IC Card v.s. RFID 資訊科技一 P9374717 李駿達 P9374711 顏世坤 Agenda Smart Cards Technology Radio Frequency Identification (RFID) Q&A Smart Cards Technology CD Lee, Sam Yen IC Card (Smart Card) 是在塑膠卡片上裝置積體電路(IC),並在卡上外接 接點,使讀寫裝置可以傳輸資料。IC卡內的積體電路 可包含微處理器(MCU) 和記憶體,只有記憶體的稱 為記憶卡(Memory Card),只能儲存資料;具微處 理器的則有運算和資料處理能力,被稱為智慧卡 (Smart Card)。 IC卡的特色有:記憶容量大,資料可重複多次寫入或 更新;資料控管功能;安全性高不易偽造,防止卡片 犯罪的損失;可採離線(off-line)作業,減少通訊 成本。國內目前在金融、醫療、電信方面,已陸續導 入IC卡的應用。 Plastic Cards Visual identity application Magnetic strip (e.g. credit cards) Plain plastic card is enough Visual data also available in machine readable form No security of data Electronic memory cards Machine readable data Some security (vendor specific) Smart Cards Processor cards (and therefore memory too) Credit card size With or without contacts. Cards have an operating system too. The OS provides A standard way of interchanging information An interpretation of the commands and data. Cards must interface to a computer or terminal through a standard card reader. Loosely defined, a smart card is any card with a capability to relate information to a particular application such as: Magnetic Stripe Cards Optical Cards Memory Cards Microprocessor Cards Magnetic Stripe Cards Standard technology for bank cards, driver’s licenses, library cards, and so on…… Optical Cards Uses a laser to read and write the card CANPASS Contains: Photo ID Fingerprint Memory Cards Can store: Financial Info Personal Info Specialized Info Cannot process Info Microprocessor Cards Has an integrated circuit chip Has the ability to: Store information Carry out local processing Perform Complex Calculations Microprocessor Cards Contact Smart Card VCC Reset Clock Reserved GND VPP I/O Microprocessor Cards Contactless Smart Card Microprocessor Cards Combi / Hybrid Cards Hybrid Card Has two chips: contact and contactless interface. The two chips are not connected. Combi Card Has a single chip with a contact and contactless interface. Can access the same chip via a contact or contactless interface, with a very high level of security. Smart Cards devices VCC Reset Clock Reserved GND VPP I/O What’s in a Card? CLK RFU RAM, 3–5 Mhz clock rate RST Vcc Upcoming GND RFU Vpp I/O Typical Smartcard at time of our research 8-bit CPU, 384 bytes 32-bit RISC CPU, 4 Kbytes RAM, 50 Mhz clock Typical Configurations 256 bytes to 4KB RAM. 8KB to 32KB ROM. 1KB to 32KB EEPROM. Crypto-coprocessors (implementing 3DES, RSA etc., in hardware) are optional. 8-bit to 16-bit CPU. 8051 based designs are common. The price of a mid-level chip when produced in bulk is less than US$1. Smart Card Readers Dedicated terminals Usually with a small screen, keypad, printer, often also have biometric devices such as thumb print scanner. Computer based readers Connect through USB or COM (Serial) ports Communication mechanisms Communication between smart card and reader is standardized ISO 7816-4 standard Commands are initiated by the terminal Interpreted by the card OS Card state is updated Response is given by the card. Commands have the following structure CLA INS P1 P2 Lc 1..Lc Le Response from the card include 1..Le bytes followed by Response Code Security Mechanisms Password Cryptographic challenge Response Entity authentication Biometric information Card holder’s protection Person’s identification A combination of one or more Data storage Data is stored in smart cards in E2PROM Card OS provides a file structure mechanism File types MF DF DF EF DF EF EF EF EF Binary file (unstructured) Fixed size record file Variable size record file Access control on the files Applications may specify the access controls A password (PIN) on the MF selection • For example SIM password in mobiles Multiple passwords can be used and levels of security access may be given Applications may also use cryptographic authentication How does it all work? Card is inserted in the terminal ATR negotiations take place to set up data transfer speeds, capability negotiations etc. Terminal sends first command to select MF Terminal prompts the user to provide password Terminal sends password for verification Terminal sends command to select MF again Terminal sends command to read EF1 Card gets power. OS boots up. Sends ATR (Answer to reset) Card responds with an error (because MF selection is only on password presentation) Card verifies P2. Stores a status “P2 Verified”. Responds “OK” Card responds “OK” Card supplies personal data and responds “OK” CAT_TP and BIP application protocol 03.48 security layer CAT_TP BIP* * Mechanism originally specified by 3GPP T3 by which the ME provides the UICC with access to the data bearers supported by the ME and the network Server How are Smart Cards Used? Commercial Applications Banking/payment Identification Parking and toll collection Universities use smart cards for ID purposes and at the the library, vending machines, copy machines, and other services on campus. By 2007 end all credit cards will be smart. EMV standard Mobile Telecommunications SIM cards used on cell phones Over 300,000,000 GSM phones with smart cards Contains mobile phone security, subscription information, phone number on the network, billing information, and frequently called numbers. How are Smart Cards Used? Information Technology Secure logon and authentication of users to PCs and networks Encryption of sensitive data Other Applications Over 4 million small dish TV satellite receivers in the US use a smart card as its removable security element and subscription information. Pre-paid, reloadable telephone cards Health Care, stores the history of a patient Fast ticketing in public transport, parking, and road tolling in many countries JAVA cards What is Smart Card for Government? A Multi-Application, Multi-Tech Proximity Smart Card A Hybrid / Composite Card Authentication Architecture Digital Photo Smart Card Chip * Mag Stripe on back Barcode Digital Photo, Biometrics, Finger Print, Voice Print, Hand Geometry, Iris Scan, Keyboard Dynamics, Digitized Signature, Signature Dynamics, Personal ID, Electronic Signature Encryption, Compression Public/Private Key, Digital Signature (DSS), RSA for Off-line, Wireless, Telephony Hardware/Software Based, Crypto Co-Processor Uses Pre-paid Money, Credit, Debit, Authorizations, ID, Certificate Secure eMail, eForms, Digital signature * Proximity / Combi Chip are imminent - combining smart card and radio frequency into one chip * RF indicates Radio Frequency Chip Source: John G Moore, GSA, 1994 E-Government Smart Card Specification ISO 7816, 1,2,3 compliant • FIPS 140-2, level 3 • Java Applications – PKI Applet – ID PIN Verification and Management Applet – GCA Applet – Authentication Applet – Biometric Authentication Applet – Stake Holder applets (future) • JavaCard 2.1 • Global Platform 2 Compliant • 64 K RAM (42K available for applets) • DES/3DES/AES(when available) • RSA asymmetric 1024 / 2048 • PTS speed in access of 9600 bps • EEPROM endurance > 250,000 r/w cycles • MIFARE Proximity (contactless) chip – DESFire (ISO 14443-A) – 4 k NV memory Smart Card Applications Identity Management Mobile Communications Ticketless Travel Loyalty Programs Mary Carver Building Security/Area Access Time and Attendance Administration Mary Carver Debit/Credit Card Electronic Purse Mass Transit Training Management Qualification Certification Distance Learning Secure Network Access Information Security Healthcare Drivers License Work/Entry Permits Parking Advantages In comparison to it’s predecessor, the magnetic strip card, smart cards have many advantages including: Life of a smart card is longer A single smart card can house multiple applications. Just one card can be used as your license, passport, credit card, ATM card, ID Card, etc. Smart cards cannot be easily replicated and are, as a general rule much more secure than magnetic stripe cards. it has relatively powerful processing capabilities that allow it to do more than a magnetic stripe card (e.g., data encryption). Data on a smart card can be protected against unauthorized viewing. As a result of this confidential data, PINs and passwords can be stored on a smart card. This means, merchants do not have to go online every time to authenticate a transaction. Disadvantages NOT tamper proof Can be lost/stolen Lack of user mobility – only possible if user has smart card reader every he goes Has to use the same reader technology Can be expensive Working from PC – software based token will be better No benefits to using a token on multiple PCs to using a smart card Still working on bugs Over 20 programs world-wide Over 20 programs world-wide across the financial, id/security, government, mobile telecom, public healthcare, retail, and transit markets Mobile OTA application management for USIM/SIM cards (SIMToolKit, CAT) US DoD CAC card Taiwan Health Card Moscow Social Card Finnish National Smart Card Program Smart Visa Card Amex Blue Card Etc.. OS Based Classification Smart cards are also classified on the basis of their Operating System. There are many Smart Card Operating Systems available in the market, the main ones being: 1. MultOS 2. JavaCard 3. Cyberflex 4. StarCOS 5. MFC Smart Card Operating Systems or SCOS as they are commonly called, are placed on the ROM and usually occupy lesser than 16 KB. SCOS handle: • File Handling and Manipulation. • Memory Management • Data Transmission Protocols. International Standardization Mobile Telecom Standards ETSI: GSM 03.48, TS 23.048 ETSI & 3G Smart Card Platform (SCP): TS 102.225, 102.226 Government Standards US Federal Government: GSC-IS Under review (US): FIPS 201, PIV ISO: new part 13 of 7816 series New Work Item from Japan: approved by ISO SC17 Work assigned to ISO SC17/WG4, editor: Japan Scope: commands for application management in multi application environment Contribution: a subset of GlobalPlatform Card Specification, endorsed by ANSI US official contribution to ISO Global Deployment Over 70 million GlobalPlatform cards deployed worldwide Additional 450+ million GSM cards globally use GlobalPlatform technology for over-the-air (OTA) application download Over 30 implementations across the financial, ID/security, government, mobile telecom, healthcare, retail, and transit markets Estimates predict these figures to increase dramatically in 2005 and 2006 Worldwide Industry Radio Frequency Identification (RFID) CD Lee, Sam Yen Internet of THIINGS RFID Overview(1) What is RFID? Radio Frequency IDentifier RFID combines the features of traditional IDs • Barcodes : used to identify and track objects • OCR and biometrics : enables automatic ID and verification • Smart cards/IC card : store information and provide interactive processing How RFID different? Used to identify objects and store information about the object Used to locate and identify objects from a distance using RF signals Used to detect and read things that are not in line of sight Data can be interactively managed and processed by the RFID chip and RFID system The RFID Tag Components The RFID tag is made up of several parts: A microchip that stores data and modulates and demodulates analog radio waves An antenna that gathers RF energy from a reader and reflects back a signal A protective layer that can be used to create a label or other type of transponder How it works The reader emits radio waves The tag coverts the radio waves into electricity to power up the microchip The microchip modulates and demodulates the antenna and sends backs long and short waves or waves of different amplitude The reader converts these waves into a string of ones and zeros A computer turns the ones and zeros into digital information RFID Overview(3) • Web service vs RFID service Web Service RFID Service DNS www.nida.or.kr 203.254.110.10 203.254.110.10 4.3.2.1.rfid.or.kr object information server’s domain name RFID ODS object info server’s IP address object info Homepage (HTML) Web server object info server ODS: Object Directory System RFID Operation (Passive Tags) APPLICATION INTERROGATOR RF TAG Tag Physical Memory Decoder AIR Application Program Interface Encoder INTERFACE DEVICE COMMANDS APPLICATION COMMANDS APPLICATION RESPONSES Command / Response Unit Tag Driver and Mapping Rules Logical Memory Map COMMANDS RESPONSES DEVICE RESPONSES Logical Memory DATA PROTOCOL PROCESSOR PHYSICAL INTERROGATOR Note: The Logical Memory Map in the Tag Physical Memory is given by the Tag architecture and the mapping rules in the Tag Driver. All the information in the Logical Memory is represented in the Logical Memory Map ISO/IEC 15961 ISO/IEC 15962 ISO/IEC 15962 Annexes ISO/IEC 18000 The RFID reader also has several parts: A digital signal processor and a microcontroller An internal or external antenna A network or serial port connection Input/output ports for linking to other devices RFID’s Unique Capabilities No “line of sight” required to read tags Simultaneous communication with multiple tags Each Item is unique; prevents double counting Bulk reading capability Can store information directly on tags High memory capacity Long read ranges Performance not limited by harsh environments versus bar codes Are All Tags The Same? Basic Types: Active Tag transmits radio signal Internally powered memory, radio & circuitry High Read Range (300 feet) Passive Tag reflects radio signal from reader Reader powered Shorter Read Range (4 inches - 15 feet) Active RFID Active tags transmit an RF signal (instead of reflecting the signal) Active tags have longer range than passive tags Most active tags have batteries, though emerging technology may provide active transmission WITHOUT batteries. Passive RFID Passive tags (also referred to as “field disturbance devices”) reflect and modulate radio waves received by the tag from the interrogator. Passive devices have ranges of 1 to 4 meters depending upon national regulations Passive tags do not require an on-board power source, but some do have batteries to support sensors and faster response times. RFID Operation (Passive Tags) Sequence of Communication Host Manages Reader(s) and Issues Commands Reader and tag communicate via RF signal Carrier signal generated by the reader (upon request from the host application) Carrier signal sent out through the antennas Carrier signal hits tag(s) Tag receives and modifies carrier signal “sends back” modulated signal (Passive Backscatter - FCC and ITU refer to as “field disturbance device”) Antennas receive the modulated signal and send them to the Reader Reader decodes the data Results returned to the host application How far, how fast, how much, how many, attached to what? Frequency Regulation Range Data Speed Comments 120 – 150 kHz 18000-2 (passive) Basically unregulated < 1m Low Animal identification and factory data collection 13.56 MHz 18000-3 (passive) ISM band, differing power levels and duty cycle < 1m Low to moderate Popular frequency for I.C. Cards (Smart Cards), Libraries 433 MHz 18000-7 (active) Non-specific Short Range Devices (SRD), Location Systems 1 – 100 m Moderate Container Security and Tracking. Asset tracking for U.S. DoD (Pallets) – Active 860 – 960 MHz 18000-6 (passive) ISM band, increasing use in other regions, differing power levels and duty cycle 2–5m Moderate to high MH 10.8.4 (RTI), AIAG B11 (tires), EPC (18000-6C), DoD Passive 2450 MHz 18000-4 Mode 1 (passive) ISM band, differing power levels and duty cycle 1–2m High IEEE 802.11 b/g, Bluetooth, cordless telephones Minimum Requirements Passive Technology Active Technology How far 3 meters How far 100 meters How fast 10 mph How fast 35 mph How much 256 bitsNote How much 256 bytesNote How many 500 tags/second How many 500 tags/minute Technology 860-960 MHz ISO/IEC 18000-6 UHF Gen 2 (Type C) EPC Class I, II, III Technology 433 MHz ISO/IEC 18000-7 EPC Class IV RFID Scenario(1) RFID Scenario(2) Supply chain process from Metro Distribution Chain Center Implementation Issues Read zone control Application of tags Where in the process Where on the container How are the labels being applied Use ISO standards EPC requires pre-population of data at the recipient (X12 856 / EDIFACT DESADV / XML) or access to the EPCIS Back-up in case of tag failure Recycling Data concerns Return on investment RFID Standardization-ISO(1) Automatic Identification in ISO Identification of Things TC122/Ad Hoc Group Packaging TC23/SC19/WG3 Animals TC104/SC4/WG2 Container JTC1/SC17 Personal ID JWG Supply Chain App ISO/IEC JTC1/SC31/WG4 Automatic Identification and Data Capture Technique TC: Technical Committee JTC: Joint Technical Committee SC: Sub-Committee WG: Woking Group ISO: International Organization for Standards TC204 Transportation TC68/SC6 Financial Transaction Application Standards Radio Frequency Identification - Open Standards ISO 10374 - Freight containers — Automatic identification ISO 18185 - Freight Containers - Radio-frequency communication protocol for electronic seal ISO 11784 – Radio-Frequency Identification of Animals - Code Structure ISO 11785 – Radio-Frequency Identification of Animals - Technical Concept ISO 14223-1 – Radio-Frequency Identification of Animals - Advanced Transponders - Part 1: Air Interface ISO 21007-1 – Gas Cylinders - Identification and Marking Using Radio Frequency Identification Technology - Part 1: Reference Architecture and Terminology ISO 21007-2 – Gas Cylinders - Identification and Marking Using Radio Frequency Identification Technology - Part 2: Numbering Schemes for Radio Frequency ANSI MH10.8.4 - RFID for Returnable Containers AIAG B-11 - Tire & Wheel Identification Standard ISO 122/104 JWG - Supply Chain Applications of RFID ISO 17363 - Freight containers ISO 17364 - Returnable transport items ISO 17365 - Transport units ISO 17366 - Product packaging ISO 17367 - Product tagging RFID Standardization-ISO(2) ISO/IEC JTC1/SC31/WG4 ARP: Application Requirement Profile SG: Sub-Group SG1 Data Protocol: Application Interface Data Protocol: Data Encoding Rules and Logical Memory Functions ISO/IEC 15961:2004, 2004.10 ISO/IEC 15962:2004, 2004.10 SG2 Unique Identification for RF Tag IOS/IEC 15963:2004, 2004.10 SG1 Part1: Reference Architecture and Definition of Parameters to be standaized IOS/IEC 18000-1: 2004, 2004.9 ISO/IEC Part2: Parameters for Air Interface Communications below 135kHz ISO/IEC 18000-2: 2004, 2004.9 Part3: Parameters for Air Interface Communications at 13.56MHz ISO/IEC 18000-3: 2004, 2004.9 Part4: Parameters for Air Interface Communications at 2.45GHz ISO/IEC 18000-4: 2004, 2004.9 Part6: Parameters for Air Interface Communications at 860 MHz to 960 MHz ISO/IEC 18000-6: 2004, 2004.9 Part7: Parameters for Air Interface Communications at 433MHz ISO/IEC 18000-7: 2004, 2004.9 ARP Application Requirements Profiles Implementation Guidlines – Part1: RFID-Enabled Labels Implementation Guidlines – Part2: Recyclability of RF Tags Implementation Guidlines – Part3: RFID Interrogator/ Antenna Installation ISO/IEC TR 18000:2004.10 ISO/IEC 24729-1, Now ISO/IEC 24729-2, Now ISO/IEC 24729-3, Now Technology Standards Radio Frequency Identification Open Standards ISO/IEC 18000 - RFID for Item Management Part 2 - 125 - 150 kHz Part 3 - 13.56 MHz Part 4 - 2450 MHz Part 6 - 860 - 960 MHz Part 7 - 433.92 MHz (active) Data Standards ISO/IEC 15418 - Application Identifiers & Data Identifiers ISO/IEC 15434 - Syntax ISO/IEC 15459 - Unique Item Identification ISO/IEC 15961 - Data Protocol: Application Interface ISO/IEC 15962 - Data Protocol: Data Encoding Rules and Logical Memory Functions ISO/IEC 15963 - Unique Identification for RF Tags Conformance Standards ISO/IEC 18047 - RFID device conformance test methods (at) Part 2 - 125 - 150 kHz Part 3 - 13.56 MHz Part 4 - 2450 MHz Part 6 - 860 - 960 MHz Part 7 - 433.92 MHz (active) RFID Standardization-EPCgobal(1) EPCglobal (EPC: Electronic Product Code) History • Developed by Auto-ID center, an academic research project headquartered at MIT with five universities around the globe • VerSign initiative Work scope • EPCglobal Network • EPCglobal Services RFID Standardization-EPCgobal(2) EPCglobal specifications and ratified standards Spec/Stardnard Project Title Remarks 900MHz Class 0 RF Identification Tag Specification EPCglobal Specification 13.56 MHz ISM Band Class 1 RF Identification Tag Interface Specification RF and tag requirements for each band 860 MHz – 930 MHz Class 1 RF Identification Tag Radio Frequency & Logical Communication Interface Specification EPC Tag Data Standard Version 1.1 rev 1.26 Ratified EPCglobal Standards Class 1 Generation 2 UHF Air Interface Protocol Standard version 1.0.9 Tag data encoding schemes Physical/logical requirements for passive RFID systems RFID Components and Standardization Antenna Reader Memory map RFID Tag Tag drivers Identification code Application Host Data protocol processor Data collection Event handling READER/HOST INTERFACE Application condition ISO/IEC object identification code - WG2, EPCglobal Data protocol ISO/IEC AIR interface tag identification code - ISO/IEC 15963 WG4/SG2 WG4/SG1 Management protocol 15961, 15962 ISO/IEC 18000-1 ~ 7 WG4/SG3 UHF GEN2 EPCglobal TR18001,24729 WG4/ARP Auto-ID Reader Protocol EPCgobal Event handling ALE EPCglobal Object information search ONS, EPCIS EPCglobal Standards Organizations International International Telecommunications Union (ITU) (United Nations) International Electrotechnical Commission (IEC) International Organization for Standardization (ISO) Universal Postal Union (UPU) (United Nations) ISO/IEC Joint Technical Committee 1 (JTC 1) TC 122 Packaging TC 104 Freight Containers SC 31 Automatic Data Capture ITU-T (fka CCITT) Telecommunications SC 17 IC Cards WG 1 - Symbology WG 2 - Data Content TC 122/104 JWG SC Apps RFID SC 6 Telcom & info exch btwn systems WG 3 - Conformance WG 4 - RFID WG 5 - RTLS TC 8 Ships & Marine Tech Regional Comité Européen Normalisation (CEN) ITU-D (fka BDT) Telecommunications Development Comité Européen Normalisation Electrotechnique (CENELEC) ECMA ODETTE ITU-R (fka CCIR & IFBR) Radio-frequency Issues Comité Européen Postal & Telegraph (CEPT) National Standards Assoc of China (SAC) British Standards Institution (BSI) MHI GS 1 AIM Deutches Institut fur Normung (DIN) ANSI AFNOR CEA IEEE INCITS JISC Other T6 B10 Industry DoD ATA CEA AIA HIBCC AIAG GS 1 Other VDA ISO/IEC JTC 1/SC 31 Structure International Electrotechnical Commission (IEC) International Organization for Standardization (ISO) ISO/IEC Joint Technical Committee 1 (JTC 1) - IT ISO/IEC JTC 1 Subcommittee 31 WG 1 Data Carrier WG 2 Data Structure Convener S. Ackley (US) Convener T. Yoshioka (JP) WG 3 Conformance Convener C. Biss (US) Secretariat GS 1 WG 4 RF Tags Convener H. Barthel Code 39 DAI Linear Print Quality Air Interface ITF Data Syntax 2D Print Quality Unique RF Tag ID MaxiCode Unique ID Printing Specs Data Matrix Test Specs BC Printers Defs. Logical Mem Map Application Interface Encoding Rules EAN/U.P.C. Test Specs BC Readers Code 128 Test Specs BC Verifiers PDF417 QR Code RFID Performance Symbology Identifiers RFID Conformance WG 5 RTLS Convener M. Harmon API 2450 MHz 433 MHz GLS Near Field SC 31/WG 4 (RFID) Technology Projects ISO Designation Title Status Information technology - AIDC techniques - RFID for item management ISO/IEC 18000, Part 1 Part 1 - Definition of parameters to be standardized Published 2004-08-06 Revision in process ISO/IEC 18000, Part 2 Type A - ISO 11785 based Type B - Yoshikawa RF Part 2 - Parameters for air interface communications below 135 kHz Published 2004-07-30 Revision in process ISO/IEC 18000, Part 3 Mode 1 - ISO/IEC 15693 based Mode 2 - Magellan based Part 3 - Parameters for air interface communications at 13.56 MHz Published 2004-08-06 Revision in process ISO/IEC 18000, Part 4 Mode 1 - Intermec based Mode 2 - Siemens/NEDAP based Part 4 - Parameters for air interface communications at 2.45 GHz Published 2004-05-31 Revision in process ISO/IEC 18000, Part 6 Type A - BTG based Type B - Intermec/Philips based Type C - UHFGen2 (v1.0.9) based Part 6 - Parameters for air interface communications at 860-960 MHz Published 2004-08-15 Amendment FDIS Ballot 2006-03-03 thru 2006-05-03 Revision beginning 2006-03 ISO/IEC 18000, Part 7 Savi based Part 7 - Parameters for active air interface communications at 433 MHz Published 2004-05-31 Revision in process ISO/IEC 15961 Data protocol: Application interface Published 2004-10-15 Revision in process ISO/IEC 15962 Protocol: Data encoding rules and logical memory functions Published 2004-10-15 Revision in process ISO/IEC 15963 Published 2004-09-01 Unique Identification of RF Tag ISO/IEC 24752 System Management Protocol ISO/IEC 24753 NP Approved 2005-04-05 NP Approved 2005-04-07 Air Interface Commands for Battery Assist and Sensor Functionality ISO/IEC TR 24729 Implementation guidelines: Part 1: RFID-enabled labels, Part 2: Recyclability of RF tags, Part 3: RFID interrogator/antenna installation NPs Approved 2005-01-12 The Layers of Logistic Units (Radio Frequency Identification - RFID) Layer 5 Movement Vehicle (truck, airplane, ship, train) Layer 4 (433 MHz) ISO 17363 (Freight containers) Container (e.g., 40 foot Sea Container) Layer 3 (860-960 MHz) (Other 18000 with TPA) Unit Load “Pallet” ISO 17364 (Returnable transport items) Unit Load “Pallet” Layer 2 (860-960 MHz) ISO 17365 (Transport units) Transport Unit Transport Unit Transport Unit Transport Unit Layer 1 (860-960 MHz) ISO 17366 (Product packaging) Pkg Pkg Pkg Pkg Pkg Pkg Pkg Pkg Layer 0 (860-960 MHz) (13.56 MHz with TPA) ISO 17367 (Product tagging) Item “TPA” - Trading Partner Agreement Item Item Item Item Item Item Item Item Item Item Concept Source: Akira Shibata, DENSO-Wave Corporation Item Item Item Item Item Three tags - different purposes Supply Chain Tag ISO 17363 Electronic Seal ISO 18185 Container ID Tag ISO 10374.2 Sealing and anti-tamper capability Bolt Seal Security Tag Electronically secures ocean containers, air cargo ULD containers, trailers, Monitors presence and integrity of bolt seal, generates alarm upon bolt removal or breakage Re-usable tag Reduces manual inspections Minimizes theft, loss and tampering ASC MH10 PINS Today Container Reader/ Communicator Customs Proposed On Board Unit (OBU) 10374.2 Tag 17364 Tags 18185 Tag/Seal Fingerprint Reader 17365 Tags Transportation Worker ID Card (TWIC) with Fingerprint Biometric ISO/IEC 14443 17363 Tag Chassis Tag TC 204 Standard Tractor Tag TC 204 Standard On Board Unit (OBU) Tomorrow Customs Part of CALM Network Road Side Unit (RSU) EPCglobal and ISO ISO Requirement EPC UHF Gen2 v1.0.9 Standard to cover the widest possible set of applications for a common protocol Restricted to “EPC-only” data structures Top-down architecture Bottom-up architecture Standard to embrace global applications Restricted to EPC applications Active tags to comply with ISO/IEC 18000-7 No accommodation for active tags Extensible commands, e.g., sensors, write No extensibilities beyond Class 1 RAND EPCglobal’s I.P. not disclosed, “royaltyfree” AFIs for multi-application use No AFIs Consistent and common use of Tag ID, Item ID Object ID, Chip ID, etc. Usages are not mainstream and are confusing ??? IC Card Comparison Maximum Data Capacity Processing Power Cost of Card Cost of Reader and Connection Magnetic Stripe Cards 140 bytes None $0.20 $0.75 $750 Integrated Circuit Memory Cards 1 Kbyte None $1 - $2.50 $500 Integrated Circuit Processor Cards 8 Kbytes 8-bit cpu, moving to 16- and 32bit $7-$15 $500 Optical Memory Cards 4.9 Mbytes None $7 - $12 $3,500 $4,000 RFID vs Smart Card RFID Smart Card No need for contact or line-of-sight Contact and Contactless (short distance) Data retrive Can scan entire pallets at once Need to issue command for response for data request Communication Simultaneous communication with multiple tags One at a time speed Greater speed Lack of user mobility Size Size – a grain of rice Credit Card size Storage 64 – 128 bits EEPROM: 8K - 128K bit. Cost 2005: $0.05 per tag; hundreds of dollars per reader 2008: $0.01 per tag; several dollars per reader (?) Typical costs range from $2.00 to $10.00. RFID Smart Card Application Multiple data storage, but no applet. multiple applications- Just one card can be used as your license, passport, credit card, ATM card, ID Card, etc. rewrite EPC tags, are read-only Also have rewritable tags (containing EEPROM) Rewritable Processing Power Little computational power -A few thousand gates -Static keys for read/write permission -No real cryptographic functions available Capable of processing, not just storing information - Smart cards can communicate with computing devices through a smart card reader - information and applications on a card can be updated Security EPC tags, no computing power for basic cryptographic More expensive tags can perform basic cryptographic algorithms, such as symmetric-key encryption and challenge-response identification protocols Chip microprocessor and Co-processor supports DES, 3-DES, RSA or ECC standards for encryption, authentication, and digital signature for non-repudiation. Error Correction The anti-collision protocol used in HF tags is generally a variant of the classic ALOHA protocol. ALOHA-based RFID reading leaks less information than most UHF tree-walking protocols. Current Chip Operating Systems (COS) perform their own error checking Usage General Merchant Personal use Proprietary Features On expensive tag could handle some encryption feature include Chip Operating System and System Development Kits