Patents by Inventor Wayne Shanks

Wayne Shanks has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20060082458
    Abstract: A radio frequency identification (RFID) architecture is described. RFID tags are interrogated by a reader, which may be located in a network of readers. The reader transmits symbols to the tags. Tags respond to the interrogations with symbols that each represent one or more bits of data. An RFID tag includes an antenna pad, a receiver, a state machine, and a modulator. The receiver is coupled to the antenna pad. The receiver receives a symbol from the antenna pad and outputs a received signal. The state machine is configured to determine a response symbol from the received signal and an operating state of the tag. The modulator is coupled to the antenna pad. The modulator is configured to backscatter modulate the received symbol with the response symbol. The modulator is configured to output the backscatter modulated symbol to the antenna pad.
    Type: Application
    Filed: November 14, 2005
    Publication date: April 20, 2006
    Applicant: Symbol Technologies, Inc.
    Inventors: Wayne Shanks, William Bandy, Michael Arneson, Kevin Powell
  • Publication number: 20060077082
    Abstract: A method, system, and apparatus for remotely calibrating data symbols received by a radio frequency identification (RFID) tag population are described. Tags are interrogated by a reader, which may be located in a network of readers. The reader transmits data symbols to the tags. Tags respond to the interrogations with symbols that each represent one or more bits of data. To calibrate the tags, the reader transmits a plurality of pulses of different lengths to the tag population. The tags receive the plurality of pulses. A characteristic of each pulse, such as a pulse length, is stored by the tags. The stored pulse lengths are used to define different data symbols that are subsequently received by the tags from the reader.
    Type: Application
    Filed: September 9, 2005
    Publication date: April 13, 2006
    Applicant: Symbol Technologies, Inc.
    Inventors: Wayne Shanks, William Bandy, Kevin Powell, Michael Arneson
  • Publication number: 20060065731
    Abstract: Methods and systems for the negotiation of a population of RFID tags with improved security is provided. In one aspect, tags are singulated without using information that directly identifies the tags in the tag population. A key is generated to identify each RFID tag of the population of RFID tags. The generated key does not include bits identifying an item with which the particular RFID tag is associated. An algorithm is operated to identify one or more tags in the population of RFIDs tags using the generated keys. In another aspect, frequency hopping and/or spread spectrum techniques are used to provide improved security while negotiating tags. In another aspect, the reader causes the tags to scroll series of bits back to the reader for each bit sent to the tags to provide improved security.
    Type: Application
    Filed: November 10, 2005
    Publication date: March 30, 2006
    Applicant: Symbol Technologies, Inc.
    Inventors: Kevin Powell, Wayne Shanks, William Bandy
  • Publication number: 20060061473
    Abstract: A method, system, and apparatus for communicating with a radio frequency identification (RFID) tag population that includes one or more tags are described. The tags are interrogated by a reader which may be located in a network of readers. The reader interrogates the tags by transmitting data symbols to the tags. Tags respond to the reader with backscatter symbols. Bit patterns, such as identification numbers stored in the tags, are collected from the plurality of tags without collisions. Collisions are avoided because the backscatter symbols transmitted by the tags use different characteristics to represent different data bits. For example, a first backscatter symbol frequency is used by the tag to represent a “0” bit, and a second backscatter symbol frequency is used by the tag to represent a “1” bit.
    Type: Application
    Filed: November 10, 2005
    Publication date: March 23, 2006
    Applicant: Symbol Technologies, Inc.
    Inventors: Wayne Shanks, William Bandy, Kevin Powell, Michael Arneson
  • Publication number: 20060061474
    Abstract: A method, system, and apparatus for interrogating a radio frequency identification (RFID) tag population are described. Tags are interrogated by a reader. The reader and tags engage in communication according to communications algorithms, where data symbols are exchanged between the reader and tags. Furthermore, a reader implicitly controls the operating state of every tag in the tag population by transmitting a single data symbol. Bit patterns may be collected from the tags by the reader, using a variety of interrogation techniques. In a general interrogation, the reader exchanges symbols with the tag population to interrogate the entire tag population. In a specific interrogation, a reader exchanges symbols with the tag population to target a particular tag identification number. Tags may also be placed in a superposition state by the reader, where they respond whenever a received data symbol matches the next bit of their identification number.
    Type: Application
    Filed: November 14, 2005
    Publication date: March 23, 2006
    Applicant: Symbol Technologies, Inc.
    Inventors: Wayne Shanks, Kevin Powell, William Bandy, Michael Arneson
  • Publication number: 20060012387
    Abstract: Methods and systems for testing tags in volume are described. According to a first embodiment, an array of radiation sources is present. Each radiation source in the array corresponds to a tag in a plurality of tags. A plurality of radiation sources in the array controllably emit radiation to their corresponding tag to inhibit operation of an integrated circuit of their corresponding tag. A first radiation source in the array does not emit radiation to its corresponding tag. The tag corresponding to the first radiation source is tested. In a second embodiment, an array of blocking elements is present. Each blocking element in the array corresponds to a tag in a plurality of tags. The blocking elements in the array controllably inhibit radiation from being incident upon corresponding tags. A first blocking element in the array inhibits radiation from being incident upon its corresponding tag. The tag corresponding to the first blocking element is tested.
    Type: Application
    Filed: June 29, 2005
    Publication date: January 19, 2006
    Applicant: Symbol Technologies, Inc.
    Inventor: Wayne Shanks
  • Publication number: 20050174239
    Abstract: A radio frequency identification (RFID) architecture is described. RFID tags are interrogated by a reader, which may be located in a network of readers. The reader transmits symbols to the tags. Tags respond to the interrogations with symbols that each represent one or more bits of data. An RFID tag includes an antenna pad, a receiver, a state machine, and a modulator. The receiver is coupled to the antenna pad. The receiver receives a symbol from the antenna pad and outputs a received signal. The state machine is configured to determine a response symbol from the received signal and an operating state of the tag. The modulator is coupled to the antenna pad. The modulator is configured to backscatter modulate the received symbol with the response symbol. The modulator is configured to output the backscatter modulated symbol to the antenna pad.
    Type: Application
    Filed: April 6, 2005
    Publication date: August 11, 2005
    Applicant: Symbol Technologies, Inc.
    Inventors: Wayne Shanks, William Bandy, Michael Arneson, Kevin Powell
  • Publication number: 20050040974
    Abstract: A method, system, and apparatus for remotely calibrating data symbols received by a radio frequency identification (RFID) tag population are described. Tags are interrogated by a reader, which may be located in a network of readers. The reader transmits data symbols to the tags. Tags respond to the interrogations with symbols that each represent one or more bits of data. To calibrate the tags, the reader transmits a plurality of pulses of different lengths to the tag population. The tags receive the plurality of pulses. A characteristic of each pulse, such as a pulse length, is stored by the tags. The stored pulse lengths are used to define different data symbols that are subsequently received by the tags from the reader.
    Type: Application
    Filed: August 26, 2004
    Publication date: February 24, 2005
    Inventors: Wayne Shanks, William Bandy, Kevin Powell, Michael Arneson
  • Publication number: 20040135674
    Abstract: A method for reading and tracking radio frequency identification (RFID) tags in the presence of a noisy air channel is provided. In accordance with the method, a binary tree data structure is used to characterize a plurality of RFID tags, each of which is associated with a unique identification (ID) number. During communication between a tag reader and one or more RFID tags, the tag reader traverses the binary tree, eliminating tags from communication until one tag with a unique ID number is isolated and verified. As the binary tree is traversed, counters associated with each node in the tree are incremented based on tag matches, such that, over time, counters associated with nodes in tag-populated branches will tend to have a high value and counters associated with nodes in unpopulated tree branches will tend to have low values.
    Type: Application
    Filed: October 20, 2003
    Publication date: July 15, 2004
    Inventors: Wayne Shanks, Jens Arnold