Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer...

8
Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas http://rfidsecurity.uark.edu 1 This material is based upon work supported by the National Science Foundation under Grant No. DUE-0736741. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). Copyright © 2008, 2009 by Dale R. Thompson {[email protected]} and Jia Di {[email protected]}

description

Classification of RFID Tags Class-1: Identity Tags  An electronic product code (EPC) identifier  A tag identifier  A ‘kill’ function that permanently disable the tag  Optional password-protected access control  Optional user memory Class-2: Higher-Functionality Tags  An extended Tag ID  Extended user memory  Authenticated access control  Additional features as will be defined in the Class-2 specification 3 Class-3: Semi-Passive Tags  An integral power source  Integrated sensing circuitry Class-4: Active Tags  Tag-to-tag communications  Active communications  Ad-hoc networking capabilities *Note that each higher-class tag has its extended features above and beyond its immediate predecessor *We focus on Class-1, UHF RFID Tags

Transcript of Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer...

Page 1: Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering…

Lesson Title: Tag Architecture

Dale R. Thompson and Jia DiComputer Science and Computer Engineering Dept.

University of Arkansas

http://rfidsecurity.uark.edu 1

This material is based upon work supported by the National Science Foundation under Grant No. DUE-0736741.Any opinions, findings and conclusions or recommendations expressed in this material are those of the

author(s) and do not necessarily reflect the views of the National Science Foundation (NSF).

Copyright © 2008, 2009 by Dale R. Thompson {[email protected]} and Jia Di {[email protected]}

Page 2: Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering…

Tag Layer

http://rfidsecurity.uark.edu 2

Page 3: Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering…

Classification of RFID Tags• Class-1: Identity Tags An electronic product code (EPC)

identifier A tag identifier A ‘kill’ function that permanently

disable the tag Optional password-protected access

control Optional user memory

• Class-2: Higher-Functionality Tags

An extended Tag ID Extended user memory Authenticated access control Additional features as will be defined

in the Class-2 specification

http://rfidsecurity.uark.edu 3

Class-3: Semi-Passive Tags An integral power source Integrated sensing circuitry

Class-4: Active Tags Tag-to-tag communications Active communications Ad-hoc networking capabilities

*Note that each higher-class tag has its extended features above and beyond its immediate predecessor

*We focus on Class-1, UHF RFID Tags

Page 4: Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering…

Tag Antenna

http://rfidsecurity.uark.edu 4

RFID chip

Antenna trace

Page 5: Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering…

Tag Circuit Block Diagram

Rectifier

Charge-Pump

Voltage Regulator

Reset Circuit

Power Generation/Management Unit

Envelope Detector

Ring Oscillator

Comparator

Demodulator

Bias Generator

Phase Modulator

Modulator

FSM

Memory Interface

Data Buffer

Digital Logic Memory

Antenna

http://rfidsecurity.uark.edu 5

Page 6: Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering…

Tag Logical Memory Map

http://rfidsecurity.uark.edu 6

Page 7: Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering…

Contact InformationDale R. Thompson, Ph.D., P.E.Associate ProfessorComputer Science and Computer Engineering Dept.JBHT – CSCE 5041 University of ArkansasFayetteville, Arkansas 72701-1201

Phone: +1 (479) 575-5090FAX: +1 (479) 575-5339E-mail: [email protected]: http://comp.uark.edu/~drt/

http://rfidsecurity.uark.edu 7

Page 8: Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering…

Copyright Notice, Acknowledgment, and Liability Release

• Copyright Notice– This material is Copyright © 2008, 2009 by Dale R. Thompson and Jia Di. It may be freely

redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder.

• Acknowledgment– These materials were developed through a grant from the National Science Foundation at the

University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas.

• Liability Release– The curriculum activities and lessons have been designed to be safe and engaging learning

experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices.

http://rfidsecurity.uark.edu 8