SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
© 20101 | © 2013
Advances in UHF RFID
June 2013
© 20102 | © 2013
2004: UHF Gen2 Ratified
• Two readers using DRM
– Transmitting simultaneously
– Inventorying simultaneously
• Tags moving fast
• Readers rejecting interference
• No missed tags or ghost reads
Wind
Tunnel
Presented at 2005
EPCglobal
US Conference
© 20103 | © 2013
2005: Walmart Pallet Tests Proved Gen2
• Speedway™ prototype on either
side of dock door
• AD-620 (Triflex™) tags on each
of 40 boxes of Caress® soap
• Multiple interfering readers
transmitting simultaneously
© 20104 | © 2013
2006: Impinj Introduces Near-Field UHF
• UHF Gen2 works both near & far, on all types of items
– Allows a single infrastructure for pallets, cases, and items
– The only frequency with this property
• Far field: 30cm to 15m range
• Near field: 0 to 60cm range
– Reads on liquids and metals
– The only difference is the antennas
© 20105 | © 2013
2007: UHF Gen2 Beat HF for Pharma
• UHF outperformed HF at NACDS
• UHF reliably wrote & read bottles at
2× speed of fastest pharma line
• Impinj deploys UHF Gen2 on Purdue
Pharma production line
© 20106 | © 2013
2008: Gen2 Enhanced for Item Tagging
• New Gen2 V1.2.0 adds UM indicator, XPC, BPL, and
recommissioning specifically for item tagging
• Impinj develops item
solution for Metro
Galeria Kaufhof
– 30,000 tagged items
on the sales floor
© 20107 | © 2013
2009: Enabled Myriad Products
• Hand-Held Readers
• Fixed Readers
• Cards & Modules
© 20108 | © 2013
But the Tag Volumes Went Nowhere…
500
1000
1500
2500
2000
2005 2006 20082007 2009 2010 2011
100
250 300 350 400
Volume(MU)
3500
3000
2012 2013
End customers were
piloting but not yet
deploying
© 20109 | © 2013
2010: Walmart Rolls-Out Apparel Tagging
© 201010 | © 2013
2011: Coke Rolls-Out Embedded RFID
© 201011 | © 2013
2012: STP Breaks Encoding Barrier
• Platform for high-performance encoding & verification
• Delivers highest encoding quality & reliability
• Leverages Monza performance & capabilities
• Encodes at speeds to 300k uph
STP + Monza breaks RFID encoding performance barrier
© 201012 | © 2013
2013: Retail Apparel Tagging Takes Off
Top 50 apparel retailer TAM = ~25Bn garments/year
• Rollout or deployed
– American Apparel
– Macy’s
– Liverpool
– Memove
– Zara
– JCP
– Walmart
– Marks & Spencer
– Kohl’s
• Piloting
– Sears
– Chico’s
– Saks
– Lord & Taylor
– Hudson Bay
– C&A (EU, Brazil)
0.0
200.0
400.0
600.0
800.0
1000.0
1200.0
1400.0
1600.0
Jan/09
Sep/09
May/10
Jan/11
Sep/11
May/12
Jan/13
Sep/13
May/14
Jan/15
Sep/15
May/16
Jan/17
Sep/17
May/18
Jan/19
Sep/19
May/20
Jan/21
Sep/21
MonthlyTagConsumption(M)
We are here
@ 2Bn/yr
Monthly Tag Consumption by Top 50
Apparel Retailers
© 201013 | © 2013
Tag Volumes Grow as Customers Adopt
500
1000
1500
2500
2000
2005 2006 20082007 2009 2010 2011
100
250 300 350 400
1300
1950
Volume(MU)
3500
3000
2650
3300
2012 2013
2/3 of the 2013 volume
Is for apparel tagging
© 201014 | © 2013
The Situation Today
• Retail is adopting UHF RFID broadly
– American Apparel, Macy’s, Memove, Liverpool, Zara, JCP,
Walmart, Marks & Spencer, Kohl’s, more
• Other UHF RFID applications are growing
– Embedded RFID, asset tracking, laundry, border crossing,
customer experience, manufacturing, more
• Do we have the technology we need?
Identify
an Item
Locate
an Item
Authenticate
an Item

© 201015 | © 2013
Locating an Item: xArray
6.35 cm
45.7 cm
2D-array RFID reader
w/ POE & tilt sensor
Leverages Speedway
Revolution I/F & tools
Tag direction &
localization
150 m2 floor coverage
at 4.5m height
Better than 1.5m
spatial resolution
Unaffected by 1000’s
of stray tags
© 201016 | © 2013
xArray Locationing
Side View View Looking Down
Colored balls represent tags
Locate Items in Real Time
© 201017 | © 2013
Gen2 Today Definition
Select Select a population of tags
Inventory Inventory selected tags; get their EPCs
Access Read/write/lock tag memory; kill the tag
New in UHF Gen2 V2 (aka G2) protocol
In today’s UHF Gen2 protocol
G2 Enhancements Definition
Anticounterfeiting Authenticate a tag as genuine
Security Modify tag information securely
File Management Create files and assign access privileges
Untraceability Hide tag data to protect consumer privacy
Loss Prevention Use a tag for EAS
Authenticating an Item: UHF Gen2 V2.0.0
© 201018 | © 2013
G2 for Cryptographic Authentication
• Reader reads static TID from
tag memory
• Counterfeiter can clone tag
by copying TID
Today’s Gen2 RFID Future G2 RFID
Read
TID
Challenge (RN)
Response
• Tag computes response from
reader’s random challenge
and tag’s secret key
• Counterfeiter cannot clone tag
without knowing secret key
TID Key
© 201019 | © 2013
G2 for Cryptographic Security
Command Function
Challenge Challenges multiple tags simultaneously
Authenticate Performs tag, reader, or mutual authentication
AuthComm Authenticates a tag message with a MAC
SecureComm Encrypts a tag message
KeyUpdate Updates a tag’s stored key
FilePrivilege Alters a reader’s privileges to a file
TagPrivilege Alters a reader’s privileges to the tag
© 201020 | © 2013
G2 for File Management
Tag Memory
Key Concept: Partition User Memory into Files
Readers have per-file read,
write, and lock privileges
G2 supports up to 1023 files,
each of which can be up to
~2 Mbytes in size
© 201021 | © 2013
G2 for Consumer Privacy (Untraceability)
Hide none or all
Hide none, unique serialization, or all
Hide none, part , or all
Hide none, part , or all
Tag Memory
Protected by range reduction,
access privileges, or both
Key Concept: Hide Portions of Tag Memory
© 201022 | © 2013
G2 for Loss Prevention
© 201023 | © 2013
G2 Status
• GS1 EPCglobal has finished the protocol
– Has passed community review
– In final stages of IP review
– BoG ratification in 2013
• ISO is standardizing the crypto suites
– 9 crypto suites submitted to date
• Present, ECC, AES(×2), Grain, CryptoGPS, XOR, ECDSA-ECDH
– ISO will ratify the first crypto suites in 2014
© 201024 | © 2013
Item
Authentication Long Read
Range
Files & File
Management
File
Privileges
Fast
Inventory
• G2 provides authentication and much more
• G2 is backward compatible with Gen2
Short Read
Range
Cryptographic
Security
Large Tag
Populations
Loss
Prevention
G2
Consumer
Privacy
G2 will Supercharge UHF RFID
Identify
an Item
Locate
an Item
Authenticate
an Item
  
G2 + xArray = the Future of UHF RFID
© 201025 | © 2013

Weitere ähnliche Inhalte

Was ist angesagt?

HIikvision Mobile DVR 2012
HIikvision Mobile DVR 2012HIikvision Mobile DVR 2012
HIikvision Mobile DVR 2012mos81
 
Innovative Solutions For The Wood Industry
Innovative Solutions For The Wood IndustryInnovative Solutions For The Wood Industry
Innovative Solutions For The Wood IndustryThorne & Derrick UK
 
System Label SlideShare
System Label SlideShareSystem Label SlideShare
System Label SlideShareJack Kavanagh
 
Bluetooth rfid readers
Bluetooth rfid readersBluetooth rfid readers
Bluetooth rfid readersnephsystem
 
Beyond Identification - Barcodes in Industry
Beyond Identification - Barcodes in IndustryBeyond Identification - Barcodes in Industry
Beyond Identification - Barcodes in Industrydavid_h
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification Suman Dey
 
Barcodes in Action - Barcode GeekFest Slides
Barcodes in Action - Barcode GeekFest SlidesBarcodes in Action - Barcode GeekFest Slides
Barcodes in Action - Barcode GeekFest Slidesdavid_h
 
Micro TagTechnology
Micro TagTechnologyMicro TagTechnology
Micro TagTechnologyJAMATECH
 
May doc ma_vach_opticon_h21_1_d_numeric
May doc ma_vach_opticon_h21_1_d_numericMay doc ma_vach_opticon_h21_1_d_numeric
May doc ma_vach_opticon_h21_1_d_numericOPTICON VIETNAM LLC
 

Was ist angesagt? (16)

HIikvision Mobile DVR 2012
HIikvision Mobile DVR 2012HIikvision Mobile DVR 2012
HIikvision Mobile DVR 2012
 
Innovative Solutions For The Wood Industry
Innovative Solutions For The Wood IndustryInnovative Solutions For The Wood Industry
Innovative Solutions For The Wood Industry
 
May doc ma_vach_opticon_phl8114
May doc ma_vach_opticon_phl8114May doc ma_vach_opticon_phl8114
May doc ma_vach_opticon_phl8114
 
XB-320M, XB-620M
XB-320M, XB-620MXB-320M, XB-620M
XB-320M, XB-620M
 
May doc ma_vach_opticon_phl8214
May doc ma_vach_opticon_phl8214May doc ma_vach_opticon_phl8214
May doc ma_vach_opticon_phl8214
 
System Label SlideShare
System Label SlideShareSystem Label SlideShare
System Label SlideShare
 
Bluetooth rfid readers
Bluetooth rfid readersBluetooth rfid readers
Bluetooth rfid readers
 
Beyond Identification - Barcodes in Industry
Beyond Identification - Barcodes in IndustryBeyond Identification - Barcodes in Industry
Beyond Identification - Barcodes in Industry
 
Radio Frequency Identification
Radio Frequency Identification Radio Frequency Identification
Radio Frequency Identification
 
Barcodes in Action - Barcode GeekFest Slides
Barcodes in Action - Barcode GeekFest SlidesBarcodes in Action - Barcode GeekFest Slides
Barcodes in Action - Barcode GeekFest Slides
 
May doc ma_vach_opticon_phl8112
May doc ma_vach_opticon_phl8112May doc ma_vach_opticon_phl8112
May doc ma_vach_opticon_phl8112
 
rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Syndicate rfid products
Syndicate rfid productsSyndicate rfid products
Syndicate rfid products
 
May doc ma_vach_opticon_opl9723
May doc ma_vach_opticon_opl9723May doc ma_vach_opticon_opl9723
May doc ma_vach_opticon_opl9723
 
Micro TagTechnology
Micro TagTechnologyMicro TagTechnology
Micro TagTechnology
 
May doc ma_vach_opticon_h21_1_d_numeric
May doc ma_vach_opticon_h21_1_d_numericMay doc ma_vach_opticon_h21_1_d_numeric
May doc ma_vach_opticon_h21_1_d_numeric
 

Ähnlich wie I International Workshop RFID and IoT - Dia 20 - New Types of RFID Tags and Readers - Dr. Chris Diorio - Impinj

The Zebra Warehousing Mobile Computing Portfolio
The Zebra Warehousing Mobile Computing PortfolioThe Zebra Warehousing Mobile Computing Portfolio
The Zebra Warehousing Mobile Computing PortfolioScanSource Brasil
 
Havoc industrial electronice and techonology rfid and two-way radios - 2015
Havoc industrial electronice and techonology   rfid and two-way radios - 2015Havoc industrial electronice and techonology   rfid and two-way radios - 2015
Havoc industrial electronice and techonology rfid and two-way radios - 2015Robin Wright
 
Resurgence of UHF RFID
Resurgence of UHF RFIDResurgence of UHF RFID
Resurgence of UHF RFIDImpinj RFID
 
Pocket guide for mobile computers
Pocket guide for mobile computersPocket guide for mobile computers
Pocket guide for mobile computersScanSource Brasil
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsIhar Bayarenka
 
TEGO Offering Smart Asset Solutions
TEGO Offering Smart Asset SolutionsTEGO Offering Smart Asset Solutions
TEGO Offering Smart Asset SolutionsBock Mary
 
Omni Id Corp Pres Emea
Omni Id Corp Pres EmeaOmni Id Corp Pres Emea
Omni Id Corp Pres EmeaChrisHood
 
Guia para Leitores Datalogic
Guia para Leitores DatalogicGuia para Leitores Datalogic
Guia para Leitores DatalogicScanSource Brasil
 
Advantech Digital Signage Introduction.pptx
Advantech Digital Signage Introduction.pptxAdvantech Digital Signage Introduction.pptx
Advantech Digital Signage Introduction.pptxssuserc9c6261
 
4G-IoT-Technical-Perspective-Universitas-Budi-Luhur-New.pdf
4G-IoT-Technical-Perspective-Universitas-Budi-Luhur-New.pdf4G-IoT-Technical-Perspective-Universitas-Budi-Luhur-New.pdf
4G-IoT-Technical-Perspective-Universitas-Budi-Luhur-New.pdfVivi Gusti Anggraini
 
Rugged Docking Stations and Vehicle Mounts from Gamber Johnson and WAV
Rugged Docking Stations and Vehicle Mounts from Gamber Johnson and WAVRugged Docking Stations and Vehicle Mounts from Gamber Johnson and WAV
Rugged Docking Stations and Vehicle Mounts from Gamber Johnson and WAVWAV Inc.
 
Touch mobile computer bluebird ef501(r)
Touch mobile computer   bluebird ef501(r)Touch mobile computer   bluebird ef501(r)
Touch mobile computer bluebird ef501(r)carema123
 
SE-4061, Low Power Yet Robust Biometric Fingerprint Technology, by Charles Ng
SE-4061, Low Power Yet Robust Biometric Fingerprint Technology, by Charles NgSE-4061, Low Power Yet Robust Biometric Fingerprint Technology, by Charles Ng
SE-4061, Low Power Yet Robust Biometric Fingerprint Technology, by Charles NgAMD Developer Central
 
IOT Day EPITA — LPWA Networks
IOT Day EPITA — LPWA NetworksIOT Day EPITA — LPWA Networks
IOT Day EPITA — LPWA NetworksNicolas Lesconnec
 
Odalog RTx Datasheet
Odalog RTx DatasheetOdalog RTx Datasheet
Odalog RTx Datasheeta1-cbiss
 

Ähnlich wie I International Workshop RFID and IoT - Dia 20 - New Types of RFID Tags and Readers - Dr. Chris Diorio - Impinj (20)

The Zebra Warehousing Mobile Computing Portfolio
The Zebra Warehousing Mobile Computing PortfolioThe Zebra Warehousing Mobile Computing Portfolio
The Zebra Warehousing Mobile Computing Portfolio
 
Havoc industrial electronice and techonology rfid and two-way radios - 2015
Havoc industrial electronice and techonology   rfid and two-way radios - 2015Havoc industrial electronice and techonology   rfid and two-way radios - 2015
Havoc industrial electronice and techonology rfid and two-way radios - 2015
 
Mc9090 g
Mc9090 gMc9090 g
Mc9090 g
 
Resurgence of UHF RFID
Resurgence of UHF RFIDResurgence of UHF RFID
Resurgence of UHF RFID
 
Pocket guide for mobile computers
Pocket guide for mobile computersPocket guide for mobile computers
Pocket guide for mobile computers
 
New use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tagsNew use cases thanks to adding crypto to RFID tags
New use cases thanks to adding crypto to RFID tags
 
TEGO Offering Smart Asset Solutions
TEGO Offering Smart Asset SolutionsTEGO Offering Smart Asset Solutions
TEGO Offering Smart Asset Solutions
 
Omni Id Corp Pres Emea
Omni Id Corp Pres EmeaOmni Id Corp Pres Emea
Omni Id Corp Pres Emea
 
Mc9190z spec-sheet-en rfid
Mc9190z spec-sheet-en rfidMc9190z spec-sheet-en rfid
Mc9190z spec-sheet-en rfid
 
Guia para Leitores Datalogic
Guia para Leitores DatalogicGuia para Leitores Datalogic
Guia para Leitores Datalogic
 
MC9200_SS
MC9200_SSMC9200_SS
MC9200_SS
 
Advantech Digital Signage Introduction.pptx
Advantech Digital Signage Introduction.pptxAdvantech Digital Signage Introduction.pptx
Advantech Digital Signage Introduction.pptx
 
4G-IoT-Technical-Perspective-Universitas-Budi-Luhur-New.pdf
4G-IoT-Technical-Perspective-Universitas-Budi-Luhur-New.pdf4G-IoT-Technical-Perspective-Universitas-Budi-Luhur-New.pdf
4G-IoT-Technical-Perspective-Universitas-Budi-Luhur-New.pdf
 
Rugged Docking Stations and Vehicle Mounts from Gamber Johnson and WAV
Rugged Docking Stations and Vehicle Mounts from Gamber Johnson and WAVRugged Docking Stations and Vehicle Mounts from Gamber Johnson and WAV
Rugged Docking Stations and Vehicle Mounts from Gamber Johnson and WAV
 
Viavi Perfect OTDR
Viavi Perfect OTDRViavi Perfect OTDR
Viavi Perfect OTDR
 
Touch mobile computer bluebird ef501(r)
Touch mobile computer   bluebird ef501(r)Touch mobile computer   bluebird ef501(r)
Touch mobile computer bluebird ef501(r)
 
SE-4061, Low Power Yet Robust Biometric Fingerprint Technology, by Charles Ng
SE-4061, Low Power Yet Robust Biometric Fingerprint Technology, by Charles NgSE-4061, Low Power Yet Robust Biometric Fingerprint Technology, by Charles Ng
SE-4061, Low Power Yet Robust Biometric Fingerprint Technology, by Charles Ng
 
IOT Day EPITA — LPWA Networks
IOT Day EPITA — LPWA NetworksIOT Day EPITA — LPWA Networks
IOT Day EPITA — LPWA Networks
 
Odalog RTx Datasheet
Odalog RTx DatasheetOdalog RTx Datasheet
Odalog RTx Datasheet
 
Psion Teklogix
Psion TeklogixPsion Teklogix
Psion Teklogix
 

Mehr von CPqD

Control Plane for High Capacity Networks Public
Control Plane for High Capacity Networks PublicControl Plane for High Capacity Networks Public
Control Plane for High Capacity Networks PublicCPqD
 
Brazilian Semiconductor Scenario and Opportuni3es
Brazilian Semiconductor Scenario and Opportuni3esBrazilian Semiconductor Scenario and Opportuni3es
Brazilian Semiconductor Scenario and Opportuni3esCPqD
 
Cognitive Technique for Software Defined Optical Network (SDON)
Cognitive Technique for Software Defined Optical Network (SDON)Cognitive Technique for Software Defined Optical Network (SDON)
Cognitive Technique for Software Defined Optical Network (SDON)CPqD
 
The Dawn of Industry 4.0
The Dawn of Industry 4.0The Dawn of Industry 4.0
The Dawn of Industry 4.0CPqD
 
Embedded Electronics for Telecom DSP
Embedded Electronics for Telecom DSPEmbedded Electronics for Telecom DSP
Embedded Electronics for Telecom DSPCPqD
 
Troubleshooting Coherent Optical Communication Systems
Troubleshooting Coherent Optical Communication SystemsTroubleshooting Coherent Optical Communication Systems
Troubleshooting Coherent Optical Communication SystemsCPqD
 
OPTICAL COMMUNICATIONS APPLICATIONS
OPTICAL COMMUNICATIONS APPLICATIONSOPTICAL COMMUNICATIONS APPLICATIONS
OPTICAL COMMUNICATIONS APPLICATIONSCPqD
 
Integrated Photonics Advances in Optical Transmission: An Industry View
Integrated Photonics Advances in Optical Transmission: An Industry ViewIntegrated Photonics Advances in Optical Transmission: An Industry View
Integrated Photonics Advances in Optical Transmission: An Industry ViewCPqD
 
Novo modelo de apoio à inovação
Novo modelo de apoio à inovaçãoNovo modelo de apoio à inovação
Novo modelo de apoio à inovaçãoCPqD
 
CPqD at Optical Communication Ecosystem - Last/Next 10 years and R&D&I opport...
CPqD at Optical Communication Ecosystem - Last/Next 10 years and R&D&I opport...CPqD at Optical Communication Ecosystem - Last/Next 10 years and R&D&I opport...
CPqD at Optical Communication Ecosystem - Last/Next 10 years and R&D&I opport...CPqD
 
Flexible Optical Transmission
Flexible Optical TransmissionFlexible Optical Transmission
Flexible Optical TransmissionCPqD
 
High Capacity Optical Access Networks
High Capacity Optical Access NetworksHigh Capacity Optical Access Networks
High Capacity Optical Access NetworksCPqD
 
BNDES: Instrumentos de Apoio à Inovação
BNDES: Instrumentos de Apoio à InovaçãoBNDES: Instrumentos de Apoio à Inovação
BNDES: Instrumentos de Apoio à InovaçãoCPqD
 
Câmara de Gestão M2M/IoT
Câmara de Gestão M2M/IoTCâmara de Gestão M2M/IoT
Câmara de Gestão M2M/IoTCPqD
 
Mesa Redonda: Fomento Governamental para o Setor
Mesa Redonda: Fomento Governamental para o SetorMesa Redonda: Fomento Governamental para o Setor
Mesa Redonda: Fomento Governamental para o SetorCPqD
 
Creating Business Value By Enabling the Internet of Things
Creating Business Value By Enabling the Internet of ThingsCreating Business Value By Enabling the Internet of Things
Creating Business Value By Enabling the Internet of ThingsCPqD
 
RFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoTRFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoTCPqD
 
Apresentação Paulo Curado (CPqD) - RFID Journal Live! Brasil 2015
Apresentação Paulo Curado (CPqD) - RFID Journal Live! Brasil 2015Apresentação Paulo Curado (CPqD) - RFID Journal Live! Brasil 2015
Apresentação Paulo Curado (CPqD) - RFID Journal Live! Brasil 2015CPqD
 
Fiber Technology Trends for Next Generation Networks
Fiber Technology Trends for Next Generation NetworksFiber Technology Trends for Next Generation Networks
Fiber Technology Trends for Next Generation NetworksCPqD
 
Emerging Trends and Applications for Cost Effective ROADMs
Emerging Trends and Applications for Cost Effective ROADMsEmerging Trends and Applications for Cost Effective ROADMs
Emerging Trends and Applications for Cost Effective ROADMsCPqD
 

Mehr von CPqD (20)

Control Plane for High Capacity Networks Public
Control Plane for High Capacity Networks PublicControl Plane for High Capacity Networks Public
Control Plane for High Capacity Networks Public
 
Brazilian Semiconductor Scenario and Opportuni3es
Brazilian Semiconductor Scenario and Opportuni3esBrazilian Semiconductor Scenario and Opportuni3es
Brazilian Semiconductor Scenario and Opportuni3es
 
Cognitive Technique for Software Defined Optical Network (SDON)
Cognitive Technique for Software Defined Optical Network (SDON)Cognitive Technique for Software Defined Optical Network (SDON)
Cognitive Technique for Software Defined Optical Network (SDON)
 
The Dawn of Industry 4.0
The Dawn of Industry 4.0The Dawn of Industry 4.0
The Dawn of Industry 4.0
 
Embedded Electronics for Telecom DSP
Embedded Electronics for Telecom DSPEmbedded Electronics for Telecom DSP
Embedded Electronics for Telecom DSP
 
Troubleshooting Coherent Optical Communication Systems
Troubleshooting Coherent Optical Communication SystemsTroubleshooting Coherent Optical Communication Systems
Troubleshooting Coherent Optical Communication Systems
 
OPTICAL COMMUNICATIONS APPLICATIONS
OPTICAL COMMUNICATIONS APPLICATIONSOPTICAL COMMUNICATIONS APPLICATIONS
OPTICAL COMMUNICATIONS APPLICATIONS
 
Integrated Photonics Advances in Optical Transmission: An Industry View
Integrated Photonics Advances in Optical Transmission: An Industry ViewIntegrated Photonics Advances in Optical Transmission: An Industry View
Integrated Photonics Advances in Optical Transmission: An Industry View
 
Novo modelo de apoio à inovação
Novo modelo de apoio à inovaçãoNovo modelo de apoio à inovação
Novo modelo de apoio à inovação
 
CPqD at Optical Communication Ecosystem - Last/Next 10 years and R&D&I opport...
CPqD at Optical Communication Ecosystem - Last/Next 10 years and R&D&I opport...CPqD at Optical Communication Ecosystem - Last/Next 10 years and R&D&I opport...
CPqD at Optical Communication Ecosystem - Last/Next 10 years and R&D&I opport...
 
Flexible Optical Transmission
Flexible Optical TransmissionFlexible Optical Transmission
Flexible Optical Transmission
 
High Capacity Optical Access Networks
High Capacity Optical Access NetworksHigh Capacity Optical Access Networks
High Capacity Optical Access Networks
 
BNDES: Instrumentos de Apoio à Inovação
BNDES: Instrumentos de Apoio à InovaçãoBNDES: Instrumentos de Apoio à Inovação
BNDES: Instrumentos de Apoio à Inovação
 
Câmara de Gestão M2M/IoT
Câmara de Gestão M2M/IoTCâmara de Gestão M2M/IoT
Câmara de Gestão M2M/IoT
 
Mesa Redonda: Fomento Governamental para o Setor
Mesa Redonda: Fomento Governamental para o SetorMesa Redonda: Fomento Governamental para o Setor
Mesa Redonda: Fomento Governamental para o Setor
 
Creating Business Value By Enabling the Internet of Things
Creating Business Value By Enabling the Internet of ThingsCreating Business Value By Enabling the Internet of Things
Creating Business Value By Enabling the Internet of Things
 
RFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoTRFID and NFC Providing the last yards for IoT
RFID and NFC Providing the last yards for IoT
 
Apresentação Paulo Curado (CPqD) - RFID Journal Live! Brasil 2015
Apresentação Paulo Curado (CPqD) - RFID Journal Live! Brasil 2015Apresentação Paulo Curado (CPqD) - RFID Journal Live! Brasil 2015
Apresentação Paulo Curado (CPqD) - RFID Journal Live! Brasil 2015
 
Fiber Technology Trends for Next Generation Networks
Fiber Technology Trends for Next Generation NetworksFiber Technology Trends for Next Generation Networks
Fiber Technology Trends for Next Generation Networks
 
Emerging Trends and Applications for Cost Effective ROADMs
Emerging Trends and Applications for Cost Effective ROADMsEmerging Trends and Applications for Cost Effective ROADMs
Emerging Trends and Applications for Cost Effective ROADMs
 

Kürzlich hochgeladen

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Kürzlich hochgeladen (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

I International Workshop RFID and IoT - Dia 20 - New Types of RFID Tags and Readers - Dr. Chris Diorio - Impinj

  • 1. © 20101 | © 2013 Advances in UHF RFID June 2013
  • 2. © 20102 | © 2013 2004: UHF Gen2 Ratified • Two readers using DRM – Transmitting simultaneously – Inventorying simultaneously • Tags moving fast • Readers rejecting interference • No missed tags or ghost reads Wind Tunnel Presented at 2005 EPCglobal US Conference
  • 3. © 20103 | © 2013 2005: Walmart Pallet Tests Proved Gen2 • Speedway™ prototype on either side of dock door • AD-620 (Triflex™) tags on each of 40 boxes of Caress® soap • Multiple interfering readers transmitting simultaneously
  • 4. © 20104 | © 2013 2006: Impinj Introduces Near-Field UHF • UHF Gen2 works both near & far, on all types of items – Allows a single infrastructure for pallets, cases, and items – The only frequency with this property • Far field: 30cm to 15m range • Near field: 0 to 60cm range – Reads on liquids and metals – The only difference is the antennas
  • 5. © 20105 | © 2013 2007: UHF Gen2 Beat HF for Pharma • UHF outperformed HF at NACDS • UHF reliably wrote & read bottles at 2× speed of fastest pharma line • Impinj deploys UHF Gen2 on Purdue Pharma production line
  • 6. © 20106 | © 2013 2008: Gen2 Enhanced for Item Tagging • New Gen2 V1.2.0 adds UM indicator, XPC, BPL, and recommissioning specifically for item tagging • Impinj develops item solution for Metro Galeria Kaufhof – 30,000 tagged items on the sales floor
  • 7. © 20107 | © 2013 2009: Enabled Myriad Products • Hand-Held Readers • Fixed Readers • Cards & Modules
  • 8. © 20108 | © 2013 But the Tag Volumes Went Nowhere… 500 1000 1500 2500 2000 2005 2006 20082007 2009 2010 2011 100 250 300 350 400 Volume(MU) 3500 3000 2012 2013 End customers were piloting but not yet deploying
  • 9. © 20109 | © 2013 2010: Walmart Rolls-Out Apparel Tagging
  • 10. © 201010 | © 2013 2011: Coke Rolls-Out Embedded RFID
  • 11. © 201011 | © 2013 2012: STP Breaks Encoding Barrier • Platform for high-performance encoding & verification • Delivers highest encoding quality & reliability • Leverages Monza performance & capabilities • Encodes at speeds to 300k uph STP + Monza breaks RFID encoding performance barrier
  • 12. © 201012 | © 2013 2013: Retail Apparel Tagging Takes Off Top 50 apparel retailer TAM = ~25Bn garments/year • Rollout or deployed – American Apparel – Macy’s – Liverpool – Memove – Zara – JCP – Walmart – Marks & Spencer – Kohl’s • Piloting – Sears – Chico’s – Saks – Lord & Taylor – Hudson Bay – C&A (EU, Brazil) 0.0 200.0 400.0 600.0 800.0 1000.0 1200.0 1400.0 1600.0 Jan/09 Sep/09 May/10 Jan/11 Sep/11 May/12 Jan/13 Sep/13 May/14 Jan/15 Sep/15 May/16 Jan/17 Sep/17 May/18 Jan/19 Sep/19 May/20 Jan/21 Sep/21 MonthlyTagConsumption(M) We are here @ 2Bn/yr Monthly Tag Consumption by Top 50 Apparel Retailers
  • 13. © 201013 | © 2013 Tag Volumes Grow as Customers Adopt 500 1000 1500 2500 2000 2005 2006 20082007 2009 2010 2011 100 250 300 350 400 1300 1950 Volume(MU) 3500 3000 2650 3300 2012 2013 2/3 of the 2013 volume Is for apparel tagging
  • 14. © 201014 | © 2013 The Situation Today • Retail is adopting UHF RFID broadly – American Apparel, Macy’s, Memove, Liverpool, Zara, JCP, Walmart, Marks & Spencer, Kohl’s, more • Other UHF RFID applications are growing – Embedded RFID, asset tracking, laundry, border crossing, customer experience, manufacturing, more • Do we have the technology we need? Identify an Item Locate an Item Authenticate an Item 
  • 15. © 201015 | © 2013 Locating an Item: xArray 6.35 cm 45.7 cm 2D-array RFID reader w/ POE & tilt sensor Leverages Speedway Revolution I/F & tools Tag direction & localization 150 m2 floor coverage at 4.5m height Better than 1.5m spatial resolution Unaffected by 1000’s of stray tags
  • 16. © 201016 | © 2013 xArray Locationing Side View View Looking Down Colored balls represent tags Locate Items in Real Time
  • 17. © 201017 | © 2013 Gen2 Today Definition Select Select a population of tags Inventory Inventory selected tags; get their EPCs Access Read/write/lock tag memory; kill the tag New in UHF Gen2 V2 (aka G2) protocol In today’s UHF Gen2 protocol G2 Enhancements Definition Anticounterfeiting Authenticate a tag as genuine Security Modify tag information securely File Management Create files and assign access privileges Untraceability Hide tag data to protect consumer privacy Loss Prevention Use a tag for EAS Authenticating an Item: UHF Gen2 V2.0.0
  • 18. © 201018 | © 2013 G2 for Cryptographic Authentication • Reader reads static TID from tag memory • Counterfeiter can clone tag by copying TID Today’s Gen2 RFID Future G2 RFID Read TID Challenge (RN) Response • Tag computes response from reader’s random challenge and tag’s secret key • Counterfeiter cannot clone tag without knowing secret key TID Key
  • 19. © 201019 | © 2013 G2 for Cryptographic Security Command Function Challenge Challenges multiple tags simultaneously Authenticate Performs tag, reader, or mutual authentication AuthComm Authenticates a tag message with a MAC SecureComm Encrypts a tag message KeyUpdate Updates a tag’s stored key FilePrivilege Alters a reader’s privileges to a file TagPrivilege Alters a reader’s privileges to the tag
  • 20. © 201020 | © 2013 G2 for File Management Tag Memory Key Concept: Partition User Memory into Files Readers have per-file read, write, and lock privileges G2 supports up to 1023 files, each of which can be up to ~2 Mbytes in size
  • 21. © 201021 | © 2013 G2 for Consumer Privacy (Untraceability) Hide none or all Hide none, unique serialization, or all Hide none, part , or all Hide none, part , or all Tag Memory Protected by range reduction, access privileges, or both Key Concept: Hide Portions of Tag Memory
  • 22. © 201022 | © 2013 G2 for Loss Prevention
  • 23. © 201023 | © 2013 G2 Status • GS1 EPCglobal has finished the protocol – Has passed community review – In final stages of IP review – BoG ratification in 2013 • ISO is standardizing the crypto suites – 9 crypto suites submitted to date • Present, ECC, AES(×2), Grain, CryptoGPS, XOR, ECDSA-ECDH – ISO will ratify the first crypto suites in 2014
  • 24. © 201024 | © 2013 Item Authentication Long Read Range Files & File Management File Privileges Fast Inventory • G2 provides authentication and much more • G2 is backward compatible with Gen2 Short Read Range Cryptographic Security Large Tag Populations Loss Prevention G2 Consumer Privacy G2 will Supercharge UHF RFID Identify an Item Locate an Item Authenticate an Item    G2 + xArray = the Future of UHF RFID
  • 25. © 201025 | © 2013