Smartphone platform and RFID technology application
First, RFID technology analysis
1.1 Basic Principles of RFID Technology
In the 1980s, due to the maturity of large-scale integrated circuit technology, the volume of RFID systems was greatly reduced and entered the stage of practical application, becoming a mature automatic identification technology. RFID technology uses radio frequency methods for non-contact two-way communications to achieve the purpose of identification and exchange data. A typical RFID system includes a tag, a reader and an antenna.
1.2 RFID technology classification
RFID technology is mainly classified in the following four ways:
1.2.1 Classification of Working Frequency
According to the different operating frequencies can be divided into low frequency, high frequency, VHF and other systems. Systems operating at frequencies less than 30 MHz are generally referred to as low frequency systems. The low frequency system has the characteristics of low label cost, short reading distance, weak read antenna orientation, and strong anti-interference. Used for access control, e-card payment, etc. The most commonly used 13.56 MHz RFID system is a low frequency system.
High-frequency systems generally refer to systems whose operating frequency is greater than 400 MHz, and have features such as high cost of tags, readers, reading distance, read antenna directivity, and weak anti-interference. With RFID systems of this frequency, readers still have good recognition capabilities when tags move quickly, and are therefore widely used in train monitoring, highway toll collection, and other systems. VHF systems generally refer to RFID systems that operate at frequencies greater than 1 GHz. Their prominent feature is the long range of reading.
1.2.2 Tag Reading and Writing Feature Classification
According to the different read/write characteristics of the tag, it can be divided into read/write (RW) tags and
There are three write-once read-out (WORM) tags and read-only (RO) tags. RW tags cost more, and it takes more time to read and write data than the other two tags. The RO tag has a unique identifier that cannot be modified to ensure security.
1.2.3 Passive Classification of Tags
According to whether or not the tag carries power, the RFID system can be divided into two types: an active system and a passive system. Active RFID tags have long read and write distances, but are affected by the life of the power supply. The corresponding life span is shorter. Passive RnD tags have low cost, long life, and small size, but their read and write distances are short, typically only a few to a few tens of centimeters.
1.2.4 Modulation Classification
According to different modulation methods, RFID systems can be divided into active and passive. In active RFID systems, tags are generally active tags. Use its own RF energy to send data to the reader. In passive RFID systems. The tag must be excited by the RF energy of the reader to feed back data to the reader.
1.3 Advantages of RFID Technology
RFID technology, bar code identification technology, magnetic stripe identification technology, fingerprint identification technology and face recognition technology are all currently popular identification technologies. The basic ideas of RFID technology, bar code identification technology and magnetic stripe recognition technology are similar. All of them use the coded information to calibrate the physical objects so as to achieve the purpose of distinguishing and identifying the individuals to be calibrated. The biometric technology such as fingerprint recognition and face recognition has a narrow range of application, and it mainly uses the feature information of the organism to realize the biometrics. Identification of the body.
Second, analysis of smart phones and related technologies
2.1 Smartphone Operating System
An open operating system is one of the important features of smart phones. In the first half of 2008, Linux-based open source open operating systems jointly developed by Symbian, Linux, and a number of handset manufacturers already accounted for 90 percent of the market. The Internet giant Google has jointly developed Android Open Source mobile operating system jointly developed by 34 companies including chip makers, mobile phone manufacturers and operators. It is thus clear that openness has become an irreversible trend. The current mobile phone operating system has a major impact: 1. Symbian operating system; 2. Window Mobile operating system; 3. Linux operating system; 4. PalmOS operating system; 5. MacOSX operating system. Other smart phone operating systems include Google’s Android smartphone operating system and BlackBerry’s Blackberry RFID smartphone operating system. However, these operating systems are only used by their respective companies and lack the support of third-party software developers.
2.2 The combination of RFID technology and smart phones
The combination of RFID technology and smart phones is the most successful NFC technology. The technology was jointly launched by manufacturers such as Philips, Nokia and Sony. NFC technology is a standards-based short-range wireless connection technology that enables simple and secure two-way interaction between multiple close-range electronic devices (communication distance is generally less than ten centimeters). NFC technology was originally a simple merger of RFID technology and Internet technology. With the development of these two technologies and the increase in user demand for this technology, it has evolved into a near-field wireless communication technology with corresponding standards.
NFC technology supports three different application modes: card mode, read-write mode, and NFC mode. Simply put, in the card mode state, the NFC mobile phone is equivalent to an RFID tag, and the antenna communication protocol is ISO 14443A for RFID middleware based on the smart phone platform; under the read-write mode, the NFC mobile phone functions as an RFID reader/writer. The standard protocol reads and writes RFID tags such as ISO14443A; while in the NFC mode, two NFC phones are equivalent to two devices connected by a single channel, which allows low-speed information transmission.
Third, RFID middleware
3.1 Introduction to RFID middleware
With the development of RFID technology, the research and application of RFID middleware becomes more and more important. In RFID applications, transparency is the key to the entire application. Correctly obtaining data, ensuring the reliability of data reading, and effectively transferring data to the upper application system are all issues that must be considered. The data transparency between traditional applications is solved through the middleware architecture and various application service softwares have been developed. RFID middleware acts as an intermediary between RFID hardware and applications. The application side uses a set of common application program interface APIs provided by the middleware to enable connection to the RFID reader. In this way, even if database software that stores RFID tag data, upper-layer applications are added or replaced by other software, or types of read-write RFID readers increase, etc., the application does not need to be modified to handle the problem. Many-to-many connectivity maintenance complexity issues.
RFID middleware is a message-oriented middleware information that is transmitted from one program to another or multiple programs in the form of a message. Information can be transmitted asynchronously, so it does not have to wait for a response. Message-oriented middleware contains functions that not only deliver information, but must also include services such as interpreting data, security, and data broadcasting.
3.2 Smart Phone Platform RFID Middleware
There is a big difference between RFID middleware for smartphone platforms and RFID middleware for large information systems running on PCs. The RFID middleware on the smartphone platform should have the functions and features of general middleware, namely data collection, filtering, and encapsulation. This article uses event management to implement these general operations on data. Constrained by resources, such as hardware computing power and power consumption, it must be sufficiently streamlined to reduce the occupation of system resources and ensure high operating efficiency.
Contact Person: Brady Mao
Tel: +86-18771578889
Fax: 86-769-82663788