. For instance, if a signal path is shown as asingle-ended path, it also represents a differential signal path.Similarly, if a signal path is shown as a differential path, it alsorepresents a single-ended signal path. While one or more particulararchitectures are described herein, other architectures can likewise beimplemented that use one or more data buses not expressly shown, directconnectivity between elements, and/or indirect coupling between otherelements as recognized by one of average skill in the art.

The term “module” is used in the description of one or more of theembodiments. A module implements one or more functions via a device suchas a processor or other processing device or other hardware that mayinclude or operate in association with a memory that stores operationalinstructions. A module may operate independently and/or in conjunctionwith software and/or firmware. As also used herein, a module may containone or more sub-modules, each of which may be one or more modules.

While particular combinations of various functions and features of theone or more embodiments have been expressly described herein, othercombinations of these features and functions are likewise possible. Thepresent disclosure is not limited by the particular examples disclosedherein and expressly incorporates these other combinations.

What is claimed is:
 1. A radio frequency identification (RFID) readercomprises: a transmitter operably coupled to: transmit a first radiofrequency (RF) signal, wherein the first RF signal includes a firstcarrier frequency and further includes an instruction to an RFID tag torespond with a received power level indication; and transmit a second RFsignal to the RFID tag, wherein the second RF signal includes a secondcarrier frequency and further includes the instruction to an RFID tag torespond with a received power level indication; a receiver operablycoupled to: receive a first response from the RFID tag in response tothe first RF signal, wherein the first response includes a firstreceived power level indication; and receive a second response from theRFID tag in response to the second RF signal, wherein the secondresponse includes a second received power level indication; and aprocessing module operably coupled to determine an estimated resonantfrequency of the RFID tag based on the first and second received powerlevel indications and the first and second carrier frequencies.
 2. TheRFID reader of claim 1, wherein the instruction comprises: a request forthe RFID tag to respond with a unique identifier that identifies theRFID tag.
 3. The RFID reader of claim 1 further comprises: the firstcarrier frequency being a first frequency within a range of frequenciesthat correspond to a known calibration condition; and the second carrierfrequency being a second frequency within the range of frequencies thatcorrespond to the known calibration condition.
 4. The RFID reader ofclaim 1 further comprises: a transmitter operably coupled to: transmit athird RF signal to the RFID tag, wherein the third RF signal includes athird carrier frequency and further includes the instruction to an RFIDtag to respond with a received power level indication; a receiveroperably coupled to: receive a third response from the RFID tag inresponse to the third RF signal, wherein the third response includes athird received power level indication.
 5. The RFID reader of claim 4,wherein the processing module is further operable to: determine theestimated resonant frequency of the RFID tag based on one of: the firstand second received power level indications and the first and secondcarrier frequencies; the first and third received power levelindications and the first and third carrier frequencies; the second andthird received power level indications and the second and third carrierfrequencies; and the first, second, and third received power levelindications and the first, second, and third carrier frequencies.
 6. TheRFID reader of claim 1, wherein the processing module is furtheroperable to: determine a power level adjustment for the RFID tag basedon the estimated resonant frequency of the RFID tag.
 7. A radiofrequency identification (RFID) reader comprises: a transmitter operablycoupled to: transmit a plurality of radio frequency (RF) signals to aplurality of RFID tags, wherein an RF signal of the plurality of RFsignals includes an instruction to respond with a received power levelindication; a receiver operably coupled to: receive a first responsefrom a first RFID tag of the plurality of RFID tags, wherein the firstresponse includes a first received power level indication regarding oneof the plurality of RF signals; receive a second response from the firstRFID tag, wherein the second response includes a second received powerlevel indication regarding a second one of the plurality of RF signals;receive a third response from a second RFID tag of the plurality of RFIDtags, wherein the third response includes a third received power levelindication regarding the one of the plurality of RF signals or anotherone of the plurality of RF signals; and receive a fourth response fromthe second RFID tag, wherein the fourth response includes a fourthreceived power level indication regarding the second one of theplurality of RF signals or a second other one of the plurality of RFsignals; and a processing module operably coupled to: determine a firstestimated resonant frequency of the first RFID tag based on the firstand second received power level indications and frequencies of the oneof the plurality of RF signals and the second one of the plurality of RFsignals; and determine a second estimated resonant frequency of thesecond RFID tag based on the third and fourth received power levelindications and frequencies of the one of the plurality of RF signals orthe other one of the plurality of RF signals and the second one of theplurality of RF signals or the second other one of the plurality of RFsignals.
 8. The RFID reader of claim 7, wherein the instructioncomprises: a request for the RFID tag to respond with a uniqueidentifier that identifies the RFID tag.
 9. The RFID reader of claim 7further comprises: the one of the plurality of RF signals having a firstfrequency within a range of frequencies that correspond to a knowncalibration condition; and the second one of the plurality of RF signalshaving a second frequency within the range of frequencies thatcorrespond to the known calibration condition.
 10. The RFID reader ofclaim 7 further comprises: a receiver operably coupled to: receive afifth response from the first RFID tag, wherein the third responseincludes a third received power level indication regarding a third oneof the plurality of RF signals.
 11. The RFID reader of claim 10, whereinthe processing module is further operable to: determine the firstestimated resonant frequency of the first RFID tag based on one of: thefirst and second received power level indications and the one of theplurality of RF signals and the second one of the plurality of RFsignals; the first and fifth received power level indications and theone of the plurality of RF signals and the third one of the plurality ofRF signals; the second and third received power level indications andthe second one of the plurality of RF signals and the third one of theplurality of RF signals; and the first, second, and third received powerlevel indications and the one of the plurality of RF signals, the secondone of the plurality of RF signals, and the third one of the pluralityof RF signals.
 12. The RFID reader of claim 1, wherein the processingmodule is further operable to: determine a first power level adjustmentfor the first RFID tag based on the first estimated resonant frequency;and determine a second power level adjustment for the second RFID tagbased on the second estimated resonant frequency.