1 | © 2013 Advances in UHF RFID June 2013
Jul 13, 2015
© 2010 1 | © 2013
Advances in UHF RFID June 2013
© 2010 2 | © 2013
2004: UHF Gen2 Ratified • Two readers using DRM
– Transmitting simultaneously – Inventorying simultaneously
• Tags moving fast
• Readers rejecting interference
• No missed tags or ghost reads
Wind
Tunnel
Presented at 2005 EPCglobal
US Conference
© 2010 3 | © 2013
2005: Walmart Pallet Tests Proved Gen2 • Speedway™ prototype on either
side of dock door
• AD-620 (Triflex™) tags on each of 40 boxes of Caress® soap
• Multiple interfering readers transmitting simultaneously
© 2010 4 | © 2013
2006: Impinj Introduces Near-Field UHF • UHF Gen2 works both near & far, on all types of items
– Allows a single infrastructure for pallets, cases, and items – The only frequency with this property
• Far field: 30cm to 15m range
• Near field: 0 to 60cm range – Reads on liquids and metals – The only difference is the antennas
© 2010 5 | © 2013
2007: UHF Gen2 Beat HF for Pharma • UHF outperformed HF at NACDS • UHF reliably wrote & read bottles at
2× speed of fastest pharma line • Impinj deploys UHF Gen2 on Purdue
Pharma production line
© 2010 6 | © 2013
2008: Gen2 Enhanced for Item Tagging • New Gen2 V1.2.0 adds UM indicator, XPC, BPL, and
recommissioning specifically for item tagging
• Impinj develops item solution for Metro Galeria Kaufhof
– 30,000 tagged items on the sales floor
© 2010 7 | © 2013
2009: Enabled Myriad Products • Hand-Held Readers
• Fixed Readers
• Cards & Modules
© 2010 8 | © 2013
But the Tag Volumes Went Nowhere…
500
1000
1500
2500
2000
2005 2006 2008 2007 2009 2010 2011
100 250 300 350 400
Volu
me
(MU
)
3500
3000
2012 2013
End customers were piloting but not yet
deploying
© 2010 9 | © 2013
2010: Walmart Rolls-Out Apparel Tagging
© 2010 10 | © 2013
2011: Coke Rolls-Out Embedded RFID
© 2010 11 | © 2013
2012: STP Breaks Encoding Barrier • Platform for high-performance encoding & verification • Delivers highest encoding quality & reliability • Leverages Monza performance & capabilities • Encodes at speeds to 300k uph
STP + Monza breaks RFID encoding performance barrier
© 2010 12 | © 2013
2013: Retail Apparel Tagging Takes Off
Top 50 apparel retailer TAM = ~25Bn garments/year
• Rollout or deployed – American Apparel – Macy’s – Liverpool – Memove – Zara – JCP – Walmart – Marks & Spencer – Kohl’s
• Piloting – Sears – Chico’s – Saks – Lord & Taylor – Hudson Bay – C&A (EU, Brazil)
0.0
200.0
400.0
600.0
800.0
1000.0
1200.0
1400.0
1600.0
Jan/
09
Sep/
09
May
/10
Jan/
11
Sep/
11
May
/12
Jan/
13
Sep/
13
May
/14
Jan/
15
Sep/
15
May
/16
Jan/
17
Sep/
17
May
/18
Jan/
19
Sep/
19
May
/20
Jan/
21
Sep/
21
Mon
thly
Tag
Con
sum
ptio
n (M
)
We are here @ 2Bn/yr
Monthly Tag Consumption by Top 50 Apparel Retailers
© 2010 13 | © 2013
Tag Volumes Grow as Customers Adopt
500
1000
1500
2500
2000
2005 2006 2008 2007 2009 2010 2011
100 250 300 350 400
1300
1950
Volu
me
(MU
)
3500
3000 2650
3300
2012 2013
2/3 of the 2013 volume Is for apparel tagging
© 2010 14 | © 2013
The Situation Today • Retail is adopting UHF RFID broadly
– American Apparel, Macy’s, Memove, Liverpool, Zara, JCP, Walmart, Marks & Spencer, Kohl’s, more
• Other UHF RFID applications are growing – Embedded RFID, asset tracking, laundry, border crossing,
customer experience, manufacturing, more
• Do we have the technology we need?
Identify an Item
Locate an Item
Authenticate an Item
© 2010 15 | © 2013
Locating an Item: xArray
6.35 cm 45.7 cm
2D-array RFID reader w/ POE & tilt sensor
Leverages Speedway Revolution I/F & tools
Tag direction & localization
150 m2 floor coverage at 4.5m height
Better than 1.5m spatial resolution
Unaffected by 1000’s of stray tags
© 2010 16 | © 2013
xArray Locationing
Side View View Looking Down
Colored balls represent tags
Locate Items in Real Time
© 2010 17 | © 2013
Gen2 Today Definition Select Select a population of tags
Inventory Inventory selected tags; get their EPCs Access Read/write/lock tag memory; kill the tag
New in UHF Gen2 V2 (aka G2) protocol In today’s UHF Gen2 protocol
G2 Enhancements Definition Anticounterfeiting Authenticate a tag as genuine
Security Modify tag information securely File Management Create files and assign access privileges
Untraceability Hide tag data to protect consumer privacy Loss Prevention Use a tag for EAS
Authenticating an Item: UHF Gen2 V2.0.0
© 2010 18 | © 2013
G2 for Cryptographic Authentication
• Reader reads static TID from tag memory
• Counterfeiter can clone tag by copying TID
Today’s Gen2 RFID Future G2 RFID
Read
TID
Challenge (RN)
Response
• Tag computes response from reader’s random challenge and tag’s secret key
• Counterfeiter cannot clone tag without knowing secret key
TID Key
© 2010 19 | © 2013
G2 for Cryptographic Security
Command Function Challenge Challenges multiple tags simultaneously
Authenticate Performs tag, reader, or mutual authentication AuthComm Authenticates a tag message with a MAC
SecureComm Encrypts a tag message KeyUpdate Updates a tag’s stored key
FilePrivilege Alters a reader’s privileges to a file TagPrivilege Alters a reader’s privileges to the tag
© 2010 20 | © 2013
G2 for File Management
Tag Memory
Key Concept: Partition User Memory into Files
Readers have per-file read, write, and lock privileges
G2 supports up to 1023 files, each of which can be up to
~2 Mbytes in size
© 2010 21 | © 2013
G2 for Consumer Privacy (Untraceability)
Hide none or all
Hide none, unique serialization, or all
Hide none, part , or all
Hide none, part , or all
Tag Memory Protected by range reduction,
access privileges, or both
Key Concept: Hide Portions of Tag Memory
© 2010 22 | © 2013
G2 for Loss Prevention
© 2010 23 | © 2013
G2 Status • GS1 EPCglobal has finished the protocol
– Has passed community review – In final stages of IP review – BoG ratification in 2013
• ISO is standardizing the crypto suites – 9 crypto suites submitted to date
• Present, ECC, AES(×2), Grain, CryptoGPS, XOR, ECDSA-ECDH – ISO will ratify the first crypto suites in 2014
© 2010 24 | © 2013
Item Authentication Long Read
Range
Files & File Management
File Privileges
Fast Inventory
• G2 provides authentication and much more • G2 is backward compatible with Gen2
Short Read Range
Cryptographic Security
Large Tag Populations
Loss Prevention
G2
Consumer Privacy
G2 will Supercharge UHF RFID
Identify an Item
Locate an Item
Authenticate an Item
G2 + xArray = the Future of UHF RFID
© 2010 25 | © 2013