DOC. : Smart Point® System Doc Rev : Rev.A Date : Our Ref. : INDEX 1. 2. Introduction................................................................................................................................2 Smart Point® ...............................................................................................................................2 2.1 What it is ............................................................................................................................2 2.2 How it works ......................................................................................................................2 2.3 Key features .......................................................................................................................3 2.4 Tests ....................................................................................................................................5 Pagina 1 di 5 1. Introduction The aim of the present document is to briefly describe Smart Point® System and, in particular, its security characteristics. 2. Smart Point® 2.1 What it is A Smart Point® tag is an EEPROM memory encased in a 316L stainless steel casing, whose dimensions go up to 5.4 mm in diameter and 1.25 mm in thickness, which can store up to 488 alphanumeric characters. Smart Point® System is provided with two security levels: a proprietary communication protocol and two memory access codes 16 and 32 bits respectively. The access codes not only ensure data security but also make it possible to organize the memory into a maximum of 4 pages, each of which can be used by a specific operator. 2.2 How it works Data are transferred by contact to and from the memory using a proprietary reading/writing interface. Smart Point® System is able to interface with all the existing hardware (PC or hand- held computer) and with all kind of operating systems and software already in use. Pagina 2 di 5 The data stored on the Smart Point® tag can be transferred from the operating field to the central office through a serial link, a remote link, Wi-Fi, Bluetooth or GSM/GPRS network, according to the distance. 2.3 Key features - Security Smart Point® System is provided with two security levels: a proprietary communication protocol and memory access codes. Generally speaking, a communication protocol is the set of rules which controls the way a communication system works. Smart Point® System’s communication protocol is the set of rules that regulates the communication between the reading/ writing interface and the tag itself. The proprietary protocol ensures the security of the information managed through the Smart Point® (information is only accessible to operators that know the protocol commands), without limiting in any way the integration of the system itself with the existing hardware and with any software already in use. Each page of Smart Point®’s memory is protected by two access codes: SID (Software Identifier) and SAC (Software Access Code), 16 and 32 bits respectively. The first one is stored in the microcontroller’s firmware, which is part of the electronic reading/ writing interface whereas the second one is software- managed. The access to the tag is permitted only when both codes exactly match the expected ones. The access codes are unique for each client and, if requested, for each specific application of the same client, thus protecting data from: • Possible errors made by the operator that is working on two different memories which are dedicated to different applications; • Possible updates performed by an operator not enabled to work on that specific page; Pagina 3 di 5 • Accesses from other clients that use the same system for the same application. The proprietary communication protocol, together with the access codes, guarantees the total inviolability of data. In fact, any attempt to illegally access the data stored on the Smart Point® tag requires the combined knowledge of the protocol commands, which are not public, and both the 16 and 32 access codes which protect each. - Endurance and miniaturization Its technical characteristics and its compact size make Smart Point® particularly suitable for applications where limited space and the operating environment are critical factors. - Differentiated access A Smart Point® tag can be used by a maximum of four users where each of them is enabled to access only his/her own memory area. - Flexibility Smart Point® System can work in any operational condition; in particular, it can be used in presence of metals and liquids and it does not induce electromagnetic interferences nor is it affected by them. Moreover, contact reading ensures a correct data entry, avoiding problems like false reading or multiple repeated readings. - Versatility The system is able to interface with any hardware device already in use (PC, notebook, tablet, hand held computer) thus covering all the application requirements and it can be easily integrated in pre-existent business Pagina 4 di 5 software. 2.4 Tests Smart Point® tags have successfully undergone the following tests (the types of test are reported along with the related Standard Name and Number): • ultraviolet radiation (NIHS 96-50) • chemicals (ISO 4538 - NIHS 96-50) • magnetic fields (ISO 764 - 4800 A/m) • thermal shock • condensation (ISO 3160-2) • salt deposits (ISO 9227) • tropical climate (DIN 50017) • sterilization processes • vibrations (IEC 68-2-6) • mechanical shocks (ISO 1413 - NIHS 91-10) • X-rays • pressure drops (depressurization) • high pressures (NIHS 92-11 - ISO 6425) • electrostatic discharges (MIL 883 - method 3015) Pagina 5 di 5