Browse Prior Art Database

Method for Storing and Accessing Interrogation Information on RFID Tags

IP.com Disclosure Number: IPCOM000131643D
Original Publication Date: 2005-Nov-11
Included in the Prior Art Database: 2005-Nov-11
Document File: 1 page(s) / 24K

Publishing Venue

IBM

Abstract

In general the type of data that is stored on an radio frequency identification (RFID) tag or used with an application is limited to a direct replacement for barcode technology or used as a dynamic electronic manifest. As storage capacity increases on tags the application of this idea will become more practical. The amount of memory available on Read Only Tags is 20 bits of information. Active Read/Write Tags vary from 64 Bytes to 32KB, meaning that several pages of type-written text . Proposed is a method to use an RFID tag as a medium to directly log and store access information.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 60% of the total text.

Page 1 of 1

Method for Storing and Accessing Interrogation Information on RFID Tags

An RFID tag may be read many times by different readers. In the interest of minimizing storage usage there will be only one signature for each type of reader. However, there will be a record of the number of times each unique reader accessed a particular tag, and increment the access record for that type.

The following type of data can be collected and logged on a RFID tag itself - tag, that logs the number of times it has been accessed or queried - type of reader - time accessed

This concept is similar to the way cookies work in a browser. The reader would loosely be synonymous to a web server, the RFID tag the web browser. The data that is obtained from the reader each time the reader requests information fon the tag is stored as a cookie on the tag itself. Each time a particular reader attempts to access a tag the record for that reader on the tag is updated.

The contents of the tag will have restricted access, with an authentication scheme to control access to specific data. For a any reader to be able to read a tag, the reader has to transmit information about itself to an RFID before the tag transmits any information to the reader. The initial transmitted information from the reader will then be stored by the tag to be logged for later use.

This technology will give power to the user of a product that has an embedded tag. After a product is purchased, the product along with its RFID tag...