In recent years, with the continuous development of RFID technology, the application of RFID has become more and more extensive, reaching every aspect of people's daily lives.

RFID technology is known as one of the most promising technologies in the 21st century.


According to statistics, about 700 million goose meat is consumed in the country every year, of which at least 170 million goose is consumed in Guangdong Province. The reason why Guangdong can eat a lot of geese every year is inseparable from the traditional local dish: Cantonese roast goose

The production process of Cantonese-style roast goose is extremely complicated. From material selection to roasting, it involves more than 20 production processes, and more than a dozen kinds of roast goose fillings are matched and made. Any step will affect the taste of roast goose. D & H SMARTID Co., Ltd. has been committed to supporting solutions for embedded applications in the RFID industry, and has the ability to integrate production + R&D + solutions into the Internet of Things. Applying RFID technology to the tracking of food processing is a set of solutions customized according to customer needs.

A well-known roast goose chain brand in Dongguan, Guangdong took the lead in applying RFID technology to the production process of roast goose. Before roasting goose is roasted in the oven, each goose needs to go through more than 20 pretreatment processes. How to ensure the integrity of the pretreatment process is the key to achieving deliciousness.

In the pretreatment process of roasting goose, an RFID tag is added to each goose to be processed, which is equivalent to an ID card and is used to record processing information. After each process, the information is written into the RFID tag to ensure that each goose can complete each pretreatment process to ensure that each roast goose has the same delicious taste.

Apply RFID technology to product identification in the production process of various industries to ensure production quality and production efficiency analysis, and to improve the manufacturing process to increase efficiency, reduce costs, and increase benefits.

RFID technology has attracted much attention due to its long-distance reading, high storage capacity, small size, diversified shapes, anti-pollution ability and durability. It is the future of Internet of Things applications and industrial manufacturing 4.0 (intelligent manufacturing, logistics, The key technologies of healthcare, agriculture, and food supply chain will inevitably develop in a diversified direction.

The application of RFID technology to the production process of roast goose is a manifestation of the diversified development and application of RFID technology. The use of high-temperature resistant RFID tags made of food-grade PET materials to realize the full traceability of the production and processing process of roast goose, ensuring the taste of Cantonese cuisine, and making the production process more and more standardized.




RFID antenna is one of the necessary hardware for the application of RFID technology. With the rapid development of RFID technology, RFID antenna has also been developed rapidly. The goal of the antenna is to transmit the maximum energy in and out of the chip. How to match the design of the antenna with the free space and the tag chip connected to it is a factor restricting the development of the antenna.

The design and manufacture of RFID tag antennas are affected by application restrictions, the shape and physical characteristics of the objects identified by the antenna characteristics, as well as the objects around the antenna and the environment. This is an important aspect of RFID technology research in the diversified development of RFID technology applications. direction.

With the progress and development of RFID technology, more and more new RFID products have been manufactured and are well applied. In the future, the development of RFID electronic tags will also tend to be green and diversified in raw materials to meet the application needs of different industries.

With the rapid development of technology, RFID (Radio Frequency Identification) technology has gradually penetrated into various fields of our lives. As an important application tool of RFID technology, RFID handheld devices are playing an increasingly important role in various industries due to their high efficiency, accuracy, and convenience. This article will delve into and analyze the application of RFID handheld devices in various industry inventories.

1 Overview of RFID Handheld Phone Technology

RFID technology is a wireless communication technology that identifies specific targets through radio signals and reads and writes relevant data. RFID handheld devices are PDAs (portable mobile terminals) that combine RFID technology with portable mobile hardware and have specific functions such as RFID reading and writing. RFID handheld devices have the characteristics of small size, light weight, and long service life, which can quickly and accurately extract and write information.

2 The application of RFID handheld devices in various industry inventories

1. Retail industry

In the retail industry, RFID handheld devices are a powerful assistant for inventory management and inventory. By attaching RFID tags to products and using RFID handheld devices for scanning, retailers can update inventory data in real-time, ensuring the accuracy of inventory information. In addition, RFID handheld devices can help retailers conduct rapid inventory, reduce labor and time costs, and improve operational efficiency.

2. Manufacturing industry

In the manufacturing industry, RFID handheld devices play an important role in production process control and asset management. By applying RFID tags to components and equipment on production lines, manufacturers can use RFID handheld devices to track production progress in real-time and optimize production processes. Meanwhile, RFID handheld devices can also be used for asset management of devices, ensuring accurate location and maintenance records, improving device utilization and lifespan.

3. Logistics and Supply Chain Management

In the fields of logistics and supply chain management, RFID handheld devices are key tools for tracking and managing goods. By attaching RFID tags to goods and using RFID handheld devices for scanning, logistics companies can real-time understand the location and status of goods in the supply chain, achieving full process visualization of goods. This helps enterprises optimize transportation and logistics processes, improve transportation efficiency and customer satisfaction.

4. Library management

The traditional book inventory method requires scanning and recording book information one by one, which is very time-consuming and cumbersome. By using RFID technology, multiple tag information can be read simultaneously by simply approaching the storage location of the scanned book with an RFID handheld terminal, greatly improving the inventory speed. By pasting an RFID tag on each book as a unique identification. The use of RFID handheld terminals allows for quick and accurate counting within the museum, achieving fast speed and high accuracy.

5. Asset management

In enterprise fixed asset management, RFID handheld devices are used for asset inventory and tracking management. RFID handheld devices have powerful tag group reading capabilities, which can quickly read and identify RFID tags on each asset, and match them with information in the database, improving the efficiency and accuracy of inventory work. In addition, by attaching RFID tags to assets, enterprises can use RFID handheld devices to quickly and accurately obtain information on the location, usage status, and other information of assets. This helps enterprises to have real-time understanding of asset status, improve asset utilization and management efficiency.

6. Warehouse management

Compared to traditional inventory methods, RFID handheld terminals have significantly improved work efficiency. Warehouse administrators can easily scan item labels with an RFID handheld device to complete inventory work, eliminating the need to scan barcodes one by one or perform manual counting. By scanning the RFID tags on the goods, the handheld device can quickly read the information of the goods, such as quantity, type, batch, etc., and update it in real-time to the warehouse management system. This not only reduces the time and error rate of manual inventory, but also enables real-time inventory monitoring and early warning, improving the intelligence level of warehouse management.

3 Industry Case Study

Taking a clothing retail enterprise as an example, it uses RFID handheld devices for inventory counting and product tracking. By attaching RFID tags to each item and using RFID handheld devices for scanning and recording, enterprises have achieved real-time monitoring and rapid inventory of product inventory. At the same time, RFID handheld devices can also synchronize data with the backend system in real-time, ensuring the accuracy and timeliness of inventory data. This management method greatly improves the efficiency and accuracy of inventory management, and reduces the risk of goods loss.

With the rapid development of information technology and the advancement of smart city construction, RFID smart bookcases, as an emerging intelligent management tool, have received increasing attention and favor from libraries, schools, enterprises, and public service institutions. So, how big is the domestic RFID smart bookshelf market? This article will provide you with an in-depth analysis of the demand, scale, and prospects of this market. As the channels for obtaining real data are limited, the market forecast data and calculation results in this article are for reference only.

Market demand for RFID smart bookcases

Library and Education Sector

University Library: University libraries manage a large number of books and literature materials. RFID smart bookcases can greatly improve the efficiency of book borrowing and returning, reduce manual operations, lower management costs, and enhance the user experience for teachers and students. At the same time, smart bookcases can achieve precise inventory and quick positioning, improving management efficiency.

Public Library: As an important place for social education, public libraries need to meet the needs of a wide range of readers. The self-service borrowing and returning function of RFID smart bookcases can not only reduce readers' waiting time and improve service quality, but also help libraries achieve efficient book management and reduce manual workload.

Primary and secondary school libraries: Primary and secondary school libraries are important places for students to acquire knowledge. The introduction of RFID smart bookcases not only facilitates students' self-service borrowing and returning of books, but also cultivates their reading habits and information literacy, providing schools with intelligent management tools.

Enterprise and Public Services

Internal management of enterprises: In large enterprises and research institutions, RFID smart bookcases can be used to manage internal books and materials, achieving efficient knowledge management and data archiving. Enterprise employees can quickly find the necessary information and improve work efficiency through the self-service borrowing and returning system.

Community service: In the construction of smart cities, the intelligent transformation of community bookshelves has become an important component. RFID smart bookcases can not only provide convenient reading services for community residents, but also achieve cross regional book resource sharing through networking, improving book utilization.

Market size calculation of RFID smart bookshelf

Global RFID Market Size

According to market research reports, the global RFID market is expected to reach a size of $16.4 billion in 2023 and grow at a compound annual growth rate (CAGR) of around 10%. It is projected to reach $18.04 billion by 2024.

Java Card is a microprocessor-based smart card, which consists of multiple elements: hardware, Java Card operating system, security module (card manager) and one or more Applets at the time of release.



Hardware

There are various hardware manufacturers, but, it should be noted that the most popular are NXP and Infineon. The two silicon manufacturers ship millions of microprocessor chips worldwide each year. They have been certified by EMVCo, Visa, MasterCard and UnionPay International to provide you with a hardware platform with first-class security.



operating system

Java Smart Card OS is an operating platform that utilizes hardware functions and allows applications (small programs) written in the Java programming language to run on the card. Java Card is an open platform, and its standards (and development kits) are available for free from Oracle’s Java website.



Card manager

One of the main functions of the microprocessor card is its security function. A separate area of the chip is designated specifically for this purpose, the “card manager”. This is an application that permanently resides on the chip, has the function of performing card and applet management, and is a gateway to a security element (called a security domain). This central component is defined by another open platform standard GlobalPlatform.



GlobalPlatform (globalplatform.org) is an independent standards body run by its members. Members include Apple, Oracle, Samsung, American Express, Gemalto, NXP, HID, Visa, Infineon, MasterCard, etc.



Applets

An applet is a program that runs on the card that the user (or terminal) will interact with. Each card can load one or more small programs at the same time, depending on the available storage space of the chip. Not all applets have to be the same, their size and functions can be different. The applet can use the card manager for security purposes (such as authentication), or it can write its own security domain into it. Once the applet is installed, the terminal can communicate directly with it without needing to know the card manager. When you put the card in the terminal, you can select a small application, or you can select a small application as the default application.



When choosing a Java Card product that meets your requirements, there are many considerations to consider. The universal smart card can guide you through these operations in order to specify the correct card for your project.



starting point

A good starting point is to answer the following questions:

What do you want to use the card for?

What applications will the card be used for?

Do you need contact, non-contact or dual interface?

How much storage space is needed on the card?



Getting answers to these questions will help find the correct hardware, operating system, and model of any particular Applet you may need. Developers who write their own applets only need to care about the specific hardware functions required and the relevant specifications of the Java Card OS and GlobalPlatform.



If you are looking for a Java card,java chip card and need help choosing the right Java card for your project, please email us at sales@smartcardrfidtag.com.

In the vast ocean of the digital world, we navigate the intertwined waterways of physical and virtual, exploring more efficient and secure communication methods. Every technological development is as brilliant as a star, and Radio Frequency Identification (RFID) technology stands out among numerous technological achievements with its unique brilliance. It quietly changes our lives with an invisible hand, from supermarket checkout to highway toll collection, and then to contactless payment - almost everywhere, leading us on this journey.

RFID technology is a wireless communication technology that enables contactless transmission of information through radio waves. It not only simplifies our daily lives - from payment cards to logistics tracking, we cannot do without its presence; However, as the application scope of this technology continues to expand, its potential security issues have also surfaced: identity theft, data leakage... These issues, like ghosts, threaten the peace and order of the digital world. In the context of global information security, players are playing an increasingly important role. To discuss the security of RFID, it is necessary to mention its key link: security authentication. Therefore, ensuring the security of RFID technology has become an urgent task, and this has given rise to the key process of three security authentication.

When it comes to security authentication, people often think of complex passwords and complex operations. However, in the world of RFID, everything becomes different. The first security authentication here is not initiated by the user, but automatically performed by the system. When a card or item with a chip approaches the reader, the first step is the detection phase. If the match is successful, it enters the activation state and there is a short time window for both parties to exchange data. This non-contact startup process greatly facilitates the user's operating experience and lays the foundation for subsequent security measures.

Next is the process of the second security certification. This time it's the user's turn to participate. Users need to enter a Personal Identification Number (PIN) or other forms of identity verification to prove their ownership of the card. This step is equivalent to an access control, only those who know the correct method of opening the door can further access the information inside the card or perform transactions and other operations.

Finally, we come to the third security certification. This is an additional layer of protection established for high-risk operations. For example, in certain financial transactions, even after the first two identity confirmations, third-party verification methods such as SMS verification codes or phone verification may still be triggered. This multiple protection mechanism makes it difficult for criminals to obtain all benefits smoothly even if one layer is cracked.

When we turn our gaze back to the real world, it is not difficult to find that behind every progress lies the result of countless explorations and experiments. As demonstrated by RFID technology, even a small piece of paper thin label may contain countless wisdom crystals and expectations for infinite possibilities in the future.

With the development of technology and social progress, future RFID technology will become more intelligent and deeply integrated into daily life. At the same time, we also believe that with the emergence of new challenges, corresponding solutions will emerge one after another, making this digital era more convenient, intelligent, and secure.


RFID PRODUCTS: there have RFID card, RFID wristband, RFID tag and RFID reader.

With the acceleration of urbanization and the increasing demand for residents' travel, the number of electric bicycles has grown sharply. This directly led to a sharp increase in management difficulty. In busy urban traffic, electric bicycles have become an important means of transportation, but their rapid increase makes it difficult for regulatory authorities to fully cover and effectively manage them.

Industry pain points

1. Electric bicycles are parked randomly, occupying pedestrian walkways indiscriminately, obstructing pedestrians' travel, and increasing traffic risks. Inconsistent parking direction,

2. The backend site does not match the actual parking space line, and users return their bikes outside of the planned parking space after cycling, which increases the workload of operation and maintenance personnel in moving bikes and increases operating costs.

3. The safety awareness of electric bicycle drivers varies greatly, and some drivers lack knowledge of traffic regulations and do not comply with traffic rules. This non-standard driving behavior not only threatens the safety of the driver themselves, but also poses potential risks to other traffic participants

4. Severe cases can block fire exits, pedestrian evacuation routes, etc., posing serious fire rescue safety hazards, delaying the best time, and posing a threat to people's lives and property!

Solution

To standardize the parking of shared electric vehicles, strengthen the supervision and management of shared electric vehicles, reduce the management costs of operation and maintenance enterprises, promote orderly parking of shared electric vehicles, and avoid safety hazards such as affecting the city's appearance, obstructing traffic, battery fires, loss and damage caused by disorderly parking of vehicles. Therefore, Shenzhen Wanquan Intelligent R&D utilizes intelligent sensing RFID wireless radio frequency identification technology to effectively provide product solutions for issues such as electric vehicle parking management.

1. Vehicle identification and traceability

Unique identification: The RFID electronic license plate is embedded with ultra-high frequency RFID electronic tags, which write vehicle information and ensure data security and reliability. It is not only anti-counterfeiting and anti duplication, but also has a unique identification QR code printed on the outer surface, which can be used as the unique identification of the vehicle, effectively solving problems such as forgery, alteration, and obstruction of license plates, thus achieving traceability and supervision of electric bicycles.

Information recording: RFID tags can record vehicle license plates, models, colors, chassis numbers, insurance and other information, and can flexibly add other information according to needs, providing comprehensive and accurate data support for vehicle management.

2. Improve traffic management efficiency

Automatic identification and tracking: By setting up high protection RFID readers on busy road sections, automatic identification, positioning, tracking and management of electric bicycles can be achieved, improving the intelligence level of traffic management.

Illegal behavior capture: Combined with electronic police cameras, it can automatically capture illegal behaviors such as running red lights, going in the wrong direction, and not wearing helmets around the clock, achieving remote law enforcement and improving law enforcement efficiency and accuracy.

3. Assist in smart transportation and urban management

Smart Transportation: With the continuous advancement of autonomous driving and intelligent vehicle networking, RFID electronic license plates are very suitable for integration into the collaboration of "people, vehicles, and roads", helping the development of smart transportation and promoting the vigorous development of the automotive industry.

Urban management: The application of RFID electronic license plates can also be combined with community access control systems, smart facial recognition systems, etc., to achieve comprehensive safety management of electric bicycles and improve the level of refinement in urban management.

4. Anti theft and security measures

Anti theft management: The application of RFID electronic license plates can help solve the problem of electric bicycles being stolen and robbed. After a vehicle is stolen, RFID technology can be used to trace the vehicle's trajectory, which helps the police quickly recover the stolen vehicle and ensure the safety of the owner's vehicle property.

Charging and Parking Management: The RFID electric bike rental system relies on management base stations (RFID card readers) installed in unit corridors or elevators, battery identity chips, and access control recognition linkage systems to achieve community parking, safe charging, and household control of electric bicycles with one vehicle, one pool, one code, and one person identity binding. When an electric vehicle (battery) enters the unit door or elevator, the system will identify and prevent it from causing fires and injuries due to charging at the entrance.

With the high emphasis on environmental protection, the importance of environmental protection can be imagined. It can not only coordinate the relationship between humans and the environment to protect our living environment, but also ensure the sustainable development of the economy. The rapid development of urban construction and environmental treatment have always troubled many management departments. The number and distribution of environmental sanitation facilities, the execution guarantee of garbage collection frequency, daily garbage production and cleaning guarantee, timely garbage transportation, and timely scheduling will become important components of health hearing supervision. Environmental protection work mainly utilizes RFID technology to collect information from various parts, establish intelligent sanitation platforms, and help the development of smart cities. RFID technology has become an important helper for intelligent sanitation garbage bin data collection.

Due to the large number and wide distribution of garbage sanitation facilities, precise and real-time monitoring cannot be achieved; The serious accumulation of garbage in urban garbage bins, the inability to accurately grasp the situation in public places, and the inability to timely understand the efficiency and quality of task execution by relevant personnel; The status information of sanitation vehicles cannot be obtained in real time, and problems such as not following the prescribed route for collection and transportation, and speeding operations cannot be eliminated; The inability to ensure timely transportation and scheduling of garbage poses many challenges for managers, and RFID technology has become an important helper for intelligent environmental sanitation garbage bin data collection.

Garbage clearance supervision is achieved by installing ultra-high frequency RFID readers and writers inside the garbage truck, and attaching ultra-high frequency RFID tags to the garbage bin. When a garbage truck starts loading and unloading garbage, the RFID reader on the garbage truck will read the RFID electronic tag on the operated garbage bin.

Install RFID readers and writers at various community sanitation stations to collect RFID electronic tags installed on trash cans. The RFID electronic tags are bound to detailed information about the location of the trash cans. At critical locations along the cleaning path, install geographic location tags. When the sanitation station passes by, the tag information is read to obtain location information, which is beneficial for the system to plan the optimal route. Install an ultra-high frequency integrated reader and writer on the sanitation vehicle responsible for garbage removal. By installing the ultra-high frequency RFID reader and writer on the sanitation vehicle, electronic tags on each garbage bin or hopper can be read to track the working status of each vehicle. Install GPS locators on sanitation vehicles to determine the location and route of each vehicle (sprinkler, road sweeper, garbage truck, etc.). In this way, the system will record the time and ID information of each trash can operation, with specific unique identity information,

RFID technology collects data from various stages, quickly understands the distribution of facilities in garbage classification management, greatly improves the management efficiency of each stage in environmental sanitation operations, enhances work efficiency, and can achieve timely cleaning of garbage. Provide strong data support for the digital management of urban garbage cleaning work. Digital sanitation management provides real-time monitoring, intelligent analysis, data support, and precise scheduling for sanitation operations, which can effectively improve the level of precision and information management, improve the efficiency of urban sanitation work, ensure work safety, and achieve better economic and social benefits.

Schreiner MediPharm is a global supplier of innovative functional label solutions for the healthcare industry headquartered in Germany. It is known for enhancing its tamper evident professional label Cap-Lock, which uses special RFID inlay technology.


Security RFID tag with RFID technology cap lock


To help the hospital expand its digitalization plan, the label and cap safety concept for pre-filled syringes now also implements automatic inventory and supply chain management, as well as digital first opening instructions. In the process, the new Cap-Lock plus RFID solution provides efficient and reliable product certification and enhanced patient safety.

Injecting syringes of liquid medicines containing RFID tags is a challenge because both the container material and the composition of the liquid may impair the reading of UHF RFID tags. Logo labels protruding from the container are often used for this purpose. However, these usually require extra space, are easily torn off, and must be applied manually.

The Cap-Lock plus RFID chip is integrated in the tag. The cap lock is a combination of cap adapter and label. The adapter is placed on the top of the main closing of the syringe and connected to each other to balance the difference in diameter between the main body of the syringe and the closing. The label is wrapped around the syringe body and the needle cap adapter. Once opened, due to the overall perforation, it can provide irreversible tampering evidence.

The RFID inlay is located at the upper end of the tag, so it is mainly located outside the liquid-filled area, allowing reliable remote reading. Due to the function of RFID, in addition to the purely visual first opening signs provided by the previously destroyed tags, digital first opening evidence is now possible. RFID tags can be automatically processed as part of the normal labeling workflow of the main container.

In automated inventory and supply chain management, in order to monitor and control the logistics process of materials and products in real time, data on syringes with RFID tags can be automatically obtained at various sites. As the selected and placed products are read, the current inventory information is consistently stored in the database. In addition, the integrity of the container, the first opening or tampering can all be digitally monitored through specially developed RFID tags.

In drug management, data stored on RFID tags (such as product name, manufacturer, batch number, and expiration date) can be read individually, or in batches using a simple handheld or dedicated reader, and matched with the database. This enables accurate tracking of inventory and provides transparency for medicines that are missing or close to their expiration dates. This helps protect patients from potential medication errors.

Although NFC is similar to RFID in many respects and is based on RFID, it is an independent concept. In the case of RFID with passive and active tags, active tags can be read from a relatively long distance, while NFC, as its name implies, works in the near-field region of the electromagnetic field.

RFID still exists and will be in the foreseeable future. NFC is a direct development of RFID, and you might consider parallel branches. At the most basic level, NFC is usually two inductively coupled devices whose communication is performed by modulating the power absorbed by the passive device. Passive RFID absorbs RF power and then uses it to transmit data back to the reader-Active RFID can use its own power source to transmit data back to the reader. As with NFC, there are always exceptions to the rule-5 NFC tags have a longer working distance (up to 1 meter).

In the most typical implementation of NFC, a device is an active device, acting as a master device in communication and creating a modulated RF near field that will power passive slave devices. Active devices usually use the name of the reader, while passive devices are called tags. Common examples of tags include stickers and embedded systems. The most common NFC readers you might see in your daily life are smartphones or payment terminals.

Near Field Communication
In a typical RF communication, a transmitting antenna transmits RF signals into free space, and an antenna with at least λ/4 (quarter wavelength) is required to be effective. When the distance between two RF devices exceeds 2λ (two wavelengths), for example, about 245 mm (10 inches) for 2.4 GHz signals, they can usually communicate with each other.

Instead, NFC communicates in a spatial near-field area below λ/2 (less than half of the wavelength). Two near-field devices are used as two coils of a coupled inductor or transformer wound on a common magnetic core.

NFC technical parameters
Since NFC tags operate in the near field, the technical features and specifications are completely different from the more traditional far-field-based wireless technologies that you may be more familiar with. Let’s look at some interesting technical data related to NFC and how to compare it with far-field wireless technology.

Working distance


Although a dedicated point-to-point device can reach more than 100Km in compliance with the standard, it is estimated that the typical maximum outdoor range of a 2.4GHz WiFi device is about 50 to 75 meters. When a Bluetooth device runs on the same 2.4GHz WiFi, it will trade off bandwidth to increase power consumption, and expand to more than 300 meters for version 5.0. The range of LoRa equipment can exceed 10Km, its power consumption is much lower than these two technologies, and the bandwidth is very limited.


NFC is limited by design to a maximum of 10 cm.

Near-field magnetic induction communication systems (such as NFC) have very strict power density. The power density decays at a rate proportional to the reciprocal of the sixth power range. This is much larger than far-field communication, so that at the end of the near-field region of 13.56MHz (the most common frequency of NFC), its energy level is 10,000 to 1,000,000 times lower than far-field communication (-40dB to -60dB) ). The equivalent deliberate far-field transmitter.

Like any good rule, there are exceptions. NFC Type 5 tags using the ISO-15693 protocol can be read by dedicated hardware at a distance of up to one meter; however, in fact, if not all, most smart phones can only comply with the 10 cm limit. Some high-performance NFC antennas allow tags up to 15 cm to be read, while on the other side of the spectrum, some smaller tags limit the distance to around 2 cm.

The reduced distance causes the user to require explicit physical actions for the protocol to work. Contrary to the always-on characteristics of WiFi and Bluetooth, NFC is the only widespread wireless communication protocol that requires users to take conscious actions to use.

Frequency

MHz is a unit of measurement that one cannot expect to find in the wireless specifications of modern smartphones. iPhone 11 has a communication frequency of up to 8GHz, and 60GHz WiGig devices are becoming more and more popular in the market. NFC uses a different method to reduce power consumption, range, price and frequency.


Compared with a wide range of high-speed connections, the limited frequency and short distance make the implementation of NFC antennas relatively stress-free. For reasons of simplicity or inexperience, wise designers may wish to use modules with integrated antennas for Bluetooth or WiFi. In the NFC field, if you follow the IC’s recommendations, your design may perform well regardless of small manufacturing differences or nearby objects (for example, at microwave frequencies).

Data rate
The maximum bandwidth supported by the NFC standard is 424Kbit/s, which is about eight times the speed of a traditional dial-up 56K connection. This limitation makes the standard comparable in performance to Bluetooth, which is about half the data rate of version 4.0. Unfortunately, the standard has a lot of overhead, and most devices usually run at 50Kbit/s. Even if the data rate on the connection is so limited, and there is some ingenuity and creativity, the applications are endless. Since the memory on most tags is relatively limited, there is almost no need for higher data rates.

Memory
Most models of NFC tags contain 100 bytes to 1KB of memory, although the available models have a memory capacity of up to 64 KB. These larger storage capacities are usually used for smart cards.
Although this storage volume sounds a bit limited, it allows a large number of 8-16 bit (1-2 bytes) sensor readings or data about the contents of the tag attached.

Current draw
Many NFC ICs provide energy harvesting output, which can provide about 5mA of current under better conditions. The following are no special suggestions for processing methods less than 5mA:
Supply power to external sensors and analog circuits. In terms of temperature sensing, NFC ICs with embedded temperature sensors have been widely used to track perishable goods.
For external storage, its capacity is greater than that provided by the NFC IC.
Update the electronic ink display.
Charge a small lithium battery.
Charge the super capacitor (electrolytic double layer capacitor)

Price
NFC tags, tags and basic ICs are widely used for asset tracking and therefore need to be very affordable. If NFC tags are affixed to every item in a supermarket, or every piece of clothing in a clothing store, even 50c per tag, it will quickly become unpopular. Fortunately, the simplicity of NFC makes the production of tags and basic tags easy, and each tag costs between 10c and 50c, depending on the volume.

When you read the NFC standards, you will find that they have been built to support multiple existing standards and applications. Fortunately, out of our sanity, almost all electronic engineers who are not engaged in mainstream NFC implementation work need to understand the depth of NFC tag types. All modern smartphones must support each tag type to comply with the NFC standard. The data sheet will clearly explain the functions and characteristics of each NFC IC, whether it is active or passive, tag or reader, sticker or the entire SoC.

Mark Type 2 can satisfy most NFC cards, stickers and asset tags of NFC Forum Mark Type 2. Basic information storage and retrieval can be performed through NFC communication or the I2C interface used to connect to the microcontroller.

Tag type 4 mainly supports functions that perform calculations on the basis of storage and retrieval, as well as advanced security functions. Finally, if you need to read for a long time and allow users to interact with the tag through a smartphone, you will need tag type 5.


The part 2 of the depth of NFC tag types

If you are building a nfc reader for a custom application, the type of label you use will most likely depend on the application and the labels that can be purchased, rather than choosing a specific label type. If you want to build a custom tag, you will usually make a choice for you, because the NFC IC used for tag implementation will determine the tag type.

NFC Forum Mark Type 1
As shown by the numbers, NFC Type 1 tags are the simplest and very cheap of all NFC tag types. Typical Type 1 tags support read-only or write-once operations. However, models with R/W capabilities can be used, they usually have about a hundred bytes (maximum 2 Kbyte) of memory and have a relatively slow 106kbit/s bandwidth. Typical applications include stickers, marketing, product tracking, so these labels are of little significance to ordinary electronic engineers.

The standard adopted by NFC Type 1 tags is ISO-14443A.

NFC Forum Tag Type 2
Similar to Type 1 tags, NFC Type 2 tags only support ISO-14443A in read-only and read-write applications. Many Type 2 ICs provide energy harvesting functions and I2C connections to external microcontrollers. However, Type 2 tags are commonly used as stickers, cards and tickets.

As mentioned above, Type 2 tags are the most common tags on the market, with a wide range of shapes and sizes, and can be used for tags attached to cable ties.

NFC Forum Mark Type 3
Type 3 tags based on the Sony FeliCa protocol are mainly used in Japan and Asia. In related Japanese markets, this tag type is often used for electronic money, identification, bus tickets and similar applications. The adoption of this standard in international electronic goods is restricted, and its main purpose includes supporting older versions of applications.

NFC Forum Tag Type 4
Type 4 tags compatible with ISO-14443A and ISO-14443B protocols have added support for the ISO-7815 standard for smart card identification. These tags can modify the data contained in its memory and are commonly used in security, identification and payment applications.

NFC Forum Mark Type 5
The Type 5 label is the latest specification to be released. The underlying physical layer is different from all other NFC tag types because it is based on RFID technology (ISO-15693) instead of ISO-14443A, allowing a maximum reading distance of 1.5m. However, like any other NFC tag type, the maximum length of a customer’s NFC device (such as a smart phone) is limited to 10 cm, and interaction with further places requires a special reader.

Types of NFC interaction
NFC supports three main communication modes: read/write, peer-to-peer and card emulation.

Read/write mode
The read-write mode is the simplest and most common mode of operation in the NFC standard. The NFC tag implements a memory whose content is usually composed of data in NDEF (NFC Data Exchange Format) format. Readers can read or write the contents of such memory.
The definition is very simple, but like most simple concepts in electronic products, it has a wide range of uses.

When an NFC tag has a complete SoC (System on Chip) function or is connected to an external microcontroller, it can usually be accessed not only by the reader, but also by the tag itself. In this case, the tag acts as a dual-port memory, just like a database accessed by two computers. In addition, the tag itself can be powered by the NFC reader and/or auxiliary MCU. Therefore, no matter where you visit, Tag can always be powered, just like a database hosted somewhere on the Internet.

Peer-to-peer model
In peer-to-peer mode, two active devices communicate with each other through one of the following two methods.
One device can be simulated as a tag, and another device can be simulated as a reader. This situation is obviously a master-slave solution. It is very suitable for systems with “smart” and “clumsy” parts, such as the main microcontroller communicating with a smaller auxiliary MCU through a physical barrier. This mode also allows the system to maintain compatibility with smartphones, because the smartphone itself can act as a reader, and the embedded device can act as a tag.

Realizing a peer-to-peer network through a protocol called LLCP (Logical Link Control Protocol) is a more abstract method, but it is also more flexible to connect. The LLCP protocol is designed to allow arbitrarily flexible communication between two active devices similar to BSD sockets, and many embedded and Unix programmers are familiar with this protocol. Uniquely, the LLCP protocol allows rapid migration of existing protocols, such as Modbus, RS485, CAN, LIN or UART via NFC connections, thereby realizing novel communication methods.


The disadvantage of exchanging data through the LLCP protocol is the lack of support for smart phones, which can only be delegated to embedded-to-embedded communication or embedded-to-PC. If you want to build a custom NFC application, or you can use NFC to meet project requirements without smartphone integration, then if you need a short-range wireless connection, LLCP may be what you want.


The part 1 of the depth of NFC tag types