What is RFID? - PowerPoint PPT Presentation

About This Presentation
Title:

What is RFID?

Description:

RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item ... – PowerPoint PPT presentation

Number of Views:447
Avg rating:3.0/5.0
Slides: 62
Provided by: AIN123
Category:

less

Transcript and Presenter's Notes

Title: What is RFID?


1
What is RFID?
  • RFID is a technology that uses radio-frequency
    waves to transfer data between a reader and a
    movable item to identify, categorize, track...
  • RFID is fast, reliable, and does not require
    physical sight or contact between reader/scanner
    and the tagged item

2
What is RFID
  • Tag enters RF field
  • RF signal powers tag
  • Tag transmits ID, plus data
  • Reader captures data
  • Reader sends data to computer
  • Computer determines action
  • Computer instructs reader
  • Reader transmits data to tag

Radio Frequency Identification
Label (Transponder)
Reader/Antenna (Interrogator)
Computer
3
RFID Primer
  • RFID Diagram

Antenna
RF Module
Reader
Host Computer
Note The host is the software database...
4
RFID Primer
Antenna
RF Module
Reader
Host Computer
Note The RF module creates radio frequency (RF).
It receives and transmits RF through the antenna
5
RFID Primer
Antenna
RF Module
Reader
Host Computer
Note The RF module creates radio frequency (RF).
It receives and transmits RF through the antenna
6
RFID Primer
Antenna
RF Module
Tag
Reader
Host Computer
Note Tag (transponder) is interrogated by the
antenna....
7
RFID Primer
(Tag ID Communication)
Antenna
RF Module
Tag
Reader
Host Computer
Note The antenna captures the tag ID
numberfirst as analog RF waves, then it is
converted to digital information.
8
An RFID Tag Is A Portable Database
Interrogation Unit
Micro
Tag
Antenna
Tx/Rx
Computer
Computer Network
  • A sophisticated computing and communications
    device
  • A wireless extension of Information Systems

9
Inlays for RFID Tags for 13.56 Mhz
10
Why use RFID ?
  • To determine authentication of a package
  • To provide automated traceability of an item

11
Motivation of using RFID
  • Generate Revenue
  • Reduce operating costs

12
The RFID Reader Anti-collision protocol
13
What is RFID? -- The Tags
  • Tags can be read-only or read-write
  • Tag memory can be factory or field programmed,
    partitionable, and optionally permanently locked
  • Bytes left unlocked can be rewritten over more
    than 100,000 times

14
What is RFID? -- The Tags
  • Tags can be attached to almost anything
  • pallets or cases of product
  • vehicles
  • company assets or personnel
  • items such as apparel, luggage, laundry
  • people, livestock, or pets
  • high value electronics such as computers, TVs,
    camcorders

15
Are All Tags The Same?
  • Basic Types
  • Active
  • Tag transmits radio signal
  • Battery powered memory, radio circuitry
  • High Read Range (300 feet)
  • Passive
  • Tag reflects radio signal from reader
  • Reader powered
  • Shorter Read Range (4 inches - 15 feet)

16
Are All Tags The Same?
  • Variations
  • Memory
  • Size (16 bits - 512KBytes )
  • Read-Only, Read/Write or WORM
  • Type EEProm, Antifuse, FeRam
  • Arbitration (Anti-collision)
  • Ability to read/write one or many tags at a time
  • Frequency
  • 125KHz - 5.8 GHz
  • Physical Dimensions
  • Thumbnail to Brick sizes
  • Price (0.50 to 250)

17
Types of Tags - Memory Segmentation
  • Read Only (Factory Programmed)
  • WORM - Write Once, Read Many times
  • Reprogrammable (Field Programmable)
  • Read/Write (In-Use Programmable)

18
What is RFID? -- The Readers
  • Readers (interrogators) can be at a fixed point
    such as
  • Entrance/exit
  • Point of sale
  • Warehouse
  • Readers can also be mobile -- tethered,
    hand-held, or wireless

19
lt150 kHz (125 kHz 134 kHz )
  • Advantages
  • Uses normal CMOS processing basic and
    ubiquitous
  • Relative freedom from regulatory limitations
  • Well suited for applications requiring reading
    small amounts of data at slow speeds and
    minimal distances
  • Penetrates materials well (water, tissue, wood,
    aluminum)

20
lt150 kHz (125 kHz 134 kHz )
  • Disadvantages
  • Does not penetrate or transmit around metals
    (iron, steel)
  • Handles only small amounts of data
  • Slow read speeds
  • Large Antennas -- compared to higher frequencies
  • Minimal Range

21
lt150 kHz (125 kHz 134 kHz )
  • Disadvantages
  • Tag construction
  • is thicker (than 13.56 MHz)
  • is more expensive (than 13.56 MHz)
  • more complex (requires more turns of the
    induction coil)

22
13.56 MHz
  • Advantages
  • Uses normal CMOS processing--basic and ubiquitous
  • Well suited for applications requiring reading
    small amounts of data and minimal distances
  • Penetrates water/tissue well
  • Simpler antenna design (fewer turns of the coil)
    lower costs to build
  • Higher data rate (than 125 kHz--but slower than
    higher MHz systems)
  • Thinner tag construction (than 125 kHz)

23
13.56 MHz
  • Disadvantages
  • Government regulated frequency (U.S. versus
    Europe)
  • Does not penetrate or transmit around metals
    (unless very thick)
  • Large Antennas (compared to higher frequencies)
  • Larger tag size than higher frequencies
  • Tag construction requires more than one surface
    to complete a circuit
  • Minimal Range

24
Bar Codes vs. RFID
25
RFID Applications
  • Petrol Service Stations
  • In Singapore, the Mobil petrol service stations
    has already introduced RFID technology to
    implement their Speed Pass system to enable
    drivers to fill up the petrol and drive away.
    All information will be gathered automatically
    through RFID smart tags and customers bills can
    be settled through the net.

26
RFID Application in Petrol Service Station

27
RFID Application in a Factory Canteen
  • it is very interesting to notice that in the
    factory canteens environment, RFID tags are
    attached at the bottom of the plates to identify
    the cooked food and its price.
  • The staff of the factory need only to pick up the
    food on the tray and place the tray on top of a
    RFID reader.
  • The RFID reader will identify the products and
    its price. The staff need only to place the cash
    card to pay for the food.

28
Paperless Maintenance Senario at Frankfort Airport
29
Configuration of RFID Antennas on doors in Metro
ware house
30
Application in Smart Appliances
31
Smart Appliances using RFID
32
Advantage
Cooking a pizza
Forget about your pizza
Not Expired, Expired
Expiration
Cannot cook
Can cook
Healthy, Unhealthy
RFiD
Diet
33
(No Transcript)
34
EPC meets pharmaceutical supply chain
35
Case StudyLogistics processes at HP
36
Privacy
  • Privacy bit on tag
  • Tags belong to consumers
  • If privacy bit1 it will be invisible to readers
  • Readers watch on each other private tag command
  • What is blocker tag?

37
The privacy bit
  • Blocker tag command can prevent privacy
    violations before they occur
  • A blocker effectively jams readers that emit
    private-read commands
  • When it detects it, it simulates all possible
    RFID tags in the world rendering reader incapable

38
Market Trend
39
Inside a Smart Card
  • Based on ISO 7816 standards
  • -Define Card Size, Contact and internal code
    used
  • Non volatile memory EEPROM
  • IN/Out 9600 bits/second

40
Smart Card classification
  • Memory only Card( Contact or Contactless)
  • Contact CPU Card
  • Contactless CPU Card

41
How many kinds of smart cards exist?
  • -Contact smart card inserted into card reader

42
  • - Contactless Smart cards should be passed
    near an antenna to carry out transaction

43
(No Transcript)
44
How can the SMART card help in new channels?
45
Proprietary Smart Card Operating Systems
  • Proprietary Chip OS developed in native code -
    specific to underlying silicon - to access chip
    functions. OS often dedicated to performing a
    single specific function e.g. EMV

Data
Data
Data
Data
E2
E2
ROM
ROM
  • OS code is fixed in the ROM of the chip, and
    cannot be changed after the chip is made.

Chip Hardware A
Chip Hardware B
  • Limited number of programmers able to make
    adaptations to proprietary OS impact on time to
    market if changes / new functions required.
  • In order to multi-source silicon, native code
    must be redeveloped from scratch for new chip.

Chip Hardware A
Chip Hardware B
46
MULTOS
  • The only OS obtaining ITSEC(E6)
  • Very secure
  • Multi-application support
  • Requires Coprocessor for RSA makes it expensive

47
MULTOS The OPEN STANDARD smart card operating
system
  • MULTOS defines a standard CHIP HARDWARE
    INDEPENDENT Smart Card Operating System
  • Portable
  • Develop applications ONCE and run on ANY MULTOS
    chip.
  • Open
  • Develop in C or Java and Compile. API FREELY
    available.

C Compiler
Java Compiler / Translator
MEL Editor
EMV
EMV
  • Highest Hardware and OS Security Assurance
  • ITSEC E6 High evaluated
  • MULTOS SCHEME facilitates management of multiple
    applications
  • Advanced Asymmetric Cryptographic mechanism

PKI
Application A
PKI
Application A
E2PROM
E2PROM
MULTOS API
MULTOS API
MULTOS VM
MULTOS VM

ROM

ROM
Infineon Silicon
Renesas Silicon
48
HID MIFARE Card
  • 13.56 MHz contactless card
  • used for public transportation, access
    control,road toll, park ride, airline
    ticketing, customer loyalty and ID card

49
Mifare features
Reader
Card
Unique Chip Serial Number
13.56 MHz Transmission ISO 14443
8Kbit EEPROM 16 independent sectors
Anticollision
Cryptography
Key Storage WOM
Protection by cryptographic algorithm
50
Main applications
  • Access Control
  • Vehicle identification
  • Electronic driver license
  • Ski Passes
  • Airline tickets
  • Transportation buses, taxis underground
  • Baggage Identification

51
Contactless card reader
  • Read/Write to contactless memory cards
  • Utilizes Mifare technology
  • Used in Access control to buildings

52
(No Transcript)
53
Corporate Physical access control Strategy
54
(No Transcript)
55
Proximity Solutions for MULTOS
  • 2 types of MULTOS Dual-Interface cards
    supporting communication with the chip via both
    the contact plate and the contactless interface
    based on Proximity Standard - ISO 14443
  • Hitachi/DNP Contactless MULTOS 36K EEPROM, Type
    B contactless interface, Available now
  • Supports both versions of Paypass transaction
    (contactless M/Chip 4, or Contactless Track 2
    data) and in fact can execute ANY existing MULTOS
    application over the contactless interface.
  • Keycorp / Philips Contactless MULTOS, 16K
    EEPROM, MIFARE Type A contactless interface,
    Prototypes available now
  • Supports Mifare ticketing only. Full contactless
    MULTOS application execution planned for Q3 2004

250K issued for Japan Residential ID card
56
Cost
  • RFID readers 1000
  • Tags gt 20 cents.
  • Active tags 1-5
  • Tags will become cost effective when production
    inlay very high
  • Only handful of quality suppliers

57
Cost continue
  • Production methods and materials used to build
    RFID inlays being defined
  • Tag antennas metallic, very expensive and large
    size
  • Chip less Tags much cheaper .1-10 cents

58
Future of RFID Tags
  • Low cost active tags for locating tracking
    objects with limited no of readers
  • Higher frequencies Tags developed at Siemens
    lab 2.5-24 Ghz, have batteries and range extend
    to several kilometers

59
Future continue
  • Recently, Ultra WIDE BAND (ubw) can locate
    objects in 2 3 dimensions within few inches
  • Marketed for asset tracking in hospitals
  • The size of wristwatch, 40 grams
  • Indoor range 300 feet

60
Future Science Fiction
  • Transparent packages will light up in moving
    color advertisement
  • Disposable smart labels will detect viruses and
    specific chemicals

61
References
  • www.rfidjournal.com
  • RFID book by Steven Shepard, McGraw-Hill
    2005-ISBN-0-07-144299-5
  • www.gs1uk.org
  • RFID Field Guide Deploying Radio Frequency
    Identification systems By Manish
    Bhuptani-ISBN-0-13-185355-4
Write a Comment
User Comments (0)
About PowerShow.com