Download presentation
Presentation is loading. Please wait.
1
Muhammad Wasim Raad1 What is RFID? RFID is a technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track... RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item
2
Muhammad Wasim Raad2 What is RFID Radio Frequency Identification Label(Transponder) Reader/Antenna(Interrogator) Computer Tag enters RF field ‚ RF signal powers tag Tag transmits ID, plus data „ Reader captures data Reader sends data to computer Computer determines action Computer instructs reader Reader transmits data to tag
3
Muhammad Wasim Raad RFID Diagram: Note: The host is the software database... Reader RF Module Antenna Host Computer RFID Primer
4
Muhammad Wasim Raad Note: The RF module creates radio frequency (RF). It receives and transmits RF through the antenna… Reader RF Module Antenna Host Computer RFID Primer
5
Muhammad Wasim Raad Note: The RF module creates radio frequency (RF). It receives and transmits RF through the antenna… Reader RF Module Antenna Host Computer RFID Primer
6
Muhammad Wasim Raad Note: Tag (transponder) is interrogated by the antenna.... Reader Reader RF Module Tag Antenna Host Computer RFID Primer
7
Muhammad Wasim Raad Note: The antenna captures the tag ID number…first as analog RF waves, then it is converted to digital information. (Tag ID Communication) Reader RF Module Tag Antenna Host Computer RFID Primer
8
Muhammad Wasim Raad8 An RFID Tag Is A Portable Database … A sophisticated computing and communications device …A wireless extension of Information Systems Interrogation Unit Tx/Rx Micro Computer Computer Network Antenna Tag Radio Tx/Rx RAMROM CPUI/O Pwr Supply Radio Tx/Rx RAMROM CPUI/O Pwr Supply
9
Muhammad Wasim Raad9 Inlays for RFID Tags for 13.56 Mhz
10
Muhammad Wasim Raad10 Why use RFID ? To determine authentication of a package To provide automated traceability of an item
11
Muhammad Wasim Raad11 Motivation of using RFID Generate Revenue Reduce operating costs
12
Muhammad Wasim Raad12 The RFID Reader Anti- collision protocol
13
Muhammad Wasim Raad13 What is RFID? -- The Tags Tags can be read-only or read-write Tag memory can be factory or field programmed, partitionable, and optionally permanently locked Bytes left unlocked can be rewritten over more than 100,000 times
14
Muhammad Wasim Raad14 Tags can be attached to almost anything: –pallets or cases of product –vehicles –company assets or personnel –items such as apparel, luggage, laundry –people, livestock, or pets –high value electronics such as computers, TVs, camcorders What is RFID? -- The Tags
15
Muhammad Wasim Raad15 Are All Tags The Same? Basic Types: Active Tag transmits radio signal Battery powered memory, radio & circuitry High Read Range (300 feet) Passive Tag reflects radio signal from reader Reader powered Shorter Read Range (4 inches - 15 feet)
16
Muhammad Wasim Raad16 Variations: –Memory Size (16 bits - 512KBytes +) Read-Only, Read/Write or WORM Type: EEProm, Antifuse, FeRam –Arbitration (Anti-collision) Ability to read/write one or many tags at a time –Frequency 125KHz - 5.8 GHz –Physical Dimensions Thumbnail to Brick sizes –Price ($0.50 to $250) Are All Tags The Same?
17
Muhammad Wasim Raad17 Types of Tags - Memory Segmentation Read Only (Factory Programmed) WORM - Write Once, Read Many times Reprogrammable (Field Programmable) Read/Write (In-Use Programmable)
18
Muhammad Wasim Raad18 What is RFID? -- The Readers Readers (interrogators) can be at a fixed point such as –Entrance/exit –Point of sale –Warehouse Readers can also be mobile -- tethered, hand-held, or wireless
19
Muhammad Wasim Raad19 Advantages Uses normal CMOS processing — basic and ubiquitous Relative freedom from regulatory limitations Well suited for applications requiring reading small amounts of data at slow speeds and minimal distances Penetrates materials well (water, tissue, wood, aluminum) <150 kHz (125 kHz & 134 kHz )
20
Muhammad Wasim Raad20 Disadvantages: Does not penetrate or transmit around metals (iron, steel) Handles only small amounts of data Slow read speeds Large Antennas -- compared to higher frequencies Minimal Range <150 kHz (125 kHz & 134 kHz )
21
Muhammad Wasim Raad21 Disadvantages: Tag construction: 4 is thicker (than 13.56 MHz) 4 is more expensive (than 13.56 MHz) 4 more complex (requires more turns of the induction coil) <150 kHz (125 kHz & 134 kHz )
22
Muhammad Wasim Raad22 13.56 MHz Advantages Uses normal CMOS processing--basic and ubiquitous Well suited for applications requiring reading small amounts of data and minimal distances Penetrates water/tissue well Simpler antenna design (fewer turns of the coil); lower costs to build Higher data rate (than 125 kHz--but slower than higher MHz systems) Thinner tag construction (than 125 kHz)
23
Muhammad Wasim Raad23 Disadvantages Government regulated frequency (U.S. versus Europe) Does not penetrate or transmit around metals (unless very thick) Large Antennas (compared to higher frequencies) Larger tag size than higher frequencies Tag construction: requires more than one surface to complete a circuit Minimal Range 13.56 MHz
24
Muhammad Wasim Raad24 Bar Codes vs. RFID
25
Muhammad Wasim Raad25 RFID Applications Petrol Service Stations –In Singapore, the Mobil petrol service stations has already introduced RFID technology to implement their Speed Pass system to enable drivers to fill up the petrol and drive away. All information will be gathered automatically through RFID smart tags and customers’ bills can be settled through the net.
26
Muhammad Wasim Raad26 RFID Application in Petrol Service Station
27
Muhammad Wasim Raad27 RFID Application in a Factory Canteen it is very interesting to notice that in the factory canteen’s environment, RFID tags are attached at the bottom of the plates to identify the cooked food and its price. The staff of the factory need only to pick up the food on the tray and place the tray on top of a RFID reader. The RFID reader will identify the products and its price. The staff need only to place the cash card to pay for the food.
28
Muhammad Wasim Raad28 Paperless Maintenance Senario at Frankfort Airport
29
Muhammad Wasim Raad29 Configuration of RFID Antennas on doors in Metro ware house
30
Muhammad Wasim Raad30 Application in Smart Appliances
31
Muhammad Wasim Raad31 Smart Appliances using RFID
32
Muhammad Wasim Raad32 Advantage RFiD Expiration {Not Expired, Expired} Can cook Cannot cook Cooking a pizza Diet {Healthy, Unhealthy} Forget about your pizza
33
Muhammad Wasim Raad33
34
Muhammad Wasim Raad34 EPC meets pharmaceutical supply chain
35
Muhammad Wasim Raad35 Case Study:Logistics processes at HP
36
Muhammad Wasim Raad36 Privacy Privacy bit on tag Tags belong to consumers If privacy bit=1 it will be invisible to readers Readers watch on each other: private tag command What is blocker tag?
37
Muhammad Wasim Raad37 The privacy bit Blocker tag command can prevent privacy violations before they occur A blocker effectively jams readers that emit private-read commands When it detects it, it simulates all possible RFID tags in the world rendering reader incapable
38
Muhammad Wasim Raad38 Market Trend
39
Muhammad Wasim Raad39 Inside a Smart Card Based on ISO 7816 standards -Define Card Size, Contact and internal code used Non volatile memory: EEPROM IN/Out: 9600 bits/second
40
Muhammad Wasim Raad40 Smart Card classification Memory only Card( Contact or Contactless) Contact CPU Card Contactless CPU Card
41
Muhammad Wasim Raad41 How many kinds of smart cards exist? 1-Contact smart card inserted into card reader
42
Muhammad Wasim Raad42 2- Contactless Smart cards: should be passed near an antenna to carry out transaction
43
Muhammad Wasim Raad43
44
Muhammad Wasim Raad44 How can the SMART card help in new channels? Earning and redeeming rewards with Virtual Merchants To store personal data for covenience on-line To Secure Virtual World Shopping with Credit (Chip SecureCode) or e-Cash To Managing Finances Securely and Conveniently Virtual Health, Govt or other Services Entertainment on Demand
45
Muhammad Wasim Raad45 Proprietary Smart Card Operating Systems Chip Hardware B Chip Hardware A Proprietary OS A Proprietary OS B Native EMV Code Native Loyalty Code Data ROM E2 Native EMV Code Native EMV Code Native Loyalty Code Data ROM E2 l Proprietary Chip OS developed in “native” code - specific to underlying silicon - to access chip functions. OS often dedicated to performing a single specific function – e.g. EMV l OS code is fixed in the ROM of the chip, and cannot be changed after the chip is made. l Limited number of programmers able to make adaptations to proprietary OS – impact on time to market if changes / new functions required. l In order to multi-source silicon, native code must be redeveloped from scratch for new chip. Chip Hardware B Chip Hardware A
46
Muhammad Wasim Raad46 MULTOS The only OS obtaining ITSEC(E6) Very secure Multi-application support Requires Coprocessor for RSA makes it expensive
47
Muhammad Wasim Raad MULTOS VM MULTOS API MULTOS: The OPEN STANDARD smart card operating system Infineon Silicon ROM MULTOS VM MULTOS API Renesas Silicon ROM C Compiler Java Compiler / Translator MEL Editor MULTOS defines a standard CHIP HARDWARE INDEPENDENT Smart Card Operating System: Portable: Develop applications ONCE and run on ANY MULTOS chip. Open: Develop in C or Java and Compile. API FREELY available. EMV PKI Application A E2PROM EMV PKI Application A E2PROM Highest Hardware and OS Security Assurance: ITSEC E6 High evaluated MULTOS SCHEME facilitates management of multiple applications Advanced Asymmetric Cryptographic mechanism
48
Muhammad Wasim Raad48 HID MIFARE Card 13.56 MHz contactless card used for public transportation, access control,road toll, park & ride, airline ticketing, customer loyalty and ID card
49
Muhammad Wasim Raad49 Unique Chip Serial Number 8Kbit EEPROM 16 independent sectors Protection by cryptographic algorithm Mifare features Anticollision 13.56 MHz Transmission ISO 14443 Card Reader Key Storage WOM Cryptography
50
Muhammad Wasim Raad50 Main applications Access Control Vehicle identification Electronic driver license Ski Passes Airline tickets Transportation: buses, taxis & underground Baggage Identification
51
Muhammad Wasim Raad51 Contactless card reader Read/Write to contactless memory cards Utilizes Mifare technology Used in Access control to buildings
52
Muhammad Wasim Raad52
53
Muhammad Wasim Raad53 Corporate Physical access control Strategy
54
Muhammad Wasim Raad54
55
Muhammad Wasim Raad55 Proximity Solutions for MULTOS 2 types of MULTOS “Dual-Interface” cards – supporting communication with the chip via both the contact plate and the contactless interface based on Proximity Standard - ISO 14443 l Hitachi/DNP Contactless MULTOS: 36K EEPROM, Type B contactless interface, Available now l Supports both versions of Paypass transaction (contactless M/Chip 4, or Contactless Track 2 data) and in fact can execute ANY existing MULTOS application over the contactless interface. l Keycorp / Philips Contactless MULTOS, 16K EEPROM, MIFARE Type A contactless interface, Prototypes available now l Supports Mifare ticketing only. Full contactless MULTOS application execution planned for Q3 2004 250K issued for Japan Residential ID card
56
Muhammad Wasim Raad56 Cost RFID readers: 1000$ Tags: > 20 cents. Active tags: 1$-5$ Tags will become cost effective when production inlay very high Only handful of quality suppliers
57
Muhammad Wasim Raad57 Cost continue Production methods and materials used to build RFID inlays being defined Tag antennas metallic, very expensive and large size Chip less Tags much cheaper:.1-10 cents
58
Muhammad Wasim Raad58 Future of RFID Tags Low cost active tags for locating & tracking objects with limited no of readers Higher frequencies: Tags developed at Siemens lab: 2.5-24 Ghz, have batteries and range extend to several kilometers
59
Muhammad Wasim Raad59 Future continue Recently, Ultra WIDE BAND (ubw) can locate objects in 2 & 3 dimensions within few inches Marketed for asset tracking in hospitals The size of wristwatch, 40 grams Indoor range: 300 feet
60
Muhammad Wasim Raad60 Future: Science Fiction Transparent packages will light up in moving color advertisement Disposable smart labels will detect viruses and specific chemicals
61
Muhammad Wasim Raad61 References www.rfidjournal.com RFID book by Steven Shepard, McGraw- Hill 2005-ISBN-0-07-144299-5 www.gs1uk.org RFID Field Guide Deploying Radio Frequency Identification systems By Manish Bhuptani-ISBN-0-13-185355-4
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.