Title: IC Card v.s. RFID
1IC Card v.s. RFID
- ?????
- P9374717 ???
- P9374711 ???
2Agenda
- Smart Cards Technology
- Radio Frequency Identification (RFID)
- QA
3Smart Cards Technology
4IC Card (Smart Card)
- ?????????????(IC),????????,????????????IC?????????
?????(MCU) ????,???????????(Memory
Card),???????????????????????,??????(Smart
Card)? - IC??????????,??????????????????????????,???????
??????(off-line)??,??????????????????????,?????IC
?????
5(No Transcript)
6Plastic Cards
- Visual identity application
- Plain plastic card is enough
- Magnetic strip (e.g. credit cards)
- Visual data also available in machine readable
form - No security of data
- Electronic memory cards
- Machine readable data
- Some security (vendor specific)
7Smart Cards
- Processor cards (and therefore memory too)
- Credit card size
- With or without contacts.
- Cards have an operating system too.
- The OS provides
- A standard way of interchanging information
- An interpretation of the commands and data.
- Cards must interface to a computer or terminal
through a standard card reader. - Loosely defined, a smart card is any card with a
capability to relate information to a particular
application such as - Magnetic Stripe Cards
- Optical Cards
- Memory Cards
- Microprocessor Cards
8Magnetic Stripe Cards
Standard technology for bank cards, drivers
licenses, library cards, and so on
9Optical Cards
- Uses a laser to read and write the card
- CANPASS Contains
- Photo ID
- Fingerprint
10Memory Cards
- Can store
- Financial Info
- Personal Info
- Specialized Info
- Cannot process Info
11Microprocessor Cards
- Has an integrated circuit chip
- Has the ability to
- Store information
- Carry out local processing
- Perform Complex Calculations
12Microprocessor CardsContact Smart Card
13Microprocessor CardsContactless Smart Card
14Microprocessor CardsCombi / Hybrid Cards
- Hybrid Card
- Has two chips contact and contactless interface.
- The two chips are not connected.
- Combi Card
- Has a single chip with a contact and contactless
interface. - Can access the same chip via a contact or
contactless interface, with a very high level of
security.
15Smart Cards devices
16Whats in a Card?
- Typical Smartcard at time of our research
- 8-bit CPU, 384 bytes RAM, 35 Mhz clock rate
- Upcoming
- 32-bit RISC CPU, 4 Kbytes RAM, 50 Mhz clock
RST
CLK
Vcc
RFU
GND
RFU
Vpp
I/O
17Typical Configurations
- 256 bytes to 4KB RAM.
- 8KB to 32KB ROM.
- 1KB to 32KB EEPROM.
- Crypto-coprocessors (implementing 3DES, RSA etc.,
in hardware) are optional. - 8-bit to 16-bit CPU. 8051 based designs are
common. - The price of a mid-level chip when produced in
bulk is less than US1.
18Smart Card Readers
- Computer based readers
- Connect through USB or COM (Serial) ports
- Dedicated terminals
- Usually with a small screen, keypad, printer,
often alsohave biometric devices such as thumb
print scanner.
19Communication mechanisms
- Communication between smart card and reader is
standardized - ISO 7816-4 standard
- Commands are initiated by the terminal
- Interpreted by the card OS
- Card state is updated
- Response is given by the card.
- Commands have the following structure
- Response from the card include 1..Le bytes
followed by Response Code
20Security Mechanisms
- Password
- Card holders protection
- Cryptographic challenge Response
- Entity authentication
- Biometric information
- Persons identification
- A combination of one or more
21Data storage
- Data is stored in smart cards in E2PROM
- Card OS provides a file structure mechanism
File types Binary file (unstructured) Fixed size
record file Variable size record file
22Access control on the files
- Applications may specify the access controls
- A password (PIN) on the MF selection
- For example SIM password in mobiles
- Multiple passwords can be used and levels of
security access may be given - Applications may also use cryptographic
authentication
23How does it all work?
Card is inserted in the terminal
Card gets power. OS boots up. Sends ATR (Answer
to reset)
ATR negotiations take place to set up data
transfer speeds, capability negotiations etc.
Terminal sends first command to select MF
Card responds with an error (because MF selection
is only on password presentation)
Terminal prompts the user to provide password
Card verifies P2. Stores a status P2 Verified.
Responds OK
Terminal sends password for verification
Card responds OK
Terminal sends command to select MF again
Card supplies personal data and responds OK
Terminal sends command to read EF1
24CAT_TP and BIP
BIP
Mechanism originally specified by 3GPP T3 by
which the ME provides the UICC with access to the
data bearers supported by the ME and the network
25How are Smart Cards Used?
- Commercial Applications
- Banking/payment
- Identification
- Parking and toll collection
- Universities use smart cards for ID purposes and
at the the library, vending machines, copy
machines, and other services on campus. - By 2007 end all credit cards will be smart.
- EMV standard
- Mobile Telecommunications
- SIM cards used on cell phones
- Over 300,000,000 GSM phones with smart cards
- Contains mobile phone security, subscription
information, phone number on the network, billing
information, and frequently called numbers.
26How are Smart Cards Used?
- Information Technology
- Secure logon and authentication of users to PCs
and networks - Encryption of sensitive data
- Other Applications
- Over 4 million small dish TV satellite receivers
in the US use a smart card as its removable
security element and subscription information. - Pre-paid, reloadable telephone cards
- Health Care, stores the history of a patient
- Fast ticketing in public transport, parking, and
road tolling in many countries - JAVA cards
27What is Smart Card for Government?
A Multi-Application, Multi-Tech Proximity Smart
CardA Hybrid / Composite Card
Authen
tication Architecture
Encryption, Compression
Uses
Pre-paid Money, Credit, Debit,
Authorizations, ID, Certificate Secure eMail,
eForms, Digital signature
Proximity / Combi Chip are imminent - combining
smart card and radio frequency into one
chip
RF indicates Radio Frequency Chip
Source John G Moore, GSA, 1994
28E-Government Smart Card Specification
- ISO 7816, 1,2,3 compliant
- FIPS 140-2, level 3
- Java Applications
- PKI Applet
- ID PIN Verification and Management Applet
- GCA Applet
- Authentication Applet
- Biometric Authentication Applet
- Stake Holder applets (future)
- JavaCard 2.1
- Global Platform 2 Compliant
- 64 K RAM (42K available for applets)
- DES/3DES/AES(when available)
- RSA asymmetric 1024 / 2048
- PTS speed in access of 9600 bps
- EEPROM endurance gt 250,000 r/w cycles
- MIFARE Proximity (contactless) chip
- DESFire (ISO 14443-A)
- 4 k NV memory
29Smart Card Applications
Identity Management
Mobile Communications
Ticketless Travel Loyalty Programs
Building Security/Area Access
Time and Attendance Administration
Debit/Credit Card Electronic Purse Mass Transit
Training Management Qualification Certification Di
stance Learning
Secure Network Access Information Security
Drivers License Work/Entry Permits Parking
Healthcare
30Advantages
- In comparison to its predecessor, the magnetic
strip card, smart - cards have many advantages including
- Life of a smart card is longer
- A single smart card can house multiple
applications. Just one card can be used as your
license, passport, credit card, ATM card, ID
Card, etc. - Smart cards cannot be easily replicated and are,
as a general rule much more secure than magnetic
stripe cards. it has relatively powerful
processing capabilities that allow it to do more
than a magnetic stripe card (e.g., data
encryption). - Data on a smart card can be protected against
unauthorized viewing. As a result of this
confidential data, PINs and passwords can be
stored on a smart card. This means, merchants do
not have to go online every time to authenticate
a transaction.
31Disadvantages
- NOT tamper proof
- Can be lost/stolen
- Lack of user mobility only possible if user has
smart card reader every he goes - Has to use the same reader technology
- Can be expensive
- Working from PC software based token will be
better - No benefits to using a token on multiple PCs to
using a smart card - Still working on bugs
32Over 20 programs world-wide
- Over 20 programs world-wide across the financial,
id/security, government, mobile telecom, public
healthcare, retail, and transit markets - ?? Mobile OTA application management for
USIM/SIM cards (SIMToolKit, CAT) - ?? US DoD CAC card
- ?? Taiwan Health Card
- ?? Moscow Social Card
- ?? Finnish National Smart Card Program
- ?? Smart Visa Card
- ?? Amex Blue Card
- ?? Etc..
33OS Based Classification
- Smart cards are also classified on the basis of
their Operating System. There are many Smart Card
Operating Systems available in the market, the
main ones being1. MultOS 2. JavaCard3.
Cyberflex4. StarCOS5. MFCSmart Card Operating
Systems or SCOS as they are commonly called, are
placed on the ROM and usually occupy lesser than
16 KB. SCOS handle File Handling and
Manipulation. Memory Management Data
Transmission Protocols.
34International Standardization
- Mobile Telecom Standards
- ?? ETSI GSM 03.48, TS 23.048
- ?? ETSI 3G Smart Card Platform (SCP) TS
102.225, 102.226 - Government Standards
- ?? US Federal Government GSC-IS
- ?? Under review (US) FIPS 201, PIV
- ISO new part 13 of 7816 series
- ?? New Work Item from Japan approved by ISO SC17
- ?? Work assigned to ISO SC17/WG4, editor Japan
- ?? Scope commands for application management in
multi application environment - ?? Contribution a subset of GlobalPlatform Card
Specification, endorsed by ANSI - ?? US official contribution to ISO
35Global Deployment
- Over 70 million GlobalPlatform cards deployed
worldwide - Additional 450 million GSM cards globally use
GlobalPlatform technology for over-the-air (OTA)
application download - Over 30 implementations across the financial,
ID/security, government, mobile telecom,
healthcare, retail, and transit markets - Estimates predict these figures to increase
dramatically in 2005 and 2006
36Worldwide Industry
37Radio FrequencyIdentification (RFID)
38Internet of THIINGS
39RFID Overview(1)
- What is RFID?
- Radio Frequency IDentifier
- RFID combines the features of traditional IDs
- Barcodes used to identify and track objects
- OCR and biometrics enables automatic ID and
verification - Smart cards/IC card store information and
provide interactive processing - How RFID different?
- Used to identify objects and store information
about the object - Used to locate and identify objects from a
distance using RF signals - Used to detect and read things that are not in
line of sight - Data can be interactively managed and processed
by the RFID chip and RFID system
40The RFID Tag Components
- The RFID tag is made up of several parts
- A microchip that stores data and modulates and
demodulates analog radio waves - An antenna that gathers RF energy from a reader
and reflects back a signal - A protective layer that can be used to create a
label or other type of transponder
41- How it works
- The reader emits radio waves
- The tag coverts the radio waves into electricity
to power up the microchip - The microchip modulates and demodulates the
antenna and sends backs long and short waves or
waves of different amplitude - The reader converts these waves into a string of
ones and zeros - A computer turns the ones and zeros into digital
information
42(No Transcript)
43RFID Overview(3)
- Web service vs RFID service
Web Service
RFID Service
4.3.2.1.rfid.or.kr
www.nida.or.kr
object information servers domain name
203.254.110.10
object info servers IP address
203.254.110.10
object info
Homepage (HTML)
object info server
Web server
ODS Object Directory System
44RFID Operation (Passive Tags)
APPLICATION
INTERROGATOR
RF TAG
Tag Physical Memory
Decoder
AIR INTERFACE
Logical Memory Map
Encoder
DEVICECOMMANDS
COMMANDS
Tag Driver and Mapping Rules
APPLICATIONCOMMANDS
Command / Response Unit
Application Program Interface
APPLICATIONRESPONSES
RESPONSES
DEVICERESPONSES
Logical Memory
Note The Logical Memory Map in the Tag Physical
Memory is given by the Tag architecture and the
mapping rules in the Tag Driver. All the
information in the Logical Memory is represented
in the Logical Memory Map
PHYSICAL INTERROGATOR
DATA PROTOCOL PROCESSOR
ISO/IEC 15961
ISO/IEC 18000
ISO/IEC 15962
ISO/IEC 15962 Annexes
45The RFID reader also has several parts
- A digital signal processor and a microcontroller
- An internal or external antenna
- A network or serial port connection
- Input/output ports for linking to other devices
46RFIDs Unique Capabilities
- No line of sight required to read tags
- Simultaneous communication with multiple tags
- Each Item is unique prevents double counting
- Bulk reading capability
- Can store information directly on tags
- High memory capacity
- Long read ranges
- Performance not limited by harsh environments
versus bar codes
47Are All Tags The Same?
- Basic Types
- Active
- Tag transmits radio signal
- Internally powered memory, radio circuitry
- High Read Range (300 feet)
- Passive
- Tag reflects radio signal from reader
- Reader powered
- Shorter Read Range (4 inches - 15 feet)
48Active RFID
- Active tags transmit an RF signal (instead of
reflecting the signal) - Active tags have longer range than passive tags
- Most active tags have batteries, though emerging
technology may provide active transmission
WITHOUT batteries.
49Passive RFID
- Passive tags (also referred to as field
disturbance devices) reflect and modulate radio
waves received by the tag from the interrogator. - Passive devices have ranges of 1 to 4 meters
depending upon national regulations - Passive tags do not require an on-board power
source, but some do have batteries to support
sensors and faster response times.
50RFID Operation (Passive Tags)
- Sequence of Communication
- Host Manages Reader(s) and Issues Commands
- Reader and tag communicate via RF signal
- Carrier signal generated by the reader (upon
request from the host application) - Carrier signal sent out through the antennas
- Carrier signal hits tag(s)
- Tag receives and modifies carrier signal
- sends back modulated signal (Passive
Backscatter - FCC and ITU refer to as field
disturbance device) - Antennas receive the modulated signal and send
them to the Reader - Reader decodes the data
- Results returned to the host application
51How far, how fast, how much, how many, attached
to what?
52Minimum Requirements
Note While minimums are stated, supply chain
applications are common for passive tags at 256
bytes and active tags at 128 Kbytes
53RFID Scenario(1)
54RFID Scenario(2)
Supply chain process from Metro Distribution
Chain Center
55Implementation Issues
- Read zone control
- Application of tags
- Where in the process
- Where on the container
- How are the labels being applied
- Use ISO standards
- EPC requires pre-population of data at the
recipient (X12 856 / EDIFACT DESADV / XML) or
access to the EPCIS - Back-up in case of tag failure
- Recycling
- Data concerns
- Return on investment
56RFID Standardization-ISO(1)
- Automatic Identification in ISO
Identification of Things
TC122/Ad Hoc Group Packaging
TC23/SC19/WG3 Animals
TC104/SC4/WG2 Container
JTC1/SC17 Personal ID
JWG Supply Chain App
TC204 Transportation
ISO/IEC JTC1/SC31/WG4 Automatic Identification
and Data Capture Technique
TC68/SC6 Financial Transaction
TC Technical Committee JTC Joint Technical
Committee SC Sub-Committee WG Woking Group ISO
International Organization for Standards
57Application StandardsRadio Frequency
Identification - Open Standards
- ISO 10374 - Freight containers Automatic
identification - ISO 18185 - Freight Containers - Radio-frequency
communication protocol for electronic seal - ISO 11784 Radio-Frequency Identification of
Animals - Code Structure - ISO 11785 Radio-Frequency Identification of
Animals - Technical Concept - ISO 14223-1 Radio-Frequency Identification of
Animals - Advanced Transponders - Part 1 Air
Interface - ISO 21007-1 Gas Cylinders - Identification and
Marking Using Radio Frequency Identification
Technology - Part 1 Reference Architecture and
Terminology - ISO 21007-2 Gas Cylinders - Identification and
Marking Using Radio Frequency Identification
Technology - Part 2 Numbering Schemes for Radio
Frequency - ANSI MH10.8.4 - RFID for Returnable Containers
- AIAG B-11 - Tire Wheel Identification Standard
- ISO 122/104 JWG - Supply Chain Applications of
RFID - ISO 17363 - Freight containers
- ISO 17364 - Returnable transport items
- ISO 17365 - Transport units
- ISO 17366 - Product packaging
- ISO 17367 - Product tagging
58RFID Standardization-ISO(2)
ARP Application Requirement Profile SG Sub-Group
SG1
ISO/IEC 159612004, 2004.10 ISO/IEC 159622004,
2004.10
Data Protocol Application Interface Data
Protocol Data Encoding Rules and Logical Memory
Functions
IOS/IEC 159632004, 2004.10
SG2
Unique Identification for RF Tag
SG1
IOS/IEC 18000-1 2004, 2004.9
ISO/IEC 18000-1 2004, 2004.9
Part1 Reference Architecture and Definition of
Parameters to be standaized
ISO/IEC 18000-2 2004, 2004.9
Part2 Parameters for Air Interface
Communications below 135kHz
ISO/IEC 18000-3 2004, 2004.9
Part3 Parameters for Air Interface
Communications at 13.56MHz
ISO/IEC 18000-4 2004, 2004.9
Part4 Parameters for Air Interface
Communications at 2.45GHz
ISO/IEC 18000-6 2004, 2004.9
Part6 Parameters for Air Interface
Communications at 860 MHz to 960 MHz
ISO/IEC 18000-7 2004, 2004.9
Part7 Parameters for Air Interface
Communications at 433MHz
ISO/IEC TR 180002004.10 ISO/IEC 24729-1,
Now ISO/IEC 24729-2, Now ISO/IEC 24729-3, Now
Application Requirements Profiles Implementation
Guidlines Part1 RFID-Enabled
Labels Implementation Guidlines Part2
Recyclability of RF Tags Implementation Guidlines
Part3 RFID Interrogator/ Antenna Installation
ARP
59Technology Standards
Radio Frequency Identification Open Standards
- ISO/IEC 18000 - RFID for Item Management
- Part 2 - 125 - 150 kHz
- Part 3 - 13.56 MHz
- Part 4 - 2450 MHz
- Part 6 - 860 - 960 MHz
- Part 7 - 433.92 MHz (active)
Data Standards
- ISO/IEC 15418 - Application Identifiers Data
Identifiers - ISO/IEC 15434 - Syntax
- ISO/IEC 15459 - Unique Item Identification
- ISO/IEC 15961 - Data Protocol Application
Interface - ISO/IEC 15962 - Data Protocol Data Encoding
Rules and - Logical Memory Functions
- ISO/IEC 15963 - Unique Identification for RF Tags
Conformance Standards
- ISO/IEC 18047 - RFID device conformance test
methods (at) - Part 2 - 125 - 150 kHz
- Part 3 - 13.56 MHz
- Part 4 - 2450 MHz
- Part 6 - 860 - 960 MHz
- Part 7 - 433.92 MHz (active)
60RFID Standardization-EPCgobal(1)
- EPCglobal (EPC Electronic Product Code)
- History
- Developed by Auto-ID center, an academic research
project headquartered at MIT with five
universities around the globe - VerSign initiative
- Work scope
- EPCglobal Network
- EPCglobal Services
61RFID Standardization-EPCgobal(2)
- EPCglobal specifications and ratified standards
62RFID Components and Standardization
Antenna Reader
Application
RFID Tag
Host
Memory map
Data collection
Data protocol processor
Tag drivers
Event handling
Identification code
READER/HOST INTERFACE
Application condition ISO/IEC TR18001,24729
WG4/ARP
object identification code - WG2, EPCglobal
WG4/SG1
Data protocol ISO/IEC 15961, 15962
Management protocol
AIR interface
AIR interface ISO/IEC 18000-1 7 WG4/SG3 UHF
GEN2 EPCglobal
tag identification code - ISO/IEC 15963 WG4/SG2
Event handling ALE EPCglobal
Auto-ID Reader Protocol EPCgobal
Object information search ONS, EPCIS EPCglobal
63Standards Organizations
International
International Telecommunications Union (ITU)
(United Nations)
Universal Postal Union (UPU) (United Nations)
International Electrotechnical Commission (IEC)
International Organization for Standardization
(ISO)
ISO/IEC Joint Technical Committee 1 (JTC 1)
TC 122 Packaging
SC 31 Automatic Data Capture
ITU-T (fka CCITT) Telecommunications
SC 17 IC Cards
TC 104 Freight Containers
WG 1 - Symbology
WG 2 - Data Content
ITU-R (fka CCIR IFBR) Radio-frequency Issues
TC 122/104 JWG SC Apps RFID
SC 6 Telcom info exchbtwn systems
WG 3 - Conformance
WG 4 - RFID
ITU-D (fka BDT) Telecommunications Development
TC 8 Ships Marine Tech
WG 5 - RTLS
Regional
Comité Européen Normalisation Electrotechnique
(CENELEC)
Comité Européen Postal Telegraph (CEPT)
Comité Européen Normalisation (CEN)
ECMA
ODETTE
National
Standards Assoc of China (SAC)
Deutches Institut fur Normung (DIN)
British Standards Institution (BSI)
ANSI
AFNOR
JISC
IEEE
INCITS
MHI
GS 1
CEA
AIM
Other
T6
B10
Industry
ATA
DoD
CEA
HIBCC
GS 1
AIA
Other
VDA
AIAG
64ISO/IEC JTC 1/SC 31 Structure
International Organization for Standardization
(ISO)
International Electrotechnical Commission (IEC)
ISO/IEC Joint Technical Committee 1 (JTC 1) - IT
ISO/IEC JTC 1 Subcommittee 31
Secretariat GS 1
WG 1 Data Carrier
WG 2 Data Structure
WG 3 Conformance
WG 4 RF Tags
WG 5 RTLS
Convener S. Ackley (US)
Convener T. Yoshioka (JP)
Convener C. Biss (US)
Convener H. Barthel
Convener M. Harmon
DAI
Code 39
Linear Print Quality
API
Air Interface
2450 MHz
Data Syntax
ITF
2D Print Quality
Unique RF Tag ID
433 MHz
Unique ID
MaxiCode
Printing Specs
Defs. Logical Mem Map
GLS
Data Matrix
Test Specs BC Printers
Application Interface
Near Field
Test Specs BC Readers
Encoding Rules
EAN/U.P.C.
Test Specs BC Verifiers
Code 128
PDF417
RFID Performance
QR Code
RFID Conformance
Symbology Identifiers
65SC 31/WG 4 (RFID) Technology Projects
66The Layers of Logistic Units (Radio Frequency
Identification - RFID)
Layer 5
Movement Vehicle (truck, airplane, ship, train)
Layer 4 (433 MHz)ISO 17363(Freight containers)
Container (e.g., 40 foot Sea Container)
Layer 3 (860-960 MHz)(Other 18000 with TPA) ISO
17364(Returnable transport items)
Unit Load Pallet
Unit Load Pallet
Layer 2 (860-960 MHz)ISO 17365(Transport units)
Transport Unit
Transport Unit
Transport Unit
Transport Unit
Layer 1 (860-960 MHz) ISO 17366(Product
packaging)
Pkg
Pkg
Pkg
Pkg
Pkg
Pkg
Pkg
Pkg
Layer 0 (860-960 MHz)(13.56 MHz with TPA)ISO
17367(Product tagging)
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
Item
TPA - Trading Partner Agreement
Concept Source Akira Shibata, DENSO-Wave
Corporation
67Three tags - different purposes
Supply Chain Tag - ISO 17363
Container ID Tag - ISO 10374.2
Electronic Seal -ISO 18185
68Sealing and anti-tamper capability
- Bolt Seal Security Tag
- Electronically secures ocean containers, air
cargo ULD containers, trailers, - Monitors presence and integrity of bolt seal,
generates alarm upon bolt removal or breakage - Re-usable tag
- Reduces manual inspections
- Minimizes theft, loss and tampering
69(No Transcript)
70ASC MH10 PINS
Today
Container Reader/ Communicator
Proposed
?
On Board Unit (OBU)
?
10374.2 Tag
?
17364 Tags
?
18185 Tag/Seal
?
?
?
?
?
Fingerprint Reader
?
?
?
?
?
?
?
?
?
?
?
?
17365 Tags
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
?
Transportation Worker ID Card (TWIC) with
Fingerprint BiometricISO/IEC 14443
17363 Tag
?
?
?
?
?
?
?
?
?
?
?
?
?
?
Chassis Tag TC 204 Standard
Tractor Tag TC 204 Standard
On Board Unit (OBU)
?
Tomorrow
Road Side Unit (RSU)
Part of CALM Network
71EPCglobal and ISO
72???
73IC Card Comparison
74RFID vs Smart Card
75(No Transcript)
76(No Transcript)