1 / 61

What is RFID?

What is RFID?. RFID is a technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track... RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item. What is RFID.

mateja
Download Presentation

What is RFID?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What is RFID? • RFID is a technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track... • RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item Muhammad Wasim Raad

  2. What is RFID • Tag enters RF field • RF signal powers tag • Tag transmits ID, plus data • Reader captures data • Reader sends data to computer • Computer determines action • Computer instructs reader • Reader transmits data to tag Radio Frequency Identification Label (Transponder) Reader/Antenna (Interrogator) Computer Muhammad Wasim Raad

  3. RFID Primer • RFID Diagram: Antenna RF Module Reader Host Computer Note: The host is the software database... Muhammad Wasim Raad

  4. RFID Primer Antenna RFModule Reader Host Computer Note: The RF module createsradio frequency (RF). It receives and transmits RF through the antenna… Muhammad Wasim Raad

  5. RFID Primer Antenna RFModule Reader Host Computer Note: The RF module createsradio frequency (RF). It receives and transmits RF through the antenna… Muhammad Wasim Raad

  6. RFID Primer Antenna RF Module Tag Reader Host Computer Note: Tag (transponder) is interrogated by the antenna.... Muhammad Wasim Raad

  7. RFID Primer (Tag ID Communication) Antenna RF Module Tag Reader Host Computer Note: The antenna captures the tag ID number…first as analog RF waves, then it is converted to digital information. Muhammad Wasim Raad

  8. CPU I/O RAM ROM Radio Tx/Rx Pwr Supply CPU I/O RAM ROM Radio Tx/Rx Pwr Supply An RFID Tag Is A Portable Database …A sophisticated computing and communications device …A wireless extension of Information Systems Interrogation Unit Tag Micro Antenna Tx/Rx Computer Computer Network Muhammad Wasim Raad

  9. Inlays for RFID Tags for 13.56 Mhz Muhammad Wasim Raad

  10. Why use RFID ? • To determine authentication of a package • To provide automated traceability of an item Muhammad Wasim Raad

  11. Motivation of using RFID • Generate Revenue • Reduce operating costs Muhammad Wasim Raad

  12. The RFID Reader Anti-collision protocol Muhammad Wasim Raad

  13. What is RFID? -- The Tags • Tags can be read-only or read-write • Tag memory can be factory or field programmed, partitionable, and optionally permanently locked • Bytes left unlocked can be rewritten over more than 100,000 times Muhammad Wasim Raad

  14. What is RFID? -- The Tags • Tags can be attached to almost anything: • pallets or cases of product • vehicles • company assets or personnel • items such as apparel, luggage, laundry • people, livestock, or pets • high value electronics such as computers, TVs, camcorders Muhammad Wasim Raad

  15. Are All Tags The Same? Basic Types: • Active • Tag transmits radio signal • Battery powered memory, radio & circuitry • High Read Range (300 feet) • Passive • Tag reflects radio signal from reader • Reader powered • Shorter Read Range (4 inches - 15 feet) Muhammad Wasim Raad

  16. Are All Tags The Same? • Variations: • Memory • Size (16 bits - 512KBytes +) • Read-Only, Read/Write or WORM • Type: EEProm, Antifuse, FeRam • Arbitration (Anti-collision) • Ability to read/write one or many tags at a time • Frequency • 125KHz - 5.8 GHz • Physical Dimensions • Thumbnail to Brick sizes • Price ($0.50 to $250) Muhammad Wasim Raad

  17. Types of Tags - Memory Segmentation • Read Only (Factory Programmed) • WORM - Write Once, Read Many times • Reprogrammable (Field Programmable) • Read/Write (In-Use Programmable) Muhammad Wasim Raad

  18. What is RFID? -- The Readers • Readers (interrogators) can be at a fixed point such as • Entrance/exit • Point of sale • Warehouse • Readers can also be mobile -- tethered, hand-held, or wireless Muhammad Wasim Raad

  19. <150 kHz (125 kHz & 134 kHz ) Advantages • Uses normal CMOS processing —basic and ubiquitous • Relative freedom from regulatory limitations • Well suited for applications requiring reading small amounts of data at slow speeds and minimal distances • Penetrates materials well (water, tissue, wood, aluminum) Muhammad Wasim Raad

  20. <150 kHz (125 kHz & 134 kHz ) Disadvantages: • Does not penetrate or transmit around metals (iron, steel) • Handles only small amounts of data • Slow read speeds • Large Antennas -- compared to higher frequencies • Minimal Range Muhammad Wasim Raad

  21. <150 kHz (125 kHz & 134 kHz ) Disadvantages: • Tag construction: • is thicker (than 13.56 MHz) • is more expensive (than 13.56 MHz) • more complex (requires more turns of the induction coil) Muhammad Wasim Raad

  22. 13.56 MHz Advantages • Uses normal CMOS processing--basic and ubiquitous • Well suited for applications requiring reading small amounts of data and minimal distances • Penetrates water/tissue well • Simpler antenna design (fewer turns of the coil); lower costs to build • Higher data rate (than 125 kHz--but slower than higher MHz systems) • Thinner tag construction (than 125 kHz) Muhammad Wasim Raad

  23. 13.56 MHz Disadvantages • Government regulated frequency (U.S. versus Europe) • Does not penetrate or transmit around metals (unless very thick) • Large Antennas (compared to higher frequencies) • Larger tag size than higher frequencies • Tag construction: requires more than one surface to complete a circuit • Minimal Range Muhammad Wasim Raad

  24. Bar Codes vs. RFID Muhammad Wasim Raad

  25. RFID Applications • Petrol Service Stations • In Singapore, the Mobil petrol service stations has already introduced RFID technology to implement their Speed Pass system to enable drivers to fill up the petrol and drive away. All information will be gathered automatically through RFID smart tags and customers’ bills can be settled through the net. Muhammad Wasim Raad

  26. RFID Application in Petrol Service Station Muhammad Wasim Raad

  27. RFID Application in a Factory Canteen • it is very interesting to notice that in the factory canteen’s environment, RFID tags are attached at the bottom of the plates to identify the cooked food and its price. • The staff of the factory need only to pick up the food on the tray and place the tray on top of a RFID reader. • The RFID reader will identify the products and its price. The staff need only to place the cash card to pay for the food. Muhammad Wasim Raad

  28. Paperless Maintenance Senario at Frankfort Airport Muhammad Wasim Raad

  29. Configuration of RFID Antennas on doors in Metro ware house Muhammad Wasim Raad

  30. Application in Smart Appliances Muhammad Wasim Raad

  31. Smart Appliances using RFID Muhammad Wasim Raad

  32. Advantage Cooking a pizza Forget about your pizza {Not Expired, Expired} Expiration Cannotcook Can cook {Healthy, Unhealthy} RFiD Diet Muhammad Wasim Raad

  33. Muhammad Wasim Raad

  34. EPC meets pharmaceutical supply chain Muhammad Wasim Raad

  35. Case Study:Logistics processes at HP Muhammad Wasim Raad

  36. Privacy • Privacy bit on tag • Tags belong to consumers • If privacy bit=1 it will be invisible to readers • Readers watch on each other: private tag command • What is blocker tag? Muhammad Wasim Raad

  37. The privacy bit • Blocker tag command can prevent privacy violations before they occur • A blocker effectively jams readers that emit private-read commands • When it detects it, it simulates all possible RFID tags in the world rendering reader incapable Muhammad Wasim Raad

  38. Market Trend Muhammad Wasim Raad

  39. Inside a Smart Card • Based on ISO 7816 standards -Define Card Size, Contact and internal code used • Non volatile memory: EEPROM • IN/Out: 9600 bits/second Muhammad Wasim Raad

  40. Smart Card classification • Memory only Card( Contact or Contactless) • Contact CPU Card • Contactless CPU Card Muhammad Wasim Raad

  41. How many kinds of smart cards exist? • -Contact smart card inserted into card reader Muhammad Wasim Raad

  42. - Contactless Smart cards: should be passed near an antenna to carry out transaction Muhammad Wasim Raad

  43. Muhammad Wasim Raad

  44. To Managing Finances Securely and Conveniently Entertainment on Demand Earning and redeeming rewards with Virtual Merchants To store personal data for covenience on-line Virtual Health, Govt or other Services To Secure Virtual World Shopping with Credit (Chip SecureCode) or e-Cash How can the SMART card help in new channels? Muhammad Wasim Raad

  45. Native EMV Code Native Loyalty Code Native EMV Code Native EMV Code Native Loyalty Code Proprietary OS A Proprietary OS B Proprietary Smart Card Operating Systems • Proprietary Chip OS developed in “native” code - specific to underlying silicon - to access chip functions. OS often dedicated to performing a single specific function – e.g. EMV Data Data Data Data E2 E2 ROM ROM • OS code is fixed in the ROM of the chip, and cannot be changed after the chip is made. Chip Hardware A Chip Hardware B • Limited number of programmers able to make adaptations to proprietary OS – impact on time to market if changes / new functions required. • In order to multi-source silicon, native code must be redeveloped from scratch for new chip. Muhammad Wasim Raad Chip Hardware A Chip Hardware B

  46. MULTOS • The only OS obtaining ITSEC(E6) Very secure • Multi-application support • Requires Coprocessor for RSA makes it expensive Muhammad Wasim Raad

  47. MULTOS: The OPEN STANDARD smart card operating system • MULTOS defines a standard CHIP HARDWARE INDEPENDENT Smart CardOperating System: • Portable: • Develop applications ONCE and run on ANY MULTOS chip. • Open: • Develop in C or Java and Compile. API FREELY available. MEL Editor C Compiler Java Compiler / Translator EMV EMV • Highest Hardware and OS Security Assurance: • ITSEC E6 High evaluated • MULTOS SCHEME facilitates management of multiple applications • Advanced Asymmetric Cryptographic mechanism PKI Application A PKI Application A E2PROM E2PROM MULTOS API MULTOS API MULTOS VM MULTOS VM ROM ROM Infineon Silicon Renesas Silicon Muhammad Wasim Raad

  48. HID MIFARE Card • 13.56 MHz contactless card • used for public transportation, access control,road toll, park & ride, airline ticketing, customer loyalty and ID card Muhammad Wasim Raad

  49. Mifare features Reader Card Unique Chip Serial Number 13.56 MHz Transmission ISO 14443 8Kbit EEPROM 16 independent sectors Anticollision Cryptography Key Storage WOM Protection by cryptographic algorithm Muhammad Wasim Raad

  50. Main applications • Access Control • Vehicle identification • Electronic driver license • Ski Passes • Airline tickets • Transportation: buses, taxis & underground • Baggage Identification Muhammad Wasim Raad

More Related