Weitere ähnliche Inhalte
Ähnlich wie I International Workshop RFID and IoT - Dia 20 - New Types of RFID Tags and Readers - Dr. Chris Diorio - Impinj (20)
Kürzlich hochgeladen (20)
I International Workshop RFID and IoT - Dia 20 - New Types of RFID Tags and Readers - Dr. Chris Diorio - Impinj
- 1. © 20101 | © 2013
Advances in UHF RFID
June 2013
- 2. © 20102 | © 2013
2004: UHF Gen2 Ratified
• Two readers using DRM
– Transmitting simultaneously
– Inventorying simultaneously
• Tags moving fast
• Readers rejecting interference
• No missed tags or ghost reads
Wind
Tunnel
Presented at 2005
EPCglobal
US Conference
- 3. © 20103 | © 2013
2005: Walmart Pallet Tests Proved Gen2
• Speedway™ prototype on either
side of dock door
• AD-620 (Triflex™) tags on each
of 40 boxes of Caress® soap
• Multiple interfering readers
transmitting simultaneously
- 4. © 20104 | © 2013
2006: Impinj Introduces Near-Field UHF
• UHF Gen2 works both near & far, on all types of items
– Allows a single infrastructure for pallets, cases, and items
– The only frequency with this property
• Far field: 30cm to 15m range
• Near field: 0 to 60cm range
– Reads on liquids and metals
– The only difference is the antennas
- 5. © 20105 | © 2013
2007: UHF Gen2 Beat HF for Pharma
• UHF outperformed HF at NACDS
• UHF reliably wrote & read bottles at
2× speed of fastest pharma line
• Impinj deploys UHF Gen2 on Purdue
Pharma production line
- 6. © 20106 | © 2013
2008: Gen2 Enhanced for Item Tagging
• New Gen2 V1.2.0 adds UM indicator, XPC, BPL, and
recommissioning specifically for item tagging
• Impinj develops item
solution for Metro
Galeria Kaufhof
– 30,000 tagged items
on the sales floor
- 7. © 20107 | © 2013
2009: Enabled Myriad Products
• Hand-Held Readers
• Fixed Readers
• Cards & Modules
- 8. © 20108 | © 2013
But the Tag Volumes Went Nowhere…
500
1000
1500
2500
2000
2005 2006 20082007 2009 2010 2011
100
250 300 350 400
Volume(MU)
3500
3000
2012 2013
End customers were
piloting but not yet
deploying
- 9. © 20109 | © 2013
2010: Walmart Rolls-Out Apparel Tagging
- 10. © 201010 | © 2013
2011: Coke Rolls-Out Embedded RFID
- 11. © 201011 | © 2013
2012: STP Breaks Encoding Barrier
• Platform for high-performance encoding & verification
• Delivers highest encoding quality & reliability
• Leverages Monza performance & capabilities
• Encodes at speeds to 300k uph
STP + Monza breaks RFID encoding performance barrier
- 12. © 201012 | © 2013
2013: Retail Apparel Tagging Takes Off
Top 50 apparel retailer TAM = ~25Bn garments/year
• Rollout or deployed
– American Apparel
– Macy’s
– Liverpool
– Memove
– Zara
– JCP
– Walmart
– Marks & Spencer
– Kohl’s
• Piloting
– Sears
– Chico’s
– Saks
– Lord & Taylor
– Hudson Bay
– C&A (EU, Brazil)
0.0
200.0
400.0
600.0
800.0
1000.0
1200.0
1400.0
1600.0
Jan/09
Sep/09
May/10
Jan/11
Sep/11
May/12
Jan/13
Sep/13
May/14
Jan/15
Sep/15
May/16
Jan/17
Sep/17
May/18
Jan/19
Sep/19
May/20
Jan/21
Sep/21
MonthlyTagConsumption(M)
We are here
@ 2Bn/yr
Monthly Tag Consumption by Top 50
Apparel Retailers
- 13. © 201013 | © 2013
Tag Volumes Grow as Customers Adopt
500
1000
1500
2500
2000
2005 2006 20082007 2009 2010 2011
100
250 300 350 400
1300
1950
Volume(MU)
3500
3000
2650
3300
2012 2013
2/3 of the 2013 volume
Is for apparel tagging
- 14. © 201014 | © 2013
The Situation Today
• Retail is adopting UHF RFID broadly
– American Apparel, Macy’s, Memove, Liverpool, Zara, JCP,
Walmart, Marks & Spencer, Kohl’s, more
• Other UHF RFID applications are growing
– Embedded RFID, asset tracking, laundry, border crossing,
customer experience, manufacturing, more
• Do we have the technology we need?
Identify
an Item
Locate
an Item
Authenticate
an Item
- 15. © 201015 | © 2013
Locating an Item: xArray
6.35 cm
45.7 cm
2D-array RFID reader
w/ POE & tilt sensor
Leverages Speedway
Revolution I/F & tools
Tag direction &
localization
150 m2 floor coverage
at 4.5m height
Better than 1.5m
spatial resolution
Unaffected by 1000’s
of stray tags
- 16. © 201016 | © 2013
xArray Locationing
Side View View Looking Down
Colored balls represent tags
Locate Items in Real Time
- 17. © 201017 | © 2013
Gen2 Today Definition
Select Select a population of tags
Inventory Inventory selected tags; get their EPCs
Access Read/write/lock tag memory; kill the tag
New in UHF Gen2 V2 (aka G2) protocol
In today’s UHF Gen2 protocol
G2 Enhancements Definition
Anticounterfeiting Authenticate a tag as genuine
Security Modify tag information securely
File Management Create files and assign access privileges
Untraceability Hide tag data to protect consumer privacy
Loss Prevention Use a tag for EAS
Authenticating an Item: UHF Gen2 V2.0.0
- 18. © 201018 | © 2013
G2 for Cryptographic Authentication
• Reader reads static TID from
tag memory
• Counterfeiter can clone tag
by copying TID
Today’s Gen2 RFID Future G2 RFID
Read
TID
Challenge (RN)
Response
• Tag computes response from
reader’s random challenge
and tag’s secret key
• Counterfeiter cannot clone tag
without knowing secret key
TID Key
- 19. © 201019 | © 2013
G2 for Cryptographic Security
Command Function
Challenge Challenges multiple tags simultaneously
Authenticate Performs tag, reader, or mutual authentication
AuthComm Authenticates a tag message with a MAC
SecureComm Encrypts a tag message
KeyUpdate Updates a tag’s stored key
FilePrivilege Alters a reader’s privileges to a file
TagPrivilege Alters a reader’s privileges to the tag
- 20. © 201020 | © 2013
G2 for File Management
Tag Memory
Key Concept: Partition User Memory into Files
Readers have per-file read,
write, and lock privileges
G2 supports up to 1023 files,
each of which can be up to
~2 Mbytes in size
- 21. © 201021 | © 2013
G2 for Consumer Privacy (Untraceability)
Hide none or all
Hide none, unique serialization, or all
Hide none, part , or all
Hide none, part , or all
Tag Memory
Protected by range reduction,
access privileges, or both
Key Concept: Hide Portions of Tag Memory
- 23. © 201023 | © 2013
G2 Status
• GS1 EPCglobal has finished the protocol
– Has passed community review
– In final stages of IP review
– BoG ratification in 2013
• ISO is standardizing the crypto suites
– 9 crypto suites submitted to date
• Present, ECC, AES(×2), Grain, CryptoGPS, XOR, ECDSA-ECDH
– ISO will ratify the first crypto suites in 2014
- 24. © 201024 | © 2013
Item
Authentication Long Read
Range
Files & File
Management
File
Privileges
Fast
Inventory
• G2 provides authentication and much more
• G2 is backward compatible with Gen2
Short Read
Range
Cryptographic
Security
Large Tag
Populations
Loss
Prevention
G2
Consumer
Privacy
G2 will Supercharge UHF RFID
Identify
an Item
Locate
an Item
Authenticate
an Item
G2 + xArray = the Future of UHF RFID