DOC. : Smart Point® System Doc Rev : Rev.A Date : Our Ref

advertisement
DOC.
: Smart Point® System
Doc Rev
: Rev.A
Date
:
Our Ref.
:
INDEX
1.
2.
Introduction................................................................................................................................2
Smart Point® ...............................................................................................................................2
2.1
What it is ............................................................................................................................2
2.2
How it works ......................................................................................................................2
2.3
Key features .......................................................................................................................3
2.4
Tests ....................................................................................................................................5
Pagina 1 di 5
1. Introduction
The aim of the present document is to briefly describe Smart Point® System and,
in particular, its security characteristics.
2. Smart Point®
2.1 What it is
A Smart Point® tag is an EEPROM memory encased
in a 316L stainless steel casing, whose dimensions go
up to 5.4 mm in diameter and 1.25 mm in thickness,
which can store up to 488 alphanumeric characters.
Smart Point® System is provided with two security
levels: a proprietary communication protocol and two
memory access codes 16 and 32 bits respectively. The
access codes not only ensure data security but also make it possible to organize the
memory into a maximum of 4 pages, each of which can be used by a specific
operator.
2.2 How it works
Data are transferred by contact to and
from the memory using a proprietary
reading/writing interface.
Smart Point®
System is able to interface with all the
existing hardware (PC or hand- held computer) and with all kind of operating
systems and software already in use.
Pagina 2 di 5
The data stored on the Smart Point® tag can be transferred from the operating
field to the central office through a serial link, a remote link, Wi-Fi, Bluetooth or
GSM/GPRS network, according to the distance.
2.3 Key features
- Security
Smart Point® System is provided with two security levels: a proprietary
communication protocol and memory access codes.
Generally speaking, a communication protocol is the set of rules which
controls the way a communication system works. Smart Point® System’s
communication protocol is the set of rules that regulates the communication
between the reading/ writing interface and the tag itself. The proprietary
protocol ensures the security of the information managed through the Smart
Point® (information is only accessible to operators that know the protocol
commands), without limiting in any way the integration of the system itself
with the existing hardware and with any software already in use.
Each page of Smart Point®’s memory is protected by two access codes: SID
(Software Identifier) and SAC (Software Access Code), 16 and 32 bits
respectively. The first one is stored in the microcontroller’s firmware, which
is part of the electronic reading/ writing interface whereas the second one is
software- managed. The access to the tag is permitted only when both codes
exactly match the expected ones.
The access codes are unique for each client and, if requested, for each
specific application of the same client, thus protecting data from:
•
Possible errors made by the operator that is working on two different
memories which are dedicated to different applications;
•
Possible updates performed by an operator not enabled to work on that
specific page;
Pagina 3 di 5
•
Accesses from other clients that use the same system for the same
application.
The proprietary communication protocol, together with the access
codes, guarantees the total inviolability of data. In fact, any attempt to
illegally access the data stored on the Smart Point® tag requires the
combined knowledge of the protocol commands, which are not public, and
both the 16 and 32 access codes which protect each.
- Endurance and miniaturization
Its technical characteristics and its compact size make Smart Point®
particularly suitable for applications where limited space and the operating
environment are critical factors.
- Differentiated access
A Smart Point® tag can be used by a maximum of four users where each of
them is enabled to access only his/her own memory area.
- Flexibility
Smart Point® System can work in any operational condition; in particular, it
can be used in presence of metals and liquids and it does not induce
electromagnetic interferences nor is it affected by them. Moreover, contact
reading ensures a correct data entry, avoiding problems like false reading or
multiple repeated readings.
- Versatility
The system is able to interface with any hardware device already in use
(PC, notebook, tablet, hand held computer) thus covering all the application
requirements and it can be easily integrated in pre-existent business
Pagina 4 di 5
software.
2.4 Tests
Smart Point® tags have successfully undergone the following tests (the types of
test are reported along with the related Standard Name and Number):
• ultraviolet radiation (NIHS 96-50)
• chemicals (ISO 4538 - NIHS 96-50)
• magnetic fields (ISO 764 - 4800 A/m)
• thermal shock
• condensation (ISO 3160-2)
• salt deposits (ISO 9227)
• tropical climate (DIN 50017)
• sterilization processes
• vibrations (IEC 68-2-6)
• mechanical shocks (ISO 1413 - NIHS 91-10)
• X-rays
• pressure drops (depressurization)
• high pressures (NIHS 92-11 - ISO 6425)
• electrostatic discharges (MIL 883 - method 3015)
Pagina 5 di 5
Download