Automatic Identification System

Slides:



Advertisements
Similar presentations
Collecting data Chapter 6. What is data? Data is raw facts and figures. In order to process data it has to be collected. The method of collecting data.
Advertisements

Learning Objectives Understand the shifts that are occurring with regard to online payments. Discuss the players and processes involved in using credit.
Chapter 1 Computer, Internet, Web, and Basics
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
The Marcus Department of Industrial and Manufacturing Engineering at Penn State Facility Layout and Material HandlingD. J. Medeiros Automatic Identification.
Automatic Data Capture Devices & Methods
Commercial Data Processing Lesson 2: The Data Processing Cycle.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Automatic Identification (ID) Images - Bar Codes - Stacked Codes - Matrix Codes Automatic Identification (ID) Scanners - Wands - Imagers (CCD)
CP1610: Introduction to Computer Components
Your Interactive Guide to the Digital World Discovering Computers 2012.
Aqsa Bibi SP11/BBA/013 Huma Rehman SP11/BBA/038 Ch Ateeq Ullah Zafar SP11/BBA/020 Danial Ahmed SP11/BBA/021 Fareeha Khalid SP11/BBA/031.
JDW 09/2007 Primary Data Carrier - RFID or 2D Barcode?
BAR CODE TECHNOLOGY AND ITS APPLICATION TO LIBRARY SERVICES I R N GOUDAR HEAD, ICAST NATIONAL AEROSPACE LABORATORIES BANGALORE
Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.
1 Introduction to Computers Day 2. 2 Input Devices Input devices are used to feed data and instructions to the computer systems.They consist of a range.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
AS Level ICT Selection and use of input devices and input media: Capturing transaction data.
COMPONENTS OF THE SYSTEM UNIT
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
 Chasis / System cabinet  A plastic enclosure that contains most of the components of a computer (usually excluding the display, keyboard and mouse)
BAR CODE SCANNER A.ANUSHA (06N61A0402). What is bar code? A barcode is a machine readable representation of information. Barcode stores data in widths.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Smart Card Application. Smart-card is a plastic card, the size of a standard credit card, with one or several integrated circuits (chips) capable to store.
Input Devices Manual and Automatic By Laura and Gracie.
Data Capture and Sensing Evanna Agnew CBLT. AIDC Technologies Automatic Identification and Data Capture (AIDC)
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Computers Are Your Future Eleventh Edition Chapter 2: Inside the System Unit Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
System Analysis and Design
Smart Card Technology & Features
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Presented by: Nada Aried, Paul Czerniak, Dan Lavender, Fabrice Toscano, Paul Zaher AutomaticAutomatic IdentificationIdentification.
Section 2.3 – Authentication Technologies 1. Authentication The determination of identity, usually based on a combination of – something the person has.
Radio Frequency Identification
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
INTRODUCTION TO COMPUTERS
Describe direct data entry and associated devices, e. g
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
CONTACTLESS SMART CARD Betty Yu. What is contactless smart card? A contactless smart card is a contactless MHz credential whose dimensions are credit-card.
Information Technology INT1001 Lecture 2 1. Computers Are Your Future Tenth Edition Chapter 6: Inside the System Unit Copyright © 2009 Pearson Education,
Topic 2 Input devices. Topic 2 Input devices Are used to get raw data into the computer so that it can be processed Include common input devices such.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
Memory Random Access Memory (RAM) and Read Only Memory (ROM)
1 Chapter 1 Basic Structures Of Computers. Computer : Introduction A computer is an electronic machine,devised for performing calculations and controlling.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Introduction to Input Devices. Input Devices Units that gather information and transform that information into a series of electronic signals for the.
A smart card is a credit card sized plastic card embedded with an integrated circuit chip that makes it "smart". This made between a convenient plastic.
AGENDA Introduction Kind of information smart card contain
DATA COLLECTION Data Collection Data Verification and Validation.
Input devices.
Radio Frequency Identification (RFID)
LECTURE Course Name: Computer Application
Smart Card Technology Why is a Smart Card So Smart?
Input devices.
OCR GCSE ICT Data capture methods.
Databases.
By: Zachary G/ Kailona G IS 201 M9
Automatic Identification and Data Collection Technology
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

Automatic Identification System Chapter 4 Automatic Identification System EC5103PA_Apr2008

15 July 2008 (Tuesday) CPA Class Test 1 Chapter 1 to 3 During project lesson

Automatic Identification System Basic structure and operating principles of various identification system Bar codes Magnetic stripe Radio frequency identification Smart card

What is Automatic Identification System? Auto ID, also refer as AIDC (Automatic Identification and Data Capture) Auto ID refers to the method of capturing or collecting data via automatic means (i.e. without the use of a keyboard), and storing data in a microprocessor-controlled devices (computer). All AIDC technologies support two common goals: Accuracy To eliminate errors associated with identification and/or data collection Productivity To accelerate the through-put process

Types of Auto ID Technologies AutoID technologies can be roughly divided into six categories: Optical Magnetic Electromagnetic Biometrics Touch Smart card

Automatic Identification System – Bar Codes A symbol that represents a series of numbers and/or letters Symbol is designed such that it can be read by scanners which communicate with the computers Scanning a bar code initiates same action as entering data into a computer

Bar codes Applications Some specific applications are: Retail point of sale Baggage tracking Package tracking Book tracking Statistical process control Time and attendance Patient tracking Inventory and access control Retrieval of client files.

Bar code System Bar code generator software - to design and print original bar code labels. - to add graphics and text to bar codes. CCD Scanner and wedge – A CCD scanner scans the bar codes and collect data. - A wedge is the interface that interprets the scanned data and enters it into the open application of the computer. Data collection software – All bar codes must be scanned into an open application on your computer through which you can compile the information replayed by the scans.

Bar code Symbology Bar code language, also known as symbology, is a graphic representation for numbers or alphabetic characters. Types of symbology available: Linear (1D) Symbologies 2D Symbologies Composite Symbologies

Linear (1D) Bar Code Symbologies Well-established, read-only, optical-read technology Low cost label-based symbol Low capacity, typically 15~50 characters, depending upon symbology and form used Accurate and fast though requires line-of-sight machine readability Wide range of symbol formation software

Linear (1D) Bar Code Symbologies Wide range of encodation symbologies such as: Interleaved 2-of-5 , ITF Code 39 (Pioneered by defense and automotive) Code 128 Universal Product Code, UPC (Used in supermarket) Codabar (Used in blood banks) UPC Codabar

Linear (1D) Bar Code Symbologies Universal Product Code (UPC) Consists of : Machine-readable bar code 12-digit readable UPC number Format of UPC: UPC number – 6 39382 specific products and manufacturers by the Uniform Code Council (UCC). Item number – 00039 (product code) Check digit – Last digit of UPC

2-Dimenstional Bar Code Symbologies A need to encode more information in a smaller space result the use of 2D bar code Two types of 2D bar codes in use are: Stacked Symbologies Matrix Symbologies

2-Dimenstional Bar Code Symbologies Stacked Codes Code 49 Code 16K PDF417 Matrix Symbologies AZTEC CODE                           DATA MATRIX                             MAXICODE                               

Composite Bar Code Symbologies Newly-emerging class of symbology in which two symbols are printed in close proximity to each other and contain linked data Typically one component is a linear symbol and the other either a stacked or a matrix symbol Example of composite symbol : UCC.EAN

Disadvantages of Bar Codes In order to keep up with inventories, companies must scan each bar code on every box of a particular product. Going through the checkout line involves the same process of scanning each bar code on each item. Bar code is a read-only technology, meaning that it cannot send out any information.

Auto-ID System – Bar codes – Scanning & Verification Bar code scanners are electro-optical systems that include a means of illuminating symbol and measuring reflected light. Light waveform data is converted from analog to digital in order to be processed by a decoder and further transmitted to software application. Type of bar code scanners: Contact wands scanner CCD scanner Laser scanner

Auto-ID System – Bar codes – Scanning & Verification Contact Wands bar code scanner Least expensive way to read bar code Handheld bar code scanner Must be placed in contact with bar code symbol and moved across entire symbol to correctly read the symbol Low cost, light weight and suitable for rugged used

Auto-ID System – Bar codes – Scanning & Verification CCD Scanner Mid-range price handheld bar code reader Use a stationary flood of light to reflect symbol image back to an array of photo sensors. Depth of field (DOF), optimal distance for scanner to read the bar code ranges from contact to six inches. More rugged than laser scanner as there are no moving parts Capable of reading 2D matrix

Auto-ID System – Bar codes – Scanning & Verification Laser Scanner Expensive handheld bar code reader Laser diode created a beam which is spread into horizontal arc by means of rapidly moving mirror Light sweeps @ 40 scans per second Revolving polygons or oscillating mirrors may be used to produce a more reliable reading Larger area of scanning view and can achieve a distance of 6 to 12 inches Laser Scanner can tolerate symbol skew

Auto-ID System – Magnetic Strip – Introduction Magnetic stripes technology uses the same technology as audio or videotape – digital magnetic recording. Rather than sounds or images being encoded, digital data is encoded on a magnetic stripe.

Auto-ID System – Magnetic Strip – Introduction Magnetic stripe is adhered to the back of cards or tickets. Information is encoded on the stripe using low and high-energy electromagnetic charges – alternating the polarity of small sections of the magnetic material. When the card is swiped through the reader, electromagnetic charged particles are read as binary data that is then translated and converted into letters and numbers for computer processing.

Auto-ID System – Magnetic Strip – Tracks Layout Magnetic strip may contain up to three tracks (according to ISO7811) Track 1 (Read-Only) – Capacity of 79 alphanumeric characters can hold user’s account number, name, expiration date Track 2 (Read-Only) – Contains 40 numeric characters Track 3 (Read and Write) – Contains cardholder’s accounts and may be encoded each time it is used. This track is used for security purposes.

Auto-ID System – Magnetic Strip – Advantages & Disadvantages Advantage of magnetic strip Flexibility, can be re-encoded at any time as compared to bar codes. Durability, enable up to 100,000 swipes on a single card and over 2 million swipes on a reader. Reliability, ten years of performance for both cards and readers. Disadvantage of magnetic strip Ability of a magnetic field to erase the card ‘s encryption. Data on the stripe can easily be read, written, deleted or changed with off-the-shelf equipment. not the best place to store sensitive information.

Magnetic Strip Applications Magnetic stripes is used everywhere such as: Bank Card Airline Ticket and Boarding pass Phone card Transit ticket Parking lot ticket

Review Questions What are the two main objectives of AIDC technologies? Name four common types of Auto-ID technologies. State three types of bar code symbology.

What is Radio Frequency Identification? RFID is a technology used for automatic data capture which allows contact-less identification of objects via Radio Frequency (RF). RFID relies on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader.

Components of a RFID System A basic RFID system consists of three components: A transponder (RFID tag) Reader or Interrogator Host computer

Components of a RFID System A transponder (Also called a tag) a tiny radio device that is also referred to as a transponder, smart tag, smart label, or radio barcode. contain at least two parts. integrated circuit for storing and processing information, modulating and demodulating a (RF) signal, and other specialized functions. an antenna for receiving and transmitting the signal. Fig 12 An EPC RFID tag used by Wal-Mart

Components of a RFID System Reader or Interrogator RFID readers or receivers are composed of a radio frequency module, a control unit and an antenna to interrogate electronic tags via radio frequency (RF) communication. The main objective of an RFID reader is to control the reading and writing of data to an RFID tag. A radio frequency field is generated around the RFID reader's antenna to generate power for the passive tags as well as provide means for data transfer from the tag to the reader.

Components of a RFID System Host Computer The data acquired by the readers is then passed to a host computer, which may run specialist RFID software or middleware to filter the data and route it to the correct application, to be processed into useful information.

RFID tags RFID tags are categorized as either passive, active and semi-passive.

Passive RFID tags Have no internal power supply. draw power from the radio wave transmitted by the reader. The reader transmits a low power radio signal through its antenna to the tag, which in turn receives it through its own antenna to power the integrated circuit (chip). The tag will briefly converse with the reader for verification and the exchange of data. The tag chip can contain non-volatile, writable EEPROM for storing data. Simple, low cost & small Shorter read range (typically 3m of less)

2.45GHz RFID Temperature Sensor Active Tag Active RFID tags have internal power source, which is used to power the integrated circuits and to broadcast the response signal to the reader. larger and more expensive than passive tags. transmit at higher power levels than passive tags, allowing them to be more robust in "RF challenged" environment. with humidity and spray or with dampening targets (including humans/cattle, which contain mostly water), reflective targets from metal (shipping containers, vehicles), or at longer distances. used to track high value goods like vehicles and large containers of goods. Provide longer range (typically tens of metres) Larger memories than passive tags Tags could last up to 10 years due to battery life time 2.45GHz RFID Temperature Sensor Active Tag

Semi-Passive RFID tags have own power source, but the battery only powers the on-board microchip and does not power the broadcasting of a signal to the reader. battery can be used to power data storage. Some semi-passive tags sleep until they are woken up by a signal from the reader, which conserves battery life. These tags are sometimes called battery-assisted tags. Main advantages:- 1) Greater sensitivity than passive tags. 2) Longer battery powered life cycle than active tags. 3) Can perform active functions (such as temperature logging) under its own power, even when no reader is present for powering the circuitry.

RFID Frequencies Type of tags are also categorized by radio frequency: Low frequency tags (125 or 134.2 khz) High frequency tags(13.56MHz) UHF tags (850 to 960 MHz) Microwave tags (2.45GHz)

RFID Frequencies

Automatic Identification System – Advantages Real-time updates Contactless technology Line-of-sight not required High Security Fast reading speed Simultaneous reading

Automatic Identification System – Application RFID in Metro Group

Components of a RFID System A basic RFID system consists of three components: A transponder (RFID tag) Reader or Interrogator Host computer

Auto-ID System – Smart Card – Introduction Provide greater memory capacity for storing of information Allows reprogramming of adding, deleting of data Provide greater security features than magnetic stripe

What is a Smart Card ? A credit card size plastic card containing an integrated circuit (IC) that carried relatively large amounts of information. The microchip can contain just a memory module, or a microprocessor with a memory module. Integrated Circuit

What is a Smart Card ? Information contained in the microchip can include monetary data, personal identification, security credentials or medical history. Allows reprogramming of adding, deleting of data

A Smart Card System A smart card is a part of a larger system which includes: Smart Card reader/writer Allow transfer of information between smart card and machine interfacing with card (i.e. ATM) Client Application Software which performs on-line transactions between card and system providers (i.e. banks) Card Management System (or Card Operating System) Software and protocol that control the card operation

Types of smart card Memory card (Also known as “dumb’ card) has an embedded memory chip with predefined operations, such as acting as a cash card. It does not contain logic or perform calculations; they simply store data. use ROM and EEPROM to store from 1KB to 15KB of information. Without a processor, a memory card relies on a CAD (card acceptance device) to process the card information upon each card use. Memory card are used in NETS CashCard, pay phone, retail or vending machines, game-station.

Types of smart card Microprocessor card (Smart card) Microprocessor with memory is embedded in the card can process and manipulate its own data Not dependent on reader to make application work Microprocessor cards are used in ATM, credit & debit cards.

Types of Smart Card Interface Contact Contactless Dual interface - Hybrid card - Dual interface chip card (Combi Card)

Types of Smart Card Interface Contact smart card Require physical contact with device known as reader Has 6 contacts point (usually gold plated) for power and data communication

Types of Smart Card Interface Contact smart card Prone to electric shock through the contacts which may result a destruction of IC Contact point prone to corrosion Lower cost of smart card series

Types of Smart Card Interface Contactless smart card Communicates with reader without physical contact Contains an antenna which embedded inside the card for wireless communication No contact to wear out Used in applications such as :- transit fare payment cards government and corporate identification cards electronic passports and visas, and financial payment cards.

Types of Smart Card Interface Hybrid smart card contains two chips on the card, one supporting a contact interface and one supporting a contactless interface. The chips contained on the card are generally not connected to each other. Dual-Interface Chip Smart Card (Combi Card) contains a single chip that supports both contact and contactless interfaces.

Auto-ID System – Smart Card – Smart Card Architecture Smart Card consists of the following: Microprocessor I/O controller Memories ( ROM, RAM, EEPROM) Microprocessor I/O Control RAM ROM EEPROM Power Ground Clock Reset Input Output

Smart Card Architecture In a microprocessor card, programs are written to manage the memory allocation and file accessibility. All the operation are performed via Card Operating Systems (COS).

Card Operating System Card Operating System primary tasks include: Management of interchanges between the card and terminal, in terms of the interchange protocol. Management of files and data in card memory. Access control to information and functions (for example, select file, read, write, and update data). Management of card security and the cyptographic algorithm procedures. Maintaining reliability, such as data consistency, sequence interrupts, and recovering from an error. Management of various phases of the card’s life cycle (Fabrication, Personalization, Active life, and End Of Life).

Card Operating System Examples of COS are: CardOS – Infineon Cyberflex, Multifex, Payflex – Schlumberger STARCOS – Giesecke & Devrient PCOS, MCOS, MPCOS – Gemplus

Smart Card Features and Characteristics Key features & characteristics of smart cards: Cost High consider with Bar codes and magnetic stripe. Reliability Guarantee of 10,000 read/write cycle.

Smart Card Features and Characteristics Error Correction Built-in COS is able to their own error checking, thus provide a more reliable data Capacity Typically, each card could store up to 128K bit of information Security Smart cards are highly secure. Information stored on the card is difficult to duplicate or disrupt. Some cards support DES, 3-DES, RSA or ECC standards for encryption, authentication and digital signature

Smart Card Applications Secure identity applications Employee ID badges, citizen ID documents, electronic passports, driver’s licenses, online authentication devices. Healthcare applications Citizen health ID cards, physician ID cards, portable medical records cards. Payment applications Contact and contactless credit/debit cards, transit payment cards, highway tolls.

Smart Card Applications Telecommunications applications GSM and Smart Cards GSM mobile phones include a smart card, the Subscriber Identity Module (SIM) Pay Phones and Smart Cards use smart cards instead of coins in their pay phones to improve customer convenience and telecommunications operators’ business models (less cash, reduced risk of losses).

Smart Card Applications Telecommunications applications Mobile Payment use phones to pay for products such as games, ring tones and other digital content. Mobile phones and other mobile devices are also being used to pay for products at a physical point of sale (POS)

Multi-Applications Smart Cards Fig 24 Potential Uses for Multi-Application Smart Cards

Review Questions Please answer True or False for each question. For practical purposes, properly designed AutoID systems don’t make mistakes, whereas with manual data entry there will be inevitably be some data entry errors. A bar code is a symbol that represents a series of numbers only. A wedge is to interface the scanned data into the open application of the computer. Check digit in a UPC code is the last digit to determine if the numbers are correctly scanned. Magnetic stripes technology makes use of digital magnetic recording. Rather than sounds or images being encoded, digital data is encoded on a magnetic stripe. RFID tags carry data, are available in a wide variety of shapes and sizes, provide identification for an item that requires tracking or identification. 7. Active RFID tags have their own internal power source, which is used to power the integrated circuits and to broadcast the response signal to the reader.

Review Questions Transponders operate in the range of 850 – 960MHz which is known as High Frequency or HF. The RFID tag needs to be seen in order to read from it. It cannot be hidden under skin or even in a book. 10. A smart card is a plastic card embedded with a computer chip that stores and transacts card data by reader of a computer system. 11. Dual interface smart card offers both contact and contactless interfaces. Examples are hybrid card and dual-interface chip card (“Combi” card). 12. The smart card uses a serial interface and receives its power from external sources like a card reader. 13. Ez-link card is a contactless smart card using RFID technology. 14. NETS CashCard is the stored value card that allows you to make quick and easy payments for car parks, ERP and tolls. 15. The Singapore Biometric Passport (BioPass) contains a polycarbonate page that is embedded with a contactless chip (RFID tag), carrying the owner's facial and fingerprint biometric identifiers.