How RF-star & Industries Are Moving Forward
  • IoT Security Made Simple with SimpleLink™ Wi-Fi® RF-star CC3100 and CC3200 Module RF-WM-3200B1
    IoT Security Made Simple with SimpleLink™ Wi-Fi® RF-star CC3100 and CC3200 Module RF-WM-3200B1
    The Internet of Things (IoT) connects billions of devices and brings a huge opportunity for businesses to grow. However, billions of new connected devices also brings billions of new opportunities for hackers to steal intellectual property (IP), compromise users’ property and invade their privacy. While consumer awareness for Internet security grows as more security breaches at large companies are revealed to the public, secure Internet communication technology has advanced to a level that provides online banking, e-commerce and government services. State-of-the-art Internet security relies on advanced cryptographic algorithms, powerful computers and collaboration between major Internet companies and users. The common security capabilities available to Internet applications today include the following: Private communication – Information exchanged between parties is encrypted, such that an eavesdropper cannot understand it. End-point authentication – Communicating parties confirm each other’s identity prior to any information exchange to prevent attackers from using a false identity to access information and gain unauthorized control of a remote device. Information authentication – Critical information including transaction data and software updates are digitally signed to authenticate its origin and prevent malware installation. These security capabilities largely rely on a few fundamental building blocks, including: Stable cryptographic ciphers such as the Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA2) and the public key ciphers RSA and ECC. When used properly with an adequate key size, these ciphers have no known practical attack. The Transport Layer Security (TLS) protocol, superseding its predecessor Secure Sockets Layer (SSL) protocol, provides the framework for establishing a secure communication channel between two parties. It handles both information encryption and end-point authentication, and relies on the cryptographic ciphers mentioned above. Public key infrastructure (PKI) provides the building blocks for authentication and trust through a digital certificate standard and certificate authorities (CA) such as Symantec and others. The benefit of using these well-known ciphers and protocols in IoT applications is two-fold. First, it relies on proven technology that is widely deployed and tested by the industry at a mega-scale. Second, it allows harnessing the power of already deployed Internet services (e.g. email, social media) as well as the public key infrastructure provided by CAs. Although Internet security technology is widely available, recent research from Symantec Security suggests that many deployed IoT devices have not implemented adequate security measures. There are likely multiple reasons for these security gaps, but vendor awareness, software complexity and implementation costs are probably at the top of the list. Many IoT devices are based on low-end microcontrollers (MCUs) that have limited processing...
  • BLE Portable Ultrasound Diagnosis System
    BLE Portable Ultrasound Diagnosis System
    Project Name: BLE Portable Ultrasound Diagnosis System Projection Location: Taiwan, China With the gradual rise of primary medical care, the demand for portable ultrasound has become popular in clinical medical care, bedside care, and field first aid. The ultrasonic transducer system can be safely and stably connected with smart mobile terminals through RF-star's TI series Wi-Fi module. And through the combination with cloud technology, artificial intelligence, deep learning, etc., a single portable ultrasound can achieve the diagnosis operations on multiple parts of the body and multiple clinical applications by multiple inspection modes. Now, more and more medical institutions realize the potential of handheld ultrasound. The Smart BLE palm ultrasound may be the next stethoscope.
  • Bluetooth 5.0 Low Energy Chip Manufacturers and the Applications
    Bluetooth 5.0 Low Energy Chip Manufacturers and the Applications
    What can Bluetooth 5.0 do? What kind of Bluetooth 5.0 applications are available in the market? RF-star senior advisor XCODER has the following opinions. The applications of Bluetooth 5.0 are the same as that of Bluetooth 4.x. For the time being, Bluetooth 5.0 can replace the applications of Bluetooth v4.x. Even more, it can replace the original classic Bluetooth SPP transparent transmission applications because of its higher rate. Bluetooth Mesh protocol as a part of the Bluetooth 5.0 has great potential markets in smart home and Bluetooth light control. Many companies are already joined in Bluetooth Mesh smart home market, and finally use smart speakers as the Internet entrance of smart home. The following two paragraphs are from the SIG: “The strategic decision to adopt Bluetooth as the communications platform for our smart home strategy was an obvious choice for us,” said Lijuan Chen, Head of Alibaba A.I. Labs, the department leading consumer AI product development at Alibaba Group. “Bluetooth mesh is a wireless protocol that enables us to meet our customers’ scale, performance, and reliability requirements in the home. Bluetooth is already a proven, trusted, and widely used wireless standard, and we’re confident Bluetooth mesh will be the standard in home and building automation for years to come.” “Bluetooth mesh is one of many fundamental enablers of future IoT markets, allowing for robust, secure, and scalable connectivity across the smart home, commercial building automation, industrial environments, and beyond,” said Stuart Carlaw, Chief Research Officer, ABI Research. “Bluetooth mesh, in conjunction with Bluetooth beacons, can propel these environments towards greater automation, increased sensorization, and enable valuable RTLS services. Nearly 360 million annual Bluetooth Smart Building device shipments are forecasted by 2022.” What are the main Bluetooth 5.0 chips? Some mid-end & low-end Bluetooth chip manufacturers and emerging companies in China Mainland and Taiwan are also actively joining in Bluetooth 5 market. Such as Airoha, Telink, Freqchip, Maxscend, Barrot and Bekin. The biggest drawback of ZigBee is that it cannot communicate with mobile phones. Bluetooth Mesh is an emerging technology that enables real-time interaction between devices and mobile phones, and enterprises are definitely willing to invest in it. The appearance of the SIG leaders and Alibaba in various public occasions is a clear signal to us that new technology means new opportunities.
  • Strengthening Wi-Fi Security at the Hardware Level RFstar RF-WM-3220B1 W-iFi Module
    Strengthening Wi-Fi Security at the Hardware Level RFstar RF-WM-3220B1 W-iFi Module
    If you’re an Internet of Things (IoT) designer, you’re probably often challenged to do more with less when it comes to security, constantly looking for new ways to protect your products against an ever-growing list of threats with lean system resources and perhaps limited experience. Knowing that these struggles are very real, in this post I’ll outline a few top IoT security risks and common misconceptions on how to address them. I will also provide an overview of how new CC3220SF Wi-Fi module RF-WM-3200B1 give you more tools to help address security challenges through a novel architecture and rich set of integrated security features. Are there IoT applications that don’t need to implement security measures? Any device that connects to the internet may be vulnerable to local or remote attacks. Attackers can target almost any connected device to try and steal manufacturer intellectual property stored in the system, gain access to user data, or even maliciously manipulate the system to compromise users or attack third parties online. As demonstrated by the major distributed denial of service (DDoS) attack late last year, labeled by experts as the largest of its kind in history, even seemingly harmless products such as home digital video recorders (DVRs) can be maliciously infected and used as “botnets” to halt operations for third-party entities. The attack last year affected services such as Twitter and PayPal, but similar attacks could potentially target large smart infrastructure technologies such as electric grid systems. According to a 2016 study conducted by Kapersky Lab, a single DDoS attack can cost an organization more than $1.6 million to resolve. Recognizing these threats,RF-star's CC3220SF Wi-Fi module integrates a host of powerful, multilayered and hardware-based security features to provide you with powerful tools to help protect products from attacks such as local or remote packet sniffing, man-in-the-middle (MITM) server emulation, hostile takeovers via over-the-air updates, remote file manipulation, data and software theft, intellectual property (IP) cloning, and many more. Watch the below video to learn more about these tools: Should IoT security features primarily focus on Wi-Fi and internet-level encryption of packets sent over the air? Having strong Wi-Fi (Advanced Encryption Standard [AES]/Wired Equivalent Privacy [WEP]) and internet-level (Transport Layer Security [TLS]/Secure Sockets Layer [SSL]) encryption is critical to help prevent local and remote network-packet sniffing, respectively. But these measures alone may not be enough to fend off hostile takeover attempts or provide full protection against theft of IP, code, data, keys and identity information stored and used in a connected system. Figure 1 illustrates these measures in action. Figure 1: Local network security features in action The CC3220 Wi-Fi module actually integrates more than 25 additional security features to help provide tools that address potential thr...
  • Smart BLE Motion Capture Technology
    Smart BLE Motion Capture Technology
    Project Name: Smart BLE Motion Capture Technology Projection Location: China, Thailand, Singapore, Brazil The combination of sensor technology and Bluetooth communication is realized in more and more applications. VR motion navigation system and head-mounted wireless mouse system are sensitive to the movement of limbs or head through sensor technology. The sensing data is transmitted through RF-star’s BLE modules and Dongle devices, and finally obtained by the PC to realize data analysis. This type of application allows the players of VR somatosensory games to have a more relaxed and enjoyable experience or allows some people who are inconvenient to operate the hand mouse to use the computer through head movements.
  • Low Power Consumption in Beacon Positioning Technology
    Low Power Consumption in Beacon Positioning Technology
    With the rapid development of indoor positioning technology and the gradual implementation of the related projects, the indoor positioning technology based on Beacon has matured step by step, thus, Bluetooth Beacon is widely used in indoor positioning service. According to the survey data of Markets & Markets, the global indoor location market size to grow from USD 6.1 billion in 2020 to USD 17.0 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 22.5% during the forecast period. The major factors driving the growth of the indoor location market are the increased number of applications powered by beacons and Bluetooth Low Energy (BLE) tags and growing integration of beacons in cameras; and Light Emitting Diode (LED) lightning, Point of Sales (PoS), and digital signage. The proliferation of smartphone connected devices and location-based applications is also expected to drive the market growth. North America is expected to hold the highest share in the global indoor location market, while Asia Pacific (APAC) is expected to grow at the highest CAGR during the forecast period. The region is witnessing significant developments in the market. North America is projected to hold the largest market size during the forecast period. Key factors favoring the growth of the market in North America include the increasing investments in the development of various technologies and application of indoor location solutions. The growing number of indoor location players across regions is expected to drive the market growth further. Asia-Pacific market will play an important role in driving the development of the global market, especially due to the rapid growth of China, India and Southeast Asian countries. In 2018, the market scale of China's indoor positioning was RMB 3.5 billion, an increase of 47.7% compared with 2017, with a compound annual growth rate of 39.3%. Business expansion based on data has become the most popular business model, especially the accumulation of economies of scale, which has gradually reduced the cost of positioning solutions. In particular, the cost advantages of positioning solutions based on Beacon technology have become more prominent, which also brings new opportunities for indoor positioning industry. For more information about this report visit: https://www.marketsandmarkets.com/Market-Reports/indoor-location-market-989.html The positioning accuracy of Beacon is 2 m ~ 3 m, which can basically meet the application needs of factory visitor tracking, indoor navigation of shopping mall, and anti-lost alarm of valuables. This kind of Beacon devices often have very high requirements for battery life. Let’s see how Beacon devices achieve a long battery life as follows. Beacon device has the advantages of ultra-low power consumption and low cost. Achieving better positioning accuracy needs large numbers of Beacon devices deployed in the sites. Most Beacon solutions on the market are used coin cell CR2032, because CR2032 ...
  • CC3220SF Wi-Fi Module RF-WM-3220B1
    CC3220SF Wi-Fi Module RF-WM-3220B1
    The post will briefly introduce what RF-WM-3220B1 WiFi module is, what features it has and where it is applied in. What is RF-WM-3220B1 WiFi module? RF-WM-3220B1 is a Wi-Fi IoT module built on basis of TI CC320SF IC, which is embedded with a Cortex-M4 MCU. It supports a variety of peripherals i.e. camera interface, I²S, SD/MMC, UART, SPI, I²C, ADC and GPIO. The module supports IEEE 802.11 b/g/n standards, and is able to work at Station, AP and Wi-Fi Direct modes. Antenna wise, it offers 3 options: ceramic antenna, IPEX base and antenna welding. RF-WM-3220B1 supports TCP/IP protocols and relevant applications. It can be widely applied in a big variety of IoT scenarios i.e. home automation, home appliance control, security systems, smart energy, internet gateway, industrial control, smart metering, wireless audio, wireless doorbell and sensor networking nodes etc. The module has two operation modes: AT Command Mode and Data Transparent Transmission Mode. With AT Command Mode, the developer can write a series of AT commands to route the transmission of the data. While in Data Transparent Transmission Mode, the modules automatically transmit the data by broadcasting the UDP packets with designated destinations. The developer or user does not have to instruct how the data transmission is routed in the latter mode. However, to switch between operation modes for the network or change the work mode of a module, the user has to use some simple AT commands to instruct the modules. Applications of RF-WM-3220B1 WiFi module Features of RF-WM-3220B1 WiFi module The module which works at Station mode can exchange data between any devices in the LAN, beside it can through a router to enter the internet, and communicate among remote devices. One module works at AP mode as TCP Server, and the other modules works at Station mode as TCP Client to communicate with it. Pin Assignment Package Size Module Thickness No. Parameter item Parameter details Description 1 Chip CC3220SF TI 2 Size 31*20mm - 3 Weight 5g - 4 Frequency Band 2402 MHz ~ 2480MHz   6 PCB 4-layer Impedance-matching, lead-free 7 Supply Voltage 2.3~3.6V DC The voltage higher than 3.6V is forbidden 8 Operation Range 100m Open area; +17dBm; 9 Max Power Max +17dBm 50mW 10 Power consumption Averge:1.AP Mode:74mA                                    2.STA mode Active:20mA                      3.STA Mode Always                                Connected(Long Sleep                          Intervals:400ms):1.5mA   4.STA Mode Hibernate:35uA 11 Communication interface IO See details in Pin definition 12 Antenna type PCB/IPEX 50Ω characteristic impedance/- 13 Operating temperature -40 ~ +85℃ Industrial-grade 14 Operating hum...
  • What Is nRF5340?
    What Is nRF5340?
    On November 14, 2019, Nordic announced the launch of the first member of the next-generation nRF53 series chip -- nRF5340 high-end multi-protocol system-level chip. The chip to build in the Nordic nRF51 and nRF52 multi-protocol series chips, and at the same time introduced a dual processor hardware architecture, with high performance and low power consumption, extensibility, high heat resistance advantages, can be widely used in smart home, indoor navigation, professional lighting, industrial automation, wearable devices, and other complex Internet applications. Based on the design of the Arm cor-M33 dual-core processor, the nRF5340 integrates high-performance application processors, programmable ultra-low power network processors, and security functions into a low-power multi-protocol SoC. At the same time, the chip also enhances dynamic multi-protocol support, and supports Bluetooth 5.1, low-power Bluetooth, Bluetooth Mesh, Thread, and Zigbee protocols. It can be configured or debugged by smart phones using low-power bluetooth, and interact with Mesh networks. The wireless transmitter is equipped with all Bluetooth 5.1 direction finding functions. The nRF5340 operates in a power supply voltage range of 1.7 to 5.5V, allowing rechargeable batteries and USB power. nRF5340 integrates a new power-optimized multi-protocol 2.4ghz radio with a transmitting current of 3.2ma (0dbm transmitting power, 3V, DC/DC) and a receiving current of 2.6ma (3V, DC/DC). The sleep current was as low as 1.1 A. The nRF5340 launched this time, the main processor Application processor is responsible for the calculation of complex functions and bluetooth protocol stack. It adopts the Arm architecture -m33 under the Arm architecture that has always been used by Nordic, and mounts DSP and floating point functions at the same time, which can be used for third-party development and Application. The kernel runs at up to 128 MHz, supports voltage and frequency regulation, and contains dedicated 1 MB of flash memory and 512 KB of RAM memory, which can meet the needs of the next generation of cutting-edge wearable devices and significantly improve performance over the previous generation of nRF52840. The sub-core Network processor can be used as the computation of additional and uncomplicated content, which also USES Arm corcor-m33, the kernel runs at 64 MHz (238 CoreMark), and is dedicated to 256 KB flash and 64 KB memory. The low power consumption and low duty cycle sensor acquisition during radio operation are optimized. Provides optimal implementation of the 2.4 GHz private protocol and ensures portability from the nRF51 and nRF52 series. The two processors can work independently of each other, connect directly through the IPC, or wake up to each other, but consider their respective protection Settings. In addition, the application processor also integrates security functions such as Arm cryptocell-312 security key storage, providing the highest level of security. It works by h...
  • Why ZigBee 3.0 Module?
    Why ZigBee 3.0 Module?
    ZigBee 3.0 is the only complete and interoperable Internet of things solution, which enables intelligent products to work together from mesh network layer to general language layer. Why ZigBee 3.0 ZigBee 3.0 gives users and developers more options. The standardization of the whole stack covers chips from multiple chip suppliers, ZigBee Pro network protocol stack, and ZigBee cluster Library in application layer, bringing confidence that products and services can work together. ZigBee 3.0 complete solution includes testing, certification, brand and marketing support, making the development and sales of interoperable products and solutions easier, releasing growth opportunities, and giving unlimited innovation possibilities for home, work and travel. RF-star provides the most advanced ZigBee 3.0 module in the industry. Users can use the ZigBee 3.0 module of RF-star for secondary development or in-depth cooperative development with RF-star. ZigBee 3.0 advantages Interoperability Certification procedures ensure interoperability between devices Multi vendor ecosystem uses the same application layer common language ZigBee 3.0 network can be used for devices using previous application layer standards ZigBee 3.0 equipment can also be added to the network using the previous application layer standards Different industries, same plan Home, architecture, industry, retail, health, etc Developers and users in different fields have the same choice to solve the problem of market fragmentation The same application layer can meet the requirements of the complete deployment scheme Convenient and easy to use All the required files are in one place The same certification mark shall be used on each certified product and package Stable and reliable Proven mesh network, eliminating the impact of single node failure, can be expanded to large-scale network Self healing and scalable, capable of supporting a network of hundreds of devices Global general Use 2.4 GHz frequency band to ensure that the product can be deployed globally free of frequency band license fee Practice verification · 2500 certified products and 300 million deployed products Green environmental protection Specially designed for energy capture devices and ultra-low power consumption devices ZigBee routers all have green power proxy function to provide mesh network support for energy capture devices Future guarantee Developed by more than 400 member companies who have been deeply involved in the Internet of things industry for many years and launched to the market Continuous innovation - in our ecosystem, there are not only industry giants, established enterprises, but also start-ups and new forces Complete test The integrated test and authentication program covers all layers of protocol stack: MAC / PHY, network stack protocol and application layer Examples of ZigBee Application Equipment
1 ... 8 9 10 11 12

A total of 12 pages

Leave A Message

Leave A Message
If you are interested in our products and want to know more details, please leave a message here, we will reply you as soon as we can.

Home

Product

Teams

whatsapp