throbber
Page 001
`
`Momentum Dynamics Corporation
`Exhibit 1016
`
`Second Edition
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 001
`
`

`

`

`

`

`

`Contents
`
`PREFACE
`LIST OF ABBREVIATIONS
`
`1
`
`Introduction
`1.1 Automatic Identification Systems
`1.1.1 Barcode systems
`1.1.2 Optical character recognition
`1.1.3 Biometric procedures
`1.1.3.1 Voice identification
`1.1.3.2 Fi ngerpri nti ng procedures ( dactyloscopy)
`1.1.4 Smart cards
`1.1.4.1 Memory cards
`1.1.4.2 Microprocessor cards
`1.1.5 RFID systems
`1.2 A Comparison of Different ID Systems
`1.3 Components of an RFID System
`
`2 Differentiation Features of RFI D Sy stems
`2. 1 Fundamental Differentiation Features
`2.2 Transponder Construction Formats
`2.2.1 Disks and coins
`2.2.2 Glass housing
`2.2.3 Plastic housing
`2.2.4 Tool and gas bottle identification
`2.2.5 Keys and key fobs
`2.2.6 Clocks
`2.2.7
`ID-1 format, contactless smart cards
`2.2.8 Smart label
`2.2.9 Coil-on-chip
`2.2.10 Other formats
`2 .3 Frequency, Range and Coupling
`2.4
`Information Processing in the Transponder
`2.4.1 Low-end systems
`2.4.2 Mid-range systems
`2.4.3 High-end systems
`2.5 Selection Criteria for RFID Systems
`2.5. 1 Operating frequency
`2.5.2 Range
`
`xiii
`xv
`
`1
`2
`2
`3
`4
`4
`4
`5
`5
`6
`6
`7
`7
`
`11
`11
`13
`13
`14
`14
`15
`17
`18
`18
`19
`20
`2 1
`22
`23
`23
`24
`25
`25
`26
`26
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 004
`
`

`

`

`

`CONTENTS
`
`4.1.9
`
`Interrogation field strength Hmin
`4.1.9 .1
`Energy range of transponder systems
`4.1.9.2
`Interrogation zone of readers
`4.1.10 Total transponder -
`reader system
`4.1.10.1 Transformed transponder impedance z' T
`Influencing variables of z' T
`4.1.10.2
`4. 1.10.3 Load modulation
`4.1.11 Measurement of system parameters
`4.1.11.l Measuring the coupling coefficient k
`4.1.11 .2 Measuring the transponder resonant frequency
`4.1.1 2 Magnetic materials
`4.1.1 2.1 Properties of magnetic materials and ferrite
`4.1.1 2.2 Ferrite antennas in LF transponders
`4.1.1 2.3 Ferrite shielding in a metallic environment
`4.1.1 2.4 Fitting transponders in metal
`4.2 Electromagnetic Waves
`4.2.1
`The generation of electromagnetic waves
`4.2. 1.1
`Transition from near field to far field in conductor loops
`Radiation density S
`Characteristic wave impedance and field strength E
`Polarisation of electromagnetic waves
`4.2.4.1
`Reflection of electromagnetic waves
`Antennas
`4.2.5. 1 Gain and directional effect
`4.2.5.2
`EIRP and ERP
`4.2.5.3
`Input impedance
`4.2.5.4
`Effective aperture and scatter aperture
`4.2.5 .5
`Effective length
`4.2.5.6
`Dipole antennas
`4.2.5.7
`Yagi - Udo antenna
`4.2.5.8
`Patch or microstrip antenna
`4.2.5.9
`Slot antennas
`Practical operation of microwave transponders
`4.2.6. 1
`Equivalent circuits of the transponder
`4.2.6.2
`Power supply of passive transponders
`4.2.6.3
`Power supply of active transponders
`4.2.6.4
`Reflection and cancellation
`4.2.6.5
`Sensitivity of the transponder
`4.2.6.6 Modulated backscatter
`4.2.6.7
`Read range
`4 .3 Surface Waves
`4.3. l
`The creation of a surface wave
`4.3.2
`Reflection of a surface wave
`4.3.3
`Functional diagram of SAW transponders (Figure 4 . 95)
`4. 3.4
`The sensor effect
`4.3.4. 1
`Reflective delay lines
`4.3.4.2
`Resonant sensors
`
`4.2.2
`4.2.3
`4.2.4
`
`4.2.5
`
`4.2.6
`
`vii
`
`80
`82
`84
`86
`88
`90
`97
`103
`103
`105
`106
`107
`108
`109
`110
`111
`111
`112
`114
`11 5
`116
`117
`119
`11 9
`120
`121
`12 1
`124
`125
`127
`128
`130
`131
`131
`133
`140
`141
`142
`143
`145
`148
`148
`150
`15 1
`153
`154
`155
`
`l
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 006
`
`

`

`viii
`
`CONTENTS
`
`Impedance sensors
`4.3.4.3
`Switched sensors
`
`4.3.5
`
`5 Frequency Ranges and Radio Licensing Regulations
`5.1 Frequency Ranges Used
`Frequencyrange9-135kHz
`5.1.1
`Frequency range 6.78 MHz
`5.1.2
`Frequency range 13.56 MHz
`5.1.3
`Frequency range 27. 1 25 MHz
`5 .1.4
`Frequencyrange40.680MHz
`5.1.5
`Frequency range 433. 920 MHz
`5 .1.6
`Frequency range 869.0 MHz
`5.1.7
`Frequency range 915.0 MHz
`5.1.8
`Frequency range 2.45 GHz
`5.1.9
`5.1.10 Frequency range 5.8 GHz
`5.1.11 Frequency range 24.125 GHz
`5.1.12 Selection of a suitable frequency for inductively coupled RFID systems
`5.2 European Licensing Regulations
`5.2. 1 CEPT/ERC REC 70-03
`Annex 1 : Non-specific short range devices
`5.2.1.1
`Annex 4: Railway applications
`5.2.1.2
`Annex 5: Road transport and traffic telematics
`5.2.1.3
`5.2.1.4 Annex 9: Inductive applications
`Annex 11 : RFID applications
`5.2.1.5
`Frequency range 868 MHz
`5.2.1.6
`EN 300 330: 9 kHz - 25 MHz
`Carrier power -
`limit values for H field transmitters
`5.2.2.1
`Spurious emissions
`5.2.2.2
`EN 300 220- l , EN 300 220-2
`5.2.3
`EN 300 440
`5.2.4
`5.3 National Licensing Regulations in Europe
`5.3.1 Germany
`5.4 National Licensing Regulations
`USA
`5.4.1
`Future development: USA-Japan-Europe
`5.4.2
`
`5 .2.2
`
`6 Coding and Modulation
`6.1 Coding in the Baseband
`6.2 Digital Modulation Procedures
`Amplitude shift keying (ASK)
`6.2.1
`2 FSK
`6.2.2
`2 PSK
`6.2.3
`6.2.4 Modulation procedures with subcarrier
`
`7 Data Integrity
`7 .1 The Checksum Procedure
`
`157
`159
`
`161
`161
`161
`163
`163
`163
`165
`165
`166
`166
`166
`166
`166
`167
`169
`169
`170
`171
`172
`172
`172
`173
`173
`173
`175
`175
`176
`177
`177
`179
`179
`180
`
`183
`184
`186
`186
`189
`190
`191
`
`195
`195
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 007
`
`

`

`

`

`

`

`CONTENTS
`
`11.2.1 HF interface
`Inductively coupled system, FDX/HDX
`11.2.1.1
`11.2.1.2 Microwave systems - half duplex
`11.2.1.3 Sequential systems - SEQ
`11.2.1.4 Microwave system for SAW transponders
`11.2.2 Control unit
`11 .3 Low Cost Configuration - Reader IC U2270B
`11.4 Connection of Antennas for Inductive Systems
`Connection using current matching
`11.4.1
`Supply via coaxial cable
`11.4.2
`The influence of the Q factor
`11.4.3
`11.5 Reader Designs
`11.5.1
`11.5.2
`11.5.3
`
`OEM readers
`Readers for industrial use
`Portable readers
`
`12 The Manufacture of Transponders and Contactless
`Smart Cards
`12.1 Glass and Plastic Transponders
`12.1.1 Module manufacture
`12.1.2 Semi-finished transponder
`12.1.3 Completion
`12.2 Contactless Smart Cards
`12.2.1 Coil manufacture
`12.2.2 Connection technique
`12.2.3 Lamination
`
`13 Example Applications
`13.1 Contactless Smart Cards
`13.2 Public Transport
`13.2.1 The starting point
`13.2.2 Requirements
`13.2.2.1 Transaction time
`13.2.2.2 Resistance to degradation, lifetime, convenience
`13.2.3 Benefits of RFID systems
`13 .2.4 Fare systems using electronic payment
`13.2.5 Market potential
`13.2.6 Example projects
`13.2.6.1 Korea - seoul
`13.2.6.2 Germany - Luneburg, Oldenburg
`!CARE and CALYPSO
`13.2.6.3 EU Projects -
`13.3 Ticketing
`13.3.1 Lufthansa miles & more card
`13.3.2 Ski tickets
`
`xi
`
`311
`312
`313
`314
`315
`316
`317
`319
`320
`322
`325
`326
`326
`327
`328
`
`329
`329
`329
`330
`332
`332
`333
`336
`338
`
`341
`341
`342
`343
`344
`344
`344
`345
`346
`346
`347
`347
`349
`350
`354
`354
`356
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 010
`
`

`

`xii
`
`CONTENTS
`
`13.4 Access Control
`13.4.1 Online systems
`13.4.2 Offline systems
`13.4.3 Transponders
`13.5 Transport Systems
`Eurobalise S2 l
`13 .5 .1
`International container transport
`13.5.2
`13.6 Animal Identification
`Stock keeping
`13 .6.1
`13.6.2 Carrier pigeon races
`13.7 Electronic Immobilisation
`The functionality of an immobilisation system
`13.7.1
`Brief success story
`13.7.2
`Predictions
`13.7.3
`13.8 Container Identification
`13.8.1 Gas bottles and chemical containers
`13 .8.2 Waste disposal
`13.9 Sporting Events
`13.10 Industrial Automation
`13.10.1 Tool identification
`Industrial production
`13.10.2
`13 .10.2.1 Benefits from the use of RFID systems
`13 .10.2.2 The selection of a suitable RFID system
`13 .10.2.3 Example projects
`13.11 Medical Applications
`
`14 Appendix
`14.1 Contact Addresses, Associations and Technical Periodicals
`Industrial associations
`14.1.1
`Technical journals
`14.1.2
`RFID on the internet
`14.1.3
`14.2 Relevant Standards and Regulations
`Sources for standards and regu lations
`14.2.1
`14.3 References
`14.4 Printed Circuit Board Layouts
`Test card in accordance with ISO 14443
`14.4.1
`Field generator coi l
`14.4.2
`
`INDEX
`
`357
`357
`358
`360
`361
`361
`363
`364
`364
`367
`371
`372
`375
`376
`376
`376
`378
`379
`381
`381
`385
`387
`388
`389
`392
`
`394
`394
`394
`398
`399
`400
`405
`406
`41 2
`412
`413
`
`419
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 011
`
`

`

`3
`Fundamental Operating
`Principles
`
`This chapter describes the basic interaction between transponder and reader, in par(cid:173)
`ticular the power supply to the transponder and the data transfer between transponder
`and reader (Figure 3.1). For a more in-depth description of the physical interactions
`and mathematical models relating to inductive coupling or backscatter systems please
`refer to Chapter 4.
`
`3.1 1-Bit Transponder
`
`A bit is the smallest unit of information that can be represented and has only two states:
`1 and 0. This means that only two states can be represented by systems based upon a
`I-bit transponder: 'transponder in interrogation zone' and 'no transponder in interro(cid:173)
`gation zone'. Despite this limitation, 1-bit transponders are very widespread -
`their
`main field of application is in electronic anti-theft devices in shops (EAS, electronic
`article surveillance).
`An EAS system is made up of the following components: the antenna of a 'reader'
`or interrogator, the security element or tag, and an optional deactivation device for
`deactivating the tag after payment. In modern systems deactivation takes place when the
`price code is registered at the till. Some systems also incorporate an activator, which
`is used to reactivate the security element after deactivation (Gillert, 1997). The main
`performance characteristic for all systems is the recognition or detection rate in relation
`to the gate width (maximum distance between transponder and interrogator antenna).
`The procedure for the inspection and testing of installed article surveillance
`systems is specified in the guideline VD! 4470 entitled
`'Anti-theft systems for
`goods -
`detection gates. Inspection guidelines for customers'. This guideline contains
`definitions and testing procedures for the calculation of the detection rate and false
`alarm ratio. It can be used· by the retail trade as the basis for sales contracts or
`for monitoring the performance of installed systems on an ongoing basis. For the
`product manufacturer, the Inspection Guidelines for Customers represents an effective
`benchmark in the development and optimisation of integrated solutions for security
`projects (in accordance with VDI 4470).
`
`RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. Klaus Finkenzeller
`© 2003 John Wiley & Sons, Ltd
`ISBN: 0-470-84402-7
`-
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 012
`
`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`36
`
`3 FUNDAMENTAL OPERATING PRINCIPLES
`
`Table 3.3 Typical system parameters (Plotzke et al., 1994)
`
`Frequency
`Modulation type:
`Modulation frequency/modulation signal:
`
`130kHz
`100% ASK
`12.5 Hz or 25 Hz, rectangle 50%
`
`The magnetic field of the security device is pulsed at a lower frequency (ASK
`modulated) to improve the detection rate. Similarly to the procedure for the generation
`of harmonics, the modulation of the carrier wave (ASK or FSK) is maintained at half
`the frequency (subhannonic ). This is used to differentiate between 'interference' and
`'useful' signals. This system almost entirely rules out false alarms.
`Frame antennas, described in Section 3.1.1, are used as sensor antennas.
`
`3. 1 .4 Electromagnetic types
`
`Electromagnetic types operate using strong magnetic fields in the NF range from 10 Hz
`to around 20 kHz. The security elements contain a soft magnetic amorphous metal strip
`with a steep flanked hysteresis curve (see also Section 4.1.12). The magnetisation of
`these strips is periodically reversed and the strips taken to magnetic saturation by
`a strong magnetic alternating field. The markedly nonlinear relationship between the
`applied field strength H and the magnetic flux density B near saturation (see also
`Figure 4.50), plus the sudden change of flux density B in the vicinity of the zero
`crossover of the applied field strength H, generates harmonics at the basic frequency
`of the security device, and these harmonics can be received and evaluated by the
`security device.
`The electromagnetic type is optimised by superimposing additional signal sections
`with higher frequencies over the main signal. The marked nonlinearity of the strip's
`hysteresis curve generates not only harmonics but also signal sections with summation
`and differential frequencies of the supplied signals. Given a main signal of frequency
`f s = 20 Hz and the additional signals / 1 = 3. 5 and h = 5. 3 kHz, the following signals
`are generated (first order):
`
`Ji + h = /1+2 = 8.80 kHz
`/1 - h = /1 - 2 = 1.80 kHz
`fs + fr = fs+1 = 3.52kHz and so on
`
`The security device does not react to the harmonic of the basic frequency in this case,
`but rather to the summation or differential frequency of the extra signals.
`The tags are available in the form of self-adhesive strips with lengths ranging from
`a few centimetres to 20 cm. Due to the extremely low operating frequency, electromag(cid:173)
`netic systems are the only systems suitable for products containing metal. However,
`these systems have the disadvantage that the function of the tags is dependent upon
`position: for reliable detection the magnetic field lines of the security device must run
`vertically through the amorphous metal strip. Figure 3.8 shows a typical design for a
`security system.
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 020
`
`

`

`

`

`

`

`

`

`40
`
`3 FUNDAMENTAL OPERATING PRINCIPLES
`
`Table 3.5 Typical operating parameters of acoustomagnetic
`systems (VDI 4471)
`
`Parameter
`Resonant frequency Jo
`Frequency tolerance
`Quality factor Q
`Minimum field strength HA for activation
`ON duration of the field
`Field pause (OFF duration)
`Decay process of the security element
`
`Typical value
`
`58kHz
`±0.52%
`> 150
`> 16000A/m
`2ms
`20ms
`5ms
`
`metal strip so it can no longer be excited by the operating frequency of the security
`system. The hard magnetic metal strip can only be demagnetised by a strong magnetic
`alternating field with a slowly decaying field strength. It is thus absolutely impossible
`for the security element to be manipulated by permanent magnets brought into the
`store by customers.
`
`3.2 Full and Half Duplex Procedure
`
`In contrast to 1-bit transponders, which normally exploit simple physical effects (oscil(cid:173)
`lation stimulation procedures, stimulation of harmonics by diodes or the nonlinear
`hysteresis cm:ve of metals), the transponders described in this and subsequent sections
`use an electronic microchip as the data-carrying device. This has a data storage capac(cid:173)
`ity of up to a few kilobytes. To read from or write to the data-carrying device it
`must be possible to transfer data between the transponder and a reader. This transfer
`takes place according to one of two main procedures: full and half duplex procedures,
`which are described in this section, and sequential systems, which are described in the
`following section.
`In the half duplex procedure (HDX) the data transfer from the transponder to the
`reader alternates with data transfer from the reader to the transponder. At frequencies
`below 30 MHz this is most often used with the load modulation procedure,. either
`with or without a subcarrier, which involves very simple circuitry. Closely related
`to this is the modulated reflected cross-section procedure that is familiar from radar
`technology and is used at frequencies above 100 MHz. Load modulation and modulated
`reflected cross-section procedures directly influence the magnetic or electromagnetic
`field generated by the reader and are therefore known as harmonic procedures.
`In the full duplex procedure (FDX) the data transfer from the transponder to the
`reader takes place at the same time as the data transfer from the reader to the transpon(cid:173)
`der. This includes procedures in which data is transmitted from the transponder at a
`fraction of the frequency of the reader, i.e. a subharmonic, or at a completely inde(cid:173)
`pendent, i.e. an anharmonic, frequency.
`However, both procedures have in common the fact that the transfer of energy
`from the reader to the transponder is continuous, i.e. it is independent of the direction
`of data flow. In sequential systems (SEQ), on the other hand, the transfer of energy
`from the transponder to the reader takes place for a limited period of time only (pulse
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 024
`
`

`

`3.2 FULL AND HALF DUPLEX PROCEDURE
`
`41
`
`Procedure:
`FOX:
`Enerav transfer:
`downlink:
`uplink:
`
`HDX:
`Enerav transfer:
`downlink:
`uplink:
`
`SEQ:
`Enerqy transfer:
`downlink:
`uplink:
`
`I
`
`I
`
`-
`
`I
`
`-
`
`I
`
`I
`
`-
`
`I
`
`I
`
`-
`
`I
`
`I
`
`-
`-
`
`I
`I
`
`-
`-
`
`I
`
`- -
`-
`
`I
`I
`
`■
`
`- - \
`
`-
`
`• -
`
`Figure 3.12 Representation of full duplex, half duplex and sequential systems over time. Data
`transfer from the reader to the transponder is termed downlink, while data transfer from the
`transponder to the reader is termed uplink
`
`operation -+ pulsed system). Data transfer from the transponder to the reader occurs
`in the pauses between the power supply to the transponder. See Figure 3.12 for a
`representation of full duplex, half duplex and sequential systems.
`Unfortunately, the literature relating to RFID has not yet been able to agree a con(cid:173)
`sistent nomenclature for these system variants. Rather, there has been a confusing and
`inconsistent classification of individual systems into full and half duplex procedures.
`this is correct from the
`Thus pulsed systems are often termed half duplex systems -
`and all unpulsed systems are falsely classified as
`point of view of data transfer -
`full duplex systems. For this reason, in this book pulsed systems -
`for differentiation
`from other procedures, and unlike most RFID literature(!) -
`are termed sequential
`systems (SEQ).
`
`3.2. 1
`
`Inductive coupling
`
`3.2. 1. 1 Power supply to passive transponders
`
`An inductively coupled transponder comprises an electronic data-carrying device, usu(cid:173)
`ally a single microchip, and a large area coil that functions as an antenna.
`Inductively coupled transponders are almost always operated passively. This means
`that all the energy needed for the operation of the microchip has to be provided by
`the reader (Figure 3.13). For this purpose, the reader's antenna coil generates a strong,
`high frequency electromagnetic field, which penetrates the cross-section of the coil
`area and the area around the coil. Because the wavelength of the frequency range used
`( < 135 kHz: 2400 m, 13.56 MHz: 22.1 m) is several times greater than the distance
`between the reader's antenna and the transponder, the electromagnetic field may be
`treated as a simple magnetic alternating field with regard to the distance between
`transponder and antenna (see Section 4.2.1.1 for further details).
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 025
`
`

`

`

`

`

`

`44
`
`3 FUNDAMENTAL OPERATING PRINCIPLES
`
`Table 3.6 Overview of the power consumption of various RFID-ASIC building blocks (Atmel ,
`1994). The minimum supply voltage required for the operation of the microchip is 1.8 V, the
`maximum permissible voltage is 10 V
`
`Memory Write/read
`(Bytes)
`distance
`
`Power
`consumption
`
`Frequency
`
`Application
`
`ASIC#l
`ASIC#2
`ASIC#3
`ASIC#4
`ASIC#5
`ASIC#6
`ASIC#7
`ASIC#8
`ASIC#9
`ASIC#l0
`
`6
`32
`256
`256
`256
`256
`2048
`1024
`8
`128
`
`*Close coupling system.
`
`15cm
`13cm
`2cm
`0.5cm
`<2cm
`100cm
`0.3cm
`10cm
`100cm
`100cm
`
`l0µA
`120kHz Animal ID
`600 p,A
`120kHz Goods flow, access check
`6µA
`128kHz Public transport
`4MHz* Goods flow, public transport
`< lmA
`~ lmA 4113.56MHz Goods flow
`500µA
`125kHz Access check
`4.91MHz* Contactless chip cards
`< lOmA
`~lmA
`13.56MHz Public transport
`125kHz Goods flow
`< lmA
`125kHz Access check
`< lmA
`
`represented as transformed impedance ZT in the antenna coil of the reader. Switching
`a load resistor on and off at the transponder's antenna therefore brings about a
`change in the impedance ZT, and thus voltage changes at the reader's antenna (see
`Section 4.1.10.3). This has the effect of an amplitude modulation of the voltage UL at
`the reader's antenna coil by the remote transponder. If the timing with which the load
`resistor is switched on and off is controlled by data, this data can be transferred from
`the transponder to the reader. This type of data transfer is called load modulation.
`To reclaim the data at the reader, the voltage tapped at the reader's antenna is recti(cid:173)
`fied. This represents the demodulation of an amplitude modulated signal. An example
`circuit is shown in Section 11.3.
`
`Load modulation with subcarrier Due to the weak coupling between the reader
`antenna and the transponder antenna, the voltage fluctuations at the antenna of the
`reader that represent the useful signal are smaller by orders of magnitude than the
`output voltage of the reader.
`In practice, for a 13.56 MHz system, given an antenna voltage of approximately
`100 V ( voltage step-up by resonance) a useful signal of around 10 m V can be expected
`(=80 dB signal/noise ratio). Because detecting this slight voltage change requires highly
`complicated circuitry, the modulation sidebands created by the amplitude modulation
`of the antenna voltage are utilised (Figure 3.16).
`If the additional load resistor in the transponder is switched on and off at a very high
`elementary frequency fs, then two spectral lines are created at a distance of ±fs around
`the transmission frequency of the reader !READER, and these can be easily detected
`(however fs must be less than !READER) - In the terminology of radio technology the
`new elementary frequency is called a subcarrier) . Data transfer is by ASK, FSK or PSK
`modulation of the subcarrier in time with the data flow. This represents an amplitude
`modulation of the subcarrier.
`Load modulation with a subcarrier creates two modulation sidebands at the
`reader's antenna at the distance of the subcarrier frequency around the operating
`frequency !READER (Figure 3.17). These modulation sidebands can be separated from
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 028
`
`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`4.1 MAGNETIC FIELD
`
`('short-circuited' transponder coil)
`
`,
`ZT(RL -+ oo) =
`
`u}k2 · L1 · L2
`1
`jwL2 + R2 + -.-(cid:173)
`;wC2
`
`97
`
`(4.54)
`
`(unloaded transponder resonant circuit).
`Transponder inductance L2 Let us now investigate the influence of inductance L 2
`on the transformed transponder impedance, whereby the resonant frequency of the
`transponder is again held constant, so that C2 = 1/wfxLz.
`Transformed transponder impedance reaches a clear peak at a given inductance
`value, as a glance at the line diagram shows (Figure 4.36). This behaviour is remi(cid:173)
`niscent of the graph of voltage u 2 = f(L 2 ) (see also Figure 4.15). Here too the peak
`transformed transponder impedance occurs where the Q factor, and thus the current
`i2 in the transponder, is at a maximum (Z~ ~ jwM · i2). Please refer to Section 4.1.7
`for an explanation of the mathematical relationship between load resistance and the
`Q factor.
`
`4. 1. 10.3 Load modulation
`
`Apart from a few other methods (see Chapter 3), so-called load modulation is the most
`common procedure for data transmission from transponder to reader by some margin.
`
`\
`\
`" f\
`' ' i\ '
`
`• i\
`
`"' ' ~ ' '-... r-----
`
`1 X 10-S
`
`1 X 10- 4
`
`\
`
`.........
`
`I
`
`~
`V
`V ,✓---
`~ y
`l/ V
`,
`~ I
`I
`v
`/
`
`35
`
`30
`
`-
`
`25
`
`-
`
`E 20
`..c
`Q_
`,I- 15
`f'--1
`
`'--
`
`-
`
`- -
`
`10
`
`5
`
`0
`
`1 X 10-?
`
`1 X 10- 6
`
`fRES = fTX
`fRES = fTX + 3%
`fRES = fTX - 0.5%
`
`Figure 4.36 The value of Z~ as a function of the transponder inductance L 2 at a constant
`resonant frequency h.Es of the transponder. The maximum value of Z~ coincides with the
`maximum value of the Q factor in the transponder
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 080
`
`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`124
`
`4 PHYSICAL PRINCIPLES OF RFID SYSTEMS
`
`" ~
`
`f'\
`\
`
`4 r--
`
`r-..
`,-....
`1',r-
`
`Cf)
`"(
`L1J
`"(
`Q)
`>
`~
`a5
`er:
`
`3
`
`2
`
`1
`
`..
`
`..
`
`..
`... ...
`
`...
`...
`
`0.1
`
`....
`...
`0
`0.01
`
`I\
`i\
`I\
`[\
`~
`~
`~
`
`... I\ ·· ..
`
`·· . . .
`~
`....... ,-,.._
`
`·• . . ..
`. .. ... ·····
`
`10
`
`. .
`100
`
`Figure 4.65 Graph of the relative effective aperture Ae and the relative scatter aperture a in
`relation to the ratio of the resistances RA and Rr . Where Ry/ RA = 1 the antenna is operated
`using power matching (Ry= Rr)- The case Ry / RA= 0 represents a short-circuit at the terminals
`of the antenna
`
`to calculate the reflected power Ps of an antenna (see Section 4.2.4.1) we need the
`absolute value for As. The effective aperture Ae of an antenna is proportional to its
`gain G (Kraus, 1988; Meinke and Gundlach, 1992). Since the gain is known for most
`antenna designs, the effective aperture Ae, and thus also the scatter aperture As, is
`simple to calculate for the case of matching ( Z A = ZT). The following is true5
`:
`
`A 2
`CY = Ae = __Q_ • G
`4:ir
`
`From equation (4.75) it thus follows that:
`
`A 2
`Pe = Ae · S = __Q_ • G · S
`4:ir
`
`4.2.5.5 Effective length
`
`(4.86)
`
`(4.87)
`
`As we have seen, a voltage Vo is induced in the antenna by an electromagnetic field.
`The voltage Vo is proportional to the electric field strength E of the incoming wave.
`
`5 The derivation of this relationship is not important for the understanding of RFID systems , but can be
`found in Kraus (1988 , chapter 2-22) if required .
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 107
`
`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`138
`
`4 PHYSICAL PRINCIPLES OF RFID SYSTEMS
`
`-·-·-. .......
`-.....
`
`·······
`'·,. ....
`
`······ ····- ·--.
`
`r-..
`' ·,
`
`' ' '.
`
`\
`\
`
`0.8
`
`._
`0
`t5 cu
`
`LL
`
`0 .6
`
`0.4
`
`0.2
`
`0
`1 X 108
`
`Ri= 250
`Ri= 2500
`Ri = 25 k
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`\
`
`I
`~
`\ I
`I
`'i
`1 · \
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`1 X 109
`Frequency
`
`I
`I
`I
`I
`I
`I
`I
`·•. I
`"J
`1\
`I
`I
`I
`I
`I
`
`·.
`
`·.
`
`·.
`
`·.
`
`.....
`
`............
`
`I
`I
`I
`I
`I
`I r,
`'
`' ·,_1
`"· ....
`I
`I
`I
`II
`
`I
`-:---.1:
`1 1 11
`.. 868 X 106
`2045 X 106
`I "~
`I ·.
`I
`I
`\
`I
`I
`I
`I
`I
`I
`I
`
`I'\
`I\
`'
`\
`I\
`I\
`
`..
`
`·---- -- ,-. ... -
`
`1 X 1010
`
`Figure 4.82 The factor M describes the influence of the parasitic junction capacitance Cj upon
`the output voltage Uchip at different frequencies. As the junction resistance Rj falls, the influence
`of the junction capacitance q also declines markedly. Markers at 868 MHz and 2.45 GHz
`
`the Schottky detector and thus also the junction resistance Rj of the Schottky diode.
`The HF equivalent circuit of a voltage doubler correspondingly consists of the parallel
`connection of two Schottky diodes.
`In order to now achieve the required power matching between the antenna and the
`Schottky detector, the input impedance Zrect of the Schottky detector must be matched
`by means of a circuit for the impedance matching at the antenna impedance ZA. In
`HF technology, discrete components, i.e. L and C, but also line sections of differing
`impedances (line transformation), can be used for this.
`At ideal matching, the voltage sensitivity y2xs (in mV/µ W) of a Schottky detector
`can be simply calculated (Figure 4.83; Hewlett Packard, 963, 1089):
`
`2
`
`y =
`
`0.52
`U s + lb) · (1 + w- 2 Cf RsRj) · ( 1 + :~)
`
`(4.104)
`
`The theoretical maximum of y2 lies at 200mV/µW (868MHz) for a Schottky
`diode of type HSM 2801, and occurs at a total diode cmTent h =ls + h of 0.65 µA .
`The saturation current ls of the selected Schottky diode is, however, as low as 2 µA,
`which means that in theory this voltage sensitivity is completely out of reach even
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 121
`
`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`

`4.3 SURFACE WAVES
`
`159
`
`changes the magnitude and phase of the reflected HF pulse, which can be detected by
`the reader.
`
`4.3.5 Switched sensors
`
`Surface wave transponders can also be passively recoded (Figure 4.104). As is the
`case for an impedance sensor, a second interdigital transducer is used as a reflector.
`External circuit elements of the interdigital transducer's bus bar make it possible to
`switch between the states 'short-circuited' and 'open'. This significantly changes the
`acoustic transmission and reflection p of the transducer and thus also the magnitude
`and phase of the reflected HF impulse that can be detected by the reader.
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 142
`
`

`

`11
`Rea·ders
`
`11.1 Data Flow in an Application
`
`A software application tliat is designed to read data from a contactless data carrier
`(transponder) or write data to a contactless data carrier, requires a contactless reader
`as an interface. From the point of view of the application software, access to the
`data carrier should be as transparent as possible. In other words, the read and write
`operations should differ as little as possible from the process of accessing comparable
`data carriers (smart card with contacts, serial EEPROM).
`Write and read operations involving a contactless data carrier are performed on
`the basis of the master- slave principle (Figure 11.1). This means that all reader and
`transponder activities are initiated by the application software. In a hierarchical system
`structure the application software represents the master, while the reader, as the slave, is
`only activated when write/read commands are received from the application software.
`To execute a command from the application software, the reader first enters into
`communication with a transponder. The reader now plays the role of the master in
`relation to the transponder. The transponder therefore only responds to commands
`from the reader and is never active independently (except for the simplest read-only
`transponders. See Chapter 10).
`A simple read command from the application software to the reader can initiate a
`series of communication steps between the reader and a transponder. In the example
`in Table 11.1 , a read command first leads to the activation of a transponder, followed
`by the execution of the authentication sequence and finally the transmission of the
`requested data.
`The reader's main functions are therefore to activate the data carrier (transpon(cid:173)
`der), structure the communication sequence with the data carrier, and transfer data
`between the application software and a contactless data carrier. All features of the
`contactless communication, i.e. making the connection, and performing anticollision
`and authentication procedures, are handled entirely by the reader.
`
`11.2 Components of a Reader
`
`A number of contactless transnuss10n procedures have 31-lready been described in
`the preceding chapters. Despite the fundamental differences in the type of coupling
`
`RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. Klaus Finkenzeller
`© 2003 John Wiley & Sons, Ltd
`ISBN: 0-470-84402-7
`
`Momentum Dynamics Corporation
`Exhibit 1016
`Page 143
`
`

`

`310
`
`11 READERS
`
`Master <~--~) Slave
`C
`d
`omman ~
`
`Application
`
`~
`
`Reader
`
`omman ..
`C
`
`d
`
`~
`
`Trans-
`ponder
`
`~
`
`~
`
`Response
`
`~
`
`~
`
`Response
`Master <~ ----) Slave
`
`t•-------• Data flow-------•l•
`
`Figure 11.1 Master-slave principle between application software (application), reader and
`transponder
`
`Table 11.1 Example of the execution of a read command by the application software, reader
`and transponder
`
`Application B- reader
`
`Reader B- transponder
`
`Comment
`
`--+ Blockread _Address[00]
`
`+--- Data[9876543210]
`
`--+ Request
`+--- ATR_ SNR[4712]
`
`--+ GET _Random
`+--- Random[081514]
`--+ SEND_ Tokenl
`+--- GET_ Token2
`
`--+ Read_ @[00]
`+--- Data[9876543210]
`
`Read transponder memory
`[address]
`Transponder in the field?
`Transponder operates with
`serial number
`Initiate authentication
`
`Authentication successfully
`completed
`Read command [address]
`Data from transponder
`Data to application
`
`electromagnetic), the communication sequence (FDX, HDX, SEQ), the
`(inductive -
`data transmission procedure from the transponder to the

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket