throbber
RFID
`
`APPLEINC./ Page 1 of 19
`
`Ex.1007
`
`Ue RR Ut
`
`Radio-Frequency Identification
`Fundamentals and Applications
`
`I
`
`1
`
`iKinn
`
`W KM
`
`' -V '
`
`.. r
`
`I
`
`r'
`
`J PI:
`
`Ex.1007
`APPLE INC. / Page 1 of 19
`
`

`

`E'•i mm
`
`Radio-Frequency Identification
`Fundamentals and Applications
`
`KLAUS FINKENZELLER
`Ciesecke & Devrient GmbH, Munich, Germany
`
`Translated by
`Rachel Waddlngton
`Swadlincote, UK
`
`JOHN WILEY & SON. LTD
`Chichester • New York • Weinhelm • Brisbane • Singapore •Toronto
`
`Ex.1007
`APPLE INC. / Page 2 of 19
`
`

`

`First published under the title RFID-Handbuch by Carl Hanser Verlag
`© Carl Hanser Verlag, Munich/FRG, 1998, All Rights Reserved
`
`Copyright ©1999 John Wiley & Sons Ltd
`Baffins Lane, Chiehester,
`West Sussex, P019 lUD, England
`01243 779777
`National
`International (+44) 1243 779777
`
`e-mail (for orders and customer service enquiries); cs-books@wiley.co.uk
`Visit our Home Page on http://www.wiley.co.uk or http://www.wiley.com
`Reprinted June 2000, April 2001
`
`All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted,
`in any form or by any means, electronic, mechanical, photocopying, recording, scarming or otherwise, except
`under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the
`Copyright Licensing Agency, 90 Tottenham Court Road, London WIP 9HE, UK, without the permission in
`writing of the Publisher.
`
`Neither the author nor John Wiley & Sons Ltd accept any responsihility or liability for loss or damage
`occasioned to any person or property through using the material, instructions, methods or ideas contained herein,
`or acting or refraining from acting as a result of such use. The author(s) and Publisher expressly disclaim all
`implied warranties, including merchantability or fitness for any particular purpose.
`
`Designations used by companies to distinguish their products are often claimed as trademarks. In all instances
`where John Wiley & Sons is aware of a claim, the product names appear in initial capital or all capital letters.
`Readers, however, should contact the appropriate companies for more complete information regarding
`trademarks and registration.
`
`Other Wiley Editorial Offices
`
`John Wiley & Sons, Inc., 605 Third Avenue,
`New York, NY 10158-0012, USA
`
`Weinheim • Brisbane • Singapore • Toronto
`
`Library of Congress Cataloging-in-Publlcation Data
`
`Finkenzeller, Klaus.
`[RFID Handbuch. English]
`RFID handbook: radio-frequency identification fundamentals and
`applications / Klaus Finkenzeller : translated by Rachel Waddington
`p. cm.
`Includes bibliographical references and index.
`ISBN 0-471-98851-0 (alk. paper)
`1.
`Inventory control—Automation. 2. Radio frequency
`identification systems. I. Title.
`TS160.F5513 1999
`658.7—dc21
`
`99-16221
`CIP
`
`British Library Cataloguing in PubUcation Data
`
`A catalogue record for this book is available from the British Library
`
`ISBN 0 471 98851 0
`
`Produced from PostScript files supplied by the translator
`Printed and bound in Great Britain by Antony Rowe Ltd, Chippenham
`This book is printed on acid-free paper responsibly manufactured from sustainable forestry
`in whieh at least two trees are planted for each one used for paper production.
`
`Ex.1007
`APPLE INC. / Page 3 of 19
`
`

`

`Contents
`
`PREFACE
`
`LIST OF ABBREVIATIONS
`
`INTRODUCTION
`1
`1.1 Automatic Identification Systems
`1.1.1 Barcode systems
`1.1.2 Optical character recognition
`1.1.3 Biometric procedure
`1.1.3.1 Voice identification
`1.1.3.2 Finger printing procedures (dactyloscopy)
`1.1.4 Smart cards
`1.1.4.1 Memory cards
`1.1.4.2 Microprocessor cards
`1.1.5 RFID systems
`1.2 A Comparison of Different ID Systems
`1.3 Components of an RFID System
`
`2 DIFFERENTIATION FEATURES OF RFID SYSTEMS
`2.1 Fundamental Differentiation Features
`2.2 Transponder Construction Formats
`2.2.1 Disks and coins
`2.2.2 Glass housing
`2.2.3 Plastic housing
`2.2.4 Tool and gas bottle identification
`2.2.5 Keys and key fobs
`2.2.6 Clocks
`2.2.7 ID-1 format, contactless smart cards
`
`xiii
`
`xv
`
`1
`2
`2
`3
`4
`4
`4
`4
`5
`5
`6
`6
`7
`
`11
`11
`13
`13
`14
`15
`16
`17
`19
`
`'
`
`Ex.1007
`APPLE INC. / Page 4 of 19
`
`

`

`VI
`
`The RFID Handbook
`
`2.2.8 Other formats
`2.3 Frequency, Range and Coupling
`2.3.1 Close coupling
`2.3.2 Remote coupling
`2.3.3 Long range
`2.3.4 System performance
`
`3 FUNDAMENTAL OPERATING PRINCIPLES
`3.11 Bit Transponder
`3.1.1 Radio frequency
`3.1.2 Microwaves
`3.1.3 Frequency divider
`3.1.4 Electromagnetic types
`3.2 Full and Half Duplex Procedure
`3.2.1 Inductive coupling
`3.2.1.1 Power supply to passive transponders
`3.2.1.2 Data transfer transponder —> reader
`3.2.2 Electromagnetic backscatter coupling
`3.2.2.1 Power supply to the transponder
`3.2.2.2 Data transmission
`reader
`3.2.3 Close coupling
`3.2.3.1 Power supply to the transponder
`3.2.3.2 Data transfer transponder
`reader
`3.2.4 Data transfer reader —> transponder
`3.3 Sequential Procedures
`3.3.1 Inductive coupling
`3.3.1.1 Power supply to the transponder
`3.3.1.2 A comparison between FDX/HDX and SEQ systems
`3.3.1.3 Data transmission transponder
`reader
`3.3.2 Surface acoustic wave transponder
`
`4 PHYSICAL PRINCIPLES OF RFID SYSTEMS
`4.1 Magnetic Field
`4.1.1 Magnetic field strength H
`4.1.1.1 Path of field strength H(x) in conductor loops
`4.1.1.2 Optimal antenna diameter
`4.1.2 Magnetic flux and magnetic flux density
`4.1.3 Inductance L
`4.1.4 Mutual inductance M
`4.1.5 Coupling coefficient k
`4.1.6 Faraday's law
`4.1.7 Resonance
`
`21
`21
`21
`22
`22
`23
`
`25
`26
`26
`29
`31
`32
`34
`35
`35
`37
`41
`41
`41
`43
`43
`44
`44
`45
`45
`45
`45
`47
`48
`
`53
`53
`53
`55
`57
`5 g
`59
`60
`62
`64
`66
`
`Ex.1007
`APPLE INC. / Page 5 of 19
`
`

`

`Table of Contents
`
`4.1.8 Practical operation of the transponder
`4.1.8.1 Power supply to the transponder
`4.1.8.2 Voltage regulation
`4.1.9 Interrogation field strength Hmin
`4.1.9.1 "Energy range" of transponder systems
`4.1.10 Total transponder - reader system
`4.1.10.1 Transformed transponder impedance Zp'
`4.1.10.2 Influencing variables of Zp'
`4.1.10.3 Load modulation
`4.1.11 Measuring the coupling coefficient k
`4.1.12 Magnetic materials
`4.1.12.1 Properties of magnetic materials and ferrite
`4.1.12.2 Ferrite antennas in LF transponders
`4.1.12.3 Ferrite shielding in a metallic environment
`4.2 Electromagnetic Waves
`4.2.1 The creation of electromagnetic waves
`4.2.2 Reflection of electromagnetic waves
`4.2.3 Radar cross section of an antenna
`4.2.4 Modulated radar cross section
`4.2.5 Effective length
`4.2.6 Antenna construction formats for microwave transponders
`4.2.6.1 Slot antennas
`4.2.6.2 Planar antennas
`4.2.6.3. Overview - antenna parameters
`
`5 FREQUENCY RANGES AND RADIO LICENSING
`REGULATIONS
`5.1 Frequency Ranges Used
`5.1.1 Frequency range 9 - 135 kHz
`5.1.2 Frequency range 6.78 MHz
`5.1.3 Frequency range 13.56 MHz
`5.1.4 Frequency range 27.125 MHz
`5.1.5 Frequency range 40.680 MHz
`5.1.6 Frequency range 433.920 MHz
`5.1.7 Frequency range 869.0 MHz
`5.1.8 Frequency range 915.0 MHz
`5.1.9 Frequency range 2.45 GHz
`5.1.10 Frequency range 5.8 GHz
`5.1.11 Frequency range 24.125 GHz
`5.1.12 Selection of a suitable frequency for inductively coupled RFID systems
`5.2 International Licensing Regulations
`5.2.1 CEPT/ERC 70-03
`5.2.2 EN 300330: 9 kHz-25 MHz
`
`vii
`
`71
`71
`71
`74
`76
`78
`80
`83
`90
`98
`99
`99
`101
`101
`102
`102
`105
`106
`109
`109
`110
`110
`110
`110
`
`111
`111
`111
`114
`114
`114
`115
`115
`115
`116
`116
`116
`116
`116
`119
`119
`119
`
`Ex.1007
`APPLE INC. / Page 6 of 19
`
`

`

`viil
`
`The RFID Handbook
`
`5.2.2.1 Carrier power - limit values for class 1 transmitters
`5.2.2.2 Carrier power - limit values for class 2 transmitters
`5.2.2.3 Modulation bandwidth
`5.2.2.4 Spurious emissions
`5.2.3 EN 300220-1, EN 300220-2
`5.2.4 EN 300440
`5.3 National Licencing Regulations - U.S.A
`
`6 CODING AND MODULATION
`6.1 Coding in the Baseband
`6.2 Digital Modulation Procedures
`6.2.1 Amplitude shift keying (ASK)
`6.2.2 2 FSK
`6.2.3 2 FSK
`6.2.4 Modulation procedures with subcarrier
`
`7 DATA INTEGRITY
`7.1 The Checksum Procedure
`7.1.1 Parity checking
`7.1.2 LRC procedure
`7.1.3 CRC procedure
`7.2 Anticollision
`7.2.1 How collision arises
`7.2.2 Anticollision procedures
`7.2.2.1 Spatial domain anticollision procedures
`7.2.2.2 Frequency domain anticollision procedures
`7.2.2.3 Time domain anticollision procedures
`7.2.3 Application example - binary search algorithm
`
`8 DATA SECURITY
`8.1 Mutual Symmetrical Authentication
`8.2 Authentication Using Derived Keys
`8.3 Encrypted Data Transfer
`8.3.1 Stream cipher
`
`9 STANDARDISATION
`9.1 Animal Identiflcation
`9.1.1 ISO 11784 - Code structure
`9.1.2 ISO 11785 - Technical concept
`
`120
`120
`122
`122
`122
`123
`
`125
`126
`128
`129
`132
`133
`134
`
`137
`137
`137
`138
`139
`141
`141
`142
`142
`143
`143
`144
`
`151
`151
`153
`154
`155
`
`159
`159
`159
`160
`
`Ex.1007
`APPLE INC. / Page 7 of 19
`
`

`

`Table of Contents
`
`9.1.2.1 Requirements
`9.1.2.2 Full/half duplex system
`9.1.2.3 Sequential system
`9.2 Contactless Smart Cards
`9.2.1 ISO 10536 - Close coupling smart cards
`9.2.1.1 Part 1 - Physical characteristics
`9.2.1.2 Part 2 - Dimensions and locations of coupling areas
`9.2.1.3 Part 3 - Electronic signals and reset procedures
`9.2.1.4 Part 4 - Answer to reset and transmission protocols
`9.2.2. ISO 14443 - Proximity coupling smart cards
`9.2.3 ISO 15693 - Vicinity coupling smart cards
`9.3 ISO 69873 - Data Carriers for Tools and Clamping Devices
`9.4 ISO 10374 - Container Identification
`9.5 VDI4470 - Anti-theft Systems for Goods
`9.5.1 Part 1 - Detection gates - inspection guidelines for customers
`9.5.1.1 Ascertaining the false alarm rate
`9.5.1.2 Ascertaining the detection rate
`9.5.1.3 Forms in VDI 4470
`9.5.2 Part 2 - Deactivation devices, inspection guidelines for customers
`
`10 THE ARCHITECTURE OF ELECTRONIC DATA
`CARRIERS
`10.1 Transponder with Memory Function
`10.1.1 HF interface
`10.1.2 Address and security logic
`10.1.2.1 State machine
`10.1.3 Memory architecture
`10.1.3.1 Read-only transponder
`10.1.3.2 Writeable transponder
`10.1.3.3 Transponder with cryptological function
`10.1.3.4 Segmented memory
`10.1.3.5 MIFARE® application directory
`10.2 Microprocessors
`10.2.1 Dual interface card
`10.2.1.1 MIF ARE® plus dual interface card
`10.3 Memory Technology
`10.3.1 RAM
`10.3.2 EEPROM
`10.3.3 FRAM
`10.3.4 Performance comparison FRAM - EEPROM
`
`160
`162
`162
`163
`163
`163
`164
`164
`165
`165
`166
`167
`167
`168
`168
`169
`169
`169
`170
`
`171
`172
`172
`173
`174
`175
`175
`177
`177
`179
`181
`185
`187
`189
`190
`190
`191
`192
`194
`
`Ex.1007
`APPLE INC. / Page 8 of 19
`
`

`

`The RFID Handbook
`
`10.4 Measuring Physical Variabies
`10.4.1 Transponder with sensor functions
`10.4.2 Measurements using microwave transponders
`
`.
`
`11 READERS
`11.1 Data Flow in an Application
`11.2 Components of a Reader
`11.2.1 HP-interface
`11.2.1.1 Inductively coupled system, FDX/HDX
`11.2.1.2 Microwave systems - half duplex
`11.2.1.3 Sequential systems - SEQ
`11.2.2 Control unit
`11.3 Low Cost Configuration - Reader IC U2270B
`11.4 Connection of Antennas
`11.4.1 Antennas for inductive systems
`11.4.1.1 Connection using current matching
`11.4.1.2 Supply via coaxial cable
`11.4.1.3 The Influence of the Q Factor
`11.4.2 Antennas for microwave systems
`11.5 Reader Designs
`12 THE MANUFACTURE OF TRANSPONDERS AND
`CONTACTLESS SMART CARDS
`12.1 Module Manufacture
`12.2 Semi-Finished Transponder
`12.3 Completion
`12.4 Contactiess Smart Cards
`
`13 EXAMPLE APPLICATIONS
`13.1 Contactiess Smart cards
`13.2 Public Transport
`13.2.1 The starting point
`13.2.2 Requirements
`13.2.2.1 Transaction time
`13.2.2.2 Resistance to degradation, lifetime, convenience
`13.2.3 Benefits of RFID systems
`13.2.4 Fare systems using electronic payment
`13.2.5 Market potential
`
`194
`194
`195
`
`199
`199
`200
`202
`202
`203
`204
`205
`207
`209
`209
`209
`211
`215
`216
`217
`
`219
`219
`221
`222
`222
`
`227
`227
`229
`229
`230
`230
`231
`231
`232
`234
`
`Ex.1007
`APPLE INC. / Page 9 of 19
`
`

`

`Table of Contents
`
`13.2.6. Example projects
`13.2.6.1 Korea - Seoul
`13.2.6.2 Germany - Luneburg, Oldenburg
`13.3 Ticketing
`13.3.1 Lufthansa Miles & More card
`13.3.2 Ski tickets
`13.4 Access Control
`13.5 Transport Systems
`13.5.1 Eurobalise S21
`13.5.2 International container transport
`13.6 Animal Identification
`13.6.1 Stock keeping
`13.6.2. Carrier pigeon races
`13.7 Electronic Immobilisation
`13.7.1 The functionality of an immobilisation system
`13.7.2 Brief success story
`13.7.3 Predictions
`13.8 Container Identification
`13.8.1 Gas bottles and chemical containers
`13.8.2 Waste disposal
`13.9 Sporting Events
`13.10 Industrial Automation
`13.10.1 Tool identification
`13.10.2 Industrial Production
`13.10.2.1 Benefits from the use of RFID systems
`13.10.2.2 The selection of a suitable RFID system
`13.10.2.3 Example projects
`
`14 MARKET OVERVIEW
`14.1 Selection Criteria
`14.1.1 Operating frequency
`14.1.2 Range
`14.1.3 Security requirements
`14.1.4 Memory size
`14.2 System Overview
`14.3 Contact Addresses, Technical Periodicals
`14.3.1 Industrial associations
`14.3.2 Technical journals and events
`14.3.3 RFID on the Intemet
`
`xi
`
`234
`234
`236
`237
`237
`239
`241
`242
`242
`244
`245
`245
`251
`253
`253
`256
`257
`257
`257
`259
`261
`263
`263
`266
`269
`270
`271
`
`275
`275
`27 5
`276
`277
`278
`278
`287
`287
`290
`292
`
`Ex.1007
`APPLE INC. / Page 10 of 19
`
`

`

`15 APPENDICES
`15.1 Relevant Standards and Regulations
`15.1.1 Sources of supply for standards and regulations
`15.2 References
`
`16 INDEX
`
`The RFID Handbook
`
`293
`293
`294
`294
`
`299
`
`Ex.1007
`APPLE INC. / Page 11 of 19
`
`

`

`Preface
`
`This book is aimed at an extremely wide range of readers. First and foremost it is intended
`for students and engineers who find themselves confronted with RFID technology for the
`first time. A few basic chapters are provided for this audience describing the functionality
`of RFID technology and the physical and IT-related principles underlying this field. The
`book is also intended for practitioners who, as users, wish to or need to obtain as
`comprehensive and detailed an overview of the various technologies, the legal framework
`or the possible applications of RFID as possible.
`Although a wide range of individual articles are now available on this subject, the task
`of gathering all this scattered information together when it is needed is a tiresome and time-
`consuming one - as researching this book has proved. This book therefore aims to fill a gap
`in the range of literature on the subject of RFID.
`This book uses numerous pictures and diagrams to attempt to give a graphic
`representation of RFID technology in the tmest sense of the word. Particular emphasis is
`placed on practical considerations. For this reason the chapter entitled "Example
`Applications" is particularly comprehensive.
`Technological developments in the field of RFID technology are proceeding at such a
`pace that although a book like this can explain the general scientific principles it is not
`dynamic enough to be able to explore the latest trends regarding the most recent products
`on the market. I am therefore grateful for any suggestions and advice - particularly from the
`field of industry. The basic concepts and underlying physical principles remain, however,
`and provide a good background for understanding the latest developments.
`At this point I would also like to express my thanks to those companies who were kind
`enough to contribute to the success of this project by providing numerous technical data
`sheets, lecture manuscripts and photographs.
`
`Munich, January 1998
`
`Klaus Finkenzeller
`
`Ex.1007
`APPLE INC. / Page 12 of 19
`
`

`

`1
`Introduction
`
`In recent years automatic identification procedures (Auto ID) have become very popular in
`many service industries, purchasing and distribution logistics, industry, manufacturing
`companies and material flow systems. Automatic identification procedures exist to provide
`information ahout people, animals, goods and products in transit.
`The orrmipresent barcode labels that triggered a revolution in identification systems
`some considerable time ago, are being found to be inadequate in an increasing number of
`cases. Barcodes may be extremely cheap, hut their stumhling block is their [low storage
`capacity .and the fact that they cannot be reprogrammed^
`The technically optimal solution would he the storage of data in a silicon chip. The most
`common form of electronic data carrying device in use in everyday life is the smart card
`based upon a contact field (telephone smart card, hank cards). However, the mechanical
`contact used in the smart card is often impractical. A contactless transfer of data between
`the data carrying device and its reader is far more flexible. In the ideal case, the power
`required to operate the electronic data carrying device would also he transferred from the
`reader using contactless technology. Because of the procedures used for the transfer of
`power and data, contactless ID systems are called RFID systems (Radio Frequency
`Identification).
`The number of companies that are actively involved in the development and sale of
`RFID systems indicates that this is a market that should be taken seriously. Total worldwide
`sales of RFID systems for the year 2000 are estimated at above 2 billion US$. The RFID
`market therefore belongs to the fastest growing sector of the radio technology industry,
`including mobile phones and cordless telephones.
`Furthermore, in recent years contactless identification has been developing into an
`independent interdisciplinary field, which no longer fits into any of the conventional pigeon
`holes. It brings together elements from extremely varied fields: HF technology and EMC,
`semiconductor
`technology, data protection and cryptography,
`telecommunications,
`manufacturing technology and many related areas.
`As an introduction, the following chapter gives a brief overview of different auto ID
`systems, that perform similar functions to RFID.
`
`Ex.1007
`APPLE INC. / Page 13 of 19
`
`

`

`The RFID Handbook
`
`specific parts of the programme are not loaded into the EEPROM until after manufacture
`and can be initiated via the operating system.
`Microprocessor cards are primarily used in security sensitive applications. Examples are
`smart cards for GSM mobile phones and the new EC (electronic cash) cards. The option of
`programming the microprocessor cards also facilitates rapid adaptation to new applications
`[rankl].
`
`•
`
`N
`
`Vcc GND
`
`CPU
`
`RST Vpp
`
`•
`
`>
`
`CLK
`
`I/O
`
`RAM
`
`ROM
`(operating system)
`
`EEPROM
`(application
`data)
`
`Figure 1.5: Typical architecture of a microprocessor card
`
`1.1.5
`
`RFID systems
`
`RFID systems are closely related to the smart cards described above. Like smart card
`systems, data is stored on an electronic data carrying device - the transponder. However,
`unlike the smart card, the power supply to the data carrying device and the data exchange
`between data carrying device and reader are achieved without the use of galvanic contacts,
`using instead magnetic or electromagnetic fields. The underlying technical procedure is
`drawn from the fields of radio and radar engineering. The abbreviation RFID stands for
`radio frequency identification, i.e. information carried by radio waves. Due to the numerous
`advantages of RFID systems compared with other identification systems, RFID systems are
`now beginning to conquer new mass markets. One example is the use of contactless smart
`cards as tickets for short-distance public transport.
`
`A Comparison of Different ID Systems
`1.2
`A comparison between the identification systems described above highlights the strengths
`and weakness of RFID in relation to other systems. Here too, there is a close relationship
`between contact based smart cards and RFID systems, however the latter circumvents all
`the disadvantages related to faulty contacting (sabotage, dirt, unidirectional insertion, time
`consuming insertion, etc.).
`
`Ex.1007
`APPLE INC. / Page 14 of 19
`
`

`

`The Architecture of Electronic Data Carriers
`
`179
`
`Application
`data
`
`Authentication
`
`Reader 1
`
`Reader 2
`
`Key B
`
`Read only
`
`Read & write
`
`Key A / Acc A
`
`Key B / Acc B
`
`Transponder
`
`Key & "access right
`of the key" (Acc)
`
`Figure 10.10: A transponder with two key memories facilitates the hierarchical allocation of access
`rights, in connection with the authentication keys used
`
`The access rights to the transponder's two access registers A and B are configured such
`that, after successful authentication using key A, the system only permits the deduction of
`monetary amounts (the devaluation of a counter in the transponder). Only after
`authentication with key B may monetary amounts be added (the revaluation of the same
`counter).
`In order to protect against attempted fraud, the readers in vehicles or subway entrances,
`i.e. devaluers, are only provided with key A. This means that a transponder can never be
`revalued using a devaluer, not even if the software of a stolen devaluer is manipulated. The
`transponder itself refuses to add to the internal counter unless the transaction has been
`authenticated by the correct key.
`The high-security key B is only loaded into selected secure readers that are protected
`against theft. The transponder can only be revalued using these readers.
`10.1.3.4 Segmented memory
`Transponders can also be protected from access by readers that belong to other
`applications using authentication procedures, as we described in a previous chapter. In
`transponders with large memory capacities, it is possible to divide the entire memory into
`small units called segments, and protect each of these from unauthorised access with a
`separate key. A segmented transponder like this permits data from different applications to
`be stored completely separately.
`
`Ex.1007
`APPLE INC. / Page 15 of 19
`
`

`

`180
`
`The RFID Handbook
`
`Security
`encoding
`
`(planned)
`
`Appl. Y
`(planned)
`
`RFU
`
`Figure 10.11: Several applications on one transponder - each protected by its own secret key
`
`Access to an individual segment can only be gained after successful authentication with
`the appropriate key. Therefore, a reader belonging to one application can only gain access
`to its "own" segment if it only knows the application's own key.
`The majority of segmented memory systems use fixed segment sizes. In these systems,
`the storage space within a segment cannot be altered by the user. A fixed segment size has
`the advantage that it is very simple and cheap to realise upon the transponder's microchip.
`However, it is very rare for the storage space required by an application to correspond
`with the segment size of the transponder.
`In small applications, valuable storage space is wasted on the transponder, because the
`segments are only partially used. Very large applications, on the other hand, need to be
`distributed across several segments, which means that the application specific key must be
`stored in each of the occupied segments. This multiple storage of an identical key also
`wastes valuable storage space.
`A much better use of space is achieved by the use of variable length segments. Here, the
`memory allocated to a segment can be matched to the requirements of the application using
`the memory area. Because of the difficulty in realising variable segmentation, this variant is
`rare in transponders with state machines.
`
`Ex.1007
`APPLE INC. / Page 16 of 19
`
`

`

`The Architecture of Electronic Data Carriers
`
`183
`
`MfFARE® chip
`
`Manufacturer b ock"
`
`8=0, Y=1,Data
`
`S=0, Y=2, Data
`
`S=X, Y=0, Data
`
`S=X, Y=1,Data
`
`S=X, Y=2, Data
`
`Sector trailer
`
`conflg.
`
`Data blocks
`
`Write- / read block (16 byte)
`
`value-block
`
`ector 0
`
`Sector 1
`
`Sector 3
`
`Sector 4
`
`Sector 5
`
`Sector OxC
`
`Sector OxD
`
`Sector OxE
`
`Sector OxF
`
`16 sectors x 4 blocks x 16 bytes
`
`Figure 10.14: Memory configuration of a MIFARE® data carrier [koo]. The entire memory is
`divided into 16 independent sectors. Thus a maximum of separate 16 applications can be loaded onto
`a MIFARE® card
`
`Sector 0
`
`Sector 1
`
`;^^tOl^ji|
`
`Sectors
`
`Sector4,
`
`iectd'B
`
`Rector OxE
`
`'Seeto^fictil
`
`16 Sectors x 4 Blocks x 16
`
`S=0, Y=0, Manutacturer-Block
`
`S=0. YsO. Manuf. Block
`
`SNR
`
`TAG. Size....
`
`Production
`
`SsO. Ys1. Direcforv
`
`Y=3, Sector trailer:
`
`S=0. Y=2. Directory
`
`Key A
`
`I'-nlKevB
`Condibons 1 . .„l
`
`SsO. Ys3. Trailer
`
`.69: Card not oersonalized
`non-standard
`
`Y=1..2, Application Directory:
`
`ID7
`
`106
`
`IE»
`
`ID4
`
`IDS
`
`1D2
`
`IDl 1 Iwio'
`
`ORG
`
`lOSF
`
`IDSE
`
`IDSD
`
`IDSC
`
`IDSB
`
`IDSA
`
`IDS
`
`108 '
`
`R.F,U
`
`APPL(1=multl/
`0 = mono)
`
`C
`
`DIR available (1 = ves 10 =
`
`Read with
`key:
`A/B
`
`write with
`key:
`
`B
`
`Increment
`with key:
`
`•
`
`Dec, tif, ret
`with key:
`
`•
`
`INFO: 1 Byte Header, 1 Byte 8-Bit-CHC
`IDn: 2 Bvtes Aoolication Identifier. Sector n
`
`Figure 10.15: The data structure of the MIFARE® application directory consists of an arrangement
`of 15 pointers (IDl to ID$F), which point to the subsequent sectors
`
`Ex.1007
`APPLE INC. / Page 17 of 19
`
`

`

`Market Overview
`
`283
`
`Table 14.1 continued: Overview of RFID systems on the market
`
`System
`manufacturer:
`
`Coupling,
`operating
`method,
`energy,
`distance:
`
`Memory:
`gross / net:
`
`Security logic Downlink
`reader —>
`transponder:
`
`Uplink
`transponder
`—> reader:
`
`125 kHz, ind.,
`0 - 7 cm
`4 MHz, ind.,
`0 - 5 cm
`1.81 MHz,
`ind., 0 - 1 m
`
`14 k Mask
`ROM
`4kEEPROM
`7816 contacts
`240 Byte
`EEPROM
`512 Byte
`EEPROM
`128 Byte
`EEPROM,
`32 k RAM
`752 Byte
`EEPROM
`
`32 k RAM
`
`20 bit fix.
`SAW
`
`13.56 MHz,
`ind.,
`0 - 10 cm
`433 MHz,
`em., battery,
`0 - 80 cm
`2.45 GHz,
`em.,
`0-1.3m
`125 kHz, ind. 128 Byte
`EEPROM
`8 Byte, OTP
`Laser-ROM
`
`SLE44R42S
`(MIFARE®
`plus)
`
`MOBY-F
`
`MOBY-L
`
`MOBY-I
`
`MOBY-E
`
`MOBY-V
`
`SOFIS
`
`Sokymat
`Titan 4000
`Unique 1200
`
`Sony, FeliCa
`
`TagMaster AB,
`Confident
`S1251,S1255
`
`1 kByte
`
`8-75 Byte
`
`125 kHz, ind.,
`0 - 20 cm
`13.56 MHz,
`ind.,
`0 - 10 cm
`2.45 Ghz,
`em.,
`0^ m (read)
`0-0.5m
`(write), Li
`battery
`Temic, TK 5530 125 kHz, ind. 16 Byte
`PROM (Laser
`cutting)
`
`+ 8 bit.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`0.1 kbyte/s
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`n.i.
`
`>1 kbyte/s
`
`n.i.
`
`(read only)
`
`surface wave
`
`password
`
`n.i.
`
`ASK
`
`ASK
`
`authentication
`encryption
`
`anticollision
`
`modified
`ASK
`250 kbit/s
`(random
`interval
`mode) 4
`kBit/s
`
`n.i.
`
`read-only
`
`load
`modulation
`load
`modulation
`
`n.i.
`
`backscatter,
`16 kBit/s
`
`load
`modulation
`FSK,PSK, /
`Manchester,
`bi-phase,
`max. 15 kbit/s
`
`Ex.1007
`APPLE INC. / Page 18 of 19
`
`

`

`300
`
`The RFID Handbook
`
`Code
`DBP, 126
`differential, 126
`differential bi-phase, 126
`BAN, 2
`Manchester, 126, 145
`Miller, 126
`modified Miller, 127
`NRZ, 126,145, 165
`pulse-pause, 126
`unipolar RZ, 126
`Coding
`bit, 145
`in the baseband, 125
`Collar transponder, 245
`Collision, 142
`Combicard, 187
`Communication system, 125
`Configuration register, 177
`Contactless clock, 19
`Container, 167
`Container identification, 167, 258
`Coupling
`capacitive, 44
`close, 21,43, 163
`inductive, 22, 116, 275
`transformer, 36, 37
`vicinity, 166
`Coupling coefficient, 62
`Coupling element, 9
`capacitive, 164
`inductive, 164
`Coupling loss, 203
`CRC, 139
`Cryptological key, 151
`Cryptological unit, 174
`DASA, 279
`Data carrier, 9
`electronic, 171
`Data transfer, 125
`Deactivation device, 26, 170
`Deactivation rate, 170
`Deciphering, 155
`Decryption, 155
`Deister electronic, 279
`
`Demodulation, 125, 128, 172
`Demodulator, 125
`Detection rate, 26, 168
`Die, 220
`Diehl Ident, 279
`Dimple, 28
`Diode
`capacitance, 29
`low barrier Schottky, 42
`Dip, 27
`Dipole, 30
`Directed beam, 277
`Directional coupler, 42, 203
`Directivity, 204
`Disk, 13
`Dopant profile, 29
`Doppler effect, 195
`Driver, 208
`Dual interface card, 187
`Duplex
`full, 11,34
`half, 11,34
`Duty factor, 129
`Ear tag, 247
`EAS, 26, 27
`Eddy current, 64
`EEPROM, 191
`lifetime, 192
`Effective area, 108
`Effective length, 109
`Electric rotational field, 64
`Electromagnetic interference field, 276
`Electromagnetic procedure, 32
`Electromagnetic wave, 105, 211
`Electronic article surveillance, 11, 26
`Electronic immobilisation system, 15
`EM microelectronic-Marin, 279
`EN 300220, 122
`EN 300330, 117,120
`EN 300440,123
`Encrypted data transmission, 155
`Encryption, 155, 277
`Encryption function, 157
`End of burst detector, 47
`Endrich, 279
`
`Ex.1007
`APPLE INC. / Page 19 of 19
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket