throbber
SAMSUNG 1009
`
`ry Fundamentals and Applications in Contactless
`Si RISee eterTim ie nee ere
`Sy
`
`qi
`
`,
`
`i
`
`1
`
`:
`
`KLAUS FINKENZELLER
`
`memhe
`
`| I
`
`s|
`
`: i
`
`n
`|.
`
`H
`
`1
`
`SAMSUNG 1009
`
`

`

`RFID
`Handbook
`
`Fundamentals and Applications in Contactless Smart
`Cards and Identification
`
`Second Edition
`
`Klaus Finkenzeller
`Giesecke & Devrient GmbH, Munich, Germany
`
`Translated by
`Rachel Waddington
`Member of the Institute of Translation and Interpreting
`
`~ WILEY
`
`2
`
`

`

`First published under the title RF/D-Handbuch, 2 Aufiage by Carl Hanser Verlag
`© Carl Hanser Verlag, Munich/FRG, 1999 All rights reserved
`Authorized translation from the 2nd edition in the original German language
`published by Carl Hanser Verlag, Munich/FRG
`
`Copyright © 2003
`
`John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester,
`West Sussex POI9 8SQ, England
`
`Telephone (+44) 1243 779777
`
`Email (for orders and customer service enquiries): cs-books@wiley.co.uk
`Visit our Home Page on www.wileyeurope.com or www.wiley.com
`
`Reprinted September 2003, March 2004
`
`All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or
`transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or
`otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a
`licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London WIT 4LP,
`UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to
`the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West
`Sussex PO19 8SQ, England, or emailed to permreq@wiley.co.uk, or faxed to (+44) 1243 770620.
`
`This publication is designed to provide accurate and authoritative information in regard to the subject
`matter covered. It is sold on the understanding that the Publisher is not engaged in rendering professional
`services. If professional advice or other expert assistance is required, the services of a competent
`professional should be sought.
`
`Other Wiley Editorial Offices
`
`John Wiley & Sons Inc., 111 River Street, Hoboken, NJ 07030, USA
`
`Jossey-Bass, 989 Market Street, San Francisco, CA 94103-1741, USA
`
`Wiley-VCH Verlag GmbH, Boschstr. 12, D-69469 Weinheim, Germany
`
`John Wiley & Sons Australia Ltd, 33 Park Road, Milton, Queensland 4064, Australia
`
`John Wiley & Sons (Asia) Pie Ltd, 2 Clementi Loop #02-01, Jin Xing Distripark, Singapore 129809
`
`John Wiley & Sons Canada Ltd, 22 Worcester Road, Etobicoke, Ontario, Canada M9W ILi
`
`Wiley also publishes its books in a variety of electronic formats. Some content that appears
`in print may not be available in electronic books.
`
`Library of Congress Cataloging-in-Publication Data
`
`Finkenzeller, Klaus.
`[RFID Handbuch. English)
`RFID handbook : fundamentals and applications in contactless smart cards and
`identifcation/Klaus Finkenzeller; translated by Rachel Waddington. -
`2nd ed.
`p. cm.
`Includes bibliographical references and index.
`ISBN 0-470-84402-7 (alk. paper)
`1. Inventory control - Automation. 2. Radio frequency identification systems. 3. Smart.
`cards.
`I. Title.
`
`TS160.F5513 2003
`658.7'87 -
`dc21
`
`2002192439
`
`British Library Cataloguing in Publication Data
`
`A catalogue record for this book is available from the British Library
`
`ISBN 0-470-84402-7
`
`Typeset in 10/12pt Times by Laserwords Private Limited, Chennai, India
`Printed and bound in Great Britain by Antony Rowe Ltd, Chippenham, Wiltshire
`This book is printed on acid-free paper responsibly manufactured from sustainable forestry
`in which at least two trees are planted for each one used for paper production.
`
`3
`
`

`

`Verlag
`
`ie
`
`Gate, Chichester,
`
`in a retrieval system or
`ying, recording, scanning or
`: t 1988 or under the terms of a
`t Road, London WIT 4LP,
`blisher should be addressed to
`11 Gate, Chichester, West
`to ( +44) 1243 770620.
`
`on in regard to the subject
`;aged in rendering professional
`rvices of a competent
`
`Australia
`
`ripark, Singapore 129809
`
`anada M9W ILi
`
`:ent that appears
`
`rds and
`I ed.
`
`ystems. 3. Smart.
`
`2002192439
`
`shire
`unable forestry
`,n.
`
`Contents
`
`PREFACE
`UST OF ABBREVIATIONS
`
`1
`
`Introduction
`1.1 Automatic Identification Systems
`1. 1.1 Barcode systems
`1.1.2 Optical character recognition
`1.1.3 Biometric procedures
`1.1.3.1 Voice identification
`1.1.3.2 Fingerprinting procedures (dactyloscopy)
`1.1.4 Smart cards
`1.1.4.l Memory cards
`1.1.4.2 Microprocessor cards
`1.1.5 RFID systems
`1.2 A Comparison of Different ID Systems
`1.3 Components of an RFID System
`
`2 Differentiation Features of RFID Systems
`2.1 Fundamental Differentiation Features
`2.2 Transponder Construction Formats
`2.2.1 Disks and coins
`2.2.2 Glass housing
`2.2.3 Plastic housing
`2.2.4 Tool and gas bottle identification
`2.2.5 Keys and key fobs
`2.2.6 Clocks
`ID-1 format, contactless smart cards
`2.2.7
`2.2.8 Smart label
`2.2.9 Coil-on-chip
`2.2.10 Other formats
`2.3 Frequency, Range and Coupling
`Information Processing in the Transponder
`2.4
`2.4.1 Low-end systems
`2.4.2 Mid-range systems
`2.4.3 High-end systems
`2.5 Selection Criteria for RFID Systems
`2.5.1 Operating frequency
`2.5.2 Range
`
`xiii
`xv
`
`1
`2
`2
`3
`4
`4
`4
`5
`5
`6
`6
`7
`7
`
`11
`II
`13
`13
`14
`14
`15
`17
`18
`18
`19
`20
`21
`22
`23
`23
`24
`25
`25
`26
`26
`
`4
`
`

`

`vi
`
`CONTENTS
`
`2.5.3 Security requirements
`2.5.4 Memory capacity
`
`3 Fundamental Operating Principles
`3.1
`1-Bit Transponder
`3.1.1 Radio frequency
`3.1.2 Microwaves
`3.1.3 Frequency divider
`3.1.4 Electromagnetic types
`3 .1.5 Acoustomagnetic
`3.2 Full and Half Duplex Procedure
`3.2.1
`Inductive coupling
`3.2.1.1 Power supply to passive transponders
`3.2.1.2 Data transfer transponder (cid:157)
`reader
`3.2.2 Electromagnetic backscatter coupling
`3.2.2.1 Power supply to the transponder
`3.2.2.2 Data transmission (cid:157)
`reader
`3.2.3 Close coupling
`3.2.3.1 Power supply to the transponder
`3.2.3.2 Data transfer transponder (cid:157)
`reader
`3.2.4 Electrical coupling
`3.2.4.1 Power supply of passive transponders
`3.2.4.2 Data transfer transponder (cid:157)
`reader
`3.2.5 Data transfer reader (cid:157)
`transponder
`3.3 Sequential Procedures
`3.3.1
`Inductive coupling
`3.3.1.1 Power supply to the transponder
`3.3.1.2 A comparison between FDX/HDX and SEQ systems
`3.3.1.3 Data transmission transponder (cid:157)
`reader
`3.3.2 Surface acoustic wave transponder
`
`4 Physical Principles of RFID Systems
`4.1 Magnetic Field
`4.1.1 Magnetic field strength H
`4.1.1.1 Path offield strength H(x) in conductor loops
`4.1.1.2 Optimal antenna diameter
`4.1.2 Magnetic flux and magnetic flux density
`Inductance L
`4.1.3
`4.1.3.1
`Inductance of a conductor loop
`4.1.4 Mutual inductance M
`4.1.5 Coupling coefficient k
`4.1.6 Faraday's law
`4.1.7 Resonance
`4.1.8 Practical operation of the transponder
`4.1.8.1 Power supply to the transponder
`4.1.8.2 Voltage regulation
`
`27
`28
`
`29
`29
`30
`33
`35
`36
`37
`40
`41
`41
`42
`47
`47
`49
`49
`49
`50
`51
`51
`53
`53
`54
`54
`54
`54
`56
`57
`
`61
`61
`61
`62
`65
`66
`67
`68
`68
`70
`71
`73
`78
`78
`78
`
`5
`
`

`

`CONTENTS
`
`CONTENTS
`
`27
`28
`
`29
`29
`30
`33
`35
`36
`37
`40
`41
`41
`42
`47
`47
`49
`49
`49
`50
`51
`51
`53
`53
`54
`54
`54
`54
`56
`57
`
`61
`61
`61
`62
`65
`66
`67
`68
`68
`70
`71
`73
`78
`78
`78
`
`systems
`
`>ps
`
`4.1.9
`
`Interrogation field strength Hmin
`Energy range of transponder systems
`4.1.9.1
`Interrogation zone of readers
`4.1.9.2
`4.1.10 Total transponder -
`reader system
`4.1.10.1 Transformed transponder impedance z' T
`Influencing variables of z'T
`4.1.10.2
`4.1.10.3 Load modulation
`4.1.11 Measurement of system parameters
`4.1.11.1 Measuring the coupling coefficient k
`4.1.11.2 Measuring the transponder resonant frequency
`4.1.12 Magnetic materials
`4.1.12.1 Properties of magnetic materials and ferrite
`4.1.12.2 Ferrite antennas in LF transponders
`4.1.12.3 Ferrite shielding in a metallic environment
`4.1.12.4 Fitting transponders in metal
`4.2 Electromagnetic Waves
`The generation of electromagnetic waves
`4.2.1
`Transition from near field to far field in conductor loops
`4.2.1.l
`4.2.2 Radiation density S
`Characteristic wave impedance and field strength E
`4.2.3
`4.2.4
`Polarisation of electromagnetic waves
`Reflection of electromagnetic waves
`4.2.4.1
`4.2.5 Antennas
`4.2.5.1 Gain and directional effect
`4.2.5 .2
`EIRP and ERP
`4.2.5.3
`Input impedance
`Effective aperture and scatter aperture
`4.2.5.4
`Effective length
`4.2.5 .5
`4.2.5 .6 Dipole antennas
`4.2.5.7 Yagi-Uda antenna
`Patch or microstrip antenna
`4.2.5.8
`4.2.5.9
`Slot antennas
`Practical operation of microwave transponders
`Equivalent circuits of the transponder
`4.2.6.1
`Power supply of passive transponders
`4.2.6.2
`4.2.6.3
`Power supply of active transponders
`4.2.6.4 Reflection and cancellation
`Sensitivity of the transponder
`4.2.6.5
`4.2.6.6 Modulated backscatter
`4.2.6.7 Read range
`4.3 Surface Waves
`The creation of a surface wave
`4.3.1
`4.3.2 Reflection of a surface wave
`4.3.3
`Functional diagram of SAW transponders (Figure 4 . 95)
`4.3.4
`The sensor effect
`Reflective delay lines
`4.3.4.1
`4.3.4.2 Resonant sensors
`
`4.2.6
`
`vii
`
`80
`82
`84
`86
`88
`90
`97
`103
`103
`l05
`106
`107
`108
`109
`110
`111
`111
`112
`114
`115
`116
`117
`119
`119
`120
`121
`121
`124
`125
`127
`128
`130
`131
`131
`133
`140
`141
`142
`143
`145
`148
`148
`150
`151
`153
`154
`155
`
`6
`
`

`

`viii
`
`CONTENTS
`
`Impedance sensors
`4.3.4.3
`Switched sensors
`
`4.3.5
`
`5 Frequency Ranges and Radio Licensing Regulations
`5.1 Frequency Ranges Used
`Frequency range 9-135 kHz
`5.1.1
`Frequency range 6.78MHz
`5.1.2
`Frequency range 13.56 MHz
`5.1.3
`Frequency range 27.125 MHz
`5.1.4
`Frequency range 40.680MHz
`5.1.5
`Frequency range 433.920 MHz
`5.1.6
`Frequency range 869.0MHz
`5.1.7
`Frequency range 915.0 MHz
`5.1.8
`Frequency range 2.45 GHz
`5.1.9
`5.1.10 Frequency range 5.8 GHz
`5.l.11 Frequency range 24.125 GHz
`5.1.12 Selection of a suitable frequency for inductively coupled RFID systems
`5.2 European Licensing Regulations
`CEPT/ERC REC 70-03
`5.2.1
`5.2.1.1 Annex 1: Non-specific short range devices
`5.2.1.2 Annex 4 : Railway applications
`5.2.1.3 Annex 5: Road transport and traffic telematics
`5.2.1.4 Annex 9: Inductive applications
`5.2.1.5 Annex 11: RFID applications
`Frequency range 868 MHz
`5.2.1.6
`EN 300 330: 9 kHz-25 MHz
`Carrier power -
`limit values for H field transmitters
`5.2.2.1
`Spurious emissions
`5.2.2.2
`EN 300 220-1, EN 300 220-2
`5.2.3
`EN 300 440
`5.2.4
`5.3 National Licensing Regulations in Europe
`5.3 .1 Germany
`5.4 National Licensing Regulations
`USA
`5.4.1
`Future development: USA-Japan-Europe
`5.4.2
`
`5.2.2
`
`6 Coding and Modulation
`6.1 Coding in the Baseband
`6.2 Digital Modulation Procedures
`6.2. I Amplitude shift keying (ASK)
`2 FSK
`6.2.2
`2 PSK
`6.2.3
`6.2.4 Modulation procedures with subcarrier
`
`7 Data Integrity
`7.1 The Checksum Procedure
`
`157
`159
`
`161
`161
`161
`163
`163
`163
`165
`165
`166
`166
`166
`166
`166
`167
`169
`169
`170
`171
`172
`172
`172
`173
`173
`173
`175
`175
`176
`177
`177
`179
`179
`180
`
`183
`184
`186
`186
`189
`190
`191
`
`195
`195
`
`7
`
`

`

`CONTENTS
`
`CONTENTS
`
`7.1.1
`Parity checking
`7.1.2
`LRC procedure
`7.1.3
`CRC procedure
`7.2 Multi-Access Procedures - Anticollision
`7.2.1
`Space division multiple access (SDMA)
`7.2.2
`Frequency domain multiple access (FDMA)
`7.2.3
`Time domain multiple access (TDMA)
`7.2.4
`Examples of anticollision procedures
`7.2.4.l ALOHA procedure
`7.2.4.2
`Slotted ALOHA procedure
`7.2.4.3
`Binary search algorithm
`
`8 Data Security
`8.1 Mutual Symmetrical Authentication
`8.2 Authentication Using Derived Keys
`8.3 Encrypted Data Transfer
`8.3.l
`Stream cipher
`
`9
`
`:itions
`
`,pied RFID systems
`
`as
`
`,atics
`
`ransmitters
`
`157
`159
`
`161
`161
`161
`163
`163
`163
`165
`165
`166
`166
`166
`166
`166
`167
`169
`169
`170
`171
`172
`172
`172
`173
`173
`173
`175
`175
`176
`177
`177
`179
`179
`180
`
`183
`184
`186
`186
`189
`190
`191
`
`195
`195
`
`9.1.3
`
`9.2.2
`
`Standardisation
`9.1 Animal Identification
`9.1.1
`ISO 11784 - Code structure
`9.1.2
`ISO 11785 - Technical concept
`9.1.2.1
`Requirements
`9.1.2.2
`Full/half duplex system
`9.1.2.3
`Sequential system
`ISO 14223 - Advanced transponders
`9.1.3.1
`Part 1 - Air interface
`9.1.3.2
`Part 2 - Code and command structure
`9.2 Contactless Smart Cards
`9.2.1
`ISO 10536 - Close coupling smart cards
`9.2.1.1
`Part 1 - Physical characteristics
`9.2.1.2
`Part 2 - Dimensions and locations of coupling areas
`9.2.1.3
`Part 3 - Electronic signals and reset procedures
`9.2.1.4
`Part 4 - Answer to reset and transmission protocols
`ISO 14443 - Proximity coupling smart cards
`9.2.2.1
`Part 1 - Physical characteristics
`9.2.2.2
`Part 2 - Radio frequency interference
`9.2.2.3
`Part 3 -
`Initialisation and anticollision
`9.2.2.4
`Part 4 - Transmission protocols
`ISO 15693 - Vicinity coupling smart cards
`9.2.3.1
`Part 1 - Physical characteristics
`9.2.3.2
`Part 2 - Air interface and initialisation
`ISO 1 0373 - Test methods for smart cards
`9.2.4.1
`Part 4: Test procedures for dose coupling smart cards
`9.2.4.2
`Part 6: Test procedures for proximity coupling smart cards
`9.2.4.3
`Part 7 : Test procedure for vicinity coupling smart cards
`
`9.2.3
`
`9.2.4
`
`ix
`
`195
`196
`197
`200
`202
`204
`205
`206
`206
`208
`212
`
`221
`221
`223
`224
`225
`
`229
`229
`229
`230
`230
`232
`232
`233
`233
`234
`236
`237
`238
`238
`238
`239
`240
`240
`240
`245
`251
`256
`256
`256
`260
`261
`261
`264
`
`8
`
`

`

`x
`
`CONTENTS
`
`ISO 69873 - Data Carriers for Tools and Clamping Devices
`9.3
`ISO 1037 4 - Container Identification
`9.4
`9.5 VDI 4470 - Anti-theft Systems for Goods
`Part 1 - Detection gates -
`inspection guidelines for customers
`9.5.1
`9.5.1.1 Ascertaining the false alarm rate
`9.5 .1.2 Ascertaining the detection rate
`Forms in VDI 4470
`9.5.1.3
`Part 2 - Deactivation devices, inspection guidelines for customers
`9.5.2
`Item Management
`ISO 18000 series
`9.6.1
`9.6.2 GTAG initiative
`9.6.2.1 GTAG transport layer (physical layer}
`9.6.2.2 GTAG communication and application layer
`
`9.6
`
`10 The Architecture of Electronic Data Carriers
`10.1 Transponder with Memory Function
`10.l.l HF interface
`load modulation with subcarrier
`10.1.l.l Example circuit -
`10.l. l.2 Example circuit - HF interface for ISO 14443 transponder
`10.1.2 Address and security logic
`10.1.2.1 State machine
`10.1.3 Memory architecture
`10.1.3.1 Read-only transponder
`10.1.3.2 Writable transponder
`10.1.3.3 Transponder with cryptological function
`10.1.3.4 Segmented memory
`10.1.3.5 MIFARE® application directory
`10.1.3.6 Dual port EEPROM
`10.2 Microprocessors
`10.2.l Dual interface card
`10.2.1.1 MIFARE® plus
`10.2.1.2 Modern concepts for the dual interface card
`10.3 Memory Technology
`10.3.1 RAM
`10.3.2 EEPROM
`10.3.3 FRAM
`10.3.4 Performance comparison FRAM - EEPROM
`10.4 Measuring Physical Variables
`10.4.1 Transponder with sensor functions
`10.4.2 Measurements using microwave transponders
`I 0.4.3 Sensor effect in surface wave transponders
`
`11 Readers
`11.1 Data Flow in an Application
`11.2 Components of a Reader
`
`265
`265
`265
`265
`266
`267
`267
`268
`268
`268
`269
`270
`271
`
`273
`273
`273
`274
`276
`278
`279
`280
`280
`281
`281
`284
`286
`289
`292
`293
`295
`296
`298
`299
`299
`300
`302
`302
`302
`303
`305
`
`309
`309
`309
`
`9
`
`

`

`CONTENTS
`
`CONTENTS
`
`ievices
`
`for customers
`
`es for customers
`
`ayer
`
`subcarrier
`14443 transponder
`
`:ard
`
`265
`265
`265
`265
`266
`267
`267
`268
`268
`268
`269
`270
`271
`
`273
`273
`273
`274
`276
`278
`279
`280
`280
`281
`281
`284
`286
`289
`292
`293
`295
`296
`298
`299
`299
`300
`302
`302
`302
`303
`305
`
`309
`309
`309
`
`11.2.1 HF interface
`11.2.1.1 Inductively coupled system, FDX/HDX
`11.2.1.2 Microwave systems - half duplex
`11.2.1.3 Sequential systems - SEQ
`11.2.1.4 Microwave system for SAW transponders
`11.2.2 Control unit
`11.3 Low Cost Configuration - Reader IC U2270B
`11.4 Connection of Antennas for Inductive Systems
`11.4.1 Connection using current matching
`11.4.2
`Supply via coaxial cable
`11.4.3
`The inAuence of the Q factor
`1 1.5 Reader Designs
`11.5.1
`11.5.2
`11.5.3
`
`OEM readers
`Readers for industrial use
`Portable readers
`
`12 The Manufacture of Transponders and Contactless
`Smart Cards
`12.1 Glass and Plastic Transponders
`12.1.1 Module manufacture
`12.1.2 Semi-finished transponder
`12.1.3 Completion
`12.2 Contactless Smart Cards
`12.2.1 Coil manufacture
`12.2.2 Connection technique
`12.2.3 Lamination
`
`13 Example Applications
`13.1 Contactless Smart Cards
`13.2 Public Transport
`13.2.1 The starting point
`13.2.2 Requirements
`13.2.2.1 Transaction time
`13.2.2.2 Resistance to degradation, lifetime, convenience
`13.2.3 Benefits of RFID systems
`13.2.4 Fare systems using electronic payment
`13.2.5 Market potential
`13.2.6 Example projects
`13.2.6.l Korea -
`seoul
`13.2.6.2 Germany - Liineburg, Oldenburg
`13.2.6.3 EU Projects -
`ICARE and CALYPSO
`13.3 Ticketing
`13.3.l Lufthansa miles & more cord
`13.3.2 Ski tickets
`
`xi
`
`311
`312
`313
`314
`315
`316
`317
`319
`320
`322
`325
`326
`326
`327
`328
`
`329
`329
`329
`330
`332
`332
`333
`336
`338
`
`341
`341
`342
`343
`344
`344
`344
`345
`346
`346
`347
`347
`349
`350
`354
`354
`356
`
`10
`
`

`

`xii
`
`CONTENTS
`
`13.4 Access Control
`13.4.1 Online systems
`13.4.2 Offline systems
`13.4.3 Transponders
`13.5 Transport Systems
`Eurobalise S21
`13.5.1
`International container transport
`13.5.2
`13.6 Animal Identification
`13.6.1 Stock keeping
`13.6.2 Carrier pigeon races
`13.7 Electronic Immobilisation
`13.7.1 The functionality of an immobilisation system
`13.7.2 Brief success story
`Predictions
`13.7.3
`13.8 Container Identification
`13.8.1 Gas bottles and chemical containers
`13.8.2 Waste disposal
`13.9 Sporting Events
`13.10 Industrial Automation
`13.10.1 Tool identification
`Industrial production
`13.10.2
`13.10.2.1 Benefits from the use of RFID systems
`13.10.2.2 The selection of a suitable RFID system
`13.10.2.3 Example projects
`13.11 Medical Applications
`
`14 Appendix
`14.1 Contact Addresses, Associations and Technical Periodicals
`14.1.1
`Industrial associations
`14.1.2 Technical journals
`14.1.3
`RFID on the internet
`14.2 Relevant Standards and Regulations
`Sources for standards and regulations
`14.2.1
`14.3 References
`14.4 Printed Circuit Board Layouts
`14.4.1 Test card in accordance with ISO 14443
`Field generator coil
`14.4.2
`
`INDEX
`
`357
`357
`358
`360
`361
`361
`363
`364
`364
`367
`371
`372
`375
`376
`376
`376
`378
`379
`381
`381
`385
`387
`388
`389
`392
`
`394
`394
`394
`398
`399
`400
`405
`406
`412
`412
`413
`
`419
`
`11
`
`

`

`LIST OF ABBREVIATIONS
`
`. 3 GHz)
`
`93)
`(German Association of
`
`p Card (see ISO 15693)
`
`gulation)
`
`: elektronics N.V.
`:ecurity Locking
`
`instruments
`D systems
`
`1
`Introduction
`
`In recent years automatic identification procedures (Auto-ID) have become very popular
`in many service industries, purchasing and distribution logistics, industry, manufactur(cid:173)
`ing companies and material flow systems. Automatic identification procedures exist to
`provide information about people, animals, goods and products in transit.
`The omnipresent barcode labels that triggered a revolution in identification systems
`some considerable time ago, are being found to be inadequate in an increasing number
`of cases. Barcodes may be extremely cheap, but their stumbling block is their low
`storage capacity and the fact that they cannot be reprogrammed.
`The technically optimal solution would be the storage of data in a silicon chip. The
`most common form of electronic data-carrying device in use in everyday life is the
`smart card based upon a contact field (telephone smart card, bank cards). However, the
`mechanical contact used in the smart card is often impractical. A contactless transfer
`of data between the data-carrying device and its reader is far more flexible. In the ideal
`case, the power required to operate the electronic data-carrying device would also be
`transferred from the reader using contactless technology. Because of the procedures
`used for the transfer of power and data, contactless ID systems are called RFID systems
`(Radio Frequency Identification).
`The number of companies actively involved in the development and sale of RFID
`systems indicates that this is a market that should be taken seriously. Whereas global
`sales of RFID systems were approximately 900 million $US in the year 2000 it is
`estimated that this figure will reach 2650 million $US in 2005 (Krebs, n.d.). The RFID
`market therefore belongs to the fastest growing sector of the radio technology industry,
`including mobile phones and cordless telephones, (Figure 1.1).
`Furthermore, in recent years contactless identification has been developing into an
`independent interdisciplinary field, which no longer fits into any of the conventional
`pigeon holes. It brings together elements from extremely varied fields: HF technology
`and EMC, semiconductor technology, data protection and cryptography, telecommuni(cid:173)
`cations, manufacturing technology and many related areas.
`As an introduction, the following section gives a brief overview of different auto(cid:173)
`matic ID systems that perform similar functions to RFID (Figure 1.2).
`
`RF!D H(md/>l)ok: Fundamentals and Applicntio11., in Contactless Smart Cards and Identification. Klaus Finkenzeller
`e 2003 John Wiley & Sons, Ltd
`ISBN: 0-470-84402-7
`
`12
`
`

`

`2
`
`500
`
`400
`
`E
`en
`:::, 300
`~
`ai
`-"' cu
`E
`cii 200
`.D
`0 a
`
`100
`
`INTRODUCTION
`
`x Security/access control
`
`• Asset management
`
`1:,. Transportation
`
`... Supply chain management
`
`v Point of sale
`
`• Rental item tracking
`(cid:143) Toll collection
`ra Automobile immobilisers
`
`o Baggage handling
`
`• Animal tracking
`
`+ Real time location systems
`
`o Other
`
`0
`2000
`
`2001
`
`2003
`2002
`Year
`
`2004
`
`2005
`
`Figure 1.1 The estimated growth of the global market for RFID systems between 2000 and
`2005 in million $US, classified by application
`
`Figure 1.2 Overview of the most important auto-ID procedures
`
`1. 1 Automatic Identification Systems
`
`1. 1. 1 Barcode systems
`
`Barcodes have successfully held their own against other identification systems over the
`past 20 years. According to experts, the turnover volume for barcode systems totalled
`around 3 billion DM in Western Europe at the beginning of the 1990s (Virnich and
`Posten, 1992).
`
`13
`
`

`

`INTRODUCTION
`
`1.1 AUTOMATIC IDENTIFICATION SYSTEMS
`
`3
`
`x Security/access control
`
`• Asset management
`
`" Transportation
`• Supply chain management
`
`v Point of sale
`
`• Rental item tracking
`
`(cid:143) Toil collection
`
`"' Automobile immobilisers
`o Baggage handling
`
`• Animal tracking
`+ Real time location systems
`
`o Other
`
`:rn systems between 2000 and
`
`o-ID procedures
`
`tems
`
`entification systems over the
`for barcode systems totalled
`; of the l 990s (Vimich and
`
`The barcode is a binary code comprising a field of bar and gaps arranged in a
`parallel configuration. They are arranged according to a predetermined pattern and
`represent data elements that refer to an ~ssociated symbol_. The sequence, made_ up of
`wide and narrow bars and gaps, can be mterpreted nurnencally and alpbanumencaJLy.
`It is read by optical laser scanning, i.e. by the different reflection of a laser beam from
`the black bars and white gaps (ident, 1996). However, despite being identical in their
`physical design, th~re are considerable differences . between the code layouts in the
`approximately ten d1fferent barcode types currently m use.
`The most popular barcode by some margin is the EAN code (European Article
`Number), which was designed specifically to fulfil the requirements of the grocery
`industry in 1976. The EAN code repre ents a development of the UPC (Unjversal
`Product Code) from the USA, which was introduced in the USA as early as 1973.
`Today the UPC represent a ub et of the EAN code, and is therefore compatible with
`it (Vimich and Posten, 1992).
`The EAN code is made up of 13 digits: the country identifier, the company identifier,
`the manufacturer's item number and a check digit (Figure 1.3).
`In addition to the EAN code, the following barcodes are popular in other industrial
`fields (see Figure 1.4):
`
`• Code Codabar: medical/clinical applications, fields with high safety requirements.
`• Code 2/5 interleaved: automotive industry, goods storage, pallets, shipping con(cid:173)
`tainers and heavy industry.
`• Code 39: processing industry, logistics, universities and libraries.
`
`1. 1.2 Optical character recognition
`
`Optical character recognition (OCR) was first used in the 1960s. Special fonts were
`developed for this application that stylised characters so that they could be read both
`
`Country Company identifier
`identifier
`
`Manufacturer's item
`number
`
`CD
`
`4 r o 1J2l3l4 l s o I s I 1 I s I o
`
`9
`
`FRG
`
`Company Name
`1 Road Name
`80001 Munich
`
`Chocolate Rabbit
`100 g
`
`Figure 1.3 Example of the structure of a barcode in EAN coding
`
`ISBN 0-4 71-98851-0
`
`Figure 1.4 This barcode is printed on the back of this book and
`contains the ISBN number of the book
`
`9 780471 988519
`
`14
`
`

`

`4
`
`INTRODUCTION
`
`in the normal way by people and automatically by machines. The most important
`advantage of OCR systems is the high density of information and the possibility of read(cid:173)
`ing data visually in an emergency (or simply for checking) (Virnich and Posten, 1992).
`Today, OCR is used in production, service and administrative fields, and also in
`banks for the registration of cheques (personal data, such as name and account number,
`is printed on the bottom line of a cheque in OCR type).
`However, OCR systems have failed to become universally applicable because of
`their high price and the complicated readers that they require in comparison with other
`ID procedures.
`
`1 • 1 .3 Biometric procedures
`
`Biometrics is defined as the science of counting and (body) measurement procedures
`involving living beings. In the context of identification systems, biometry is the general
`term for all procedures that identify people by comparing unmistakable and individual
`physical characteristics. In practice, these are fingerprinting and handprinting proce(cid:173)
`dures, voice identification and, less commonly, retina (or iris) identification.
`
`1. 1.3. 1 Voice identification
`
`Recently, specialised systems have become available to identify individuals using
`peaker verification (speaker recognition). In such systems, Lhe user talks into a micro(cid:173)
`phone linked to a computer. This equipment converts the spoken word
`into digital
`signals, which are evaluated by the identification software.
`The objective of speaker verification is to check tbe supposed identity of the person
`based upon thei( voice. This is achieved by checking the speech characteristics of the
`speaker against an existing reference pattern. If they correspond then a reaction can
`be initiated (e.g. 'open door') .
`
`1.1.3.2 Fingerprinting procedures (dactyloscopy}
`
`Criminology has been using fingerprinting procedures for the identification of criminals
`since the early twentieth century. This process is based upon the comparison of papillae
`and dermal ridges of the fingertips, which can be obtained not only from the finger
`itself, but also from objects that the individual in question has touched.
`When fingerprinting procedures are used for personal identification, usually for
`entrance procedures, the fingertip is placed upon a special reader. The system calculates
`a data record from the pattern it has read and compares this with a stored reference
`pattern. Modem fingerprint ID systems require less than half a second to recognise
`and check a fingerprint. In order to prevent violent frauds , fingerprint ID systems have
`even been developed that can detect whether the finger placed on the reader is that of
`a living person (Schmidhausler, 1995).
`
`15
`
`

`

`INTRODUCTION
`
`1.1 AUTOMATIC IDENTIFICATION SYSTEMS
`
`5
`
`~hines. The most important
`m and the possibility of read(cid:173)
`. (Virnich and Posten, 1992).
`1istrative fields, and also in
`s name and account number,
`
`rsally applicable because of
`ire in comparison with other
`
`ly) measurement procedures
`ems, biometry is the general
`unmistakable and individual
`ng and handprinting proce(cid:173)
`iris) identification.
`
`identify individuals using
`, the user talks into a micro(cid:173)
`~ spoken words into digital
`
`posed identity of the person
`,peech characteristics of the
`espond, then a reaction can
`
`oscopy)
`
`te identification of criminals
`1 the comparison of papillae
`:d not only from the finger
`has touched.
`I identification, usually for
`:ader. The system calculates
`his with a stored reference
`half a second to recognise
`fingerprint ID systems have
`iced on the reader is that of
`
`1. 1 .4 Smart cards
`
`A smarl card is an electronic data
`torage system, possibly with additional compuling
`capacity (microprocessor card), which -
`for convenience -
`is incorporated into a
`pla tic card the size of a credit card. The first smart card
`in the ·form of prepaid
`telephone smart card were launched in 1984. Smart cards are placed in a reader
`which makes a galvanic connection to the contact urfaces of the smart card using
`contact prings. The smart card is supplied with energy and a clock pulse from the
`reader via the contact urfaces. Data transfer between the reader a:nd the card takes
`place using a bidirectional serial interface (I/O port). It is possible to differentiate
`between two ba ic types of smart card based upon their internal functionality: the
`memory card and the microprocessor card.
`One of the primary advantage of the smart card is the fact that the data stored
`on it can be protected against undesired (read) access and manipulation. Smart cards
`make all services that relate to information or financial transactions simpler, safer and
`cheaper. For this reason, 200 million smart cards were issued worldwide in 1992. In
`1995 this figure had risen to 600 million, of which 500 million were memory cards and
`100 million were microprocessor cards. The smart card market therefore represents
`one of the fastest growing subsectors of the microelectronics industry.
`One disadvantage of contact-based smart cards is the vulnerability of the contacts
`to wear, corrosion and dirt. Readers that are used frequently are expensive to maintain
`due to their tendency to malfunction. In addition, readers that are accessible to the
`public (telephone boxes) cannot be protected against vandalism.
`
`1. 1.4. 1 Memory cards
`
`In memory cards the memory -
`is accessed using a sequen(cid:173)
`usually an EEPROM -
`tial logic (state machine) (Figure 1.5). It is also possible to incorporate simple security
`algorithms, e.g. stream ciphering, using this system. The functionality of the memory
`card in question is usually optimised for a specific application. Flexibility of applica(cid:173)
`tion is highly limited but, on the positive side, memory cards are very cost effective.
`For this reason, memory cards are predominantly used in price sensitive, large-scale
`
`Address and
`Security Logic
`
`EEPROM
`
`ROM
`
`Figure 1.5 Typical architecture of a memory card with security logic
`
`16
`
`

`

`6
`
`INTRODUCTION
`
`applications (Rankl and Effing, 1996). One example of this is the national insurance
`card used by the state pension system in Germany (Lemme, 1993).
`
`1. 1 .4.2 Microprocessor cards
`
`As the name suggests, microprocessor cards contain a microprocessor, which is con(cid:173)
`nected to a segmented memory (ROM, RAM and EEPROM segments).
`The mask programmed ROM incorporates an operating system (higher programme
`code) for the microprocessor and is inserted during chip manufacture. The contents of
`the ROM are determined during manufacturing, are identical for all microchips from
`the same production batch, and cannot be overwritten.
`The chip's EEPROM contains application data and application-related programme
`code. Reading from or writing to this memory area is controlled by the operating
`system.
`The RAM is the microprocessor's temporary working memory. Data stored in the
`RAM are lost when the supply voltage is disconnected (Figure 1.6).
`Microprocessor cards are very flexible. In modern smart card systems it is also
`possible to integrate different applications in a single card (multi-application). The
`application-specific parts of the programme are not loaded into the EEPROM until
`after manufacture and can be initiated via the operating system.
`Microprocessor cards are primarily used in security sensitive applications. Examples
`are smart cards for GSM mobile phones and the new EC (electronic cash) card . The
`option of programmin

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket