Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens

Similar documents
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Evolving Bar Codes. Y398 Internship. William Holmes

How To Understand The Power Of An Freddi Tag (Rfid) System

Using RFID Techniques for a Universal Identification Device

Living Requirements Document: Sniffit

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

RFID based Bill Generation and Payment through Mobile

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

NFC. Technical Overview. Release r05

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

Discovering Computers Chapter 9 Communications and Networks

Frequently Asked Questions

RFID BASED VEHICLE TRACKING SYSTEM

Wireless LANs vs. Wireless WANs

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

Time & Access System An RFID based technology

Simple Smart Card Applications for Paratransit Systems

E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY

Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS. Chapter-1L06: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education

Introduction to Computer Networks and Data Communications

Warehouse Management System

Loyalty Systems over Near Field Communication (NFC)

Radio Frequency Identification (RFID) Vs Barcodes

Using ISO Compliant RFID Tags in an Inventory Control System

Gemalto Mifare 1K Datasheet

Supplement to Gaming Machine Technical Standards Consultation

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Efficient Asset Tracking: From Manual to Automated

The Cave Hill Campus Wireless Access Guide

LibRFID: Automation Software for Library Management System Using RFID Technology

CHAPTER 1 Introduction 1

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Computer Network and Communication

Enabling the secure use of RFID

RFID Design Principles

NETWORKING TECHNOLOGIES

RADIO FREQUENCY IDENTIFICATION IN LIBRARIES

Your Mobile Phone as a Ticket (NFC)

Telecommunications, the Internet, and Wireless Technology

BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID

International Journal of Engineering Research & Management Technology

Chapter 02: Computer Organization. Lesson 04: Functional units and components in a computer organization Part 3 Bus Structures

WSNetServer User Manual. Date: July

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Inventory & Location System

CMPT 165: The Internet, Part 3

DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch

Introduction. Network Basics. Workstations. Server. Hub

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

White Paper ON Dual Mode Phone (GSM & Wi-Fi)

Radio Frequency Identification (RFID)

A Smart Telephone Answering Machine with Voice Message Forwarding Capability

1) No configuration is necessary in ZDMC nor in RescueNet Field Data Configuration.

Network Fundamentals CHAPTER 1

The following sections describe the Gateway configuration pages in the SBG1000 Setup Program.

Secure your Privacy. jrsys, Inc. All rights reserved.

RF Attendance System Framework for Faculties of Higher Education

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

The GSM and GPRS network T /301

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Using Contactless Smart Cards for Secure Applications

RFID Design Principles

IT 3202 Internet Working (New)

Cloud RFID UHF Gen 2

GPS Based Automatic Vehicle Tracking Using RFID Devyani Bajaj, Neelesh Gupta

Chapter 7 Information System Security and Control

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Wireless Networks. Keeping your network running smooth and secure with the latest security and site analyses

OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:

ProxNet: Secure Dynamic Wireless Connection by Proximity Sensing

Beginners Guide to Mobile Technology

WHITE PAPER. ABCs of RFID

Intelligent Fleet Management System Using Active RFID

ADM:49 DPS POLICY MANUAL Page 1 of 5

Analytical Model for Automating Purchases using RFID-enabled Shelf and Cart

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

For the purpose of setting up a home network, all you need to worry about are two major categories of components:

Bidirectional wireless communication using EmbedRF

RFIDs and European Policies

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}

PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION

K.Srinivasu Ravi 1, Seema Kalangi 2, Veeraiah Maddu 3

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

Chapter 6 Using Network Monitoring Tools

Tracking metal parts with passive UHF RFID. April 2007

Chapter 9 Communications and Networks

Localization System for Roulette and other Table Games

Innovative Technology in Logistics

Chapter 2 Introduction

Fleets Vehicle GPS Tracker TR-11E User Manual (Version 1.0)

WIRELESS INSTRUMENTATION TECHNOLOGY

Mobile Devices: Server and Management Lesson 05 Service Discovery

Sample Project List. Software Reverse Engineering

The Research and Application of College Student Attendance System based on RFID Technology

RF ID Security and Privacy

Field Service Application

Transcription:

Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens Oxford University Press 2007. All rights reserved. 1

Smart systems Smart Labels Smart labels RFID Smart tokens Oxford University Press 2007. All rights reserved. 2

Smart Labels Smart Labels multiple applications in our day-to-day lives in their numerous forms such as identification Labels, key Labels, etc. Oxford University Press 2007. All rights reserved. 3

Label Serves the purpose of identifying the contents of a package A barcode label on a book packs in information about the publisher, title, author, publishing date, and reprint edition of a book Barcode labels also used in stores so that a reading machine can identify the product and its price. Oxford University Press 2007. All rights reserved. 4

Label differs from a card in terms of thickness and visibility A label using wireless means for product identification can be concealed inside the product Oxford University Press 2007. All rights reserved. 5

Smart Label Has a processor, memory, transceiver, and antenna similar to a contactless smart card Smart labels are essentially an earlier version of the now popular RFID tags Powered by the received signals just like smart cards Smart label need not be visible when implanted into a product or package. Oxford University Press 2007. All rights reserved. 6

Network of labels Oxford University Press 2007. All rights reserved. 7

Software in label Oxford University Press 2007. All rights reserved. 8

Access point software for label Oxford University Press 2007. All rights reserved. 9

Smart Labels Network Networked together using a central reading and computational device (host) or PC Cluster of labels form a network similar to a LAN network Collision-sense-and-avoidance protocol used so that multiple labels are not allocated the same ID tag and the central server can uniquely identify each one Oxford University Press 2007. All rights reserved. 10

Smart Labels Use secured hardware and serverauthentication software The central server also detect the removal of a labelled product or packet from a product-shelf and raises alarm in case the product does not reach the destined point, for example the cash counter in a store Oxford University Press 2007. All rights reserved. 11

RFID automatic identification method Remote storage and retrieval of data on RFID tags RFID tags are objects that when tagged (attached) onto people, products, or animals enable their identification using radio waves from a nearby source RFID tags or labels contain integrated circuit chips and antennas. Oxford University Press 2007. All rights reserved. 12

RFID computations and Data transfer rates Usually limited to transmission of the tags contents Data transfer rates of up to 115 kbps with signals from 915 MHz, 868 MHz (at the higher end of the spectrum to 315 MHz and 27 MHz (at the lower end of the spectrum) Oxford University Press 2007. All rights reserved. 13

RFID tag Each one monitored by a hotspot in the vicinity of the tag A line-of-sight access The hotspot computer and wireless transceivers transmits and receive signals from the RFID tags Oxford University Press 2007. All rights reserved. 14

RFID tag hotspots The hotspots connect to the Internet through a leased line, wireless, or mobile services. A mobile device or PC with a wireless interface is programmed to function as the hotspot. Oxford University Press 2007. All rights reserved. 15

RFID and Hot spot Oxford University Press 2007. All rights reserved. 16

Smart Token Used for authentication purposes before an action, such as granting entry into a restricted area, is initiated A smart token an encapsulated chip including an embedded processor and a memory Token sizes small, usually of the order of a shirt button or a pen nib Oxford University Press 2007. All rights reserved. 17

Smart Token Protocols Use either a wire-based protocol and communicate at 16 to 128 kbps or ASK 13.56 Mbps for contact-less communication. Oxford University Press 2007. All rights reserved. 18

Token Applications A smart token for granting permissions to employees to enter a work place. A smart token to remotely open the car doors Oxford University Press 2007. All rights reserved. 19

Token Applications Defence departments can accept only authenticated parcels. A smart token in a button form concealed within a parcel and used for authentication of supplies sent to defence departments Oxford University Press 2007. All rights reserved. 20

Summary Smart Label computer, memory and transceiver Network of labels Hotspot RFIDs Tokens Oxford University Press 2007. All rights reserved. 21

End of Lesson 04 Smart Systems Labels, RFID and tokens Oxford University Press 2007. All rights reserved. 22