throbber
Contactless Smart Card
`
`33
`
`Fig. 3.3 The GEC ic Card and Coupler electronics are totally sealed making them
`ideal for use i'n harsh environments.
`
`turing equipment which acts as a deterrent to all but the largest
`criminal organisations.
`(2) Protection against easy access to the electronics, and hence data
`storage area, by complete encapsulation of the electronics.
`(3) Protection against the probing of data lines between microprocessor
`and memory by incorporating both the elements on a single micro­
`electronics chip.
`( 4) Protection of the application program through the ability to 'blow' a
`software fuse thereby destroying the means by which the card can
`reload a new program.
`(5) Sumcheck protection against the alteration of memory contents.
`( 6) Protection against altering and adding to the dialogue between the
`card and a terminal by authentication software specifically designed
`for the card.
`(7) Protection against using recorded dialogue to establish authentic
`communication and against rerouting messages by verification soft­
`ware specifically designed for the card.
`(8) Protection, through encryption, against deciphering dialogue between
`the card and terminal.
`(9) Positive personal identification of the card holder by comparison of
`a personal characteristic (e.g. signature, fingerprint, facial features)
`
`Page 51 of 201
`
`UNITED SERVICES AUTOMOBILE ASSOCIATION
`Exhibit 1003
`
`

`
`34
`
`Integrated Circuit Cards
`
`of the legitimate card holder stored on the card with the same
`feature of the person presenting the card at an access point. The
`comparison can ° be carried out within the card, thus maintaining
`complete secrecy of reference data.
`(10) Protection, by the card invalidating itself when repeated attempts
`are made to gain access by continued keying in of possible personal
`identification numbers or forging of signatures.
`
`In totality, the security offered by the ic Card is virtually unrivalled by
`any other low cost computing based product.
`
`3.4 APPLICATIONS
`
`Applications for the smart card can be divided broadly into three cat­
`egories: data carrier, where the card is used as a convenient portable and
`secure means for storing dat�; conditional access, where the card is used
`as a secure means of identifying the holders entitlement to gain access to
`a site, a computer, a software package or a service; and financial, where
`the card is used to replace ocredit cards, cheque books or money. Each
`card is by no means restricted to one 0 application only. A card can
`accommodate several different function.s spanning all three categories.
`For instance, one card could be used to hX>ld medical data, provide access
`to a computer system �nd act in a financial capacity.
`As a data carrier the card has many applications in the medical field.
`Used as a general medical card, the ic Card could contain such information
`as the holder's address, date of birth, name and address of his/her doctor,
`allergies, recent medical history, serious complaints, drugs being taken
`and donor wishes. The card could be carried by the individual and in the
`case of an emergency, for example the holder collapsing in a street or
`being involved in a road accident, would provide immediate medical
`information to the ambulance crew (Figure 3.4) or the doctor in a hospital
`casualty department. The speed with which vital information would be
`available could well save lives. The card is also particularly suited to
`patients requiring regular treatment or regular monitoring e.g. diabetics,
`dialysis patients. In these applications the card allows key information to
`be provided easily and quickly to the doctor at each appointment and
`data can be easily added to the card.
`Military applications include electronic identity tags for servicemen and
`women. The card can contain details of the holder, service records,
`medical history, entitlements etc. The card is particularly suitable for data
`logging. At remote or unattended sites it could be used to record tempera­
`ture, events etc. Periodically it could be collected and returned to a
`central point for the logged information to be read off the card.
`
`Page 52 of 201
`
`

`
`Contactless Smart Card
`
`35
`
`Fig. 3.4 The GEC ic Card could contain medical details about the holder. In the
`case of an emergency it could provide vital medical information to an ambulance
`crew or doctor in a hospital casualty department.
`
`As a maintenance record, the card could be conveniently attached to
`equipment. The paperwork that goes with military and high value industrial
`equipment is often considerable. The smart card provides an easily up­
`datable compact way of storing such data.
`There are many industrial applications for the card. For example, it
`could be used to program computer-numerically-controlled (CNC)
`machines replacing punched cards or magnetic tapes. Alternatively a card
`could be used to store a record, for monitoring purposes, of the progress
`of manufactured components throughout stages of their manufacture. In
`the automobile industry, such a card might subsequently form the basis of
`a vehicle's servicing record.
`.
`In the airline field the card could be used ·as an electronic ticket with a
`complete analysis of the passenger's preference for 'smoking' or 'non­
`smoking' seat, as well as dietary needs. For regular travellers it could log
`the number of trips flown with a particular airline to give a free or
`reduced fare flight after a number of trips have been made.
`In the area of secure access, the card can act as an electronic key to
`control access of personnel to facilities where sensitive work is carried out
`
`Page 53 of 201
`
`

`
`36
`
`Integrated Circuit Cards
`
`or data is held. The most common type of secutity access devices are
`keys, badges and magnetic cards. These all suffer from the same basic
`drawbacks that they can be easily duplicated and when stolen or passed
`on to someone else, either wilfully or through coercion, they can allow
`entry because there is no link with the person to whom the device was
`issued. The ic Card overcomes these weaknesses because it is very difficult to
`reproduce and has the capability of storing a digitised personal character­
`istic of the owner (e.g. fingerprint). With suitable verification equipment,
`this data can be used at the point of entry to identify whether the
`cardholder is the legitimate owner of the card. The card also has the
`benefit that it can easily be individually personalised to allow access to
`only certain facilities depending on the security clearance of tlie card
`holder. Additionally, as the cardholder progresses through a security
`system, a log of the person's movements can be stored on his card as .a
`security audit trail.
`Computers often hold sensitive information and access to this information
`has to be controlled. The smart card offers a solution. It can hold a
`cryptographic key to allow access to various areas of a database depending
`on the card holder's level of authority.
`The smart card also offers a solution to the problem of unauthorised
`copying of software. By storing a key part of a software program in the
`card, the complete program will only be able to run with the smart card
`present.
`1
`Direct Broadcasting by Satellite (DBS) and Cable Television are going
`to become more widespread in future years. The smart card offers a
`means for payment and the key for reception. Customers will be able to
`purchase an ic Card that will provide the necessary key to unscramble the
`picture. Cards and decoding equipment could be supplied through TV
`rental companies. After, for instance, an interval of one month the key
`required to decode the signal can be changed so that the user has to re­
`turn to the rental shop to have, upon payment, the card updated with the
`new key. Viewing time statistics could be simultaneously collected.
`Banks' major clients can use the ic Card as the key to secure access of
`the bank's mainframe computers for corporate cash management. The
`card is a secure token for individual companies to access their bank
`accounts and financial services from remote personal computers on their
`own premises. This service could later be extended into home banking.
`In the general financial area the card can be used in a number of ways.
`It can be used to replace the cheque book. At a point of sale the smart
`card has the capability to compare the card holder's personal identity
`entered by means of a four digit number, or characteristics of a digitised
`signature, with a secretly held reference in the card. A correct comparison
`will then allow the automatic transfer of funds from the purchaser's bank
`account to the retailer's bank account.
`
`Page 54 of 201
`
`

`
`Contactless Smart Card
`
`37
`
`Fig. 3.5 The GEC ic Card can be used as the means for paying for goods at a
`retail outlet. ·
`
`The card can also be used as an electronic wallet replacing cash. Here
`the card will have prepaid amounts which can be used for payment of low
`value purchases in shops (Fig. 3.5), at vending machines and car park
`entry points by the automatic deduction of the appropriate amount. The
`payment made will be held securely within the vending machine, probably
`on another smart card, for subsequent reconciliation.
`As an electronic token, the card is equivalent to the electronic wallet
`but instead of cash, holds units of consumption such as electric and gas
`units and telephone charge units. In applications such as these the card
`could also provide additional facilities. In the case of the electricity/gas
`card it could monitor and store when units are being used; information
`which could be extracted from the card when next the token value is
`replenished. In the case of the telephone card it could also hold telephone
`numbers for speed dialling.
`In the longer term the card could be used as a social services card
`carrying individuals' child allowance, pension entitlement or social security
`entitlement. It could be used as a driving licence, tax disc and log book,
`readable electronically through the car windscreen. One day it is envisaged
`there could even be an 'electronic' passport where the card is simply laid
`
`Page 55 of 201
`
`

`
`38
`
`Integrated Circuit Cards
`
`upon the counter of immigration control to securely validate the holder
`and expedite the immigration and visa checking process.
`
`3.5 THE FUTURE
`
`There seems littl� doubt that the smart card will start .to have a major
`impact in the early 1990s. It is already being extensively adopted in France.
`In Japan most of the major electronics companies are rapidly developing
`smart cards and a number of trials are underway. In the USA, potentially
`the largest world market for smart cards with a reported 825 million plastic
`magnetic stripe credit and debit cards already in existence, major· trials
`and implementations are already beginning or are expected soon. In the
`UK the GEC ic Card is being used in a number of areas including the first
`trial of smart cards by a UK bank for financial applications. Since its intro­
`duction, the GEC ic Card has attracted worldwide interest and orders
`have been received from the USA, Europe and Austnilasia. It is set to
`take a major share of the emerging smart card market.
`
`Page 56 of 201
`
`

`
`Chapter 4
`Low Frequency Radio Tags
`and their Applications
`
`JOHN FALK
`
`(Contag International Ltd)
`
`Radio tags are well established cousins of the smart card.
`
`4.1 INTRODUCTION
`
`Radio tags are a logical development of the bar code industry. The
`success of bar codes had demonstrated a growing and universal need to
`identify items quickly and reliably. As a technology, bar codes are easy to
`use and have the added attraction that the labels are very low cost. In a
`considerable number of app�cations therefore, particularly where the
`label count is high, bar codes will continue to be the dominant technology
`for the foreseeable future.
`Despite their obvious advantages not all identification problems may be
`solved with bar codes. In fact on closer study they exhibit a number of
`limitations which _restrict their universal use. For example the bar code
`must be in direct line of sight with a reader in order to be identified. Thus
`dirt, condensation, misorientation and misalignment caa all contribute to
`misreads. Furthermore, except for very expensive readers, identification
`must take place at a predefined distance between reader and bar code.
`Another restriction is that the amount of information that can be contained
`on a bar code is strictly limited by its size and this information, once
`printed, cannot be changed.
`These limitations have led to the development of alternative technologies,
`one of which has been the emergence of the radio tag. Such devices fall
`broadly into two main categories. There are high frequency tag systems
`which operate generally in the microwave band. They tend to hold large
`addressable memories and are usually relatively expensive. There is also a
`growing army of low frequency tag systems. These operate predominantly
`in the inductive communication band .between 10-150 kHz. It is these
`low frequency systems which form the subject of this chapter.
`
`Page 57 of 201
`
`

`
`40
`
`Integrated Circuit Cards
`
`4.2 ELEMENTS OF A CODED TAG SYSTEM
`
`Before going into a more detailed study of LF tags, it will be useful to
`introduce the reader to the basic elements of the system. A typical system
`is illustrated in Figure 4.1 and comprises the following:
`This device will be attached to each object, person or
`Coded Tag
`vehicle which :is to be identified. The coded tag is small in size (typically
`40x40x 10 mm) and built to withstand rugged use.
`The function of the programmer is to enter a predefined
`Programmer
`code into each tag. This code may consist of an identity number, or may
`
`System Concept
`
`Programmers insert
`codes into Coded Tags
`
`Host computer
`stores identity
`
`and ta,t<es action
`
`Coded Tag
`
`Interrogator
`
`validates signal
`
`Interrogation field
`
`
`activates Coded Tag
`
`Reading head
`
`Fig. 4.1 Typical coded tag system.
`
`Page 58 of 201
`
`

`
`Low Frequency Radio Tags
`
`41
`
`comprise both identity and data. The programmer can also interrogate a
`tag. It may therefore be used in some specific applications as a read/write
`unit.
`This unit combines the transmit and receive antennae
`Reading head
`which interrogate a tag. The reading head is connected to the interrogator
`via a feeder cable.
`The interrogator generates the interrogate signal for the
`Interrogator
`transmit aerial. It amplifies the response from the tag which is then
`validated before being output as data.
`The host will usually be a computer or PLC. It receives valid
`Host
`data from the interrogator and takes appropriate action.
`
`Figure 4.1 only attempts to des�be the basic elements of a coded tag
`system. In practice a large installation may comprise a large population of
`reading heads, interrogators and programmers.
`
`4.3 BENEFITS OF LOW FREQUENCY
`
`Perhaps it is not surprising that LF tag systems had a harder struggle for
`acceptance than their high frequency cousins. At first sight the choice of
`low frequency does not look reassuring. Antennae must inevitably use
`coils comprising many turns and frequently must incorporate ferrites.
`Data rates will be relatively slow and furthermore ambient noise levels
`from electric motors, VDUs, switched mode power supplies etc. predomi­
`nate in the LF band. It is only when one takes a serious look at the
`advantages of an inductive system that the real benefits become apparent.
`Since these benefits are fundamental to the technology we will cover them
`in some detail.
`A low frequency system enables the designer to use a single CMOS
`device within his tag. This offers a number of advantages. Since CMOS
`circuits have a very high input impedence they may be directly coupled to
`the tuned input antenna without adversely affecting the Q. It is also a
`relatively easy task to bias the CMOS input amplifier so that it operates at
`a predefined threshold. By this means it is possible to achieve quite
`acceptable input sensitivities without the need to resort to sophisticated
`input amplifiers.
`CMOS circuits also are well known for their low consumption of current.
`Provided the in'put amplifier bias level has been correctly selected, the
`quiescent current of a CMOS device is negligible. This is particularly
`valuable where the tag contains a volatile memory and therefore incorpo­
`rates some internal power source. Even in their operating condition
`CMOS devices still draw only small levels of current. This again makes
`them an ideal choice for both active or passive tag systems.
`
`Page 59 of 201
`
`

`
`42
`
`Integrated Circuit Cards
`
`A second benefit of low frequency systems is that the communication
`medium is predominantly magnetic and not electromagnetic. Thus all of
`the basic equations of magnetic fields about a coil apply. The most
`important of these is the relationship in which
`
`H
`
`= I a2 (N)
`2(a2 + z)
`where H = the field generated by the coil in AT/m
`I = current flowing through the coil
`=
`number of turns in the coil
`N
`=
`radius of the coil in metres
`a
`z = the distance in metres along the axis of the coil at which the
`field H exists
`This is particularly useful since it shows that beyond the immediate near
`field of a coil, the intensity decays as an inverse cube of the distance.
`Such a relationship is ideal for an identification system. A reading head
`will have a high field level in its immediate proximity but a very low level
`in the far field (see Figure 4.2). Such an arrangement ensures that tags
`which are being read are exposed to a high field as they pass in front of
`the antenna. However, other tags which 1pay be in the vicinity will not be
`inadvertently activated.
`A further side benefit of this effect i� that interference generated by
`electric and electronic devices is also subject to the inverse cube law.
`Thus the simplest technique for overcoming interference from a neigh­
`bouring source is to separate by a short amount the distance between
`them. Of course this may not always be possible, in which case more
`sophisticated methods will be necessary.
`Magnetic fields will also penetrate dense materials with very little loss
`in field strength. This is convenient since it permits tags to be read when
`situated within or behind a solid object. Equally it is possible to read. tags
`while immersed in a fluid without any significant loss in performance.
`Low frequency magnetic fields will not of course penetrate electrically
`conductive materials. However, the field is able to 'go around' metal
`objects in a way which gives the effect that a tag on the far side is being
`read through it. In fact magnetic fields show a quite remarkable ability to
`pass through even the smallest of apertures. The author on one occasion
`arranged a demonstration in which a tag was read inside a tobacco tin. In
`this case the signal passed through the small air gap between the lid and
`case.
`As a consequence of the inverse cube law, low frequency systems are
`relatively immune to the misorientation of the tag with respect to the
`reader. This point can be demonstrated by th� following simple analysis.
`The antenna in an LF system will consist of a coil comprising one or more
`
`Page 60 of 201
`
`

`
`Low Frequency Radio Tags
`
`43
`
`.s::.
`
`0, c
`� -
`(/)
`"0 Q)
`�
`� 0
`
`100
`
`80
`
`60
`
`40
`
`20
`
`0.5
`
`1 .0
`1.5
`Normalised distance z/a
`Fig. 4.2 Magnetic field strength around a coil.
`
`2.0
`
`turns. Where a transmit and receive coil are placed in the same plane the
`coupling between them will be a maximum. As the receive coil is rotated
`with respect to the transmit coil) the coupling is reduced by the cosine of
`the angle of rotation. The table at Figure 4.3 shows the percentage
`coupling for a number of typical values for the angle of rotation 0.
`However, for a given input threshold level the reduction in range of a tag
`from the transmit coil will be the inverse cube of the cosine of the angle
`0. Thus a quite significant rotation from optimum will result in only a
`modest reduction in range. This holds true for values of 0 up to 60°.
`Thereafter the range wilt drop away as 0 tends to 90° where the range is
`theoretically zero. In practice as the tag passes across the reading head
`even in worst orientation the curvature at the edge of the field ensures a
`reasonable level of coupling. The cumulative effect of the above is to
`allow a tag to be read acceptably in almost all orientations.
`A final point worth mentioning is the matter of international PTf
`approvals. This is an area which can be easily overlooked, yet worldwide
`
`Page 61 of 201
`
`

`
`44
`
`Integrated Circuit Cards
`
`Angle
`e
`
`0
`45
`60
`75
`85
`89
`90
`
`% Coupling
`
`% Reduction
`in range
`
`100
`70
`50
`26
`9
`2
`0
`
`0
`11
`21
`37
`56
`74
`100
`
`Fig. 4.3 Reduction in range with rotation.
`
`controls are growing increasingly more stringent. Due to the declining
`. availability of frequencies in the shortwave and microwave bands, aBo­
`cations granted in one country may not be available in others. Without
`advance planning this can turn out to be . an expensive setback in a
`marketing programme where product development is alre(ldy complete.
`By comparison with other parts of the radio spectrum, regulations in the
`inductive communication band are far less stringent. In fact a number of
`countries do not require any form of PIT approval for devices operating
`below 150 ·kHz. The choice of low frequency can therefore make a
`significant saving in a company's approval costs.
`
`4.4 PRINCIPLE OF OPERATION
`
`With practically· all RF tag systems the tag operates as a transponder.
`Such a device will only be activated when subjected to an external inter-
`
`Page 62 of 201
`
`

`
`Low Frequency Radio Tags
`
`45
`
`Internal
`control logic
`
`Memory
`
`Data input
`logic
`
`Program
`protection
`logic
`
`Fig. 4.4 Outline schematic of a typical coded tag.
`
`rogat.ion field. This mode of operation is ideal for a tag system. For most
`of its life a tag will remain in a dormant condition. However, when it is
`brought within the field from a reading head it will immediately switch to
`its active state and commence to respond.
`The interrogating signal frequently serves two functions. Not only does
`it activate the tag but also it provides the clock frequency which controls
`its internal operation. A typical tag system might be configured as in
`Figure 4.4.
`The circuit comprises two analogue inputs. One of these is tuned to the
`interrogating frequency while the second is set to a different frequency to
`receive input data. The interrogation frequency is fed to a frequency
`divider or multiplier which generates an output signal. ·The interrogation
`frequency is also used to time the internal logic. This neatly ensures
`synchronisation of any input or output data. Additionally it avoids the
`need for an internal oscillator within the transponder.
`The internal logic will validate and accept input data and control its
`storage in memory. It also accesses from memory as required output data

`which is passed to the driver stage.
`The data is used to modulate the
`output carrier using either phase or amplitude modulation.
`A reset circuit is incorporated to ensure synchronisation of the internal
`logic. In the quiescent state this ensures that the memory is protected and
`all flip flops are held in a reset condition. As soon as the tag is brought
`
`Page 63 of 201
`
`

`
`46
`
`Integrated Circuit Cards
`
`within range of an interrogating signal, the reset line is lifted and the
`internal logic will commence to operate.
`In a number of systems additional security is incorporated to protect
`the memory. This is done to prevent either accidental or deliberate
`corruption of the database. The memory protection circuit is contained
`within the internal logic and will validate a password or sequence from
`the data input before giving access to the memory.
`We have not yet covered the synchronisation of messages between the
`tag and the interrogator. A number of different techniques are possible.
`For example a unique preamble in the data stream may be used to signal
`the start of each message. Another technique is to pulse modulate the
`interrogate signal. This enables the reset line in the transponder to be
`lifted at the start of each new interrogation pulse. Thus an output message
`from the tag is time related to the start of each interrogation cycle.
`
`4.5 TAG CONSTRUCTION
`
`The heart of any tag is its custom microchip. This will be fabricated in
`CMOS and contain both the analogue amplifiers and digital elements of
`the tag. The requirement for both analogue and digital elements on a
`single die will inevitably stretch the abilities of the chip design house to its
`limits. On the one hand the digital elenitrnts of the circuit must perform
`sufficiently fast within acceptable limits of data skew. Simultaneously the
`input amplifiers must operate at a high level of input sensitivity while
`drawing minimal current. All of this must be achieved at minimum cost
`while ensuring acceptable tolerances between wafer batches. Small wonder
`that the gleam in the chip manufacturer's eye quickly fades as the reality
`of the requirement sinks home. Not surprisingly the specification phase
`for such a custom device is likely to be protracted with considerable
`debate before final agreement is reached.
`We should not leave the microchip without covering the subject of
`memory size. It is convenient to subdivide coded tags' capacity into a
`number of levels as represented in Figure 4.5. For completeness the
`single bit presence sensing tag, as used for example in anti-shoplifting
`applications, is also included. It will quickly be apparent that capacity
`heavily dictates the use to which each level is put. LF tag systems are
`available with memory capacities which range from 8 bits to low thousands
`of kilobits. Not surprisingly low memory tags and their associated control
`equipment are significantly less expensive than the high memory versions.
`A low.memory is useful in applications where an identity. number only is
`required. In such situations it is frequently unnecessary to reprogramme
`the tag. Where this applies a passive system may offer the most cost­
`effective solution.
`
`Page 64 of 201
`
`

`
`Low Frequency Radio Tags
`
`47
`
`level IV ­
`Portable data base
`
`level Ill ­
`Transaction/Routing
`
`level ! ­
`Presence sensing
`
`1
`
`8
`
`64
`Capacity {bits)
`
`512
`
`4,096
`
`Fig. 4.5 RF coded tag systems - capacity.
`
`As memory size increases, the opportunity to combine data with identity
`
`
`
`becomes a possibility. The data may take the form of flags which occup,y a
`
`
`predefined section of the memory. These flags might be set, for example,
`·in a production
`
`
`
`
`to indicate the successful completion of different stages
`process.
`
`
`Alternatively the data may be in the form of a number which
`
`
`
`relates via a look up table in the host to a sequence of actions. Medium
`32
`
`
`
`sized memory systems may be loosely classified as comprising between
`
`and 256 bits. They are characterised by the fact that the data is usually
`
`associated with a look up table.
`High memory systems are those which comprise memories greater than
`
`
`
`
`
`
`Firstly the 256 bits. They are distinguished by a number of features.
`memory is arranged in 8 bit bytes with each byte being
`individually
`
`
`This is clearly essential to avoid the need to write to or read
`addressable.
`
`
`the entire tag memory at each read/write head. Secondly the large memory
`
`
`
`size makes it possible for the data in the tag to be entered in full in ASCII
`
`
`in This is a real benefit
`look up tables. thus avoiding the need for external
`
`
`applications where there would otherwise be a frequent
`need to modify a
`
`
`
`distributed database. On the other hand, each work station must contain
`
`
`the necessary software to enable it to access its own data requirements
`
`
`from the tag. Also if the quantity of data to be transferred at a reading
`
`
`head is large, the time taken to pass the data may be significant. It will be
`
`
`
`apparent therefore that considerable work is involved in the systems
`
`
`For this reason their design and installation of a high memory device.
`
`Page 65 of 201
`
`

`
`48
`
`Integrated Circuit Cards
`
`uses are currently limited to large production lines where the cost can be
`fully justified.
`Coded tags may be either active (battery powered) or passive (battery­
`less). During interrogation, the passive tag draws its power from the
`interrogation pulse. This is used to operate the microchip and drive the
`output data signal. Such systems can work well at short range. However,
`at extended ranges or with misorientation the output signal is reduced.
`This ·effectively limits the market for passive systems to use at short
`ranges and may restrict their ability to operate in electrically noisy environ­
`ments. Active tags usually contain a small lithium cell which maintains
`the memory during the quiescent state and powers the device to give a
`strong output signal during interrogation. Lithium cells are particularly
`useful as a power source because of their very high power density and
`long shelf life. They will also operate effectively over a wide temperature
`range with typical operational limits from 75°C down to -30°C. Although
`lithium cells are capable of delivering only small current levels, this is not
`an obstacle to their use in a tag where minimal current drain is a basic
`design criterion. Most active tags will provide typically 7 years of operation
`under conditions of high use. Thus in practice the service life of the tag is
`likely to be exceeded long before the cell is discharged. However, as an
`additional precaution most active tags incorporate a battery sense circuit
`within the microchip. This will check the cell voltage each time the tag is
`interrogated. In the event that the battery voltage drops below a predefined
`level, a flag will be set in the output data message. This flag is detected in
`the control equipment which generates a warning message to the operator
`that the tag requires replacement.
`Passive tags do not have a volatile memory and in consequence are
`frequently programmed at the time of manufacture. This is sometimes
`·carried out by blowing predefined fusible links within the microchip.
`Alternatively an arrangement which makes or breaks links external to the
`chip is sometimes used. While the unit cost of passive tags is potentially
`less than their active cousins they suffer from the inflexibility that once
`programmed, their memory is fixed. There is also a hidden cost of
`programming and logistical control which should not be overlooked. At
`some point in the future the use of EEPROMs within passive tags may
`offer some interesting possibilities. For the present, however, this tech-

`nology is unsuitable.
`An interesting approach used by a few manufacturers has been the
`adoption of a quasi active system. Instead of a lithium cell, a capacitor
`with very low leakage is used to sustain a volatile memory. During
`interrogation the power to operate the chip and drive the output signal is
`derived from the interrogation pulse. Simultaneously the capacitor is
`recharged. These systems have the benefit of offering the customer a tag
`with a reprogrammable memory but without a battery. They are neverthe-
`
`Page 66 of 201
`
`

`
`Low Frequency Radio Tags
`
`49
`
`less subject to the same range and noise limitations as passive tags in
`
`
`
`operational use.
`In addition to the custom chip and power source (if used) a tag requires
`its own input and output antennae. These take the form of a coil which
`
`may be either air or ferrite cored depending on the individual design.
`
`
`Passive tags tend to use large air coils for their input field antennae. This
`
`provides the most effective means of converting the interrogation field
`internal power. Air coils can be wound with considerable
`into useful
`accuracy by automatic machines. They have low values of Q and can
`therefore be used directly in production without the need for tuning.
`
`
`However, they are readily de tuned in the presence of metal so may not
`
`
`
`be suitable in all applications. Ferrite coils are used in a great number of
`
`
`high tags and have the merit of being very compact. They can achieve
`values of Q while being relatively
`immune to the effects of nearby metal
`between
`
`objects. However, due to the wide variations in permeability
`
`
`production batches, ferrite coils invariably have to be physically tuned
`during assembly.
`The chip, ba

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket