rfid chips

Post on 21-Jan-2015

3.664 Views

Category:

Business

5 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

Radio Frequency Identification (RFID) Technology

Philip IhewuokwuShaki Hughes

1-19RFID Technology

1. Introduction2. History3. Applications/Uses of RFID technology4. Overview of RFID Technology5. Operating Principles of RFID Systems6. RFID Tags7. RFID Readers 8. Backend Systems9. Concerns About RFID Technology10.References

2-19RFID Technology

What is RFID?Radio Frequency Identification

An identification method relying on storing and remotely retrieving data using devices called RFID tags.

3-19RFID Technology

RFID Technology Background:First known device was IFF transponder (Identification Friend or Foe)

Invented by British in 1939 – used by allies in WWII to identify friend from foe.

Mario Cadullo patented first true ancestor of modern RFID in 1973.

Initial device was a passive radio transponder used by toll systems and had a memory size of 16 bits.

4-19RFID Technology

Uses and Applications

Track tagged objects e.g. Merchandise at stores, luggage at airports

Contactless identification card eg. RFID passports and debit cards

Highway toll systems

5-19RFID Technology

Application:

RFID tags provide the same functionality as barcodes though have a globally unique identifier.

Advantages: No line of sight necessary Identification can be performed contactless Not susceptible to dust, dirt, or vibrations

6-19

Operating Principles:Near Fields:

Inductive /Capacitive Coupling

Far Fields:Backscatter Coupling

Communicate Through a RF Channel

7-19RFID Technology

Received data

transmitted to computers

within network

5.1 What is Inductive Coupling?Transfer of energy from one circuit to another

through a shared magnetic field powers microchip.Circuitry uses load modulation to send data back to

reader.

8-19RFID Technology

5.2 What is Backscatter Coupling?Uses electromagnetic waves to transfer

data from RFID tag to reader.Electromagnetic waves emitted from

reader are reflected by tag in the direction in which they were received.

9-19RFID Technology

6.1 Also called transponders Two types of transponders:Passive transponders:

do not have own power supplyMuch cheaper to manufactureoperating at low frequencies (typically 135 kHz or 13.56 MHz)

Active transponders: must have own power source, longer ranges and larger memories.ability to store additional information sent by the transceiver

10-19RFID Technology

6.2 Components of a RFID Tag

a) Microchip Rectifier + limiterData SlicerShift register & LogicIF Oscillator (intermediate frequency)Power on reset

b) Antenna For receiving and responding to radio-frequency queries from an RFID reader

c) Encapsulation/packaging11-19RFID Technology

6.3 RFID Tag Architecture

12-19RFID Technology

6.3 RFID Tag Architecture

13-19RFID Technology

Data Slicer:The detector consists of an envelope detector (diodes) and an average filter

Shift register & LogicThe shift register (SR) is responsible for loading the received bit of information from the decoder

IF Oscillator (Intermediate frequency)Depending on the logic chosen, from the (shift reg. & logic) it can operate as a –stable trigger circuit.

Power on reset:The power-on-reset circuit is composed of a cross-coupled pair of transistors and a NOR gate.The NOR gate compares the two gate signals insuring a power-on-reset for the logic blocks.

Rectifier + Limiter:The rectifier consists of a three-stage full-wave voltage doubler cascade. The rectifying devices are diode connected transistors.

Also called transceiversConnecting element between RFID tags and backend systemsComponents of Readers

Antenna and other communication devices.The reader sends an N-bit serial number and only the transponder that contains this serial number wakes up.

14-19RFID Technology

RFID Tag

Consists of Middleware and Applications:

Interface towards the applicationAccess control for accessing data associated with tagsDecoupling of system components.

15-19RFID Technology

Problems respecting data securityPrivacy issuesSimple to disrupt serviceReliability

16-19RFID Technology

Design and Optimization of Passive UHF RFID Systems Publisher : Springer USCopyright: 2007ISBN: 978-0-387-35274-9   RFID Security and Privacy Concepts, Protocols, and Architectures Publisher: Springer Berlin Heidelberg ISBN: 978-3-540-79075-4

http://rfid-handbook.com

17-19RFID Technology

Luggage bag:http://www.barcoding.com/Industry/airline/baggage-tracking.shtmlluggage tag:http://www.flickr.com/photos/civex/2527717137/debit card:http://www.crunchgear.com/2008/06/04/hooray-my-creditdebit-card-now-has-rfid/passporthttp://infosecurity.us/?p=5959Picture of readerwww.uktelematicsonline.co.uk/html/rfid.htmltoll system transponder:http://www.nanoprinttech.com/gallery/FasTrak_transponder.jpg   

18-19RFID Technology

No? THE END

19-19RFID Technology

top related