Intellectual Property and Ubiquitous RFID - CiteSeerX

2 downloads 77937 Views 453KB Size Report
Abstract: Radio Frequency Identification (RFID) is a ubiquitous technology with a wide variety of uses in several ... duct might be Sony and the Playstation 3 or Apple Computer ... rendered non-functional by a simple device at a point of sale.
Recent Patents on Electrical Engineering 2008, 1, 59-67

59

Intellectual Property and Ubiquitous RFID Marlin H. Mickle, James T. Cain and Alex K. Jones* Department of Electrical and Computer Engineering, University of Pittsburgh, Pittsburgh, PA, USA Received: October 5, 2007; Accepted: November 12, 2007; Revised: November 21, 2007

Abstract: Radio Frequency Identification (RFID) is a ubiquitous technology with a wide variety of uses in several different environments and application domains. The EPCGlobal Class 1 Generation 2, or “Gen 2” specification has recently received significant attention both in notoriety and application. However, while considered a relatively recent technology, the subject of RFID has a long history in intellectual property (IP) patents, which can be traced in the United States back to at least 1930. This paper describes three important points in the development of in RFID related to IP beginning with foundational patents in Electronic Article Surveillance (EAS) and how this technology has become the foundation for current RFID efforts. The second important turning point relates to difficulties faced by ubiquitous application of a technology without involving IP using the Gen 2 specification as an example. Finally, a patent application in process is presented that allows the automated generation of new RFID protocols. This final IP has the potential to encompass many more specific patents related to RFID communication protocols and provide a new emphasis on how IP is regarded for RFID.

Keywords: Intelluctual property, ubiquitous RFID, EAS, gen 2, automation IP, electronicarticle surveilance. INTRODUCTION Radio Frequency Identification (RFID) is a ubiquitous technology that is exciting, useful, and potentially extremely pervasive. There has been an explosion of interest in RFID in the recent years. Research and development in RFID has made possible its deployment in numerous applications including supply chain management [1], automatic toll collection [2], retail stores [3], location sensing [4], libraries [5, 6], healthcare [7], airports [8, 9], animal tracking [10], and building access control. While RFID has gained relatively recent notoriety (i.e. within the last 5 years) the technology behind RFID has a long history in intellectual property (IP) patents, which can be traced back to at least 1930 in the United States. Since that time there have been thousands of patents related to RFID. In particular, several patents describe a technology that preceded RFID called electronic article surveillance (EAS). This glut of patents has made it relatively difficult for standards in RFID to emerge without copious amount of IP licensing and a high potential for IP infringement for those who develop and implement the standards. The EPC Global Class 1 Generation 2 specification, more popularly known as “Gen 2” was an attempt to accomplish the goal of developing a standard without infringement and licensing of previously developed RFID related IP. While Gen 2 has been extremely successful and recently standardized as the International Standard Organization (ISO) standard number 18000 Part 6C [11], the specification raises questions about design complexity.

development of the Gen 2 specification, an RFID standard developed with the intent to avoid the need for licensing RFID IP with active patents. Finally, an emerging technology in RFID is described that allows the automation of RFID communication protocols, which could make patents for specific RFID protocols become less valuable than patents on the process to quickly develop RFID systems. ELECTRONIC ARTICLE SURVEILANCE One of the largest problems in retail sales is dealing with products leaving the store without proper payment, whether malicious or not. Consider the following scenario: A company produces a highly successful, potentially expensive, product. A current example of this type of product might be Sony and the Playstation 3 or Apple Computer and the iPod. However, the maker (i.e. Sony or Apple Computer) has received reports that stores, ranging from small individually owned local stores to national warehouse stores such as Walmart and Best Buy, have been experiencing shrinkage. Shrinkage is the process of the product leaving the store without proper payment. The lost sales are increasing the pressure on the maker to sell the product at a lower price to the affected stores. To prevent this lost revenue the maker investigates an inexpensive technique to

This paper focuses on three historical points in the development of RFID related IP. The first is the development of underlying technology patents for components vital to the existence of EAS and passive RFID. The second is the *Address correspondence to this author at the Department of Electrical and Computer Engineering, University of Pittsburgh, Pittsburgh, PA, USA; E-mail: [email protected] 1874-4761/08 $100.00+.00

7‘

R

9‘

8‘

Fig. (1). Resonating coil invented by Brard in 1930, US1744036.

© 2008 Bentham Science Publishers Ltd.

60 Recent Patents on Electrical Engineering, 2008, Vol. 1, No. 1

detect whether an object has been properly paid for while not negatively impacting those that were properly purchased. This is essentially the problem that motivated the need for EAS. EAS is a form of RFID where the data conveyed is a ‘0’ or a ‘1’ depending on whether the appropriate actions have been taken for a person to remove an item from a given location. Typically, this means paying for the item before leaving a store, or some geographic area of the store, such as the electronics section in a department store. The fundamental technology behind EAS is the ability to recognize the presence of a resonating coil using Radio Frequency (RF), which was disclosed by Evenor Brard in 1930 [12]. The resonating coil disclosed in the Brard patent (Fig. (1)) will backscatter RF energy to an energizing base station reader when the energy is of the frequency to which the coil is tuned. The tag is simply a coil with either a physical capacitor, distributed or parasitic capacitance to form the resonant “tank” circuit. Thus, if the circuit resonates, it is functional indicating for example a ‘1.’ If it can be made non-functional, it does not resonate indicating the complement, in this example a ‘0.’ In actuality, the basis for this concept had been disclosed in 1908 by Rudenberg [13] although there was no particular embodiment or means as disclosed by Brard over 20 years later. Any embodiment of the resonant circuit that can be rendered non-functional by a simple device at a point of sale can be used in conjunction with a base station (reader) to provide an alarm if an item leaves the store without being properly rendered non-functional. For example, a knife cutting through the tag would place it in the non-resonating state. Another alternative would be to remove the tag from the item. Note that numerous alternatives could be a possibility to any person having ordinary skill in the art (PHOSITA), a common acronym in the patent literature. For a viable system of EAS, the following appear to be key items: 1.

A resonant circuit on a flat adhesive backed substrate containing an etched or printed inductor and a capacitor of discrete, distributed or parasitic implementation.

2.

The utilization of a range of legal frequencies, e.g., industrial, scientific or medical (ISM) band, or a licensable frequency band.

3.

Patent protection for the tag.

4.

A methodology to change the inductance or capacitance with a technique to deactivate the tag from resonating when activated at an exit portal.

Often an EAS company would contract a third party to determine the details of the instantiation of the system that will be placed in the retail (or other) outlets. This removes the onus of marketing and manufacturing details from the EAS company and often the third party can provide access to numerous different customers. There have been over 700 patents related to developing a tag technology for EAS. When limited to the known art of a resonant (backscattering) circuit, there appear to be around 70 patents. The leading company, Checkpoint, holds 25 of

Mickle et al.

these patents, with the next leader being Sensormatic, holding 5 patents in this area. Each company holds over 100 patents in the more general area of EAS dating back to 1988 for Sensormatic [14] and 1987 for Checkpoint [15]. The timing of this paper is interesting in that the dates on both of these are nearing the 20 year mark. As EAS became popular, over 50 years after the fundamental patent by Brard, there have been several resonant circuit designs to increase the distance and reduce the power of the radio signal required to detect the device. We have extracted several circuit designs from patents shown in Fig. (2) [16-23]. Consider, for example, the circuit from Brard from Fig. (1) when compared to an early patent on EAS by Hoover assigned to the Polyonics Corporation [16], shown in Fig. (2) (b) and to a Checkpoint patent by Appalucci [17] shown in Fig. (2) (e). Note the capacitor indicated by Brard denoted 8’. In Hoover a specific shape and location of the capacitor is indicated as features 16 and 18 for the two plates with a particular alignment of the plate indicated [16]. In Appalucci, the two plates are indicated as features 20 and 22 with a slightly different location and connection. Variations on the simple capacitor (8’ of Brard) are seen throughout the other art centered on the EAS implementation making them incremental improvements on the original patent. STANDARDIZATION OF EAS A product supplier desires standardization and an equipment vendor desires product protection. However, the commercial outlet is only seeking something that works with no special effort on its part for all of the different items in the store. The desired result here is obviously to have a single tag that works with various types of readers or various tags that work with various readers (i.e. interoperability). However, there seems to be a fundamental contradiction as to whether this can be done without violating anyone’s IP. According to general expectations, if a commercial store uses the Checkpoint base station (reader), it works with Checkpoint tags. Alternatively, the same expectations would apply for the Sensormatic reader and Sensormatic tags. Therefore, a supplier of product to a store with Checkpoint equipment would apply Checkpoint tags and a supplier to a store with Sensormatic equipment would apply Sensormatic tags. Thus, the type of tag supplied by the supplier, distributor, or store owner varies for the same product and is a function of the equipment in the customer location. This becomes a fundamental deterrent for a ubiquitous solution. Conceptually, the technology does not pose a difficult problem in that there is only a single bit of data with a very simple outcome - 0 implies okay and 1 implies alarm or vice versa. One solution is to come up with a system that produces the same result without involving any IP. However, at one point in the 1990’s, there were numerous different tags or combinations of tags required on some product(s) supplied by one company to satisfy different customers. This is the situation with the concept of a resonant tag conveying one bit or state of information. Enter the Uniform Code Council, Auto-ID Labs, and EPCglobal. The result is “Combitag,” an offering from Custom Security Industries, Inc. a majority owned subsidiary of Sentry Technology

Recent Patents on Ubiquitous RFID

Recent Patents on Electrical Engineering, 2008, Vol. 1, No. 1

61

Fig. (2). Resonant circuits extracted from patents over the last 30 years.

Corporation designed to work with multiple EAS systems [24]. Unfortunately, it is likely that the interoperable solution should have been resolved by default. After 1950, the tag concept was in the public domain. Some patent attorneys (and their expert witnesses) may even argue it was in the public domain earlier. The only issues to using the Brard disclosure for EAS would be (1) the use of article surveillance, (2) attaching it to an item, and (3) creation of a device that changes the state of the implementation. It is possible that many different types of tag embodiments could be protected. However, the Brard patent discloses the

fundamental concept. All the various means to change the state of a self-resonating tag would provide multiple systems for the entrepreneurs to develop, market, and sell. But the problem of the product supplier having to attach different types of tags or combinations of tags would have been solved. RFID AND GEN 2 RFID can be viewed as a logical extension of EAS, where EAS provides a single bit identifier, RFID can store a multi-bit identifier to allow unique identification. The concept of a multi-bit identifier dates back to one of the foundational patents by Cardullo describing a transponder

62 Recent Patents on Electrical Engineering, 2008, Vol. 1, No. 1

that can be queried for its identification number [29]. This patent does not claim the use of RF in particular, but claims the technique using several media including light and acoustic waves in addition to RF. However, the patent discusses in particular automated toll collection and lays the groundwork for many classes of applications that RFID is currently used today. The Cardullo patent enumerates one of the required features for modern RFID that is the main differentiator between RFID and EAS: the requirement of an IC to manage the communication protocol or, as described in the patent, to decode interrogation signals to signal storing or transmitting data into an on-board memory. Like EAS, there is a plethora of patents in the RFID space. For example, since 1973, there have been over 3,000 patents granted in radio frequency identification leading to a wide variety of specific technologies, protocols, manufacturing processes, and applications for RFID. This has created a fairly large amount of related IP in the area, which could potentially create a bottleneck in how the RFID industry and standards organizations proceed and innovate. BACKGROUND ON RFID Radio Frequency Identification (RFID) systems have become a ubiquitous technology with applications including logistics, supply chain management, library item tracking, medical implants, road tolling, building access control, aviation security, and homeland security. RFID systems consist of Radio Frequency (RF) tags and RF readers or interrogators. The tags consist of integrated circuits (ICs) and an RF antenna. A wide range of extensions such as memory, sensors, encryption, and access control can be added to the tag. The interrogators query the tags for information stored on them, which can include items like identification numbers, user written data, or sensory data. Multiple RFID standards exist [11, 26-29] for RFID hardware, software, and data management including active battery powered tags and passive RF energy harvesting tags with frequencies ranging from 125 kHz to 2.45 Ghz. ATTEMPTING TO DEVELOP AN RFID STANDARD WITHOUT VIOLATING IP Consider the approach taken by the Auto-ID labs toward the much more complicated RFID technological process: develop an RFID tag with as many as 64 to 96-bits of information with the possibility of collisions in message exchanges with interrogators without infringing upon existing IP. The following statement was made by the AutoID labs speaking for the need of an RFID standard that allows the technology to avoid some of the proprietary deployment problems of EAS systems: “‘Intellectual Property’ is a complex subject. In working to define a global open system for the automatic identification of physical objects by computers, the Auto-ID Center is creating common platform technology in some areas, such as software, and specifying common interfaces in others, for example radio frequency identification tags. ‘Open system’ means that these common linking technologies should be available for use by all, ideally without royalties, and certainly without punitive royalties or

Mickle et al.

discrimination. Providing this availability requires an intelligent, practical approach to considerations such as licenses, patents, copyright and trademarks [30].” The result of this effort is the EPCGlobal Class 1 Generation 2 or “Gen 2” RFID specification. However, the resulting Gen 2 protocol is extremely complicated. This can be seen just by visual inspection of the Gen 2 specification compared with other ultra high frequency (UHF) RFID standards such as ISO 18000 Part 7 [26] for active tags and ISO 18185 [27] for secure container seals. The ISO 18000 Part 7 standard is analogous to a Reduced Instruction Set Computer (RISC) style processor while the ISO 18000 Part 6C protocol is analogous to a Complex Instruction Set Computer (CISC) style processor. RISC processors are based on a small number of simple instructions, but require a large instruction count to construct an application. CISC processors have a number of complex instructions that allow an application to require a much lower instruction count. Typically, embedded processors that target reduced power as a metric (also a concern for RFID implementations) are RISC style processors with the prime example of the ARM processor family. General purpose processors, particularly for desktop computers where power is only a concern for heat dissipation and performance is the main metric (less important at the speeds of RFID communications), the processor architectures are more likely to be CISC with vector and very long instruction word (VLIW) processing engines to augment the processor. A study was presented examining the complexity of implementing the Gen 2 specification in direct comparison of to the ISO 18000 Part 7 standard in [31]. From the study, it was determined that the complexity (required area and power consumption of silicon implementation) was higher for a single command of Gen 2 than 10 commands of ISO 18000 Part 7. Silicon area directly translates into the per part cost of the IC for an RFID tag. Power consumption directly impacts the communication distance for passive tags and lifetime for active tags. Placing restrictions on a standard to avoid violating IP could potentially negatively impact the complexity of design. IP designed to quickly develop protocols for evaluation and testing of a specification may have provided an opportunity to find a specification that requires similar complexity to previous generation RFID specifications and standards. The result could reduce the cost and increase the access distance of emerging RFID standards. The basic starting point for any wireless device standard, such as RFID, is a set of command lines from an interrogator and a set of responses from the device, in this case the RFID tag. Collectively, these commands and responses are frequently termed primitives. The command lines are equivalent to matching language instructions. Matching language instructions are an intermediate representation of commonly used operations that sits between assembly code and actual machine instructions. Thus, the command lines in RFID are analogous to a traditional instruction set architecture for computing processors [32].

Recent Patents on Ubiquitous RFID

The outputs are analogous to specified outputs of a traditional digital computer. For example, in the case of the IBM 1401, constructing the contents of memory locations 201 to 332 creates a buffer that can be printed by a command, P [33], which is equivalent to outputting a transmit buffer in a remote wireless device, again in our case the RFID tag. The IP referred to in the following section provides the user with the capability of manipulating a state machine, internally embodied in a software representation, so as to avoid the pitfalls of much existing IP. The concept is one of implementing the standard while enabling the designer to make specific choices and implementations to avoid or create innovative approaches to the final instantiation. AUTOMATED GENERATION OF RFID SYSTEMS RFID systems have become increasingly complex, starting with tags that represent a single bit (EAS) moving toward complicated protocols (other than energize, detect, and kill) and systems where tags potentially contain 96-byte identifiers and potentially kilobytes of data to be transferred (Gen 2). As a result, the important IP concept is shifted from specific RFID tag implementations and protocols to techniques that automatically generate RFID tags and protocols based on existing and emerging specifications and standards. In the remainder of this paper we describe a patent application that describes such a technology [34]. The IP discloses a design automation flow or RFID compiler that can automatically generate or program the IC that implements the communication protocol of an RFID tag. The target is shown in Fig. (3). This target off the RFID compiler is the IC (20) in the system. This IC integrates with a commercial off the shelf (COTS) analog front-end (25) to form the full RFID tag (10). The RFID tag can then work properly with an RFID reader (15) that implements the same communication protocol.

Recent Patents on Electrical Engineering, 2008, Vol. 1, No. 1

63

manually translated into a set of textual RFID macros called RFID Assembly (45). The RFID Assembly specifies the formation of each packet in the communication protocol. A particular packet formation would be disclosed and is not claimed as part of the IP. Using the RFID parser (50) a behavioral template in skeleton C code is automatically generated (60) and the behavior corresponding to each primitive from the specification is written in C code and added to the skeleton manually. RFID ASSEMBLY RFID specifications typically describe the contents and formation of packets for the command issued from the reader and the response from the tag in terms of fields. Using RFID Assembly is a method to represent the format of packets within any RFID specification in such a way that an implementation can be automatically generated by the tool flow. With modern tools, the ability to claim a much broader scope can be based on the more general scope of the problem to be solved and the system that incorporates it. An example of using RFID Assembly is shown in Fig. (5) for the “ownerid write” command extracted from the ISO 18000 Part 7 active RFID standard [26]. These commands resemble assembly instructions for programming microprocessors where each command contains a unique command code and several operands required in the computation of a response. Fig. (6) shows an example of the RFID assembly for the “owner write” command labeled as ionw(137) in the figure. Each of the fields is pre-declared in the declarations section with the bit width of the field specified in parentheses. In the example, the response includes a tagstatus field, which is comprised of smaller subfields that are enumerated in the text file. The command and response formats are specified in the main section with the command listed on the first line and the response on the second. The file continues with the collection command and other commands from the specification. RFID BEHAVIOR TEMPLATE

Fig. (3). Overview of the system targeted by the design automation flow [34].

The automated software tool described as part of this IP has the design flow shown in Fig. (4). This particular design flow generates a custom hardware description that can either be implemented using an Field Programmable Gate Array (FPGA) or directly in silicon as an Application Specific IC (ASIC). In this case, these targets represent a wide set of dependent claims. The RFID specification (35) and potentially proprietary extensions to the specification (40) are

The main purpose of parsing the RFID assembly is to create the hardware description language (HDL) code for unpacking incoming command packets and for packing the response packet. However, the parser also generates a C template for specifying the behavior of the tag when it receives the specified command. The values of all the fields in the command response are specified as assignment operations in C. This allows the incorporation of all of the minor variations of the design into the more inclusive concept of claiming the flexibility to incorporate behavior. Thus, all possible state variations used by communications protocols can be included into a single conceptual framework. This is demonstrated with the “ownerid write” example from ISO 18000 Part 7. The automatically generated template for the “ownerid write” command is shown in Fig. (7) (a). Each of the required fields for the response packet is available in the template as a C variable within a record. The behavior can be specified by assigning values to each of the specified variables. The behavior can include arbitrary C code to

64 Recent Patents on Electrical Engineering, 2008, Vol. 1, No. 1

Mickle et al.

Fig. (4). Design automation flow to target the RFID tag IC for implementation of the communication protocol [34].

Fig. (5). Example packet formation of a RFID protocol [34].

Fig. (6). RFID assembly text representation [34].

implement the required computation by the tag. The width of each of the operations is automatically scaled to the bit widths specified by the RFID assembly. The completed behavioral code for the “ownerid write” command is shown in Fig. (7) (b). In many cases the response values are filled with constants. In some cases the

values assigned come from internally stored variables or variables filled by data from the initial command. CTO HDL TRANSLATION This final behavioral code is the input into the C to HDL translation and is eventually combined with the HDL

Recent Patents on Ubiquitous RFID

Recent Patents on Electrical Engineering, 2008, Vol. 1, No. 1

generated automatically from the RFID parser in the RFID compiler. The C to HDL translation is based on the Super CISC synthesis technique [35-37]. This approach incorporates the fundamental concept of the essence of the tag execution according to any logical or arithmetic operation that would be designed by a person having ordinary skill in the art. However, all such embodiments are part of the more inclusive generating capability that is disclosed and claimed in this IP. The particular embodiment for translating the C to HDL is demonstrated using the “ownerid write” example. The C code is initially converted into a control and data flow graph (CDFG) representation. The CDFG representation for the “ownerid write” command specified by the C code in Fig. (7) (b) is shown in Fig. (8). The control flow graph of the CDFG is shown on the far left and the edges represent the control flow dependencies in the code. The edges connect basic blocks which each contain a data flow graph. The data flow graph describes the computation in the RFID behavior where individual computation nodes are connected by edges that represent the data dependences. When synthesizing a CDFG structure into an HDL description, the control edges represent sequential or clock boundaries in the hardware and the data flow graphs represent combinational hardware segments. Rather than

directly generating hardware from the CDFG as is the case with many high-level synthesis techniques, the C to HDL converter described in this approach first converts this CDFG into a super data flow graph (SDFG). This technique converts the control depen-dencies of the CDFG into data dependencies using a technique called hardware predication. The technique, similar to predicated execution in a processor, rather than deciding which path to execute based on a conditional, executes all paths of execution and selects the output of the correct path [35, 36]. This is implemented in hardware using selectors or multiplexers and effectively joins the basic blocks of a CDFG into a single basic block or SDFG. SDFGs have been shown to be particularly low latency [35, 36] and low power [37] resulting in very energy efficient hardware. The SDFG generated from the CDFG in Fig. (8) is shown in Fig. (9). We notice that the control flow graph has been removed and that there is a single basic block. Several multiplexers have been introduced to select values from different control paths in the CDFG. The final result of this automation flow is an actual RFID device prototype. The technique has been demonstrated produce several RFID tag prototypes using microprocessors, FPGAs, and ASICs in [38-40]. While this approach only

(a) Template generated from the RFID parser.

(b) Filled in behavior.

Fig. (7). Template for the specification of tag behavior in C [34]. Basic Block 0

Control Flow for 'main'

BB0

0

isPasswordProtected 2

BB2

BB4

BB5

1

Basic Block 2

commandValid

0 2

!=

!=

eval

eval

7

0

Basic Block 6

Basic Block 4

Basic Block 5

0

1

14

0

0

1

2

3

acknowledge

acknowledge

mesglen

battery

userid

reserved3

tagtype

reserved2

1

reserved1

modefield

65

BB6

Fig. (8). Control and data flow graph (CDFG) for the “ownerid write” command described in C [34].

66 Recent Patents on Electrical Engineering, 2008, Vol. 1, No. 1

Mickle et al.

Basic Block 0

14

0

0

1

2

3

0

commandValid 2

mesglen

battery

userid

reserved3

tagtype

reserved2 1

mux

acknowledge 1

1

0

!=

S

2

7

2

1 1

!= 1

S

isPasswordProtected

S

reserved1 S

2

0

2

0 1

mux

mux

mux

acknowledge

reserved1

modefield

modefield 2

Fig. (9). Super data flow graph (SDFG) for the “ownerid write” command [34].

provides a design for the device’s controller, an extension of this concept could be applied to other layers in the RFID device. IMPACT OF THE AUTOMATION IP As RFID specifications and standards continue to be developed and continue to evolve with the needs of applications, the IP described in the automation patent application [34] is the key to building future RFID systems. The potential claim structure itself suggests that the automation embodiment provides techniques to implement new RFID specifications more quickly and to merge various RFID specifications and standards into a single framework of implementation. The claim structure describes several types of possible target IC implementations including micro-processors, ASICs, and low power FPGAs. The document also implies a system-on-a-chip (SoC) implementation for the entire device. The described claim concepts focus on the development of RFID tags, but this type of IP can easily be applied to the development of various types of RFID readers and other various components in RFID systems. While the target of the automation flow is specified as an eventual product prototype, the value of this concept in the development of standards is very important. The automation flow allows new RFID specifications to be quickly implemented and tested, evaluated for power consumption and area of the IC implementation. These capabilities could be interpreted to be included within the claim structure cited here. The power consumption of the IC can contribute to communication distance for passive RFID and tag lifetimes for active RFID. The area directly corresponds to the cost of the IC for the target RFID devices. Changes in the specification can be quickly entertained and compared for these metrics. When considering the implementation of a standard like Gen 2, where the goal was to avoid violating IP rather than developing the most efficient

implementation, this technique and tool would be very valuable. Finally, while the claims cited here refer to examples in the RFID domain, this technique certainly applies to communication protocols in general and may impact many domains of wireless communication such as the wireless Internet, wireless sensor networks, etc. CURRENT & FUTURE DEVELOPMENTS While RFID is only recently becoming a ubiquitous technology, the history of its development can be traced back to intellectual property and patents over more than 75 years. This paper in particular describes some of the important considerations in the development of current RFID including early work in EAS, the development of an “IP-less” passive RFID standard, and finally IP that allows the exploration of further generations of RFID and potentially wireless communication systems in general. As we move forward, more recent developments in intellectual property in RFID will continue to evolve, particularly with mandates for the use of RFID by both Walmart and the Department of Defense. Certainly, the automation IP can play an important role in accessibility of RFID standard development and potentially technology implementation of defined and ad hoc RFID specifications. However, it is interesting that, while we have come a long way in the development of IP related to RFID systems, the fundamental underlying technological concepts have not changed substantially from the resonating circuit patented in 1930. REFERENCES [1]

[2] [3]

Gao X, Xiang Z, Wang H, Shen J, Huang J, Song S. An approach to security and privacy of RFID system for supply chain. in Proc 2004 IEEE International Conference on E-Commerce Technology for Dynamic E-Business 2004; 164-168. Blythe P. RFID for road tolling, road-use pricing and vehicle access control. IEE Colloquium on RFID Technology 1999; 1999(123): 16 pages. Roussos G, Enabling RFID in retail. Computer 2006; 39(3): 25-30.

Recent Patents on Ubiquitous RFID [4] [5]

[6]

[7] [8]

[9]

[10]

[11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24]

Ni LM, Liu Y, Lau YC, Patil AP. LANDMARC: indoor location sensing using active RFID. Wireless Networks 2004; 10: 701-710. Molnar D, Wagner D. Privacy: Privacy and security in library RFID: issues, practices, and architectures. Proc 11th ACM conference on Computer and Communications Security 2004. TI, Texas instruments’ RFID technology streamlines management of vatican library’s treasured collections. 2004, www.ti.com/tiris/docs/news/news_releases/2004/rel07-07-04. shtml. Li C, Liu L, Chen S, Wu CC, Huang C, Chen X. Mobile healthcare service system using RFID. IEEE International Conference on Networking, Sensing and Control 2004; 2. Cerino A, Walsh WP. Research and application of radio frequency identification (RFID) technology to enhance aviation security. Proc IEEE National Aerospace and Electronics Conference 2000. Wong YF, Wu PWK, Wong DMH, Chan DK, Fung LC, Leung SW, “RFI: Assessment on human safety of RFID system at hong kong international airport. Proc 17th International Zurich Symposium on Electromagnetic Compatibility 2006; 108-111. Alu A, Sapia C, Toscano AV. Radio frequency animal identification: electromagnetic analysis and experimental evaluation of the transponder-gate system. Int J Radio Frequency Identification Technology and Applications 2006; 1(1): 90-106. International Standards Organization, ISO/IEC FDIS 180006:2004/amd 1:2006(e). Standard Specification, 2006. Brard, E.: US1744036 (1930). Rudenberg R. The reception of electric waves in radio telegraphy. Annalen der Physik 1908; 25(3): 446-466. Siikarla, R., Pinneo, G.G., Narlow, D.A.: US4736207 (1988). Wolf, A.E.: US4692747 (1987). Hoover, M.F, Salamone, A.B, Vandebult, J.: US4555414 (1985). Appalucci, L.C., Ortiz, L.F.: US5142270 (1992). Wahlstrom, S.E.: US4023167 (1977). Tait, W.C.: US4578654 (1986). Baker, D.L.: US4658264 (1987). Batterink, H., Angel, W.: US5734327 (1998). Appalucci, L.C., Bowers, J.G., Mazoki, G.T., McKeown, T.J., Piccoli, A.F., Rankin, M.J., Tocker, S.: US5841350, (1998). Eckstein, E., Paranzino, J.D., Shah, N.: US7187289 (2007). NewsEdge Corporation, Sentry technology subsidiary announces important eas source tagging contract. Securityinfowatch.com online journal, September 2004, www.securityinfowatch.com.

Recent Patents on Electrical Engineering, 2008, Vol. 1, No. 1 [25] [26] [27] [28]

[29] [30] [31] [32] [33] [34] [35]

[36]

[37]

[38]

[39] [40]

67

American National Standards Institute, ANSI NCITS 236:2001. Standard Specification, 2002. International Standards Organization, “ISO/IEC FDIS 180007:2004(e),” Standard Specification, 2004. ------, “ISO/IEC FDIS 18185-1:2006,” Standard Specification, 2006. Cglobal EP, “Class 1 generation 2 uhf air interface protocol standard version 1.0.9,” W3C Recommendation, 1998, http://www.epcglobalinc.org/standards/. Cardullo, M.W., William, I., Parks, L.: US3713148 (1973). Ashton K. Towards an approach to ‘intellectual property. Auto-ID Labs, Tech. Rep., 2006. Dontharaju S, Tung S, Jones A K, et al. The unwinding of a protocol. IEEE Appl Pract 2007; 1(1): 4-9. Siewiorek DP, Bell CG, Newell A, Computer Structures: Principles and Examples, McGraw-Hill, 1981. Reynolds CO. Programming the 1401 systems. Pyramid Publishing Co., 1961; 19-20. Mickle, M.H., Cain J.T., Dontharaju, S., Hoare, R.R., Jones, A.K.: US20060271912 (2006). Hoare R, Jones AK, Kusic D, et al. Rapid VLIW processor customization for signal processing applications using combinational hardware functions. EURASIP J Appl Signal Proc 2006; 2006: 467-472. Jones A K, Hoare R, Kusic D, Fazekas J, Foster J. An FPGA-based VLIW processor with custom hardware execution. ACM International Symposium on Field-Programmable Gate Arrays (FPGA), 2005; 107-117. Jones A K, Hoare R, Kusic D, Mehta G, Fazekas J, Foster J. Reducing power while increasing performance with supercisc. ACM Transactions on Embedded Computing Systems (TECS) 2006; 5(3): 658-686. Jones AK, Dontharaju ST, et al. Passive active radio frequency identification tags. Int J Radio Frequency Identif Appl (IJRFITA) 2006, 1(1): 52-73. Jones A K, Hoare R, Dontharaju S, et al. An Automated, Reconfigurable, Low-Power RFID Tag. Proc Design Automation Conference (DAC) 2006. 131-136. Jones A K, Dontharaju ST, et al. Radio Frequency Identification Prototyping. Trans Design Automation Elec Systems (TODAES) in press.