`
`APPLEINC./ Page 1 of 19
`
`Ex.1007
`
`Ue RR Ut
`
`Radio-Frequency Identification
`Fundamentals and Applications
`
`I
`
`1
`
`iKinn
`
`W KM
`
`' -V '
`
`.. r
`
`I
`
`r'
`
`J PI:
`
`Ex.1007
`APPLE INC. / Page 1 of 19
`
`
`
`E'•i mm
`
`Radio-Frequency Identification
`Fundamentals and Applications
`
`KLAUS FINKENZELLER
`Ciesecke & Devrient GmbH, Munich, Germany
`
`Translated by
`Rachel Waddlngton
`Swadlincote, UK
`
`JOHN WILEY & SON. LTD
`Chichester • New York • Weinhelm • Brisbane • Singapore •Toronto
`
`Ex.1007
`APPLE INC. / Page 2 of 19
`
`
`
`First published under the title RFID-Handbuch by Carl Hanser Verlag
`© Carl Hanser Verlag, Munich/FRG, 1998, All Rights Reserved
`
`Copyright ©1999 John Wiley & Sons Ltd
`Baffins Lane, Chiehester,
`West Sussex, P019 lUD, England
`01243 779777
`National
`International (+44) 1243 779777
`
`e-mail (for orders and customer service enquiries); cs-books@wiley.co.uk
`Visit our Home Page on http://www.wiley.co.uk or http://www.wiley.com
`Reprinted June 2000, April 2001
`
`All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,
`in any form or by any means, electronic, mechanical, photocopying, recording, scarming or otherwise, except
`under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the
`Copyright Licensing Agency, 90 Tottenham Court Road, London WIP 9HE, UK, without the permission in
`writing of the Publisher.
`
`Neither the author nor John Wiley & Sons Ltd accept any responsihility or liability for loss or damage
`occasioned to any person or property through using the material, instructions, methods or ideas contained herein,
`or acting or refraining from acting as a result of such use. The author(s) and Publisher expressly disclaim all
`implied warranties, including merchantability or fitness for any particular purpose.
`
`Designations used by companies to distinguish their products are often claimed as trademarks. In all instances
`where John Wiley & Sons is aware of a claim, the product names appear in initial capital or all capital letters.
`Readers, however, should contact the appropriate companies for more complete information regarding
`trademarks and registration.
`
`Other Wiley Editorial Offices
`
`John Wiley & Sons, Inc., 605 Third Avenue,
`New York, NY 10158-0012, USA
`
`Weinheim • Brisbane • Singapore • Toronto
`
`Library of Congress Cataloging-in-Publlcation Data
`
`Finkenzeller, Klaus.
`[RFID Handbuch. English]
`RFID handbook: radio-frequency identification fundamentals and
`applications / Klaus Finkenzeller : translated by Rachel Waddington
`p. cm.
`Includes bibliographical references and index.
`ISBN 0-471-98851-0 (alk. paper)
`1.
`Inventory control—Automation. 2. Radio frequency
`identification systems. I. Title.
`TS160.F5513 1999
`658.7—dc21
`
`99-16221
`CIP
`
`British Library Cataloguing in PubUcation Data
`
`A catalogue record for this book is available from the British Library
`
`ISBN 0 471 98851 0
`
`Produced from PostScript files supplied by the translator
`Printed and bound in Great Britain by Antony Rowe Ltd, Chippenham
`This book is printed on acid-free paper responsibly manufactured from sustainable forestry
`in whieh at least two trees are planted for each one used for paper production.
`
`Ex.1007
`APPLE INC. / Page 3 of 19
`
`
`
`Contents
`
`PREFACE
`
`LIST OF ABBREVIATIONS
`
`INTRODUCTION
`1
`1.1 Automatic Identification Systems
`1.1.1 Barcode systems
`1.1.2 Optical character recognition
`1.1.3 Biometric procedure
`1.1.3.1 Voice identification
`1.1.3.2 Finger printing procedures (dactyloscopy)
`1.1.4 Smart cards
`1.1.4.1 Memory cards
`1.1.4.2 Microprocessor cards
`1.1.5 RFID systems
`1.2 A Comparison of Different ID Systems
`1.3 Components of an RFID System
`
`2 DIFFERENTIATION FEATURES OF RFID SYSTEMS
`2.1 Fundamental Differentiation Features
`2.2 Transponder Construction Formats
`2.2.1 Disks and coins
`2.2.2 Glass housing
`2.2.3 Plastic housing
`2.2.4 Tool and gas bottle identification
`2.2.5 Keys and key fobs
`2.2.6 Clocks
`2.2.7 ID-1 format, contactless smart cards
`
`xiii
`
`xv
`
`1
`2
`2
`3
`4
`4
`4
`4
`5
`5
`6
`6
`7
`
`11
`11
`13
`13
`14
`15
`16
`17
`19
`
`'
`
`Ex.1007
`APPLE INC. / Page 4 of 19
`
`
`
`VI
`
`The RFID Handbook
`
`2.2.8 Other formats
`2.3 Frequency, Range and Coupling
`2.3.1 Close coupling
`2.3.2 Remote coupling
`2.3.3 Long range
`2.3.4 System performance
`
`3 FUNDAMENTAL OPERATING PRINCIPLES
`3.11 Bit Transponder
`3.1.1 Radio frequency
`3.1.2 Microwaves
`3.1.3 Frequency divider
`3.1.4 Electromagnetic types
`3.2 Full and Half Duplex Procedure
`3.2.1 Inductive coupling
`3.2.1.1 Power supply to passive transponders
`3.2.1.2 Data transfer transponder —> reader
`3.2.2 Electromagnetic backscatter coupling
`3.2.2.1 Power supply to the transponder
`3.2.2.2 Data transmission
`reader
`3.2.3 Close coupling
`3.2.3.1 Power supply to the transponder
`3.2.3.2 Data transfer transponder
`reader
`3.2.4 Data transfer reader —> transponder
`3.3 Sequential Procedures
`3.3.1 Inductive coupling
`3.3.1.1 Power supply to the transponder
`3.3.1.2 A comparison between FDX/HDX and SEQ systems
`3.3.1.3 Data transmission transponder
`reader
`3.3.2 Surface acoustic wave transponder
`
`4 PHYSICAL PRINCIPLES OF RFID SYSTEMS
`4.1 Magnetic Field
`4.1.1 Magnetic field strength H
`4.1.1.1 Path of field strength H(x) in conductor loops
`4.1.1.2 Optimal antenna diameter
`4.1.2 Magnetic flux and magnetic flux density
`4.1.3 Inductance L
`4.1.4 Mutual inductance M
`4.1.5 Coupling coefficient k
`4.1.6 Faraday's law
`4.1.7 Resonance
`
`21
`21
`21
`22
`22
`23
`
`25
`26
`26
`29
`31
`32
`34
`35
`35
`37
`41
`41
`41
`43
`43
`44
`44
`45
`45
`45
`45
`47
`48
`
`53
`53
`53
`55
`57
`5 g
`59
`60
`62
`64
`66
`
`Ex.1007
`APPLE INC. / Page 5 of 19
`
`
`
`Table of Contents
`
`4.1.8 Practical operation of the transponder
`4.1.8.1 Power supply to the transponder
`4.1.8.2 Voltage regulation
`4.1.9 Interrogation field strength Hmin
`4.1.9.1 "Energy range" of transponder systems
`4.1.10 Total transponder - reader system
`4.1.10.1 Transformed transponder impedance Zp'
`4.1.10.2 Influencing variables of Zp'
`4.1.10.3 Load modulation
`4.1.11 Measuring the coupling coefficient k
`4.1.12 Magnetic materials
`4.1.12.1 Properties of magnetic materials and ferrite
`4.1.12.2 Ferrite antennas in LF transponders
`4.1.12.3 Ferrite shielding in a metallic environment
`4.2 Electromagnetic Waves
`4.2.1 The creation of electromagnetic waves
`4.2.2 Reflection of electromagnetic waves
`4.2.3 Radar cross section of an antenna
`4.2.4 Modulated radar cross section
`4.2.5 Effective length
`4.2.6 Antenna construction formats for microwave transponders
`4.2.6.1 Slot antennas
`4.2.6.2 Planar antennas
`4.2.6.3. Overview - antenna parameters
`
`5 FREQUENCY RANGES AND RADIO LICENSING
`REGULATIONS
`5.1 Frequency Ranges Used
`5.1.1 Frequency range 9 - 135 kHz
`5.1.2 Frequency range 6.78 MHz
`5.1.3 Frequency range 13.56 MHz
`5.1.4 Frequency range 27.125 MHz
`5.1.5 Frequency range 40.680 MHz
`5.1.6 Frequency range 433.920 MHz
`5.1.7 Frequency range 869.0 MHz
`5.1.8 Frequency range 915.0 MHz
`5.1.9 Frequency range 2.45 GHz
`5.1.10 Frequency range 5.8 GHz
`5.1.11 Frequency range 24.125 GHz
`5.1.12 Selection of a suitable frequency for inductively coupled RFID systems
`5.2 International Licensing Regulations
`5.2.1 CEPT/ERC 70-03
`5.2.2 EN 300330: 9 kHz-25 MHz
`
`vii
`
`71
`71
`71
`74
`76
`78
`80
`83
`90
`98
`99
`99
`101
`101
`102
`102
`105
`106
`109
`109
`110
`110
`110
`110
`
`111
`111
`111
`114
`114
`114
`115
`115
`115
`116
`116
`116
`116
`116
`119
`119
`119
`
`Ex.1007
`APPLE INC. / Page 6 of 19
`
`
`
`viil
`
`The RFID Handbook
`
`5.2.2.1 Carrier power - limit values for class 1 transmitters
`5.2.2.2 Carrier power - limit values for class 2 transmitters
`5.2.2.3 Modulation bandwidth
`5.2.2.4 Spurious emissions
`5.2.3 EN 300220-1, EN 300220-2
`5.2.4 EN 300440
`5.3 National Licencing Regulations - U.S.A
`
`6 CODING AND MODULATION
`6.1 Coding in the Baseband
`6.2 Digital Modulation Procedures
`6.2.1 Amplitude shift keying (ASK)
`6.2.2 2 FSK
`6.2.3 2 FSK
`6.2.4 Modulation procedures with subcarrier
`
`7 DATA INTEGRITY
`7.1 The Checksum Procedure
`7.1.1 Parity checking
`7.1.2 LRC procedure
`7.1.3 CRC procedure
`7.2 Anticollision
`7.2.1 How collision arises
`7.2.2 Anticollision procedures
`7.2.2.1 Spatial domain anticollision procedures
`7.2.2.2 Frequency domain anticollision procedures
`7.2.2.3 Time domain anticollision procedures
`7.2.3 Application example - binary search algorithm
`
`8 DATA SECURITY
`8.1 Mutual Symmetrical Authentication
`8.2 Authentication Using Derived Keys
`8.3 Encrypted Data Transfer
`8.3.1 Stream cipher
`
`9 STANDARDISATION
`9.1 Animal Identiflcation
`9.1.1 ISO 11784 - Code structure
`9.1.2 ISO 11785 - Technical concept
`
`120
`120
`122
`122
`122
`123
`
`125
`126
`128
`129
`132
`133
`134
`
`137
`137
`137
`138
`139
`141
`141
`142
`142
`143
`143
`144
`
`151
`151
`153
`154
`155
`
`159
`159
`159
`160
`
`Ex.1007
`APPLE INC. / Page 7 of 19
`
`
`
`Table of Contents
`
`9.1.2.1 Requirements
`9.1.2.2 Full/half duplex system
`9.1.2.3 Sequential system
`9.2 Contactless Smart Cards
`9.2.1 ISO 10536 - Close coupling smart cards
`9.2.1.1 Part 1 - Physical characteristics
`9.2.1.2 Part 2 - Dimensions and locations of coupling areas
`9.2.1.3 Part 3 - Electronic signals and reset procedures
`9.2.1.4 Part 4 - Answer to reset and transmission protocols
`9.2.2. ISO 14443 - Proximity coupling smart cards
`9.2.3 ISO 15693 - Vicinity coupling smart cards
`9.3 ISO 69873 - Data Carriers for Tools and Clamping Devices
`9.4 ISO 10374 - Container Identification
`9.5 VDI4470 - Anti-theft Systems for Goods
`9.5.1 Part 1 - Detection gates - inspection guidelines for customers
`9.5.1.1 Ascertaining the false alarm rate
`9.5.1.2 Ascertaining the detection rate
`9.5.1.3 Forms in VDI 4470
`9.5.2 Part 2 - Deactivation devices, inspection guidelines for customers
`
`10 THE ARCHITECTURE OF ELECTRONIC DATA
`CARRIERS
`10.1 Transponder with Memory Function
`10.1.1 HF interface
`10.1.2 Address and security logic
`10.1.2.1 State machine
`10.1.3 Memory architecture
`10.1.3.1 Read-only transponder
`10.1.3.2 Writeable transponder
`10.1.3.3 Transponder with cryptological function
`10.1.3.4 Segmented memory
`10.1.3.5 MIFARE® application directory
`10.2 Microprocessors
`10.2.1 Dual interface card
`10.2.1.1 MIF ARE® plus dual interface card
`10.3 Memory Technology
`10.3.1 RAM
`10.3.2 EEPROM
`10.3.3 FRAM
`10.3.4 Performance comparison FRAM - EEPROM
`
`160
`162
`162
`163
`163
`163
`164
`164
`165
`165
`166
`167
`167
`168
`168
`169
`169
`169
`170
`
`171
`172
`172
`173
`174
`175
`175
`177
`177
`179
`181
`185
`187
`189
`190
`190
`191
`192
`194
`
`Ex.1007
`APPLE INC. / Page 8 of 19
`
`
`
`The RFID Handbook
`
`10.4 Measuring Physical Variabies
`10.4.1 Transponder with sensor functions
`10.4.2 Measurements using microwave transponders
`
`.
`
`11 READERS
`11.1 Data Flow in an Application
`11.2 Components of a Reader
`11.2.1 HP-interface
`11.2.1.1 Inductively coupled system, FDX/HDX
`11.2.1.2 Microwave systems - half duplex
`11.2.1.3 Sequential systems - SEQ
`11.2.2 Control unit
`11.3 Low Cost Configuration - Reader IC U2270B
`11.4 Connection of Antennas
`11.4.1 Antennas for inductive systems
`11.4.1.1 Connection using current matching
`11.4.1.2 Supply via coaxial cable
`11.4.1.3 The Influence of the Q Factor
`11.4.2 Antennas for microwave systems
`11.5 Reader Designs
`12 THE MANUFACTURE OF TRANSPONDERS AND
`CONTACTLESS SMART CARDS
`12.1 Module Manufacture
`12.2 Semi-Finished Transponder
`12.3 Completion
`12.4 Contactiess Smart Cards
`
`13 EXAMPLE APPLICATIONS
`13.1 Contactiess Smart cards
`13.2 Public Transport
`13.2.1 The starting point
`13.2.2 Requirements
`13.2.2.1 Transaction time
`13.2.2.2 Resistance to degradation, lifetime, convenience
`13.2.3 Benefits of RFID systems
`13.2.4 Fare systems using electronic payment
`13.2.5 Market potential
`
`194
`194
`195
`
`199
`199
`200
`202
`202
`203
`204
`205
`207
`209
`209
`209
`211
`215
`216
`217
`
`219
`219
`221
`222
`222
`
`227
`227
`229
`229
`230
`230
`231
`231
`232
`234
`
`Ex.1007
`APPLE INC. / Page 9 of 19
`
`
`
`Table of Contents
`
`13.2.6. Example projects
`13.2.6.1 Korea - Seoul
`13.2.6.2 Germany - Luneburg, Oldenburg
`13.3 Ticketing
`13.3.1 Lufthansa Miles & More card
`13.3.2 Ski tickets
`13.4 Access Control
`13.5 Transport Systems
`13.5.1 Eurobalise S21
`13.5.2 International container transport
`13.6 Animal Identification
`13.6.1 Stock keeping
`13.6.2. Carrier pigeon races
`13.7 Electronic Immobilisation
`13.7.1 The functionality of an immobilisation system
`13.7.2 Brief success story
`13.7.3 Predictions
`13.8 Container Identification
`13.8.1 Gas bottles and chemical containers
`13.8.2 Waste disposal
`13.9 Sporting Events
`13.10 Industrial Automation
`13.10.1 Tool identification
`13.10.2 Industrial Production
`13.10.2.1 Benefits from the use of RFID systems
`13.10.2.2 The selection of a suitable RFID system
`13.10.2.3 Example projects
`
`14 MARKET OVERVIEW
`14.1 Selection Criteria
`14.1.1 Operating frequency
`14.1.2 Range
`14.1.3 Security requirements
`14.1.4 Memory size
`14.2 System Overview
`14.3 Contact Addresses, Technical Periodicals
`14.3.1 Industrial associations
`14.3.2 Technical journals and events
`14.3.3 RFID on the Intemet
`
`xi
`
`234
`234
`236
`237
`237
`239
`241
`242
`242
`244
`245
`245
`251
`253
`253
`256
`257
`257
`257
`259
`261
`263
`263
`266
`269
`270
`271
`
`275
`275
`27 5
`276
`277
`278
`278
`287
`287
`290
`292
`
`Ex.1007
`APPLE INC. / Page 10 of 19
`
`
`
`15 APPENDICES
`15.1 Relevant Standards and Regulations
`15.1.1 Sources of supply for standards and regulations
`15.2 References
`
`16 INDEX
`
`The RFID Handbook
`
`293
`293
`294
`294
`
`299
`
`Ex.1007
`APPLE INC. / Page 11 of 19
`
`
`
`Preface
`
`This book is aimed at an extremely wide range of readers. First and foremost it is intended
`for students and engineers who find themselves confronted with RFID technology for the
`first time. A few basic chapters are provided for this audience describing the functionality
`of RFID technology and the physical and IT-related principles underlying this field. The
`book is also intended for practitioners who, as users, wish to or need to obtain as
`comprehensive and detailed an overview of the various technologies, the legal framework
`or the possible applications of RFID as possible.
`Although a wide range of individual articles are now available on this subject, the task
`of gathering all this scattered information together when it is needed is a tiresome and time-
`consuming one - as researching this book has proved. This book therefore aims to fill a gap
`in the range of literature on the subject of RFID.
`This book uses numerous pictures and diagrams to attempt to give a graphic
`representation of RFID technology in the tmest sense of the word. Particular emphasis is
`placed on practical considerations. For this reason the chapter entitled "Example
`Applications" is particularly comprehensive.
`Technological developments in the field of RFID technology are proceeding at such a
`pace that although a book like this can explain the general scientific principles it is not
`dynamic enough to be able to explore the latest trends regarding the most recent products
`on the market. I am therefore grateful for any suggestions and advice - particularly from the
`field of industry. The basic concepts and underlying physical principles remain, however,
`and provide a good background for understanding the latest developments.
`At this point I would also like to express my thanks to those companies who were kind
`enough to contribute to the success of this project by providing numerous technical data
`sheets, lecture manuscripts and photographs.
`
`Munich, January 1998
`
`Klaus Finkenzeller
`
`Ex.1007
`APPLE INC. / Page 12 of 19
`
`
`
`1
`Introduction
`
`In recent years automatic identification procedures (Auto ID) have become very popular in
`many service industries, purchasing and distribution logistics, industry, manufacturing
`companies and material flow systems. Automatic identification procedures exist to provide
`information ahout people, animals, goods and products in transit.
`The orrmipresent barcode labels that triggered a revolution in identification systems
`some considerable time ago, are being found to be inadequate in an increasing number of
`cases. Barcodes may be extremely cheap, hut their stumhling block is their [low storage
`capacity .and the fact that they cannot be reprogrammed^
`The technically optimal solution would he the storage of data in a silicon chip. The most
`common form of electronic data carrying device in use in everyday life is the smart card
`based upon a contact field (telephone smart card, hank cards). However, the mechanical
`contact used in the smart card is often impractical. A contactless transfer of data between
`the data carrying device and its reader is far more flexible. In the ideal case, the power
`required to operate the electronic data carrying device would also he transferred from the
`reader using contactless technology. Because of the procedures used for the transfer of
`power and data, contactless ID systems are called RFID systems (Radio Frequency
`Identification).
`The number of companies that are actively involved in the development and sale of
`RFID systems indicates that this is a market that should be taken seriously. Total worldwide
`sales of RFID systems for the year 2000 are estimated at above 2 billion US$. The RFID
`market therefore belongs to the fastest growing sector of the radio technology industry,
`including mobile phones and cordless telephones.
`Furthermore, in recent years contactless identification has been developing into an
`independent interdisciplinary field, which no longer fits into any of the conventional pigeon
`holes. It brings together elements from extremely varied fields: HF technology and EMC,
`semiconductor
`technology, data protection and cryptography,
`telecommunications,
`manufacturing technology and many related areas.
`As an introduction, the following chapter gives a brief overview of different auto ID
`systems, that perform similar functions to RFID.
`
`Ex.1007
`APPLE INC. / Page 13 of 19
`
`
`
`The RFID Handbook
`
`specific parts of the programme are not loaded into the EEPROM until after manufacture
`and can be initiated via the operating system.
`Microprocessor cards are primarily used in security sensitive applications. Examples are
`smart cards for GSM mobile phones and the new EC (electronic cash) cards. The option of
`programming the microprocessor cards also facilitates rapid adaptation to new applications
`[rankl].
`
`•
`
`N
`
`Vcc GND
`
`CPU
`
`RST Vpp
`
`•
`
`>
`
`CLK
`
`I/O
`
`RAM
`
`ROM
`(operating system)
`
`EEPROM
`(application
`data)
`
`Figure 1.5: Typical architecture of a microprocessor card
`
`1.1.5
`
`RFID systems
`
`RFID systems are closely related to the smart cards described above. Like smart card
`systems, data is stored on an electronic data carrying device - the transponder. However,
`unlike the smart card, the power supply to the data carrying device and the data exchange
`between data carrying device and reader are achieved without the use of galvanic contacts,
`using instead magnetic or electromagnetic fields. The underlying technical procedure is
`drawn from the fields of radio and radar engineering. The abbreviation RFID stands for
`radio frequency identification, i.e. information carried by radio waves. Due to the numerous
`advantages of RFID systems compared with other identification systems, RFID systems are
`now beginning to conquer new mass markets. One example is the use of contactless smart
`cards as tickets for short-distance public transport.
`
`A Comparison of Different ID Systems
`1.2
`A comparison between the identification systems described above highlights the strengths
`and weakness of RFID in relation to other systems. Here too, there is a close relationship
`between contact based smart cards and RFID systems, however the latter circumvents all
`the disadvantages related to faulty contacting (sabotage, dirt, unidirectional insertion, time
`consuming insertion, etc.).
`
`Ex.1007
`APPLE INC. / Page 14 of 19
`
`
`
`The Architecture of Electronic Data Carriers
`
`179
`
`Application
`data
`
`Authentication
`
`Reader 1
`
`Reader 2
`
`Key B
`
`Read only
`
`Read & write
`
`Key A / Acc A
`
`Key B / Acc B
`
`Transponder
`
`Key & "access right
`of the key" (Acc)
`
`Figure 10.10: A transponder with two key memories facilitates the hierarchical allocation of access
`rights, in connection with the authentication keys used
`
`The access rights to the transponder's two access registers A and B are configured such
`that, after successful authentication using key A, the system only permits the deduction of
`monetary amounts (the devaluation of a counter in the transponder). Only after
`authentication with key B may monetary amounts be added (the revaluation of the same
`counter).
`In order to protect against attempted fraud, the readers in vehicles or subway entrances,
`i.e. devaluers, are only provided with key A. This means that a transponder can never be
`revalued using a devaluer, not even if the software of a stolen devaluer is manipulated. The
`transponder itself refuses to add to the internal counter unless the transaction has been
`authenticated by the correct key.
`The high-security key B is only loaded into selected secure readers that are protected
`against theft. The transponder can only be revalued using these readers.
`10.1.3.4 Segmented memory
`Transponders can also be protected from access by readers that belong to other
`applications using authentication procedures, as we described in a previous chapter. In
`transponders with large memory capacities, it is possible to divide the entire memory into
`small units called segments, and protect each of these from unauthorised access with a
`separate key. A segmented transponder like this permits data from different applications to
`be stored completely separately.
`
`Ex.1007
`APPLE INC. / Page 15 of 19
`
`
`
`180
`
`The RFID Handbook
`
`Security
`encoding
`
`(planned)
`
`Appl. Y
`(planned)
`
`RFU
`
`Figure 10.11: Several applications on one transponder - each protected by its own secret key
`
`Access to an individual segment can only be gained after successful authentication with
`the appropriate key. Therefore, a reader belonging to one application can only gain access
`to its "own" segment if it only knows the application's own key.
`The majority of segmented memory systems use fixed segment sizes. In these systems,
`the storage space within a segment cannot be altered by the user. A fixed segment size has
`the advantage that it is very simple and cheap to realise upon the transponder's microchip.
`However, it is very rare for the storage space required by an application to correspond
`with the segment size of the transponder.
`In small applications, valuable storage space is wasted on the transponder, because the
`segments are only partially used. Very large applications, on the other hand, need to be
`distributed across several segments, which means that the application specific key must be
`stored in each of the occupied segments. This multiple storage of an identical key also
`wastes valuable storage space.
`A much better use of space is achieved by the use of variable length segments. Here, the
`memory allocated to a segment can be matched to the requirements of the application using
`the memory area. Because of the difficulty in realising variable segmentation, this variant is
`rare in transponders with state machines.
`
`Ex.1007
`APPLE INC. / Page 16 of 19
`
`
`
`The Architecture of Electronic Data Carriers
`
`183
`
`MfFARE® chip
`
`Manufacturer b ock"
`
`8=0, Y=1,Data
`
`S=0, Y=2, Data
`
`S=X, Y=0, Data
`
`S=X, Y=1,Data
`
`S=X, Y=2, Data
`
`Sector trailer
`
`conflg.
`
`Data blocks
`
`Write- / read block (16 byte)
`
`value-block
`
`ector 0
`
`Sector 1
`
`Sector 3
`
`Sector 4
`
`Sector 5
`
`Sector OxC
`
`Sector OxD
`
`Sector OxE
`
`Sector OxF
`
`16 sectors x 4 blocks x 16 bytes
`
`Figure 10.14: Memory configuration of a MIFARE® data carrier [koo]. The entire memory is
`divided into 16 independent sectors. Thus a maximum of separate 16 applications can be loaded onto
`a MIFARE® card
`
`Sector 0
`
`Sector 1
`
`;^^tOl^ji|
`
`Sectors
`
`Sector4,
`
`iectd'B
`
`Rector OxE
`
`'Seeto^fictil
`
`16 Sectors x 4 Blocks x 16
`
`S=0, Y=0, Manutacturer-Block
`
`S=0. YsO. Manuf. Block
`
`SNR
`
`TAG. Size....
`
`Production
`
`SsO. Ys1. Direcforv
`
`Y=3, Sector trailer:
`
`S=0. Y=2. Directory
`
`Key A
`
`I'-nlKevB
`Condibons 1 . .„l
`
`SsO. Ys3. Trailer
`
`.69: Card not oersonalized
`non-standard
`
`Y=1..2, Application Directory:
`
`ID7
`
`106
`
`IE»
`
`ID4
`
`IDS
`
`1D2
`
`IDl 1 Iwio'
`
`ORG
`
`lOSF
`
`IDSE
`
`IDSD
`
`IDSC
`
`IDSB
`
`IDSA
`
`IDS
`
`108 '
`
`R.F,U
`
`APPL(1=multl/
`0 = mono)
`
`C
`
`DIR available (1 = ves 10 =
`
`Read with
`key:
`A/B
`
`write with
`key:
`
`B
`
`Increment
`with key:
`
`•
`
`Dec, tif, ret
`with key:
`
`•
`
`INFO: 1 Byte Header, 1 Byte 8-Bit-CHC
`IDn: 2 Bvtes Aoolication Identifier. Sector n
`
`Figure 10.15: The data structure of the MIFARE® application directory consists of an arrangement
`of 15 pointers (IDl to ID$F), which point to the subsequent sectors
`
`Ex.1007
`APPLE INC. / Page 17 of 19
`
`
`
`Market Overview
`
`283
`
`Table 14.1 continued: Overview of RFID systems on the market
`
`System
`manufacturer:
`
`Coupling,
`operating
`method,
`energy,
`distance:
`
`Memory:
`gross / net:
`
`Security logic Downlink
`reader —>
`transponder:
`
`Uplink
`transponder
`—> reader:
`
`125 kHz, ind.,
`0 - 7 cm
`4 MHz, ind.,
`0 - 5 cm
`1.81 MHz,
`ind., 0 - 1 m
`
`14 k Mask
`ROM
`4kEEPROM
`7816 contacts
`240 Byte
`EEPROM
`512 Byte
`EEPROM
`128 Byte
`EEPROM,
`32 k RAM
`752 Byte
`EEPROM
`
`32 k RAM
`
`20 bit fix.
`SAW
`
`13.56 MHz,
`ind.,
`0 - 10 cm
`433 MHz,
`em., battery,
`0 - 80 cm
`2.45 GHz,
`em.,
`0-1.3m
`125 kHz, ind. 128 Byte
`EEPROM
`8 Byte, OTP
`Laser-ROM
`
`SLE44R42S
`(MIFARE®
`plus)
`
`MOBY-F
`
`MOBY-L
`
`MOBY-I
`
`MOBY-E
`
`MOBY-V
`
`SOFIS
`
`Sokymat
`Titan 4000
`Unique 1200
`
`Sony, FeliCa
`
`TagMaster AB,
`Confident
`S1251,S1255
`
`1 kByte
`
`8-75 Byte
`
`125 kHz, ind.,
`0 - 20 cm
`13.56 MHz,
`ind.,
`0 - 10 cm
`2.45 Ghz,
`em.,
`0^ m (read)
`0-0.5m
`(write), Li
`battery
`Temic, TK 5530 125 kHz, ind. 16 Byte
`PROM (Laser
`cutting)
`
`+ 8 bit.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`0.1 kbyte/s
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`>1 kbyte/s
`
`n.i.
`
`(read only)
`
`surface wave
`
`password
`
`n.i.
`
`ASK
`
`ASK
`
`authentication
`encryption
`
`anticollision
`
`modified
`ASK
`250 kbit/s
`(random
`interval
`mode) 4
`kBit/s
`
`n.i.
`
`read-only
`
`load
`modulation
`load
`modulation
`
`n.i.
`
`backscatter,
`16 kBit/s
`
`load
`modulation
`FSK,PSK, /
`Manchester,
`bi-phase,
`max. 15 kbit/s
`
`Ex.1007
`APPLE INC. / Page 18 of 19
`
`
`
`300
`
`The RFID Handbook
`
`Code
`DBP, 126
`differential, 126
`differential bi-phase, 126
`BAN, 2
`Manchester, 126, 145
`Miller, 126
`modified Miller, 127
`NRZ, 126,145, 165
`pulse-pause, 126
`unipolar RZ, 126
`Coding
`bit, 145
`in the baseband, 125
`Collar transponder, 245
`Collision, 142
`Combicard, 187
`Communication system, 125
`Configuration register, 177
`Contactless clock, 19
`Container, 167
`Container identification, 167, 258
`Coupling
`capacitive, 44
`close, 21,43, 163
`inductive, 22, 116, 275
`transformer, 36, 37
`vicinity, 166
`Coupling coefficient, 62
`Coupling element, 9
`capacitive, 164
`inductive, 164
`Coupling loss, 203
`CRC, 139
`Cryptological key, 151
`Cryptological unit, 174
`DASA, 279
`Data carrier, 9
`electronic, 171
`Data transfer, 125
`Deactivation device, 26, 170
`Deactivation rate, 170
`Deciphering, 155
`Decryption, 155
`Deister electronic, 279
`
`Demodulation, 125, 128, 172
`Demodulator, 125
`Detection rate, 26, 168
`Die, 220
`Diehl Ident, 279
`Dimple, 28
`Diode
`capacitance, 29
`low barrier Schottky, 42
`Dip, 27
`Dipole, 30
`Directed beam, 277
`Directional coupler, 42, 203
`Directivity, 204
`Disk, 13
`Dopant profile, 29
`Doppler effect, 195
`Driver, 208
`Dual interface card, 187
`Duplex
`full, 11,34
`half, 11,34
`Duty factor, 129
`Ear tag, 247
`EAS, 26, 27
`Eddy current, 64
`EEPROM, 191
`lifetime, 192
`Effective area, 108
`Effective length, 109
`Electric rotational field, 64
`Electromagnetic interference field, 276
`Electromagnetic procedure, 32
`Electromagnetic wave, 105, 211
`Electronic article surveillance, 11, 26
`Electronic immobilisation system, 15
`EM microelectronic-Marin, 279
`EN 300220, 122
`EN 300330, 117,120
`EN 300440,123
`Encrypted data transmission, 155
`Encryption, 155, 277
`Encryption function, 157
`End of burst detector, 47
`Endrich, 279
`
`Ex.1007
`APPLE INC. / Page 19 of 19
`
`