. "This method is especially effective over other methods when the transponder is a read-only type of device, whereby there is no communications interrogator on board the read-only transponder." . . .