`
`Momentum Dynamics Corporation
`Exhibit 1016
`
`Second Edition
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 001
`
`
`
`
`
`
`
`Contents
`
`PREFACE
`LIST OF ABBREVIATIONS
`
`1
`
`Introduction
`1.1 Automatic Identification Systems
`1.1.1 Barcode systems
`1.1.2 Optical character recognition
`1.1.3 Biometric procedures
`1.1.3.1 Voice identification
`1.1.3.2 Fi ngerpri nti ng procedures ( dactyloscopy)
`1.1.4 Smart cards
`1.1.4.1 Memory cards
`1.1.4.2 Microprocessor cards
`1.1.5 RFID systems
`1.2 A Comparison of Different ID Systems
`1.3 Components of an RFID System
`
`2 Differentiation Features of RFI D Sy stems
`2. 1 Fundamental Differentiation Features
`2.2 Transponder Construction Formats
`2.2.1 Disks and coins
`2.2.2 Glass housing
`2.2.3 Plastic housing
`2.2.4 Tool and gas bottle identification
`2.2.5 Keys and key fobs
`2.2.6 Clocks
`2.2.7
`ID-1 format, contactless smart cards
`2.2.8 Smart label
`2.2.9 Coil-on-chip
`2.2.10 Other formats
`2 .3 Frequency, Range and Coupling
`2.4
`Information Processing in the Transponder
`2.4.1 Low-end systems
`2.4.2 Mid-range systems
`2.4.3 High-end systems
`2.5 Selection Criteria for RFID Systems
`2.5. 1 Operating frequency
`2.5.2 Range
`
`xiii
`xv
`
`1
`2
`2
`3
`4
`4
`4
`5
`5
`6
`6
`7
`7
`
`11
`11
`13
`13
`14
`14
`15
`17
`18
`18
`19
`20
`2 1
`22
`23
`23
`24
`25
`25
`26
`26
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 004
`
`
`
`
`
`CONTENTS
`
`4.1.9
`
`Interrogation field strength Hmin
`4.1.9 .1
`Energy range of transponder systems
`4.1.9.2
`Interrogation zone of readers
`4.1.10 Total transponder -
`reader system
`4.1.10.1 Transformed transponder impedance z' T
`Influencing variables of z' T
`4.1.10.2
`4. 1.10.3 Load modulation
`4.1.11 Measurement of system parameters
`4.1.11.l Measuring the coupling coefficient k
`4.1.11 .2 Measuring the transponder resonant frequency
`4.1.1 2 Magnetic materials
`4.1.1 2.1 Properties of magnetic materials and ferrite
`4.1.1 2.2 Ferrite antennas in LF transponders
`4.1.1 2.3 Ferrite shielding in a metallic environment
`4.1.1 2.4 Fitting transponders in metal
`4.2 Electromagnetic Waves
`4.2.1
`The generation of electromagnetic waves
`4.2. 1.1
`Transition from near field to far field in conductor loops
`Radiation density S
`Characteristic wave impedance and field strength E
`Polarisation of electromagnetic waves
`4.2.4.1
`Reflection of electromagnetic waves
`Antennas
`4.2.5. 1 Gain and directional effect
`4.2.5.2
`EIRP and ERP
`4.2.5.3
`Input impedance
`4.2.5.4
`Effective aperture and scatter aperture
`4.2.5 .5
`Effective length
`4.2.5.6
`Dipole antennas
`4.2.5.7
`Yagi - Udo antenna
`4.2.5.8
`Patch or microstrip antenna
`4.2.5.9
`Slot antennas
`Practical operation of microwave transponders
`4.2.6. 1
`Equivalent circuits of the transponder
`4.2.6.2
`Power supply of passive transponders
`4.2.6.3
`Power supply of active transponders
`4.2.6.4
`Reflection and cancellation
`4.2.6.5
`Sensitivity of the transponder
`4.2.6.6 Modulated backscatter
`4.2.6.7
`Read range
`4 .3 Surface Waves
`4.3. l
`The creation of a surface wave
`4.3.2
`Reflection of a surface wave
`4.3.3
`Functional diagram of SAW transponders (Figure 4 . 95)
`4. 3.4
`The sensor effect
`4.3.4. 1
`Reflective delay lines
`4.3.4.2
`Resonant sensors
`
`4.2.2
`4.2.3
`4.2.4
`
`4.2.5
`
`4.2.6
`
`vii
`
`80
`82
`84
`86
`88
`90
`97
`103
`103
`105
`106
`107
`108
`109
`110
`111
`111
`112
`114
`11 5
`116
`117
`119
`11 9
`120
`121
`12 1
`124
`125
`127
`128
`130
`131
`131
`133
`140
`141
`142
`143
`145
`148
`148
`150
`15 1
`153
`154
`155
`
`l
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 006
`
`
`
`viii
`
`CONTENTS
`
`Impedance sensors
`4.3.4.3
`Switched sensors
`
`4.3.5
`
`5 Frequency Ranges and Radio Licensing Regulations
`5.1 Frequency Ranges Used
`Frequencyrange9-135kHz
`5.1.1
`Frequency range 6.78 MHz
`5.1.2
`Frequency range 13.56 MHz
`5.1.3
`Frequency range 27. 1 25 MHz
`5 .1.4
`Frequencyrange40.680MHz
`5.1.5
`Frequency range 433. 920 MHz
`5 .1.6
`Frequency range 869.0 MHz
`5.1.7
`Frequency range 915.0 MHz
`5.1.8
`Frequency range 2.45 GHz
`5.1.9
`5.1.10 Frequency range 5.8 GHz
`5.1.11 Frequency range 24.125 GHz
`5.1.12 Selection of a suitable frequency for inductively coupled RFID systems
`5.2 European Licensing Regulations
`5.2. 1 CEPT/ERC REC 70-03
`Annex 1 : Non-specific short range devices
`5.2.1.1
`Annex 4: Railway applications
`5.2.1.2
`Annex 5: Road transport and traffic telematics
`5.2.1.3
`5.2.1.4 Annex 9: Inductive applications
`Annex 11 : RFID applications
`5.2.1.5
`Frequency range 868 MHz
`5.2.1.6
`EN 300 330: 9 kHz - 25 MHz
`Carrier power -
`limit values for H field transmitters
`5.2.2.1
`Spurious emissions
`5.2.2.2
`EN 300 220- l , EN 300 220-2
`5.2.3
`EN 300 440
`5.2.4
`5.3 National Licensing Regulations in Europe
`5.3.1 Germany
`5.4 National Licensing Regulations
`USA
`5.4.1
`Future development: USA-Japan-Europe
`5.4.2
`
`5 .2.2
`
`6 Coding and Modulation
`6.1 Coding in the Baseband
`6.2 Digital Modulation Procedures
`Amplitude shift keying (ASK)
`6.2.1
`2 FSK
`6.2.2
`2 PSK
`6.2.3
`6.2.4 Modulation procedures with subcarrier
`
`7 Data Integrity
`7 .1 The Checksum Procedure
`
`157
`159
`
`161
`161
`161
`163
`163
`163
`165
`165
`166
`166
`166
`166
`166
`167
`169
`169
`170
`171
`172
`172
`172
`173
`173
`173
`175
`175
`176
`177
`177
`179
`179
`180
`
`183
`184
`186
`186
`189
`190
`191
`
`195
`195
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 007
`
`
`
`
`
`
`
`CONTENTS
`
`11.2.1 HF interface
`Inductively coupled system, FDX/HDX
`11.2.1.1
`11.2.1.2 Microwave systems - half duplex
`11.2.1.3 Sequential systems - SEQ
`11.2.1.4 Microwave system for SAW transponders
`11.2.2 Control unit
`11 .3 Low Cost Configuration - Reader IC U2270B
`11.4 Connection of Antennas for Inductive Systems
`Connection using current matching
`11.4.1
`Supply via coaxial cable
`11.4.2
`The influence of the Q factor
`11.4.3
`11.5 Reader Designs
`11.5.1
`11.5.2
`11.5.3
`
`OEM readers
`Readers for industrial use
`Portable readers
`
`12 The Manufacture of Transponders and Contactless
`Smart Cards
`12.1 Glass and Plastic Transponders
`12.1.1 Module manufacture
`12.1.2 Semi-finished transponder
`12.1.3 Completion
`12.2 Contactless Smart Cards
`12.2.1 Coil manufacture
`12.2.2 Connection technique
`12.2.3 Lamination
`
`13 Example Applications
`13.1 Contactless Smart Cards
`13.2 Public Transport
`13.2.1 The starting point
`13.2.2 Requirements
`13.2.2.1 Transaction time
`13.2.2.2 Resistance to degradation, lifetime, convenience
`13.2.3 Benefits of RFID systems
`13 .2.4 Fare systems using electronic payment
`13.2.5 Market potential
`13.2.6 Example projects
`13.2.6.1 Korea - seoul
`13.2.6.2 Germany - Luneburg, Oldenburg
`!CARE and CALYPSO
`13.2.6.3 EU Projects -
`13.3 Ticketing
`13.3.1 Lufthansa miles & more card
`13.3.2 Ski tickets
`
`xi
`
`311
`312
`313
`314
`315
`316
`317
`319
`320
`322
`325
`326
`326
`327
`328
`
`329
`329
`329
`330
`332
`332
`333
`336
`338
`
`341
`341
`342
`343
`344
`344
`344
`345
`346
`346
`347
`347
`349
`350
`354
`354
`356
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 010
`
`
`
`xii
`
`CONTENTS
`
`13.4 Access Control
`13.4.1 Online systems
`13.4.2 Offline systems
`13.4.3 Transponders
`13.5 Transport Systems
`Eurobalise S2 l
`13 .5 .1
`International container transport
`13.5.2
`13.6 Animal Identification
`Stock keeping
`13 .6.1
`13.6.2 Carrier pigeon races
`13.7 Electronic Immobilisation
`The functionality of an immobilisation system
`13.7.1
`Brief success story
`13.7.2
`Predictions
`13.7.3
`13.8 Container Identification
`13.8.1 Gas bottles and chemical containers
`13 .8.2 Waste disposal
`13.9 Sporting Events
`13.10 Industrial Automation
`13.10.1 Tool identification
`Industrial production
`13.10.2
`13 .10.2.1 Benefits from the use of RFID systems
`13 .10.2.2 The selection of a suitable RFID system
`13 .10.2.3 Example projects
`13.11 Medical Applications
`
`14 Appendix
`14.1 Contact Addresses, Associations and Technical Periodicals
`Industrial associations
`14.1.1
`Technical journals
`14.1.2
`RFID on the internet
`14.1.3
`14.2 Relevant Standards and Regulations
`Sources for standards and regu lations
`14.2.1
`14.3 References
`14.4 Printed Circuit Board Layouts
`Test card in accordance with ISO 14443
`14.4.1
`Field generator coi l
`14.4.2
`
`INDEX
`
`357
`357
`358
`360
`361
`361
`363
`364
`364
`367
`371
`372
`375
`376
`376
`376
`378
`379
`381
`381
`385
`387
`388
`389
`392
`
`394
`394
`394
`398
`399
`400
`405
`406
`41 2
`412
`413
`
`419
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 011
`
`
`
`3
`Fundamental Operating
`Principles
`
`This chapter describes the basic interaction between transponder and reader, in par(cid:173)
`ticular the power supply to the transponder and the data transfer between transponder
`and reader (Figure 3.1). For a more in-depth description of the physical interactions
`and mathematical models relating to inductive coupling or backscatter systems please
`refer to Chapter 4.
`
`3.1 1-Bit Transponder
`
`A bit is the smallest unit of information that can be represented and has only two states:
`1 and 0. This means that only two states can be represented by systems based upon a
`I-bit transponder: 'transponder in interrogation zone' and 'no transponder in interro(cid:173)
`gation zone'. Despite this limitation, 1-bit transponders are very widespread -
`their
`main field of application is in electronic anti-theft devices in shops (EAS, electronic
`article surveillance).
`An EAS system is made up of the following components: the antenna of a 'reader'
`or interrogator, the security element or tag, and an optional deactivation device for
`deactivating the tag after payment. In modern systems deactivation takes place when the
`price code is registered at the till. Some systems also incorporate an activator, which
`is used to reactivate the security element after deactivation (Gillert, 1997). The main
`performance characteristic for all systems is the recognition or detection rate in relation
`to the gate width (maximum distance between transponder and interrogator antenna).
`The procedure for the inspection and testing of installed article surveillance
`systems is specified in the guideline VD! 4470 entitled
`'Anti-theft systems for
`goods -
`detection gates. Inspection guidelines for customers'. This guideline contains
`definitions and testing procedures for the calculation of the detection rate and false
`alarm ratio. It can be used· by the retail trade as the basis for sales contracts or
`for monitoring the performance of installed systems on an ongoing basis. For the
`product manufacturer, the Inspection Guidelines for Customers represents an effective
`benchmark in the development and optimisation of integrated solutions for security
`projects (in accordance with VDI 4470).
`
`RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. Klaus Finkenzeller
`© 2003 John Wiley & Sons, Ltd
`ISBN: 0-470-84402-7
`-
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 012
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`36
`
`3 FUNDAMENTAL OPERATING PRINCIPLES
`
`Table 3.3 Typical system parameters (Plotzke et al., 1994)
`
`Frequency
`Modulation type:
`Modulation frequency/modulation signal:
`
`130kHz
`100% ASK
`12.5 Hz or 25 Hz, rectangle 50%
`
`The magnetic field of the security device is pulsed at a lower frequency (ASK
`modulated) to improve the detection rate. Similarly to the procedure for the generation
`of harmonics, the modulation of the carrier wave (ASK or FSK) is maintained at half
`the frequency (subhannonic ). This is used to differentiate between 'interference' and
`'useful' signals. This system almost entirely rules out false alarms.
`Frame antennas, described in Section 3.1.1, are used as sensor antennas.
`
`3. 1 .4 Electromagnetic types
`
`Electromagnetic types operate using strong magnetic fields in the NF range from 10 Hz
`to around 20 kHz. The security elements contain a soft magnetic amorphous metal strip
`with a steep flanked hysteresis curve (see also Section 4.1.12). The magnetisation of
`these strips is periodically reversed and the strips taken to magnetic saturation by
`a strong magnetic alternating field. The markedly nonlinear relationship between the
`applied field strength H and the magnetic flux density B near saturation (see also
`Figure 4.50), plus the sudden change of flux density B in the vicinity of the zero
`crossover of the applied field strength H, generates harmonics at the basic frequency
`of the security device, and these harmonics can be received and evaluated by the
`security device.
`The electromagnetic type is optimised by superimposing additional signal sections
`with higher frequencies over the main signal. The marked nonlinearity of the strip's
`hysteresis curve generates not only harmonics but also signal sections with summation
`and differential frequencies of the supplied signals. Given a main signal of frequency
`f s = 20 Hz and the additional signals / 1 = 3. 5 and h = 5. 3 kHz, the following signals
`are generated (first order):
`
`Ji + h = /1+2 = 8.80 kHz
`/1 - h = /1 - 2 = 1.80 kHz
`fs + fr = fs+1 = 3.52kHz and so on
`
`The security device does not react to the harmonic of the basic frequency in this case,
`but rather to the summation or differential frequency of the extra signals.
`The tags are available in the form of self-adhesive strips with lengths ranging from
`a few centimetres to 20 cm. Due to the extremely low operating frequency, electromag(cid:173)
`netic systems are the only systems suitable for products containing metal. However,
`these systems have the disadvantage that the function of the tags is dependent upon
`position: for reliable detection the magnetic field lines of the security device must run
`vertically through the amorphous metal strip. Figure 3.8 shows a typical design for a
`security system.
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 020
`
`
`
`
`
`
`
`
`
`40
`
`3 FUNDAMENTAL OPERATING PRINCIPLES
`
`Table 3.5 Typical operating parameters of acoustomagnetic
`systems (VDI 4471)
`
`Parameter
`Resonant frequency Jo
`Frequency tolerance
`Quality factor Q
`Minimum field strength HA for activation
`ON duration of the field
`Field pause (OFF duration)
`Decay process of the security element
`
`Typical value
`
`58kHz
`±0.52%
`> 150
`> 16000A/m
`2ms
`20ms
`5ms
`
`metal strip so it can no longer be excited by the operating frequency of the security
`system. The hard magnetic metal strip can only be demagnetised by a strong magnetic
`alternating field with a slowly decaying field strength. It is thus absolutely impossible
`for the security element to be manipulated by permanent magnets brought into the
`store by customers.
`
`3.2 Full and Half Duplex Procedure
`
`In contrast to 1-bit transponders, which normally exploit simple physical effects (oscil(cid:173)
`lation stimulation procedures, stimulation of harmonics by diodes or the nonlinear
`hysteresis cm:ve of metals), the transponders described in this and subsequent sections
`use an electronic microchip as the data-carrying device. This has a data storage capac(cid:173)
`ity of up to a few kilobytes. To read from or write to the data-carrying device it
`must be possible to transfer data between the transponder and a reader. This transfer
`takes place according to one of two main procedures: full and half duplex procedures,
`which are described in this section, and sequential systems, which are described in the
`following section.
`In the half duplex procedure (HDX) the data transfer from the transponder to the
`reader alternates with data transfer from the reader to the transponder. At frequencies
`below 30 MHz this is most often used with the load modulation procedure,. either
`with or without a subcarrier, which involves very simple circuitry. Closely related
`to this is the modulated reflected cross-section procedure that is familiar from radar
`technology and is used at frequencies above 100 MHz. Load modulation and modulated
`reflected cross-section procedures directly influence the magnetic or electromagnetic
`field generated by the reader and are therefore known as harmonic procedures.
`In the full duplex procedure (FDX) the data transfer from the transponder to the
`reader takes place at the same time as the data transfer from the reader to the transpon(cid:173)
`der. This includes procedures in which data is transmitted from the transponder at a
`fraction of the frequency of the reader, i.e. a subharmonic, or at a completely inde(cid:173)
`pendent, i.e. an anharmonic, frequency.
`However, both procedures have in common the fact that the transfer of energy
`from the reader to the transponder is continuous, i.e. it is independent of the direction
`of data flow. In sequential systems (SEQ), on the other hand, the transfer of energy
`from the transponder to the reader takes place for a limited period of time only (pulse
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 024
`
`
`
`3.2 FULL AND HALF DUPLEX PROCEDURE
`
`41
`
`Procedure:
`FOX:
`Enerav transfer:
`downlink:
`uplink:
`
`HDX:
`Enerav transfer:
`downlink:
`uplink:
`
`SEQ:
`Enerqy transfer:
`downlink:
`uplink:
`
`I
`
`I
`
`-
`
`I
`
`-
`
`I
`
`I
`
`-
`
`I
`
`I
`
`-
`
`I
`
`I
`
`-
`-
`
`I
`I
`
`-
`-
`
`I
`
`- -
`-
`
`I
`I
`
`■
`
`- - \
`
`-
`
`• -
`
`Figure 3.12 Representation of full duplex, half duplex and sequential systems over time. Data
`transfer from the reader to the transponder is termed downlink, while data transfer from the
`transponder to the reader is termed uplink
`
`operation -+ pulsed system). Data transfer from the transponder to the reader occurs
`in the pauses between the power supply to the transponder. See Figure 3.12 for a
`representation of full duplex, half duplex and sequential systems.
`Unfortunately, the literature relating to RFID has not yet been able to agree a con(cid:173)
`sistent nomenclature for these system variants. Rather, there has been a confusing and
`inconsistent classification of individual systems into full and half duplex procedures.
`this is correct from the
`Thus pulsed systems are often termed half duplex systems -
`and all unpulsed systems are falsely classified as
`point of view of data transfer -
`full duplex systems. For this reason, in this book pulsed systems -
`for differentiation
`from other procedures, and unlike most RFID literature(!) -
`are termed sequential
`systems (SEQ).
`
`3.2. 1
`
`Inductive coupling
`
`3.2. 1. 1 Power supply to passive transponders
`
`An inductively coupled transponder comprises an electronic data-carrying device, usu(cid:173)
`ally a single microchip, and a large area coil that functions as an antenna.
`Inductively coupled transponders are almost always operated passively. This means
`that all the energy needed for the operation of the microchip has to be provided by
`the reader (Figure 3.13). For this purpose, the reader's antenna coil generates a strong,
`high frequency electromagnetic field, which penetrates the cross-section of the coil
`area and the area around the coil. Because the wavelength of the frequency range used
`( < 135 kHz: 2400 m, 13.56 MHz: 22.1 m) is several times greater than the distance
`between the reader's antenna and the transponder, the electromagnetic field may be
`treated as a simple magnetic alternating field with regard to the distance between
`transponder and antenna (see Section 4.2.1.1 for further details).
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 025
`
`
`
`
`
`
`
`44
`
`3 FUNDAMENTAL OPERATING PRINCIPLES
`
`Table 3.6 Overview of the power consumption of various RFID-ASIC building blocks (Atmel ,
`1994). The minimum supply voltage required for the operation of the microchip is 1.8 V, the
`maximum permissible voltage is 10 V
`
`Memory Write/read
`(Bytes)
`distance
`
`Power
`consumption
`
`Frequency
`
`Application
`
`ASIC#l
`ASIC#2
`ASIC#3
`ASIC#4
`ASIC#5
`ASIC#6
`ASIC#7
`ASIC#8
`ASIC#9
`ASIC#l0
`
`6
`32
`256
`256
`256
`256
`2048
`1024
`8
`128
`
`*Close coupling system.
`
`15cm
`13cm
`2cm
`0.5cm
`<2cm
`100cm
`0.3cm
`10cm
`100cm
`100cm
`
`l0µA
`120kHz Animal ID
`600 p,A
`120kHz Goods flow, access check
`6µA
`128kHz Public transport
`4MHz* Goods flow, public transport
`< lmA
`~ lmA 4113.56MHz Goods flow
`500µA
`125kHz Access check
`4.91MHz* Contactless chip cards
`< lOmA
`~lmA
`13.56MHz Public transport
`125kHz Goods flow
`< lmA
`125kHz Access check
`< lmA
`
`represented as transformed impedance ZT in the antenna coil of the reader. Switching
`a load resistor on and off at the transponder's antenna therefore brings about a
`change in the impedance ZT, and thus voltage changes at the reader's antenna (see
`Section 4.1.10.3). This has the effect of an amplitude modulation of the voltage UL at
`the reader's antenna coil by the remote transponder. If the timing with which the load
`resistor is switched on and off is controlled by data, this data can be transferred from
`the transponder to the reader. This type of data transfer is called load modulation.
`To reclaim the data at the reader, the voltage tapped at the reader's antenna is recti(cid:173)
`fied. This represents the demodulation of an amplitude modulated signal. An example
`circuit is shown in Section 11.3.
`
`Load modulation with subcarrier Due to the weak coupling between the reader
`antenna and the transponder antenna, the voltage fluctuations at the antenna of the
`reader that represent the useful signal are smaller by orders of magnitude than the
`output voltage of the reader.
`In practice, for a 13.56 MHz system, given an antenna voltage of approximately
`100 V ( voltage step-up by resonance) a useful signal of around 10 m V can be expected
`(=80 dB signal/noise ratio). Because detecting this slight voltage change requires highly
`complicated circuitry, the modulation sidebands created by the amplitude modulation
`of the antenna voltage are utilised (Figure 3.16).
`If the additional load resistor in the transponder is switched on and off at a very high
`elementary frequency fs, then two spectral lines are created at a distance of ±fs around
`the transmission frequency of the reader !READER, and these can be easily detected
`(however fs must be less than !READER) - In the terminology of radio technology the
`new elementary frequency is called a subcarrier) . Data transfer is by ASK, FSK or PSK
`modulation of the subcarrier in time with the data flow. This represents an amplitude
`modulation of the subcarrier.
`Load modulation with a subcarrier creates two modulation sidebands at the
`reader's antenna at the distance of the subcarrier frequency around the operating
`frequency !READER (Figure 3.17). These modulation sidebands can be separated from
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 028
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`4.1 MAGNETIC FIELD
`
`('short-circuited' transponder coil)
`
`,
`ZT(RL -+ oo) =
`
`u}k2 · L1 · L2
`1
`jwL2 + R2 + -.-(cid:173)
`;wC2
`
`97
`
`(4.54)
`
`(unloaded transponder resonant circuit).
`Transponder inductance L2 Let us now investigate the influence of inductance L 2
`on the transformed transponder impedance, whereby the resonant frequency of the
`transponder is again held constant, so that C2 = 1/wfxLz.
`Transformed transponder impedance reaches a clear peak at a given inductance
`value, as a glance at the line diagram shows (Figure 4.36). This behaviour is remi(cid:173)
`niscent of the graph of voltage u 2 = f(L 2 ) (see also Figure 4.15). Here too the peak
`transformed transponder impedance occurs where the Q factor, and thus the current
`i2 in the transponder, is at a maximum (Z~ ~ jwM · i2). Please refer to Section 4.1.7
`for an explanation of the mathematical relationship between load resistance and the
`Q factor.
`
`4. 1. 10.3 Load modulation
`
`Apart from a few other methods (see Chapter 3), so-called load modulation is the most
`common procedure for data transmission from transponder to reader by some margin.
`
`\
`\
`" f\
`' ' i\ '
`
`• i\
`
`"' ' ~ ' '-... r-----
`
`1 X 10-S
`
`1 X 10- 4
`
`\
`
`.........
`
`I
`
`~
`V
`V ,✓---
`~ y
`l/ V
`,
`~ I
`I
`v
`/
`
`35
`
`30
`
`-
`
`25
`
`-
`
`E 20
`..c
`Q_
`,I- 15
`f'--1
`
`'--
`
`-
`
`- -
`
`10
`
`5
`
`0
`
`1 X 10-?
`
`1 X 10- 6
`
`fRES = fTX
`fRES = fTX + 3%
`fRES = fTX - 0.5%
`
`Figure 4.36 The value of Z~ as a function of the transponder inductance L 2 at a constant
`resonant frequency h.Es of the transponder. The maximum value of Z~ coincides with the
`maximum value of the Q factor in the transponder
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 080
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`124
`
`4 PHYSICAL PRINCIPLES OF RFID SYSTEMS
`
`" ~
`
`f'\
`\
`
`4 r--
`
`r-..
`,-....
`1',r-
`
`Cf)
`"(
`L1J
`"(
`Q)
`>
`~
`a5
`er:
`
`3
`
`2
`
`1
`
`..
`
`..
`
`..
`... ...
`
`...
`...
`
`0.1
`
`....
`...
`0
`0.01
`
`I\
`i\
`I\
`[\
`~
`~
`~
`
`... I\ ·· ..
`
`·· . . .
`~
`....... ,-,.._
`
`·• . . ..
`. .. ... ·····
`
`10
`
`. .
`100
`
`Figure 4.65 Graph of the relative effective aperture Ae and the relative scatter aperture a in
`relation to the ratio of the resistances RA and Rr . Where Ry/ RA = 1 the antenna is operated
`using power matching (Ry= Rr)- The case Ry / RA= 0 represents a short-circuit at the terminals
`of the antenna
`
`to calculate the reflected power Ps of an antenna (see Section 4.2.4.1) we need the
`absolute value for As. The effective aperture Ae of an antenna is proportional to its
`gain G (Kraus, 1988; Meinke and Gundlach, 1992). Since the gain is known for most
`antenna designs, the effective aperture Ae, and thus also the scatter aperture As, is
`simple to calculate for the case of matching ( Z A = ZT). The following is true5
`:
`
`A 2
`CY = Ae = __Q_ • G
`4:ir
`
`From equation (4.75) it thus follows that:
`
`A 2
`Pe = Ae · S = __Q_ • G · S
`4:ir
`
`4.2.5.5 Effective length
`
`(4.86)
`
`(4.87)
`
`As we have seen, a voltage Vo is induced in the antenna by an electromagnetic field.
`The voltage Vo is proportional to the electric field strength E of the incoming wave.
`
`5 The derivation of this relationship is not important for the understanding of RFID systems , but can be
`found in Kraus (1988 , chapter 2-22) if required .
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 107
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`138
`
`4 PHYSICAL PRINCIPLES OF RFID SYSTEMS
`
`-·-·-. .......
`-.....
`
`·······
`'·,. ....
`
`······ ····- ·--.
`
`r-..
`' ·,
`
`' ' '.
`
`\
`\
`
`0.8
`
`._
`0
`t5 cu
`
`LL
`
`0 .6
`
`0.4
`
`0.2
`
`0
`1 X 108
`
`Ri= 250
`Ri= 2500
`Ri = 25 k
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`I
`~
`\ I
`I
`'i
`1 · \
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`1 X 109
`Frequency
`
`I
`I
`I
`I
`I
`I
`I
`·•. I
`"J
`1\
`I
`I
`I
`I
`I
`
`·.
`
`·.
`
`·.
`
`·.
`
`.....
`
`............
`
`I
`I
`I
`I
`I
`I r,
`'
`' ·,_1
`"· ....
`I
`I
`I
`II
`
`I
`-:---.1:
`1 1 11
`.. 868 X 106
`2045 X 106
`I "~
`I ·.
`I
`I
`\
`I
`I
`I
`I
`I
`I
`I
`
`I'\
`I\
`'
`\
`I\
`I\
`
`..
`
`·---- -- ,-. ... -
`
`1 X 1010
`
`Figure 4.82 The factor M describes the influence of the parasitic junction capacitance Cj upon
`the output voltage Uchip at different frequencies. As the junction resistance Rj falls, the influence
`of the junction capacitance q also declines markedly. Markers at 868 MHz and 2.45 GHz
`
`the Schottky detector and thus also the junction resistance Rj of the Schottky diode.
`The HF equivalent circuit of a voltage doubler correspondingly consists of the parallel
`connection of two Schottky diodes.
`In order to now achieve the required power matching between the antenna and the
`Schottky detector, the input impedance Zrect of the Schottky detector must be matched
`by means of a circuit for the impedance matching at the antenna impedance ZA. In
`HF technology, discrete components, i.e. L and C, but also line sections of differing
`impedances (line transformation), can be used for this.
`At ideal matching, the voltage sensitivity y2xs (in mV/µ W) of a Schottky detector
`can be simply calculated (Figure 4.83; Hewlett Packard, 963, 1089):
`
`2
`
`y =
`
`0.52
`U s + lb) · (1 + w- 2 Cf RsRj) · ( 1 + :~)
`
`(4.104)
`
`The theoretical maximum of y2 lies at 200mV/µW (868MHz) for a Schottky
`diode of type HSM 2801, and occurs at a total diode cmTent h =ls + h of 0.65 µA .
`The saturation current ls of the selected Schottky diode is, however, as low as 2 µA,
`which means that in theory this voltage sensitivity is completely out of reach even
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 121
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`4.3 SURFACE WAVES
`
`159
`
`changes the magnitude and phase of the reflected HF pulse, which can be detected by
`the reader.
`
`4.3.5 Switched sensors
`
`Surface wave transponders can also be passively recoded (Figure 4.104). As is the
`case for an impedance sensor, a second interdigital transducer is used as a reflector.
`External circuit elements of the interdigital transducer's bus bar make it possible to
`switch between the states 'short-circuited' and 'open'. This significantly changes the
`acoustic transmission and reflection p of the transducer and thus also the magnitude
`and phase of the reflected HF impulse that can be detected by the reader.
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 142
`
`
`
`11
`Rea·ders
`
`11.1 Data Flow in an Application
`
`A software application tliat is designed to read data from a contactless data carrier
`(transponder) or write data to a contactless data carrier, requires a contactless reader
`as an interface. From the point of view of the application software, access to the
`data carrier should be as transparent as possible. In other words, the read and write
`operations should differ as little as possible from the process of accessing comparable
`data carriers (smart card with contacts, serial EEPROM).
`Write and read operations involving a contactless data carrier are performed on
`the basis of the master- slave principle (Figure 11.1). This means that all reader and
`transponder activities are initiated by the application software. In a hierarchical system
`structure the application software represents the master, while the reader, as the slave, is
`only activated when write/read commands are received from the application software.
`To execute a command from the application software, the reader first enters into
`communication with a transponder. The reader now plays the role of the master in
`relation to the transponder. The transponder therefore only responds to commands
`from the reader and is never active independently (except for the simplest read-only
`transponders. See Chapter 10).
`A simple read command from the application software to the reader can initiate a
`series of communication steps between the reader and a transponder. In the example
`in Table 11.1 , a read command first leads to the activation of a transponder, followed
`by the execution of the authentication sequence and finally the transmission of the
`requested data.
`The reader's main functions are therefore to activate the data carrier (transpon(cid:173)
`der), structure the communication sequence with the data carrier, and transfer data
`between the application software and a contactless data carrier. All features of the
`contactless communication, i.e. making the connection, and performing anticollision
`and authentication procedures, are handled entirely by the reader.
`
`11.2 Components of a Reader
`
`A number of contactless transnuss10n procedures have 31-lready been described in
`the preceding chapters. Despite the fundamental differences in the type of coupling
`
`RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. Klaus Finkenzeller
`© 2003 John Wiley & Sons, Ltd
`ISBN: 0-470-84402-7
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 143
`
`
`
`310
`
`11 READERS
`
`Master <~--~) Slave
`C
`d
`omman ~
`
`Application
`
`~
`
`Reader
`
`omman ..
`C
`
`d
`
`~
`
`Trans-
`ponder
`
`~
`
`~
`
`Response
`
`~
`
`~
`
`Response
`Master <~ ----) Slave
`
`t•-------• Data flow-------•l•
`
`Figure 11.1 Master-slave principle between application software (application), reader and
`transponder
`
`Table 11.1 Example of the execution of a read command by the application software, reader
`and transponder
`
`Application B- reader
`
`Reader B- transponder
`
`Comment
`
`--+ Blockread _Address[00]
`
`+--- Data[9876543210]
`
`--+ Request
`+--- ATR_ SNR[4712]
`
`--+ GET _Random
`+--- Random[081514]
`--+ SEND_ Tokenl
`+--- GET_ Token2
`
`--+ Read_ @[00]
`+--- Data[9876543210]
`
`Read transponder memory
`[address]
`Transponder in the field?
`Transponder operates with
`serial number
`Initiate authentication
`
`Authentication successfully
`completed
`Read command [address]
`Data from transponder
`Data to application
`
`electromagnetic), the communication sequence (FDX, HDX, SEQ), the
`(inductive -
`data transmission procedure from the transponder to the