1.02k likes | 1.82k Views
What is RFID?. RFID is a technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track... RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item. What is RFID.
E N D
What is RFID? • RFID is a technology that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track... • RFID is fast, reliable, and does not require physical sight or contact between reader/scanner and the tagged item Muhammad Wasim Raad
What is RFID • Tag enters RF field • RF signal powers tag • Tag transmits ID, plus data • Reader captures data • Reader sends data to computer • Computer determines action • Computer instructs reader • Reader transmits data to tag Radio Frequency Identification Label (Transponder) Reader/Antenna (Interrogator) Computer Muhammad Wasim Raad
RFID Primer • RFID Diagram: Antenna RF Module Reader Host Computer Note: The host is the software database... Muhammad Wasim Raad
RFID Primer Antenna RFModule Reader Host Computer Note: The RF module createsradio frequency (RF). It receives and transmits RF through the antenna… Muhammad Wasim Raad
RFID Primer Antenna RFModule Reader Host Computer Note: The RF module createsradio frequency (RF). It receives and transmits RF through the antenna… Muhammad Wasim Raad
RFID Primer Antenna RF Module Tag Reader Host Computer Note: Tag (transponder) is interrogated by the antenna.... Muhammad Wasim Raad
RFID Primer (Tag ID Communication) Antenna RF Module Tag Reader Host Computer Note: The antenna captures the tag ID number…first as analog RF waves, then it is converted to digital information. Muhammad Wasim Raad
CPU I/O RAM ROM Radio Tx/Rx Pwr Supply CPU I/O RAM ROM Radio Tx/Rx Pwr Supply An RFID Tag Is A Portable Database …A sophisticated computing and communications device …A wireless extension of Information Systems Interrogation Unit Tag Micro Antenna Tx/Rx Computer Computer Network Muhammad Wasim Raad
Inlays for RFID Tags for 13.56 Mhz Muhammad Wasim Raad
Why use RFID ? • To determine authentication of a package • To provide automated traceability of an item Muhammad Wasim Raad
Motivation of using RFID • Generate Revenue • Reduce operating costs Muhammad Wasim Raad
The RFID Reader Anti-collision protocol Muhammad Wasim Raad
What is RFID? -- The Tags • Tags can be read-only or read-write • Tag memory can be factory or field programmed, partitionable, and optionally permanently locked • Bytes left unlocked can be rewritten over more than 100,000 times Muhammad Wasim Raad
What is RFID? -- The Tags • Tags can be attached to almost anything: • pallets or cases of product • vehicles • company assets or personnel • items such as apparel, luggage, laundry • people, livestock, or pets • high value electronics such as computers, TVs, camcorders Muhammad Wasim Raad
Are All Tags The Same? Basic Types: • Active • Tag transmits radio signal • Battery powered memory, radio & circuitry • High Read Range (300 feet) • Passive • Tag reflects radio signal from reader • Reader powered • Shorter Read Range (4 inches - 15 feet) Muhammad Wasim Raad
Are All Tags The Same? • Variations: • Memory • Size (16 bits - 512KBytes +) • Read-Only, Read/Write or WORM • Type: EEProm, Antifuse, FeRam • Arbitration (Anti-collision) • Ability to read/write one or many tags at a time • Frequency • 125KHz - 5.8 GHz • Physical Dimensions • Thumbnail to Brick sizes • Price ($0.50 to $250) Muhammad Wasim Raad
Types of Tags - Memory Segmentation • Read Only (Factory Programmed) • WORM - Write Once, Read Many times • Reprogrammable (Field Programmable) • Read/Write (In-Use Programmable) Muhammad Wasim Raad
What is RFID? -- The Readers • Readers (interrogators) can be at a fixed point such as • Entrance/exit • Point of sale • Warehouse • Readers can also be mobile -- tethered, hand-held, or wireless Muhammad Wasim Raad
<150 kHz (125 kHz & 134 kHz ) Advantages • Uses normal CMOS processing —basic and ubiquitous • Relative freedom from regulatory limitations • Well suited for applications requiring reading small amounts of data at slow speeds and minimal distances • Penetrates materials well (water, tissue, wood, aluminum) Muhammad Wasim Raad
<150 kHz (125 kHz & 134 kHz ) Disadvantages: • Does not penetrate or transmit around metals (iron, steel) • Handles only small amounts of data • Slow read speeds • Large Antennas -- compared to higher frequencies • Minimal Range Muhammad Wasim Raad
<150 kHz (125 kHz & 134 kHz ) Disadvantages: • Tag construction: • is thicker (than 13.56 MHz) • is more expensive (than 13.56 MHz) • more complex (requires more turns of the induction coil) Muhammad Wasim Raad
13.56 MHz Advantages • Uses normal CMOS processing--basic and ubiquitous • Well suited for applications requiring reading small amounts of data and minimal distances • Penetrates water/tissue well • Simpler antenna design (fewer turns of the coil); lower costs to build • Higher data rate (than 125 kHz--but slower than higher MHz systems) • Thinner tag construction (than 125 kHz) Muhammad Wasim Raad
13.56 MHz Disadvantages • Government regulated frequency (U.S. versus Europe) • Does not penetrate or transmit around metals (unless very thick) • Large Antennas (compared to higher frequencies) • Larger tag size than higher frequencies • Tag construction: requires more than one surface to complete a circuit • Minimal Range Muhammad Wasim Raad
Bar Codes vs. RFID Muhammad Wasim Raad
RFID Applications • Petrol Service Stations • In Singapore, the Mobil petrol service stations has already introduced RFID technology to implement their Speed Pass system to enable drivers to fill up the petrol and drive away. All information will be gathered automatically through RFID smart tags and customers’ bills can be settled through the net. Muhammad Wasim Raad
RFID Application in Petrol Service Station Muhammad Wasim Raad
RFID Application in a Factory Canteen • it is very interesting to notice that in the factory canteen’s environment, RFID tags are attached at the bottom of the plates to identify the cooked food and its price. • The staff of the factory need only to pick up the food on the tray and place the tray on top of a RFID reader. • The RFID reader will identify the products and its price. The staff need only to place the cash card to pay for the food. Muhammad Wasim Raad
Paperless Maintenance Senario at Frankfort Airport Muhammad Wasim Raad
Configuration of RFID Antennas on doors in Metro ware house Muhammad Wasim Raad
Application in Smart Appliances Muhammad Wasim Raad
Smart Appliances using RFID Muhammad Wasim Raad
Advantage Cooking a pizza Forget about your pizza {Not Expired, Expired} Expiration Cannotcook Can cook {Healthy, Unhealthy} RFiD Diet Muhammad Wasim Raad
EPC meets pharmaceutical supply chain Muhammad Wasim Raad
Case Study:Logistics processes at HP Muhammad Wasim Raad
Privacy • Privacy bit on tag • Tags belong to consumers • If privacy bit=1 it will be invisible to readers • Readers watch on each other: private tag command • What is blocker tag? Muhammad Wasim Raad
The privacy bit • Blocker tag command can prevent privacy violations before they occur • A blocker effectively jams readers that emit private-read commands • When it detects it, it simulates all possible RFID tags in the world rendering reader incapable Muhammad Wasim Raad
Market Trend Muhammad Wasim Raad
Inside a Smart Card • Based on ISO 7816 standards -Define Card Size, Contact and internal code used • Non volatile memory: EEPROM • IN/Out: 9600 bits/second Muhammad Wasim Raad
Smart Card classification • Memory only Card( Contact or Contactless) • Contact CPU Card • Contactless CPU Card Muhammad Wasim Raad
How many kinds of smart cards exist? • -Contact smart card inserted into card reader Muhammad Wasim Raad
- Contactless Smart cards: should be passed near an antenna to carry out transaction Muhammad Wasim Raad
To Managing Finances Securely and Conveniently Entertainment on Demand Earning and redeeming rewards with Virtual Merchants To store personal data for covenience on-line Virtual Health, Govt or other Services To Secure Virtual World Shopping with Credit (Chip SecureCode) or e-Cash How can the SMART card help in new channels? Muhammad Wasim Raad
Native EMV Code Native Loyalty Code Native EMV Code Native EMV Code Native Loyalty Code Proprietary OS A Proprietary OS B Proprietary Smart Card Operating Systems • Proprietary Chip OS developed in “native” code - specific to underlying silicon - to access chip functions. OS often dedicated to performing a single specific function – e.g. EMV Data Data Data Data E2 E2 ROM ROM • OS code is fixed in the ROM of the chip, and cannot be changed after the chip is made. Chip Hardware A Chip Hardware B • Limited number of programmers able to make adaptations to proprietary OS – impact on time to market if changes / new functions required. • In order to multi-source silicon, native code must be redeveloped from scratch for new chip. Muhammad Wasim Raad Chip Hardware A Chip Hardware B
MULTOS • The only OS obtaining ITSEC(E6) Very secure • Multi-application support • Requires Coprocessor for RSA makes it expensive Muhammad Wasim Raad
MULTOS: The OPEN STANDARD smart card operating system • MULTOS defines a standard CHIP HARDWARE INDEPENDENT Smart CardOperating System: • Portable: • Develop applications ONCE and run on ANY MULTOS chip. • Open: • Develop in C or Java and Compile. API FREELY available. MEL Editor C Compiler Java Compiler / Translator EMV EMV • Highest Hardware and OS Security Assurance: • ITSEC E6 High evaluated • MULTOS SCHEME facilitates management of multiple applications • Advanced Asymmetric Cryptographic mechanism PKI Application A PKI Application A E2PROM E2PROM MULTOS API MULTOS API MULTOS VM MULTOS VM ROM ROM Infineon Silicon Renesas Silicon Muhammad Wasim Raad
HID MIFARE Card • 13.56 MHz contactless card • used for public transportation, access control,road toll, park & ride, airline ticketing, customer loyalty and ID card Muhammad Wasim Raad
Mifare features Reader Card Unique Chip Serial Number 13.56 MHz Transmission ISO 14443 8Kbit EEPROM 16 independent sectors Anticollision Cryptography Key Storage WOM Protection by cryptographic algorithm Muhammad Wasim Raad
Main applications • Access Control • Vehicle identification • Electronic driver license • Ski Passes • Airline tickets • Transportation: buses, taxis & underground • Baggage Identification Muhammad Wasim Raad