item level rfid tags
play

Item Level RFID Tags Extend Memory Not Just an ID Need More Than - PowerPoint PPT Presentation

Item Level RFID Tags Extend Memory Not Just an ID Need More Than Just an ID Expanded memory capacity Transaction history (e.g., pharmaceutical medicine) Extended ownership


  1. Item Level RFID Tags 香港研发中心成员 Extend Memory – Not Just an ID

  2. Need More Than Just an ID 香港研发中心成员  Expanded memory capacity Transaction history (e.g.,  pharmaceutical medicine) Extended ownership description  (e.g., airline luggage) Content authentication (hash of  legal documents)

  3. Ownership Description 香港研发中心成员  Ownership information (~ 512b) Each ASCII needs 8 bits  Each Chinese character needs 16 bits   Applications Freight items   Luggage Post mail and packages  Human and animal ID tags  Patients tags  Students tags  Event tags 

  4. Transaction History 香港研发中心成员  Tracking information (1K-2K) Transactions from manufacturers,  distributors to retailers, etc.  Applications: Product history tracking  Pharmaceuticals, food, wine, cigarettes,  Anti-counterfeiting  Unique ID and logistic history for each  product User verification on the spot, no need  of backend database

  5. Even Larger Content Storage 香港研发中心成员  Hash-of-content, or even content information One A4 page of English ~ 4K to 8K  bits One A4 page of Chinese ~ 8 K to 16 K  bits One passport-sized picture ~16K to  32 K bits  Applications Machine automatic content reading  Authentication  Legal documents, such as certificate,  diploma, transcripts, etc, Pictures, or finger prints for ID cards 

  6. Novel RFID Memory Design 香港研发中心成员  MTP (multiple time programmable) logic-NVM CMOS based NVM, up to 1K bits  Pro: No extra mask, low manufacturing cost  Con: Large footprint size   MTP Flash (E 2 PROM) Up to 128K bits  Pro: small footprint size  Con: Higher manufacturing cost   OTP (one time programmable) NVM Potentially can go beyond 128K bits  Pro: No extra mask, Low manufacturing cost  Con: One time programming 

  7. RFID with Secured Communication 香港研发中心成员  EPC Gen-2 has little security mechanism built in Only 32-bit password for read/write  authorization Plain EPC ID stored and  transmitted Tags may potentially be cloned,  intercepted or emulated.  Different levels of security needed for various applications

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend