Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.

Similar presentations


Presentation on theme: "Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This."— Presentation transcript:

1 Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas http://rfidsecurity.uark.edu 1 This material is based upon work supported by the National Science Foundation under Grant No. DUE-0736741. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). Copyright © 2008, 2009 by Dale R. Thompson {d.r.thompson@ieee.org}

2 RFID Definition Radio frequency identification (RFID) is an enabling technology that is an automatic identification method for retrieving and accessing data using devices called RFID tags, sometimes called transponders. The basic RFID system includes tags, readers, and associated interfaces. Its applications include item management, physical access control, travel documents, finance & banking, sensors, animal tracking, human identification, and product counterfeiting countermeasures. http://rfidsecurity.uark.edu 2

3 Identify Friend or Foe (IFF) US and Britain had active beacons 1937-8 Aircraft identification system – Transponders (tags) on airplanes today When interrogate respond with 12 pulses Link ID to other information Location (altitude and distance) – Interrogator (reader) Pair of pulses at 1030 MHz in UHF band Transmission of info from interrogator to transponder – Expensive but planes are expensive http://rfidsecurity.uark.edu 3

4 Economics of Identification The identification system must cost less than the object to which it is attached Large or expensive systems “tagged” first Small object constraints Reduce size Reduce complexity Reduce cost http://rfidsecurity.uark.edu 4

5 Low-cost tag requirements No transmitter No battery Simple circuit Being heard in the noise http://rfidsecurity.uark.edu 5

6 No transmitter Backscattering communication http://rfidsecurity.uark.edu 6

7 No battery Harvest energy from radio frequency (RF) http://rfidsecurity.uark.edu 7

8 Simple circuit Inductively coupled system like a transformer Lower frequencies (125 kHz – 10 MHz) http://rfidsecurity.uark.edu 8

9 Electronic Article Surveillance (EAS) http://rfidsecurity.uark.edu 9

10 Electromagnetic EAS system Magnetic strip – Magnetize strip = deactivates – Demagnetize strip = activates tag Can be reactivated and used again Transmit low frequency (70 Hz – 1kHz) – Strip detected by unique frequency pattern http://rfidsecurity.uark.edu 10

11 Acousto-magnetic (AM) EAS system Transmit about 58 kHz in pulses At end of pulse tag responds Tag responds like a tuning fork Demagnetize = deactivate tag Magnetize = activates tag Bias magnetic required http://rfidsecurity.uark.edu 11

12 Radio frequency (RF) EAS system Operate 2 – 10 MHz Transmitter sweeps a range of frequencies Tags have diode or RC circuit with helical antenna Deactivate = strong RF burns out diode or RC components http://rfidsecurity.uark.edu 12

13 Passive RFID tag block diagram http://rfidsecurity.uark.edu 13

14 Sample applications Rail industry in US (late 1980s) Automobile identification (1990 in Oklahoma) Livestock management (1996 standards) Dept. of Defense (DoD) identify shipping containers (1990s) Smart payment cards (1990s) http://rfidsecurity.uark.edu 14

15 The Rise of UHF Passive RFID http://rfidsecurity.uark.edu 15

16 Massachusetts Institute of Technology Robotic vision (1998) Vision of Electronic Product Code (EPC) for every object http://rfidsecurity.uark.edu 16

17 http://rfidsecurity.uark.edu 17 Electronic Product Code (EPC) 96-bit Version Every product has unique identifier 96 bits can uniquely label all products for the next 1,000 years 2^96 = 79,228,162,514,264,337,593,543,950,336 VersionEPC Manager (Manufacturer) Object Class (Product) Serial Number 8 bits28 bits24 bits36 bits

18 Auto-ID Center Formed in 1999 Participants – MIT – Proctor and Gamble – UCC that administers barcodes for retail products Six major universities – Massachusetts Institute of Technology in Cambridge, Massachusetts – University of Cambridge in the U.K. – University of Adelaide in Australia – Keio University in Japan – Fugan University in China – University of St. Gallen in Switzerland http://rfidsecurity.uark.edu 18

19 Auto-ID Center continued Vision of ubiquitous RFID Requirements – Simple and inexpensive tags – Low-cost manufacturing – Standard infrastructure like DNS to locate information about a particular EPC number – Savants were names for software agents to consolidate many queries of tags – 900 MHz chosen as best overall frequency based on cost, read range, and capability Wal-Mart joined in 2001 and proved to be important Two startups in 2000-2002 – Matrics bought by Symbol Technologies bought by Motorola – Alien Technologies http://rfidsecurity.uark.edu 19

20 EPCglobal Inc. formed in 2003 Auto-ID Center outgrew academic environment Joint venture between EAN International and the Uniform Code Council (UCC). – UCC standardized Universal Product Code (UPC) barcodes in US – EAN standardized barcodes in Europe – UCC and EAN combined to form GS1 Not-for-profit organization developing commercial, world-wide RFID standards http://www.epcglobalinc.org/ http://rfidsecurity.uark.edu 20

21 Two incompatible protocols! Class 0 – Symbol Technologies – Impinj – Avery Class-1 Generation-1 (Class 1) – Alien Technologies – Avery – Rafsec http://rfidsecurity.uark.edu 21

22 UHF Class-1 Generation-2 protocol (Gen2) EPCglobal formed hardware action group (HAG) in 2004 EPCglobal created Gen2 standard Became IS0 18000-6C in 2006 Possibly the most important standard for passive RFID tags http://rfidsecurity.uark.edu 22

23 EPCglobal Standards EPCglobal UHF Class-0 (Class0) EPCglobal UHF Class-1 Generation-1 (Class1) EPCglobal UHF Class-1 Generation-2 (Gen2) – ISO 18000-6C http://rfidsecurity.uark.edu 23

24 United States Department of Defense (DOD) Already used RFID in tracking shipping containers Mandated tagging of high-value cases by 2005 http://rfidsecurity.uark.edu 24

25 Wal-Mart RFID adds visibility as the items flow through the supply chain from the manufacturer, shippers, distributors, and retailers The added visibility can identify bottlenecks and save money Wal-Mart requested in June 2003 that their top 100 suppliers use RFID at the pallet and case level by January 2005 Accelerated the introduction of RFID http://rfidsecurity.uark.edu 25

26 Contact Information Dale R. Thompson, Ph.D., P.E. Associate Professor Computer Science and Computer Engineering Dept. JBHT – CSCE 504 1 University of Arkansas Fayetteville, Arkansas 72701-1201 Phone: +1 (479) 575-5090 FAX: +1 (479) 575-5339 E-mail: d.r.thompson@ieee.org WWW: http://comp.uark.edu/~drt/ http://rfidsecurity.uark.edu 26

27 Copyright Notice, Acknowledgment, and Liability Release Copyright Notice – This material is Copyright © 2008, 2009 by Dale R. Thompson. It may be freely redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder. Acknowledgment – These materials were developed through a grant from the National Science Foundation at the University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas. Liability Release – The curriculum activities and lessons have been designed to be safe and engaging learning experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices. http://rfidsecurity.uark.edu 27


Download ppt "Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This."

Similar presentations


Ads by Google