RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication [NOOK Book]

Overview

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in depth. It includes revisions on chapters devoted to the physical principles of RFID systems and microprocessors, and ...

See more details below
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$91.49
BN.com price
(Save 42%)$160.00 List Price
Note: This NOOK Book can be purchased in bulk. Please email us for more information.

Overview

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in depth. It includes revisions on chapters devoted to the physical principles of RFID systems and microprocessors, and supplies up-to-date details on relevant standards and regulations.

The text explores schematic circuits of simple transponders and readers, and includes new material on active and passive transponders, ISO/IEC 18000 family, ISO/IEC 15691 and 15692. It also describes the technical limits of RFID systems.

A unique resource offering a complete overview of the large and varied world of RFID, Klaus Finkenzeller’s volume is useful for end-users of the technology as well as practitioners in auto ID and IT designers of RFID products. Computer and electronics engineers in security system development, microchip designers, and materials handling specialists benefit from this book, as do automation, industrial and transport engineers. Clear and thorough explanations also make this an excellent introduction to the topic for graduate level students in electronics and industrial engineering design.

Read More Show Less

Product Details

  • ISBN-13: 9781119991878
  • Publisher: Wiley
  • Publication date: 11/4/2010
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 3
  • Pages: 478
  • Product dimensions: 6.91 (w) x 9.83 (h) x 1.14 (d)
  • File size: 31 MB
  • Note: This product may take a few minutes to download.

Meet the Author

Klaus Finkenzeller was awarded the Fraunhofer-Smart Card Prize 2008 for the second edition of this publication, which was celebrated for being an outstanding contribution to the smart card field.
Read More Show Less

Read an Excerpt

RFID Handbook

Fundamentals and Applications in Contactless Smart Cards and Identification
By Klaus Finkenzeller

John Wiley & Sons

Copyright © 2003 John Wiley & Sons, Ltd
All right reserved.

ISBN: 0-470-84402-7


Chapter One

Introduction

In recent years automatic identification procedures (Auto-ID) have become very popular in many service industries, purchasing and distribution logistics, industry, manufacturing companies and material flow systems. Automatic identification procedures exist to provide information about people, animals, goods and products in transit.

The omnipresent barcode labels that triggered a revolution in identification systems some considerable time ago, are being found to be inadequate in an increasing number of cases. Barcodes may be extremely cheap, but their stumbling block is their low storage capacity and the fact that they cannot be reprogrammed.

The technically optimal solution would be the storage of data in a silicon chip. The most common form of electronic data-carrying device in use in everyday life is the smart card based upon a contact field (telephone smart card, bank cards). However, the mechanical contact used in the smart card is often impractical. A contactless transfer of data between the data-carrying device and its reader is far more flexible. In the ideal case, the power required to operate the electronic data-carrying devicewould also be transferred from the reader using contactless technology. Because of the procedures used for the transfer of power and data, contactless ID systems are called RFID systems (Radio Frequency Identification).

The number of companies actively involved in the development and sale of RFID systems indicates that this is a market that should be taken seriously. Whereas global sales of RFID systems were approximately 900 million $US in the year 2000 it is estimated that this figure will reach 2650 million $US in 2005 (Krebs, n.d.). The RFID market therefore belongs to the fastest growing sector of the radio technology industry, including mobile phones and cordless telephones, (Figure 1.1).

Furthermore, in recent years contactless identification has been developing into an independent interdisciplinary field, which no longer fits into any of the conventional pigeon holes. It brings together elements from extremely varied fields: HF technology and EMC, semiconductor technology, data protection and cryptography, telecommunications, manufacturing technology and many related areas.

As an introduction, the following section gives a brief overview of different automatic ID systems that perform similar functions to RFID (Figure 1.2).

1.1 Automatic Identification Systems

1.1.1 Barcode systems

Barcodes have successfully held their own against other identification systems over the past 20 years. According to experts, the turnover volume for barcode systems totalled around 3 billion DM in Western Europe at the beginning of the 1990s (Virnich and Posten, 1992).

The barcode is a binary code comprising a field of bars and gaps arranged in a parallel configuration. They are arranged according to a predetermined pattern and represent data elements that refer to an associated symbol. The sequence, made up of wide and narrow bars and gaps, can be interpreted numerically and alphanumerically. It is read by optical laser scanning, i.e. by the different reflection of a laser beam from the black bars and white gaps (ident, 1996). However, despite being identical in their physical design, there are considerable differences between the code layouts in the approximately ten different barcode types currently in use.

The most popular barcode by some margin is the EAN code (European Article Number), which was designed specifically to fulfil the requirements of the grocery industry in 1976. The EAN code represents a development of the UPC (Universal Product Code) from the USA, which was introduced in the USA as early as 1973. Today, the UPC represents a subset of the EAN code, and is therefore compatible with it (Virnich and Posten, 1992).

The EAN code is made up of 13 digits: the country identifier, the company identifier, the manufacturer's item number and a check digit (Figure 1.3).

In addition to the EAN code, the following barcodes are popular in other industrial fields (see Figure 1.4):

Code Codabar: medical/clinical applications, fields with high safety requirements.

Code 2/5 interleaved: automotive industry, goods storage, pallets, shipping containers and heavy industry.

Code 39: processing industry, logistics, universities and libraries.

1.1.2 Optical character recognition

Optical character recognition (OCR) was first used in the 1960s. Special fonts were developed for this application that stylised characters so that they could be read both in the normal way by people and automatically by machines. The most important advantage of OCR systems is the high density of information and the possibility of reading data visually in an emergency (or simply for checking) (Virnich and Posten, 1992).

Today, OCR is used in production, service and administrative fields, and also in banks for the registration of cheques (personal data, such as name and account number, is printed on the bottom line of a cheque in OCR type).

However, OCR systems have failed to become universally applicable because of their high price and the complicated readers that they require in comparison with other ID procedures.

1.1.3 Biometric procedures

Biometrics is defined as the science of counting and (body) measurement procedures involving living beings. In the context of identification systems, biometry is the general term for all procedures that identify people by comparing unmistakable and individual physical characteristics. In practice, these are fingerprinting and handprinting procedures, voice identification and, less commonly, retina (or iris) identification.

1.1.3.1 Voice identification

Recently, specialised systems have become available to identify individuals using speaker verification (speaker recognition). In such systems, the user talks into a microphone linked to a computer. This equipment converts the spoken words into digital signals, which are evaluated by the identification software.

The objective of speaker verification is to check the supposed identity of the person based upon their voice. This is achieved by checking the speech characteristics of the speaker against an existing reference pattern. If they correspond, then a reaction can be initiated (e.g. 'open door').

1.1.3.2 Fingerprinting procedures (dactyloscopy)

Criminology has been using fingerprinting procedures for the identification of criminals since the early twentieth century. This process is based upon the comparison of papillae and dermal ridges of the fingertips, which can be obtained not only from the finger itself, but also from objects that the individual in question has touched.

When fingerprinting procedures are used for personal identification, usually for entrance procedures, the fingertip is placed upon a special reader. The system calculates a data record from the pattern it has read and compares this with a stored reference pattern. Modern fingerprint ID systems require less than half a second to recognise and check a fingerprint. In order to prevent violent frauds, fingerprint ID systems have even been developed that can detect whether the finger placed on the reader is that of a living person (Schmidhäusler, 1995).

1.1.4 Smart cards

A smart card is an electronic data storage system, possibly with additional computing capacity (microprocessor card), which - for convenience - is incorporated into a plastic card the size of a credit card. The first smart cards in the form of prepaid telephone smart cards were launched in 1984. Smart cards are placed in a reader, which makes a galvanic connection to the contact surfaces of the smart card using contact springs. The smart card is supplied with energy and a clock pulse from the reader via the contact surfaces. Data transfer between the reader and the card takes place using a bidirectional serial interface (I/O port). It is possible to differentiate between two basic types of smart card based upon their internal functionality: the memory card and the microprocessor card.

One of the primary advantages of the smart card is the fact that the data stored on it can be protected against undesired (read) access and manipulation. Smart cards make all services that relate to information or financial transactions simpler, safer and cheaper. For this reason, 200 million smart cards were issued worldwide in 1992. In 1995 this figure had risen to 600 million, of which 500 million were memory cards and 100 million were microprocessor cards. The smart card market therefore represents one of the fastest growing subsectors of the microelectronics industry.

One disadvantage of contact-based smart cards is the vulnerability of the contacts to wear, corrosion and dirt. Readers that are used frequently are expensive to maintain due to their tendency to malfunction. In addition, readers that are accessible to the public (telephone boxes) cannot be protected against vandalism.

1.1.4.1 Memory cards

In memory cards the memory - usually an EEPROM - is accessed using a sequential logic (state machine) (Figure 1.5). It is also possible to incorporate simple security algorithms, e.g. stream ciphering, using this system. The functionality of the memory card in question is usually optimised for a specific application. Flexibility of application is highly limited but, on the positive side, memory cards are very cost effective. For this reason, memory cards are predominantly used in price sensitive, large-scale applications (Rankl and Effing, 1996). One example of this is the national insurance card used by the state pension system in Germany (Lemme, 1993).

1.1.4.2 Microprocessor cards

As the name suggests, microprocessor cards contain a microprocessor, which is connected to a segmented memory (ROM, RAM and EEPROM segments).

The mask programmed ROM incorporates an operating system (higher programme code) for the microprocessor and is inserted during chip manufacture. The contents of the ROM are determined during manufacturing, are identical for all microchips from the same production batch, and cannot be overwritten.

The chip's EEPROM contains application data and application-related programme code. Reading from or writing to this memory area is controlled by the operating system.

The RAM is the microprocessor's temporary working memory. Data stored in the RAM are lost when the supply voltage is disconnected (Figure 1.6).

Microprocessor cards are very flexible. In modern smart card systems it is also possible to integrate different applications in a single card (multi-application). The application-specific parts of the programme are not loaded into the EEPROM until after manufacture and can be initiated via the operating system.

Microprocessor cards are primarily used in security sensitive applications. Examples are smart cards for GSM mobile phones and the new EC (electronic cash) cards. The option of programming the microprocessor cards also facilitates rapid adaptation to new applications (Rankl and Effing, 1996).

1.1.5 RFID systems

RFID systems are closely related to the smart cards described above. Like smart card systems, data is stored on an electronic data-carrying device - the transponder. However, unlike the smart card, the power supply to the data-carrying device and the data exchange between the data-carrying device and the reader are achieved without the use of galvanic contacts, using instead magnetic or electromagnetic fields. The underlying technical procedure is drawn from the fields of radio and radar engineering. The abbreviation RFID stands for radio frequency identification, i.e. information carried by radio waves. Due to the numerous advantages of RFID systems compared with other identification systems, RFID systems are now beginning to conquer new mass markets. One example is the use of contactless smart cards as tickets for short-distance public transport.

1.2 A Comparison of Different ID Systems

A comparison between the identification systems described above highlights the strengths and weakness of RFID in relation to other systems (Table 1.1). Here too, there is a close relationship between contact-based smart cards and RFID systems; however, the latter circumvents all the disadvantages related to faulty contacting (sabotage, dirt, unidirectional insertion, time consuming insertion, etc.).

1.3 Components of an RFID System

An RFID system is always made up of two components (Figure 1.7):

the transponder, which is located on the object to be identified;

the interrogator or reader, which, depending upon the design and the technology used, may be a read or write/read device (in this book - in accordance with normal colloquial usage - the data capture device is always referred to as the reader, regardless of whether it can only read data or is also capable of writing).

A practical example is shown in Figure 1.8.

A reader typically contains a radio frequency module (transmitter and receiver), a control unit and a coupling element to the transponder. In addition, many readers are fitted with an additional interface (RS 232, RS 485, etc.) to enable them to forward the data received to another system (PC, robot control system, etc.).

The transponder, which represents the actual data-carrying device of an RFID system, normally consists of a coupling element and an electronic microchip (Figure 1.9). When the transponder, which does not usually possess its own voltage supply (battery), is not within the interrogation zone of a reader it is totally passive. The transponder is only activated when it is within the interrogation zone of a reader. The power required to activate the transponder is supplied to the transponder through the coupling unit (contactless), as are the timing pulse and data.

(Continues...)



Excerpted from RFID Handbook by Klaus Finkenzeller Copyright © 2003 by John Wiley & Sons, Ltd . Excerpted by permission.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.

Read More Show Less

Table of Contents

Preface to the Third Edition

List of Abbreviations

1 Introduction

1.1 Automatic Identification Systems

1.2 A Comparison of Different ID Systems

1.3 Components of an RFID System

2 Differentiation Features of RFID Systems

2.1 Fundamental Differentiation Features

2.2 Transponder Construction Formats

2.3 Frequency, Range and Coupling

2.4 Active and Passive Transponder

2.5 Information Processing in the Transponder

2.6 Selection Criteria for RFID Systems

3 Fundamental Operating Principles

3.1 1-Bit Transponder

3.2 Full- and Half-Duplex Procedure

3.3 Sequential Procedures

3.4 Near-Field Communication (NFC)

4 Physical Principles of RFID Systems

4.1 Magnetic Field

4.2 Electromagnetic Waves

4.3 Surface Waves

5 Frequency Ranges and Radio Licensing Regulations

5.1 Frequency Ranges Used

5.2 The International Telecommunication Union (ITU)

5.3 European Licensing Regulations

5.4 National Licensing Regulations in Europe

5.5 National Licensing Regulations

5.6 Comparison of National Regulations

6 Coding and Modulation

6.1 Coding in the Baseband

6.2 Digital Modulation Procedures

7 Data Integrity

7.1 The Checksum Procedure

7.2 Multi-Access Procedures – Anticollision

8 Security of RFID Systems

8.1 Attacks on RFID Systems

8.2 Protection by Cryptographic Measures

9 Standardisation

9.1 Animal Identification

9.2 Contactless Smart Cards

9.3 ISO/IEC 69873 – Data Carriers for Tools and Clamping Devices

9.4 ISO/IEC 10374 – Container Identification

9.5 VDI 4470 – Anti-theft Systems for Goods

9.6 Item Management

10 The Architecture of Electronic Data Carriers

10.1 Transponder with Memory Function

10.2 Microprocessors

10.3 Memory Technology

10.4 Measuring Physical Variables

11 Readers

11.1 Data Flow in an Application

11.2 Components of a Reader

11.3 Integrated Reader ICs

11.4 Connection of Antennas for Inductive Systems

11.5 Reader Designs

11.6 Near-Field Communication

12 The Manufacture of Transponders and Contactless Smart Cards

12.1 Glass and Plastic Transponders

12.2 Contactless Smart Cards

13 Example Applications

13.1 Contactless Smart Cards

13.2 Public Transport

13.3 Contactless Payment Systems

13.4 NFC Applications

13.5 Electronic Passport

13.6 Ski Tickets

13.7 Access Control

13.8 Transport Systems

13.9 Animal Identification

13.10 Electronic Immobilisation

13.11 Container Identification

13.12 Sporting Events

13.13 Industrial Automation

14 Appendix

14.1 Contact Addresses, Associations and Technical Periodicals

14.2 Relevant Standards and Regulations

14.3 Printed Circuit Board Layouts

References

Index

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted December 27, 2012

    GET it now it awsome

    Sooooooooooooooooooooooooooooooooooooooo awsomeeeeeeeeeeeeeeeeeeeeeeeee get ittttttttttttttttttt
    Now!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)