UHF RFID Embedded in Electronic Devices. Chris Diorio CTO, Impinj Inc.
|
|
- Tamsin Gilmore
- 6 years ago
- Views:
Transcription
1
2 UHF RFID Embedded in Electronic Devices Chris Diorio CTO, Impinj Inc
3 UHF RFID Applications Today Supply-Chain Tracking Asset/Returns Management Retail Inventory Pharmaceuticals Authentication Consumables Authentication Customer Experience
4 The Next Application: Embedded RFID Embedded RFID enables wireless communications between a powered reader and an unpowered tag Unpowered communications is the key feature of Embedded RFID
5 The Tag Enabler: Monza X I2C interface for µp read/write memory access 400 kbps I2C data rate Wake-on-write I2C interrupt Large user memory Monza X 2k: 2176 bits Monza X 8k: 8192 bits Monza (industry leading) read and write sensitivity 6dB additional sensitivity with DCI True3D antenna technology QT security and privacy
6 The Reader Enabler: Indy RS500 Turnkey reader SIP that makes embedded RFID easy Impinj Radio Interface (IRI) 23dBm Tx over single RF port No external components required 30 32mm surface-mount package PA Market-leading performance Ideal for embedded applications
7 Example: SKU Reduction Write SKU# at shipment SKU-specific FW update SKU #1 SKU #1 SKU #2 SKU #1 Download proper FW
8 Example: PCB tagging WIP tracking Replaces barcode, saves PCB area Potentially embeddable inside PCB Warranty, returns, service Readable from outside device Can store service history Anti-counterfeiting Difficult to clone Easily traced Anti-diversion Deter theft Deter gray market Hypothetical additional use case: MonzaX in a mobile phone 1m read range Payment terminal identifies phone WiFi or Bluetooth then initiate secure communications with identified phone
9 Example: Consumables Authentication Appliances Beverage syrup Coffee pods Printer cartridges Water filters Air filters Batteries Light bulbs Brush heads Fleet/leased vehicles Air and oil filters Healthcare equipment Blood bags, more
10 Emerging RFID Apps Entertainment Smart toys Gaming hardware Hospitals Process control Kiosks Business intelligence Shopping experience Diagnostics Wireless error-code access from unpowered devices
11 Embedded RFID Will Deploy Broadly Phones Desktops Netbooks Laptops Tablets Servers Smart TVs Embedded Consumer electronics will embed UHF RFID broadly Battery-less communications = endless applications But up to now, we were missing a few key protocol elements
12 New UHF Gen2 V2 Protocol (aka G2) G2 is a superset of all existing RFID technologies Existing UHF Gen2 + new concepts/ideas Legacy HF/NFC concepts Legacy EAS concepts Files & File Management (New) Short Read Range (NFC, HF) Item Authentication (NFC) File Privileges (New) G2 Large Tag Populations (Gen2) Long Read Range (Gen2) Cryptographic Security (NFC, HF) Fast Inventory (Gen2) Consumer Privacy (New) Loss Prevention (EAS)
13 UHF Gen2 and G2 Protocol Functionality Gen2 Today Select Inventory Access G2 Enhancements Anticounterfeiting Security File Management Untraceability Loss Prevention Definition Select a population of tags Inventory selected tags; get their EPCs Read/write/lock tag memory; kill the tag Definition Authenticate a tag as genuine Modify tag information securely Create files and assign access privileges Hide tag data to protect consumer privacy Use a tag for EAS In today s UHF Gen2 protocol New in UHF Gen2 V2 protocol = G
14 G2 for Cryptographic Anticounterfeiting Today s Gen2 RFID TID Future G2 RFID Key Read TID Challenge (RN) Response Reader reads static TID from tag memory Counterfeiter can clone tag by copying TID Tag computes response from reader s random challenge and tag s secret key Counterfeiter cannot clone tag without knowing secret key
15 G2 for Cryptographic Security Command Challenge Authenticate AuthComm SecureComm KeyUpdate FilePrivilege TagPrivilege Function Challenges multiple tags simultaneously Performs tag, reader, or mutual authentication Authenticates a tag message with a MAC Encrypts a tag message Updates a tag s stored key Alters a reader s privileges to a file Alters a reader s privileges to the tag
16 G2 for File Management Key Concept: Partition User Memory into Files Tag Memory Readers have per-file read, write, and lock privileges G2 supports up to 1023 files, each of which can be up to ~2 Mbytes in size
17 G2 for Consumer Privacy (Untraceability) Key Concept: Hide Portions of Tag Memory Tag Memory Protected by range reduction, access privileges, or both Hide none or all Hide none, unique serialization, or all Hide none, part, or all Hide none, part, or all
18 G2 for Loss Prevention
19 G2 Status GS1 EPCglobal is finalizing the specification The specification is complete Has passed out of the working group Next step is approval and ratification Community and IP review Ratification (anticipated in 4Q 2012) ISO is standardizing the crypto suites 7 crypto suites submitted to date Present, ECC, AES ( 2), Grain, Hummingbird, CryptoGPS ISO will ratify the first crypto suites in
20 G2 Will Enable New Embedded Applications Brings people information about the physical world Product authenticity, provenance, price, location Electronic device configuration/enablement Shelf availability & shopping experience Food, medicine, patient safety Personal experience
21 Thank You #1 Market Share #1 Market Share #1 Market Share Most comprehensive platform in the industry
22
23
A Look Inside Today's Embedded RFID. Chris Diorio CTO, Impinj Inc.
1 2013 1 A Look Inside Today's Embedded RFID Chris Diorio CTO, Impinj Inc. 2 What is Embedded RFID? Definition Incorporating UHF RFID technology into another device for the purposes of configuration, authentication,
More informationEasily add high-performance UHF RFID and bar code capture to the mobile devices
AT RFD 8500 Series Easily add high-performance UHF RFID and bar code capture to the mobile devices With the RFD8500 compatible third-party mobile devices, tablets and smart phones with enterprise-class
More informationIntel and the Future of Consumer Electronics. Shahrokh Shahidzadeh Sr. Principal Technologist
1 Intel and the Future of Consumer Electronics Shahrokh Shahidzadeh Sr. Principal Technologist Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
More informationSecurity and Privacy in RFID Evolving Application Spaces for Edge Security
1 Security and Privacy in RFID Evolving Application Spaces for Edge Security Chris Hanebeck, VP Product Management & Marketing Revere Security First, Allow Me to Scare Everyone And It Gets Worse Lockheed
More informationHibiki Project and Secure RFID Project
Hibiki Project and Secure RFID Project October 22, 2007 Hitachi, Ltd. Yo Nakajima Hitachi, Ltd. 2007. All rights reserved. 0 1. About Hitachi 2. Hibiki Project / Secure RFID Project 3. Cases in Japan 4.
More informationAdvanPay-160 High power desktop RFID reader with hard tag detacher and keyboard wedge
Product overview AdvanPay-160 is a high power RFID desktop reader with hard tag detacher that increases the speed of payment at cash registers. AdvanPay-160 merges 2 processes: 1.Hard tag detachment 2.Product
More informationAdvanPay-110 High power desktop RFID reader with keyboard wedge
Product overview AdvanPay-110 is a high power RFID UHF desktop reader that integrates: An antenna with a highly confined reading area Keyboard emulation by hardware. It s not needed to install any software
More informationST25TV product presentation. June 2018
ST25TV product presentation June 2018 ST25TV512 / 02K Product 2 The ST25TV chip belongs to ST25 NFC / RFID Tags & Readers family ST25TV is the natural evolution of LRI2K series The ST25TV512 / ST25TV02K
More informationConnecting to the future ELATEC RFID SYSTEMS
Connecting to the future ELATEC RFID SYSTEMS ELATEC GmbH Enabling success RFID SYSTEMS Focus on the goal Adaptable to our customer s requirements, Elatec products and technologies are the core that has
More informationUHF RFID tag IC with cryptographic authentication
SPECIFICATION 1 FEATURES SMIC EEPROM CMOS 180 nm Operating temperature range -40 +65 C Passive operation no battery needed Operating frequency 860-960 MHz EPC Class 1 Generation 2 compliant 352 bit memory
More informationSIC4340 with 3x Potentiometer for Action Figure Toy Ultra-FDX Transponder IC SIC7888 SIC7888 is a read/write low frequency FDX RFID microchip intentionally designed to maximize the read range.
More informationEEPROM с двойным интерфейсом RF/serial. ноябрь 2011
EEPROM с двойным интерфейсом RF/serial ноябрь 2011 The Dual interface E2PROM in HOME APPLIANCES Dual Interface EEPROM Introduction The Dual Interface EEPROM is an electrically-erasable memory which communicates
More informationAn IoT-Aware Architecture for Smart
An IoT-Aware Architecture for Smart Healthcare System Presented By: Amnah Allboani Abstract Smart hospital system (SHS) relies on complementary technologies specifically RFID, WSN, and smart mobile, interoperating
More informationIndy Reader Chip Family
UHF Gen 2 RFID Transceivers Indy Reader Chip Family Indy Reader Chip Family Performance and Flexibility Key Building Blocks Address All Market Segments The Impinj UHF RFID product line includes the Indy
More informationiclass SE Platform Solutions The New Standard in Access Control
iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.
More informationFLYchip 2kbit User Guide
Product range FLYchip 2kbit Reference 12312 Document Technical bulletin FLYchip 2kbit User Guide Copyright 2004-2013 MAINtag RFID & Tracing Technologies. 8 rue Edouard 94100 Saint-Maur des Fossés Registration
More informationALR-S350 Sled Handheld Universal Mobile RFID without the Hassle
ALR-S350 Sled Handheld The ALR-S350 is a robust, simple to use UHF passive RFID sled designed for all day intensive use. The sled characteristics provides the flexibility to use your preferred operating
More informationRX Reader. User Manual UHF RFID. Version 1.0
UHF RFID RX Reader User Manual Version 1.0 2016 unitech Electronics Co., Ltd. All rights reserved. unitech is a registered trademark of unitech Electronics Co., Ltd. Preface About This Manual This manual
More informationAsReader Desktop Demo Reference Guide v1.2
AsReader Desktop Demo Reference Guide v1.2 Asterisk, Inc. 2018-11-5 Revision History No. Version Modified Content Date Reviser 1 1.1 Initial version 2018/10/18 Zhen Liu 2 1.2 1. The mask, tag lock, tag
More informationQUO VADIS RFID TECHNOLOGY?
QUO VADIS RFID TECHNOLOGY? EMERGING RFID TECHNOLOGY ROADMAP O. Vermesan, SINTEF, Oslo, Norway D. Grosso, Montalbano Technology, Genova,, Italy F. Dell'Ova,, ST Microelectronics, Rousset,, France C. Prior,
More informationInteractive Gen2 Bridging the Gap between Passive RFID, Sensors and Electronics
Interactive Gen2 Bridging the Gap between Passive RFID, Sensors and Electronics Victor Vega Marketing Director, RFID Solutions 28 July 2011 Agenda AGENDA Intro Traditional & Next Gen RFID Sensor Supporting
More informationVela Desktop Reader User Guide
Vela Desktop Reader User Guide Disclaimer Star Systems International and the Star Systems International logo are trademarks of Star Systems International Ltd. in Hong Kong and other countries. Microsoft,
More informationNTAG for Electronics. James Zhu Business Development Manager Business Unit Identification
NTAG for Electronics James Zhu Business Development Manager Business Unit Identification Agenda NFC market at a glance NTAG portfolio NTAG 21xF NTAG I²C NFC market at a glance Mobile is the New Computing
More informationEBV Personalization Services for Security Devices
Infineon Security Partner Network Partner Use Case EBV Personalization Services for Security Devices Secured generation and storage of personalized OEM certificates in the OPTIGA Trust E for sophisticated
More informationWJM3000G. Next Generation RFID Reader Module. Key Features. Applications: Printers Item-level RFID Mobile & handheld devices Fixed readers
Key Features x Multi-protocol support: ISO 18000-6C (Gen2) & ISO 18000-6B x Dynamic RF output power: +18 dbm to +30 dbm (1W) range x Two antenna ports for added flexibility x Power saving modes to extend
More informationCardOS Secure Elements for Smart Home Applications
Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.
More informationACR1255 NFC Bluetooth Smart Card Reader
ACR1255 NFC Bluetooth Smart Card Reader User Manual V1.00 Name Signature Date Prepared by: Tommy Wong 2015-05-28 Reviewed by: Approved by: Subject to change without prior notice Table of Contents 1.0.
More informationTHE BEST OF BOTH WORLDS. Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security. By Mahdi Mekic, NXP Semiconductors
THE BEST OF BOTH WORLDS Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security By Mahdi Mekic, NXP Semiconductors A new generation of contactless smartcards, built to support
More informationWireless Best Kept Secret For Now
Wireless Best Kept Secret For Now IoT Event June 2014 Gilles Thonet Managing Director Europe, ZigBee Alliance 2014 ZigBee Alliance. All rights reserved. 1 ZigBee Alliance at 10 Years Who we are Open, global,
More informationTAG GD3030 rugged tablet
white paper TAG GD3030 rugged tablet The rugged design that boost efficiency in critical situations The TAG GD3030 Makes Every Task More Efficient The TAG GD3030 is the latest 10.1 IP65 Windows tablet
More informationInternet of Things (IoT)
Internet of Things (IoT) INF5050 February 19, 2016 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual entity that exists and moves
More informationTAG GD700 rugged tablet
white paper TAG GD700 rugged tablet Designed to be ready for always-connected duty The TAG GD700 Suitable for a wide range of deployments The TAG GD700 is a 7-inch tablet that s part of TAG Global System
More informationSecure UHF Tags with Strong Cryptography Development of ISO/IEC Compatible Secure RFID Tags and Presentation of First Results
Development of ISO/IEC 18000-63 Compatible Secure RFID Tags and Presentation of First Results Walter Hinz, Klaus Finkenzeller, Martin Seysen Barcelona, February 19 th, 2013 Agenda Motivation for Secure
More informationLiBS Mobile Version 1.9 Lite RFID Shelf Management User Manual
LiBS Mobile Version 1.9 Lite RFID Shelf Management Revision: 1.0 Date: Jan. 20 th, 2014 2014 All rights reserved. Table of content About LiBS Mobile Lite...3 Product Components...3 Product Characteristic...3
More informationInternet-of-Things Conference. Andrew Bickley Technology Marketing Director
Internet-of-Things Conference Andrew Bickley Technology Marketing Director Presentation today The IoT node market Technology and architecture challenges Node architectures Internet of Things Wireless Up
More informationConfidex UHF RFID and NFC Hard Tags and Labels for Smart Industries
Confidex UHF RFID and NFC Hard Tags and Labels for Smart Industries Confidex links everything Intelligently. Data to Knowledge enabling Industrial Digitalization since 2005 Confidex is the world s leading
More informationSmart Retail Solution. Building an intelligent retail makes business smarter.
Smart Retail Solution Building an intelligent retail makes business smarter www.ieiworld.com Building an intelligent retail makes business smarter IEI smart retail solution combines PSI, kiosk and digital
More informationInternet of Things (IoT)
Internet of Things (IoT) Yan Zhang Professor, University of Oslo, Norway April 7, 2017 1 Outline Internet of Things (IoT) Key Technologies RFID Mobile Cloud Computing Things A real/physical or digital/virtual
More informationACR1255U-J1 Secure Bluetooth NFC Reader
ACR1255U-J1 Secure Bluetooth NFC Reader Technical Specifications V1.07 Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Smart Card Reader... 3 1.2. Compact Design...
More informationHID Proximity Credentials
HID Proximity Credentials ProxCard II Value priced 125 khz proximity card Base Part Number 1326 Price competitive with all other card technologies Thin enough to carry in a wallet or purse ISOProx II 125
More informationNXP Semiconductors Smart Grid, Smart Mobility. Maurice Geraets June 2014
Z NXP Semiconductors Smart Grid, Smart Mobility Maurice Geraets June 2014 NXP Semiconductors Established in 2006 (formerly a division of Royal Philips) Nasdaq listed (NXPI) Net sales: >$4.8 billion in
More informationATID Co., Ltd. AT188N User guide. AT188N Product User guide. Won-Tak Choi
ATID Co., Ltd. AT188N User guide AT188N Product User guide Won-Tak Choi 2016-03-02 Revision History Version Revised Date Revised Reason Revised Contents Writer V0.1 2015-07-31 Draft Issue Draft Byung-Gil
More informationLeveraging the full potential of NFC to reinvent physical access control. Friday seminar,
Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses
More informationCONTACT US Firefly RFID Solutions 1521 Boone Trail Road Sanford, NC Phone:
2014 CATALOG 1 Firefly RFID Solutions is please to present its 2014 product catalog. Inside you will find Firefly s industry leading, enterprise-class RFID supply chain applications for in-store retail,
More informationRPT100. Bluetooth UHF RFID & Barcode Reader
RPT100 Bluetooth UHF RFID & Barcode Reader Intro The RPT100 is Bluetooth UHF RFID & barcode reader, compatible with any host devices using Android, ios and Windows (Mobile, CE, PC). Unlike typical gun-type
More informationDual Interface EEPROM. December 2011
Dual Interface EEPROM Product presentation December 2011 Dual Interface EEPROM Introduction New MCU control function Low-power I2C interface RFID and NFC compatible RF interface Unique Energy Harvesting
More informationNXP Connects the Car 25 Jul. 2013
NXP Connects the Car 25 Jul. 2013 Winston Zhou Senior Marketing Manager, BU Automotive, GC Business Unit Automotive NXP Semiconductors NXP Semiconductors N.V. (NASDAQ: NXPI) provides High Performance Mixed
More informationA Novel Approach to RFID Authentication: The Vera M4H Unclonable RFID IC
A Novel Approach to RFID Authentication: The Vera M4H Unclonable RFID IC Presenter: Vivek Khandelwal, Vice President of Marketing & Business Development 1 Agenda» Company Overview» PUF Technology Overview»
More informationNew Delhi India. Ph: (+91) , Identium Tech Solutions
RFID Inlay Catalogue 2017 New Delhi India Email: tags@identags.com Ph: (+91) 7827944632, 9711863861 INTRODUCTION: ID X40 IS A WIDE BAND EPC CLASS 1 GEN 2 MULTIPURPOSE TAG HAVING EXCELLENT READ PERFORMANCE
More information[Type here] M904S. Bluetooth 4.0 SiP Module - BT 4.0 LE
[Type here] M904S Bluetooth 4.0 SiP Module - BT 4.0 LE Preliminary DATASHEET 26 th March, 2018 Table of Contents 1 Product Brief... 1 2 Features and Applications... 2 3 Block Diagram... 3 4 Technical Specifications...
More informationNomad RFID Reader Design Guide
PN: 875-0067-01 RevA TM Nomad RFID Reader Design Guide http://www.fuwit.com Government Limited Rights Notice: All documentation and manuals were developed at private expense and no part of it was developed
More informationSPECIFICATION SHEET HAND HELD DEVICE SPECIFICATION
HAND HELD DEVICE SPECIFICATION Application Flexibility Support D,2D barcode scanning, RFID & imaging 2 Construction Rugged. IP64 rated sealing 3 Antennas Integrated Internal Antennas 4 Antenna Direction
More informationThingMagic M6-e Micro FAQ
ThingMagic M6-e Micro FAQ ThingMagic Mercury6e-Micro (Micro) UHF RFID module is designed to meet the demands of high performance RFID handheld, mobile, and stationary readers. This module offers two antenna
More informationSYRDBT. SYRIS Handheld bluetooth RFID Reader
SYRDBT SYRIS Handheld bluetooth RFID Reader V0200 SYRIS Technology Corp. Address: 12F., No.16, Sec. 2, Taiwan Blvd., West Dist., Taichung City 403, Taiwan TEL: +886-4-2207-8888 FAX: +886-4-2207-9999 E-Mail:
More informationImpinj Monza X-8K Dura Datasheet Rev 1.1 September 10, 2013
Part Order #: IPJ-P6005-X2AT Impinj Monza X-8K Dura Datasheet Rev 1.1 September 10, 2013 Monza X-8K Dura is a UHF Gen2 RFID IC product with 8192 bits of user Non Volatile Memory (NVM) and an I2C interface.
More informationSecuring Pharmaceutical and High-Value Products Against Tag Reapplication Attacks Using NFC Tags
Securing Pharmaceutical and HighValue Products Against Tag Reapplication Attacks Using NFC Tags Nirupama Bulusu Portland State University, Portland OR, USA nbulusu@pdx.edu Naif Alzahrani Portland State
More informationNXP Smart Washing Machine Solution
NXP Smart Washing Machine Solution 恩智浦智能洗衣机方案 Mike Mui Senior Sales Director, Global Appliance Segment NXP Semiconductors July, 2012 Content NXP & Major Home Appliances Home Automation Market Generic Smart
More informationNFC is the double click in the internet of the things
NFC is the double click in the internet of the things Name Frank Graeber, Product Manager NFC Subject 3rd Workshop on RFID Systems and Technologies Date 12.06.2007 Content NFC Introduction NFC Technology
More informationRFID Tag. Catalogue New Delhi India. Ph: (+91) , Identium Tech Solutions
RFID Tag Catalogue 2017 New Delhi India Email: tags@identags.com Ph: (+91) 7827944632, 9711863861 HF RFID TAGS INTRODUCTION: ID HDL38IS A HIGH MEMORY HF RFID INLAY WITH IK MEMORY SIZE FEATURES : Ø FAST
More informationSystem LSI Research Center, Grad. Sch.. Information Science & Electrical Engineering, Kyushu Univ., Japan
RFID Privacy Using User-controllable Uniqueness Sozo INOUE, Hiroto YASUURA System LSI Research Center, Grad. Sch.. Information Science & Electrical Engineering, Kyushu Univ., Japan Suppose: Ad.: Super
More informationWITH RFID SENSORS INTO THE CLOUD. Fraunhofer IPMS Frank Deicke I I Slide 1
WITH RFID SENSORS INTO THE CLOUD Frank Deicke I 16.11.2017 I Slide 1 What is RFID? Radio Frequency Idenficiation ID scanning Read/Write Track&Trace Sources: howtogeek.com Frank Deicke I 16.11.2017 I Slide
More informationUnit 2: Technology Systems
Unit 2: Technology Systems Level: 1 and 2 Unit type: Core Guided learning hours: 30 Assessment type: External Unit introduction Technology systems are involved in many of the objects we use every day,
More informationNFC FOR CONSUMABLES AND ACCESSORIES
NFC FOR CONSUMABLES AND ACCESSORIES JORDI JOFRE NFC READERS NFC EVERYWHERE 22/02/2018 WEBINAR SERIES: HOW TO DEVELOP NFC APPLICATIONS PUBLIC Agenda NFC for product authentication & identification NFC portfolio
More informationWireless Challenges and Resolutions
Wireless Challenges and Resolutions 1 Steven Shelton Senior Network Engineer Oak Ridge National Laboratory Oak Ridge, Tennessee ows@ornl.gov 2 Wireless Challenges and Resolutions Sections Common Problems
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationPaul A. Karger
Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger karger@watson.ibm.com Outline Identify specific problem with FIPS 201 Problem of
More informationID 1xx Series Cryptoterminals Trusted Hardware Security for Mobile Identity Solutions
ID 1xx Series Cryptoterminals Trusted Hardware Security for Mobile Identity Solutions The ID 1xx series devices are ideal for mobile and desktop computing platforms requiring registration and identity
More informationTHE ZEBRA PRODUCT PORTFOLIO. Solutions that track, identify and manage in a fast-moving world
THE ZEBRA PRODUCT PORTFOLIO Solutions that track, identify and manage in a fast-moving world ( ) 2 (02) 44237556 44237795 4423232 44246790-9 44268620-2 www.zebrasia.com www.zebra.ir Improving customers
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More informationImpinj Monza X-2K Dura Datasheet
Part Order #: IPJ-P6001-Q2AT Impinj Monza X-2K Dura Datasheet Rev 1.31 October 4, 2012 Monza X-2K Dura is a UHF Gen2 RFID IC product with 2176 bits of Non Volatile Memory (NVM) and an I2C interface. As
More informationIDRO RFID.
www.idro.co.kr About IDRO: IDRO Co., Ltd provides high performance UHF RFID reader and reader modules. Our UHF RFID readers are the state-of-the-art for all applications and fully compliant with the FCC
More informationSecure Card Reading and PIN Solutions
Secure Card Reading and PIN Solutions When it comes to Card Reader security and reliability MagneSafe Secure Card Readers & PIN Pads Merchants and retailers both online and in-store rely on MagTek. MagTek
More informationQuickSpecs. HPE OfficeConnect M n Access Point Series. Overview. HPE OfficeConnect M n Access Point Series
Overview Models HPE OfficeConnect M220 802.11n (AM) Access Point HPE OfficeConnect M220 802.11n (WW) Access Point J9798A J9799A Key features IEEE 802.11a/b/g/n access point Single-radio, dual-band (2.4
More informationAndroid Samsung Galaxy S6 Edge
Android 6.0.1 Samsung Galaxy S6 Edge Access your quick menu by using two fingers to pull down the menu from the top-center of the screen. You can use this to quickly turn your Wi-Fi, Location, Bluetooth,
More informationADVANCED ATTACKS AGAINST MOBILE/IOT DEVICES
CONTEXT- AWARE SECURIT Y THROUGH RAIN RFID ADVANCED ATTACKS AGAINST MOBILE/IOT DEVICES H A R D W A R E S O F T W A R E W I R E L E S S / N E T W O R K S Cold-Boot Attacks Chip-Extraction Side-Channel Attacks
More informationThe Next Generation of Credential Technology
The Next Generation of Credential Technology Seos Credential Technology from HID Global The Next Generation of Credential Technology Seos provides the ideal mix of security and flexibility for any organization.
More informationETSI Standardization for (RF)ID-Systems. ETSI RFID Workshop, February 25th,
ETSI Standardization for (RF)ID-Systems ETSI RFID Workshop, February 25th, 2008 1 TCAM Statement At its 21 st meeting, Oct. 2006 TCAM stated that RFID Readers / Writers, RFID Tags active and passive fall
More informationWelcome Subject to change without prior notice / Siemens AG, 2009
Welcome RF-MANAGER 2008 and Service Pack 1 Technical Overview Subject to change w ithout prior notice / Siemens AG, 2009 RFID system components Stationary read/write devices Mobile read/write devices Software
More informationProduct: RS31. Official Launch: June 29 th, 2017
Product: RS31 Official Launch: June 29 th, 2017 CipherLab has the pleasure to introduce you the new RS31 series Android touch computer, evolved from RS30 series with enhanced features for the demanding
More informationU B I Q U I T O U S S O L U T I O N RFID/USN
U B I Q U I T O U S S O L U T I O N RFID/USN XCODE - System Architecture XCODE is a total solution that provides not only RFID tags, readers, sensors, networks, control devices, but also various integrated
More information[Type here] M905. Bluetooth 4.2 Low Energy SiP Module with MCU and integrated antenna
[Type here] M905 Bluetooth 4.2 Low Energy SiP Module with MCU and integrated antenna Preliminary DATASHEET 23 th January, 2017 Table of Contents 1 Product Brief... 1 2 Features and Applications... 2 3
More informationHigh Definition TV Technology Standards FIGURE 1 DIGITAL TV SYSTEMS Products HDTV Program Production and Transmission
INTRODUCTION... XVII RADIO FREQUENCY TECHNOLOGIES AND APPLICATIONS... XVII STUDY BACKGROUND... XVII STUDY GOALS AND OBJECTIVES... XVIII INTENDED AUDIENCE... XIX SCOPE AND FORMAT... XIX METHODOLOGY AND
More informationBLE MODULE SPECIFICATIONS
WIRELESS-TAG BLE MODULE SPECIFICATIONS nrf51-01/02/dk Bluetooth Low Energy (BLE) module of nrf51-01/02 is the next generation BLE module released by SEMITRION electronics. The modules use nrf51822 from
More informationA Multi-Application Smart-Card ID System for George Mason University. - Suraj Ravichandran.
A Multi-Application Smart-Card ID System for George Mason University - Suraj Ravichandran. Current System Magnetic Swipe Card based ID The card has three tracks They each store the following: Name, G#
More informationMultifunctional Identifiers ESMART Access
AIR TAG Multifunctional Identifiers ESMART Access Contents ESMART Access technology 4 Key advantages of ESMART Access 6 Multifunctional identifiers ESMART Access 8 AIRTAG RFID keyfobs 9 Silicone RFID
More informationLecture 20: Future trends in mobile computing. Mythili Vutukuru CS 653 Spring 2014 April 7, Monday
Lecture 20: Future trends in mobile computing Mythili Vutukuru CS 653 Spring 2014 April 7, Monday Future topics Improving capacity Dynamic spectrum access Massive MIMO Heterogeneous networks Pervasive
More informationZebra Performance Desktop Printers
Zebra Performance Desktop Printers GX420 (thermal transfer and direct thermal) GX430 (thermal transfer) ZD500 (thermal transfer and direct thermal) Zebra s performance desktop printers deliver best-in-class
More informationSmart Phone Cradle (Option) Barcode Scanner (Option) RF Antenna. Lamp for reading-status. Status Display LCD. Power Adopter USB Terminal
Smart Phone Cradle (Option) Barcode Scanner (Option) RF Antenna Lamp for reading-status Status Display LCD Power Adopter USB Terminal Trigger Tag, Barcode-recognition Titles of parts 1 2 3 4 7 5 6 Power
More informationNFC Identity and Access Control
NFC Identity and Access Control Peter Cattaneo Vice President, Business Development Agenda Basics NFC User Interactions Architecture (F)ICAM Physical Access Logical Access Future Evolution 2 NFC Identity
More informationEnhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning
All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to
More informationCode Reader 900FD... 6 Code Reader Code Reader Code Reader Code Reader Code Reader 3600 / Code Reader 3600
Code Reader 900FD... 6 Code Reader 1000... 7 Code Reader 1400... 8 Code Reader 2300... 10 Code Reader 2600... 12 Code Reader 3600 / Code Reader 3600 DPM... 15 Code Reader 4405... 16 Code Reader 6000...
More informationElectrification of Mobility
Electrification of Mobility Moderator: Andreas Schafer, Cambridge University and Stanford University Panelists: Mary Nickerson, Toyota Ed Kjaer, Southern California Edition Flavio Bonomi, Cisco Systems
More informationDatasheet IMPINJ MONZA DURA DATASHEET IPJ-P6005-X2AT X-8K. Version , Impinj, Inc.
Datasheet IMPINJ MONZA DURA DATASHEET IPJ-P6005-X2AT X-8K Version 4.0 2016, Impinj, Inc. www.impinj.com OVERVIEW Monza X-8K Dura is a UHF Gen2 RFID IC product with 8192 bits of user Non Volatile Memory
More informationNew STM32WB Series MCU with Built-in BLE 5 and IEEE
New STM32WB Series MCU with Built-in BLE 5 and IEEE 802.15.4 Make the Choice of STM32WB Series The 7 keys points to make the difference 2 Open 2.4 GHz radio Multi-protocol Dual-core / Full control Ultra-low-power
More informationSmart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology. Smart Card Alliance2005 Fall Annual Conference Martin Bührlen
Smart Card meets Connectivity New Opportunities in Mobile Business with NFC Technology Smart Card Alliance2005 Fall Annual Conference Martin Bührlen Agenda NFC Technology Use Cases Implications for the
More informationComputer Buying Tips
Reference Services Division Presents Computer Buying Tips Get the information you need to be a savvy consumer when shopping for your first or next computer. This handout provides an overview of the types
More informationMaxReader Development Kit
MaxReader Development Kit Capture, transmit and store more data with F-RAM high-performance wireless memory EPC Gen2 Wireless Protocol (860MHz 960MHz) Quick Reference Guide Quick Reference Guide MaxReader
More informationLow Frequency RFID reader for Motorola MC70, MC75 and MC75A
Low Frequency RFID reader for Motorola MC70, MC75 and MC75A + Features and benefits: Mounts on the base of the MC70/75/75A terminal LF RFID reader is powered from the host terminal Motorola MC70/75/75A
More informationSKYEWARE PROTOCOL V3 REFERENCE GUIDE VERSION
SKYEWARE PROTOCOL V3 REFERENCE GUIDE VERSION 040218 SkyeWare Protocol V3 Reference Guide P a g e 2 COPYRIGHT INFORMATION: Copyright 2018 Novanta Corporation. All rights reserved. Version 040218 This product
More informationS P O N S O R E D B Y
S P O N S O R E D B Y Audio Requirements Log in using the link in the email you received after you registered Click on the triangle next to the word Audio on the tool palette Choose use Telephone or Mic
More information