Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.

Slides:



Advertisements
Similar presentations
Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Advertisements

Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: Tag Threats, Risks, and Mitigation Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
University of Kansas | School of Engineering Department of Electrical Engineering and Computer Science Milagros FigueroaApril Access Methods for.
AutoID Automatic Identification Technologies at the MIT Media Lab Gregory Chittim – ES 112 – 03S.
Lesson Title: Electromagnetics and Antenna Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Singulation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Radio frequency identification technology (RFID) Dominic Payne Janna Thomson Kevin Mackay.
RFID Cow Jewelry – or – Revolution Travis Sparks
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Lecture Notes #7 Radio Frequency Identification (RFID)
RFID Radio frequency identification,or RFID,is an Auto-ID technology that uses radio waves to identify a physical object. Tags ReaderAntenna.
Emerging developments in the field of automatic identification Henri Barthel Technical Director EPCglobal EAN International.
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Radio Frequency ID (RFID): Brian E. Mennecke Deans Faculty Fellow in MIS & Associate Professor Iowa State University College of Busiess.
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
1 Fall 2007RFID – Technical Issues RFID Technical Issues Operations & Decision Technologies Department Kelley School of Business Indiana University.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
RFID and Wine Alfio Grasso Deputy Director Auto-ID Lab, ADELAIDE.
Radio Frequency Identification So What? What is RFID Type of technology that uses electromagnetic radio frequency to identify objects, animals and humans.
Developing RFID Application In Supply Chain
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Introduction to RFID RFID Programming University of Houston Bauer College of Business Spring 2007.
Lesson Title: Fast Fourier Transform Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
EPCglobal Training Suite
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 RFID Technology and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
EPC Standards EPC System elements : EPC Coding structure The reader/ tag Protocols Savant platform The Object Numbering Service (ONS) PML server.
RFID Myths, Facts and Reality. What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
Radio Frequency ID (RFID) Tracking System for a Building Complex Tim Gordon Matt Tracy John O’Malley Mentor: Y. Shang, Y. Saab.
19/10/2015 EAS and RFID The need for Globalisation of Electronic Article Surveillance (EAS), Radio Frequency Identification (RFID) and similar Applications.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: RFID Stakeholders Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Applications of Rfid (radio frequency identification) © 2015 albert-learning.com APPLICATIONS OF RFID (RADIO FREQUENCY IDENTIFICATION)
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
1 RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas.
Lesson Title: Types of RFID Tags Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
RFID and Sensor Networks for Rural Environments Alfio Grasso Deputy Director Auto-ID Lab, ADELAIDE.
Lesson Title: Guidelines for Securing RFID Systems Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: EPCglobal Gen2 Tag Finite State Machine Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Lesson Title: FCC Rules for ISM Band Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: ThingNet Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Animal Identification Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
Lesson Title: RFID Nominal Read Range in Far Field Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Radio Frequency Identification (RFID)
RADIO FREQUENCY IDENTIFICATION
Lesson Title: Reader Architecture and Antenna Configurations
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Copyright © 2008 by Dale R. Thompson Dale R. Thompson
Lesson Title: Regulations Affecting RFID
Presentation transcript:

Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material is based upon work supported by the National Science Foundation under Grant No. DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). Copyright © 2008, 2009 by Dale R. Thompson

RFID Definition Radio frequency identification (RFID) is an enabling technology that is an automatic identification method for retrieving and accessing data using devices called RFID tags, sometimes called transponders. The basic RFID system includes tags, readers, and associated interfaces. Its applications include item management, physical access control, travel documents, finance & banking, sensors, animal tracking, human identification, and product counterfeiting countermeasures. 2

Identify Friend or Foe (IFF) US and Britain had active beacons Aircraft identification system – Transponders (tags) on airplanes today When interrogate respond with 12 pulses Link ID to other information Location (altitude and distance) – Interrogator (reader) Pair of pulses at 1030 MHz in UHF band Transmission of info from interrogator to transponder – Expensive but planes are expensive 3

Economics of Identification The identification system must cost less than the object to which it is attached Large or expensive systems “tagged” first Small object constraints Reduce size Reduce complexity Reduce cost 4

Low-cost tag requirements No transmitter No battery Simple circuit Being heard in the noise 5

No transmitter Backscattering communication 6

No battery Harvest energy from radio frequency (RF) 7

Simple circuit Inductively coupled system like a transformer Lower frequencies (125 kHz – 10 MHz) 8

Electronic Article Surveillance (EAS) 9

Electromagnetic EAS system Magnetic strip – Magnetize strip = deactivates – Demagnetize strip = activates tag Can be reactivated and used again Transmit low frequency (70 Hz – 1kHz) – Strip detected by unique frequency pattern 10

Acousto-magnetic (AM) EAS system Transmit about 58 kHz in pulses At end of pulse tag responds Tag responds like a tuning fork Demagnetize = deactivate tag Magnetize = activates tag Bias magnetic required 11

Radio frequency (RF) EAS system Operate 2 – 10 MHz Transmitter sweeps a range of frequencies Tags have diode or RC circuit with helical antenna Deactivate = strong RF burns out diode or RC components 12

Passive RFID tag block diagram 13

Sample applications Rail industry in US (late 1980s) Automobile identification (1990 in Oklahoma) Livestock management (1996 standards) Dept. of Defense (DoD) identify shipping containers (1990s) Smart payment cards (1990s) 14

The Rise of UHF Passive RFID 15

Massachusetts Institute of Technology Robotic vision (1998) Vision of Electronic Product Code (EPC) for every object 16

17 Electronic Product Code (EPC) 96-bit Version Every product has unique identifier 96 bits can uniquely label all products for the next 1,000 years 2^96 = 79,228,162,514,264,337,593,543,950,336 VersionEPC Manager (Manufacturer) Object Class (Product) Serial Number 8 bits28 bits24 bits36 bits

Auto-ID Center Formed in 1999 Participants – MIT – Proctor and Gamble – UCC that administers barcodes for retail products Six major universities – Massachusetts Institute of Technology in Cambridge, Massachusetts – University of Cambridge in the U.K. – University of Adelaide in Australia – Keio University in Japan – Fugan University in China – University of St. Gallen in Switzerland 18

Auto-ID Center continued Vision of ubiquitous RFID Requirements – Simple and inexpensive tags – Low-cost manufacturing – Standard infrastructure like DNS to locate information about a particular EPC number – Savants were names for software agents to consolidate many queries of tags – 900 MHz chosen as best overall frequency based on cost, read range, and capability Wal-Mart joined in 2001 and proved to be important Two startups in – Matrics bought by Symbol Technologies bought by Motorola – Alien Technologies 19

EPCglobal Inc. formed in 2003 Auto-ID Center outgrew academic environment Joint venture between EAN International and the Uniform Code Council (UCC). – UCC standardized Universal Product Code (UPC) barcodes in US – EAN standardized barcodes in Europe – UCC and EAN combined to form GS1 Not-for-profit organization developing commercial, world-wide RFID standards

Two incompatible protocols! Class 0 – Symbol Technologies – Impinj – Avery Class-1 Generation-1 (Class 1) – Alien Technologies – Avery – Rafsec 21

UHF Class-1 Generation-2 protocol (Gen2) EPCglobal formed hardware action group (HAG) in 2004 EPCglobal created Gen2 standard Became IS C in 2006 Possibly the most important standard for passive RFID tags 22

EPCglobal Standards EPCglobal UHF Class-0 (Class0) EPCglobal UHF Class-1 Generation-1 (Class1) EPCglobal UHF Class-1 Generation-2 (Gen2) – ISO C 23

United States Department of Defense (DOD) Already used RFID in tracking shipping containers Mandated tagging of high-value cases by

Wal-Mart RFID adds visibility as the items flow through the supply chain from the manufacturer, shippers, distributors, and retailers The added visibility can identify bottlenecks and save money Wal-Mart requested in June 2003 that their top 100 suppliers use RFID at the pallet and case level by January 2005 Accelerated the introduction of RFID 25

Contact Information Dale R. Thompson, Ph.D., P.E. Associate Professor Computer Science and Computer Engineering Dept. JBHT – CSCE University of Arkansas Fayetteville, Arkansas Phone: +1 (479) FAX: +1 (479) WWW:

Copyright Notice, Acknowledgment, and Liability Release Copyright Notice – This material is Copyright © 2008, 2009 by Dale R. Thompson. It may be freely redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder. Acknowledgment – These materials were developed through a grant from the National Science Foundation at the University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas. Liability Release – The curriculum activities and lessons have been designed to be safe and engaging learning experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices. 27