How RF-star & Industries Are Moving Forward
  • The Analysis and Future Outlook of Indoor Positioning Market
    The Analysis and Future Outlook of Indoor Positioning Market
    With the continuous evolution of the fourth technological revolution, the development of the Internet has also entered a new era of the "Internet +". In this era, many things will be connected to the Internet and become intelligent. Many emerging industries will open up huge markets. IoT technologies such as the Internet of Vehicles, smart logistics, and artificial intelligence have received widespread attention. And indoor positioning is one of them. Since the concept of Industry 4.0 was came out, the intelligence level of the manufacturing industry has been continuously improved, and the development of the Internet has also entered a new era of "Internet +". Many devices can access the cloud and become intelligent. Emerging industries are booming. IoT technologies such as the Internet of Vehicles, smart logistics, and artificial intelligence have received widespread attention. And indoor positioning is one of them. Indoor positioning is a huge market that has gradually been paid attention to in recent years. Because indoor scenes are very important for people's daily production and life, and location data is one of the most basic data dimensions. According to data provided by Nokia, people spend 87%-90% of their time indoors. The indoor space structure becomes complex, people have higher requirements for real-time and accuracy of the location. For example, it is becoming more and more difficult to find a car in a parking lot, find specific items, and locate relatives who have separated. The demand for indoor positioning has never been higher. With the outbreak of the epidemic, the spread control of the virus has become the goal of epidemic prevention measures. How to master the closure and mobility of personnel has become the focus. The demand for indoor positioning of personnel has ushered in another climax. Therefore, the indoor positioning market has potential explosion opportunities. Especially in recent years, with the advancement and popularization of communication technologies such as Wi-Fi, Bluetooth, UWB, and RFID, the application of indoor positioning has gradually spread. 1.The indoor positioning market is growing rapidly Global indoor positioning market distribution In the global indoor positioning market, North America has a 32% market share. Due to significant R&D and technological progress in indoor positioning technology, North America is expected to continue to lead the indoor positioning market in the future. Therefore, some North American companies are strategically adopting different levels of indoor positioning technology to gain a leading position in the market. The high-precision UWB technology and low-cost Beacon technology are developing rapidly in overseas markets. Europe and the Middle East account for 28% and 22% of the indoor positioning market respectively. The Asia-Pacific region accounts for only 18% of the market share, of which the vast majority of the market is in China. It is entirely due to the rapid eco...
  • Bluetooth Smart Digital Lock
    Bluetooth Smart Digital Lock
    Embedded RF-star's Bluetooth module RF-BM-4044B2 to your smart digital lock to assure that you can control or monitor your lock with your smartphone. Key Features: Secure Wireless Handshake Integrated with Control Althorithm
  • Differences Between TI CC2640R2L and CC2640R2F
    Differences Between TI CC2640R2L and CC2640R2F
    The CC2640R2L recently launched by TI (Texas Instruments) is a 2.4 GHz wireless microcontroller (MCU) supporting Bluetooth® 5.1 features: LE Coded PHYs (Long Range), LE 2-Mbit PHY (High Speed), Advertising Extensions, Multiple Advertisement Sets, as well as backwards compatibility and support for key features from the Bluetooth® 5.0 and earlier Low Energy specifications. CC2640R2L and CC2640R2F both use a single-core software development kit (SDK) and a rich tool set to share a common and easy-to-use development environment. The low-power wireless microcontrollers CC2640R2F and CC2640R2L, both launched by Texas Instruments, can transmit and receive radio frequency signals with a larger range. CC2640R2L, as a low-cost version of CC2640R2F, is lower in price. Judging from the Bluetooth protocol supported by the chip, CC2640R2F supports BLE 5.0 protocol, and CC2640R2L supports BLE 5.1 protocol. CC2640R2L can use AOA/AOD for indoor positioning, which is very suitable for improving the performance of Internet of Things (IoT) applications. In terms of cores, both CC2640R2L and CC2640R2F are the same: 48 MHz ARM® Cortex®-M3 cores, and they both have 275 KB non-volatile memory, including 128 KB in-system programmable flash, up to 28 KB system SRAM, of which 20 KB is ultra-low leakage SRAM. Compared with CC2640R2F, CC2640R2L does not have a Sensor Controller Engine, so the cost of CC2640R2L is lower and it is more suitable for the application scenarios of basic transparent transmission function. CC2640R2L: Microcontroller Powerful Arm® Cortex® -M3 Up to 48 MHz clock speed 275 KB of nonvolatile memory including 128 KB of in-system programmable flash Up to 28 KB of system SRAM, of which 20 KB is ultra-low leakage SRAM 8 KB of SRAM for cache or system RAM use Supports over-the-air upgrade (OTA) RoHS-compliant packages 5 mm × 5 mm RHB VQFN32 (15 GPIOs) 7 mm × 7 mm RGZ VQFN48 (31 GPIOs) Peripherals All digital peripheral pins can be routed to any GPIO Four general-purpose timer modules (eight 16 bit or four 32 bit timers, PWM each) UART, IIC, and IIS Real-time clock (RTC) AES-128 security module Integrated temperature sensor Low power Wide supply voltage range Normal operation: 1.8 V to 3.8 V External regulator mode: 1.7 V to 1.95 V RF section 2.4-GHz RF transceiver compatible with Bluetooth low energy 5.1 and earlier LE specifications Excellent receiver sensitivity (–97 dBm for BLE), selectivity, and blocking performance Programmable output power up to +5 dBm Single-ended or differential RF interface CC2640R2F: Microcontroller Powerful Arm® Cortex® -M3 Up to 48 MHz clock speed 275 KB of nonvolatile memory including 128 KB of in-system Programmable Flash Up to 28 KB of system SRAM, of which 20 KB is ultra-low leakage SRAM 8KB of SRAM for cache or system RAM use Supports over-the-air upgrade (OTA) RoHS-compliant packages 2.7 mm × 2.7 mm YFV DSBGA34 (14 GPIOs) 4 mm × 4 mm RSM VQFN32 (10 GPIOs) 5 mm × 5 mm RHB VQFN32 (15 GPIOs) 7 m...
  • IoT Security Made Simple with SimpleLink™ Wi-Fi® RF-star CC3100 and CC3200 Module RF-WM-3200B1
    IoT Security Made Simple with SimpleLink™ Wi-Fi® RF-star CC3100 and CC3200 Module RF-WM-3200B1
    The Internet of Things (IoT) connects billions of devices and brings a huge opportunity for businesses to grow. However, billions of new connected devices also brings billions of new opportunities for hackers to steal intellectual property (IP), compromise users’ property and invade their privacy. While consumer awareness for Internet security grows as more security breaches at large companies are revealed to the public, secure Internet communication technology has advanced to a level that provides online banking, e-commerce and government services. State-of-the-art Internet security relies on advanced cryptographic algorithms, powerful computers and collaboration between major Internet companies and users. The common security capabilities available to Internet applications today include the following: Private communication – Information exchanged between parties is encrypted, such that an eavesdropper cannot understand it. End-point authentication – Communicating parties confirm each other’s identity prior to any information exchange to prevent attackers from using a false identity to access information and gain unauthorized control of a remote device. Information authentication – Critical information including transaction data and software updates are digitally signed to authenticate its origin and prevent malware installation. These security capabilities largely rely on a few fundamental building blocks, including: Stable cryptographic ciphers such as the Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA2) and the public key ciphers RSA and ECC. When used properly with an adequate key size, these ciphers have no known practical attack. The Transport Layer Security (TLS) protocol, superseding its predecessor Secure Sockets Layer (SSL) protocol, provides the framework for establishing a secure communication channel between two parties. It handles both information encryption and end-point authentication, and relies on the cryptographic ciphers mentioned above. Public key infrastructure (PKI) provides the building blocks for authentication and trust through a digital certificate standard and certificate authorities (CA) such as Symantec and others. The benefit of using these well-known ciphers and protocols in IoT applications is two-fold. First, it relies on proven technology that is widely deployed and tested by the industry at a mega-scale. Second, it allows harnessing the power of already deployed Internet services (e.g. email, social media) as well as the public key infrastructure provided by CAs. Although Internet security technology is widely available, recent research from Symantec Security suggests that many deployed IoT devices have not implemented adequate security measures. There are likely multiple reasons for these security gaps, but vendor awareness, software complexity and implementation costs are probably at the top of the list. Many IoT devices are based on low-end microcontrollers (MCUs) that have limited processing...
  • BLE Portable Ultrasound Diagnosis System
    BLE Portable Ultrasound Diagnosis System
    Project Name: BLE Portable Ultrasound Diagnosis System Projection Location: Taiwan, China With the gradual rise of primary medical care, the demand for portable ultrasound has become popular in clinical medical care, bedside care, and field first aid. The ultrasonic transducer system can be safely and stably connected with smart mobile terminals through RF-star's TI series Wi-Fi module. And through the combination with cloud technology, artificial intelligence, deep learning, etc., a single portable ultrasound can achieve the diagnosis operations on multiple parts of the body and multiple clinical applications by multiple inspection modes. Now, more and more medical institutions realize the potential of handheld ultrasound. The Smart BLE palm ultrasound may be the next stethoscope.
  • Bluetooth 5.0 Low Energy Chip Manufacturers and the Applications
    Bluetooth 5.0 Low Energy Chip Manufacturers and the Applications
    What can Bluetooth 5.0 do? What kind of Bluetooth 5.0 applications are available in the market? RF-star senior advisor XCODER has the following opinions. The applications of Bluetooth 5.0 are the same as that of Bluetooth 4.x. For the time being, Bluetooth 5.0 can replace the applications of Bluetooth v4.x. Even more, it can replace the original classic Bluetooth SPP transparent transmission applications because of its higher rate. Bluetooth Mesh protocol as a part of the Bluetooth 5.0 has great potential markets in smart home and Bluetooth light control. Many companies are already joined in Bluetooth Mesh smart home market, and finally use smart speakers as the Internet entrance of smart home. The following two paragraphs are from the SIG: “The strategic decision to adopt Bluetooth as the communications platform for our smart home strategy was an obvious choice for us,” said Lijuan Chen, Head of Alibaba A.I. Labs, the department leading consumer AI product development at Alibaba Group. “Bluetooth mesh is a wireless protocol that enables us to meet our customers’ scale, performance, and reliability requirements in the home. Bluetooth is already a proven, trusted, and widely used wireless standard, and we’re confident Bluetooth mesh will be the standard in home and building automation for years to come.” “Bluetooth mesh is one of many fundamental enablers of future IoT markets, allowing for robust, secure, and scalable connectivity across the smart home, commercial building automation, industrial environments, and beyond,” said Stuart Carlaw, Chief Research Officer, ABI Research. “Bluetooth mesh, in conjunction with Bluetooth beacons, can propel these environments towards greater automation, increased sensorization, and enable valuable RTLS services. Nearly 360 million annual Bluetooth Smart Building device shipments are forecasted by 2022.” What are the main Bluetooth 5.0 chips? Some mid-end & low-end Bluetooth chip manufacturers and emerging companies in China Mainland and Taiwan are also actively joining in Bluetooth 5 market. Such as Airoha, Telink, Freqchip, Maxscend, Barrot and Bekin. The biggest drawback of ZigBee is that it cannot communicate with mobile phones. Bluetooth Mesh is an emerging technology that enables real-time interaction between devices and mobile phones, and enterprises are definitely willing to invest in it. The appearance of the SIG leaders and Alibaba in various public occasions is a clear signal to us that new technology means new opportunities.
  • Strengthening Wi-Fi Security at the Hardware Level RFstar RF-WM-3220B1 W-iFi Module
    Strengthening Wi-Fi Security at the Hardware Level RFstar RF-WM-3220B1 W-iFi Module
    If you’re an Internet of Things (IoT) designer, you’re probably often challenged to do more with less when it comes to security, constantly looking for new ways to protect your products against an ever-growing list of threats with lean system resources and perhaps limited experience. Knowing that these struggles are very real, in this post I’ll outline a few top IoT security risks and common misconceptions on how to address them. I will also provide an overview of how new CC3220SF Wi-Fi module RF-WM-3200B1 give you more tools to help address security challenges through a novel architecture and rich set of integrated security features. Are there IoT applications that don’t need to implement security measures? Any device that connects to the internet may be vulnerable to local or remote attacks. Attackers can target almost any connected device to try and steal manufacturer intellectual property stored in the system, gain access to user data, or even maliciously manipulate the system to compromise users or attack third parties online. As demonstrated by the major distributed denial of service (DDoS) attack late last year, labeled by experts as the largest of its kind in history, even seemingly harmless products such as home digital video recorders (DVRs) can be maliciously infected and used as “botnets” to halt operations for third-party entities. The attack last year affected services such as Twitter and PayPal, but similar attacks could potentially target large smart infrastructure technologies such as electric grid systems. According to a 2016 study conducted by Kapersky Lab, a single DDoS attack can cost an organization more than $1.6 million to resolve. Recognizing these threats,RF-star's CC3220SF Wi-Fi module integrates a host of powerful, multilayered and hardware-based security features to provide you with powerful tools to help protect products from attacks such as local or remote packet sniffing, man-in-the-middle (MITM) server emulation, hostile takeovers via over-the-air updates, remote file manipulation, data and software theft, intellectual property (IP) cloning, and many more. Watch the below video to learn more about these tools: Should IoT security features primarily focus on Wi-Fi and internet-level encryption of packets sent over the air? Having strong Wi-Fi (Advanced Encryption Standard [AES]/Wired Equivalent Privacy [WEP]) and internet-level (Transport Layer Security [TLS]/Secure Sockets Layer [SSL]) encryption is critical to help prevent local and remote network-packet sniffing, respectively. But these measures alone may not be enough to fend off hostile takeover attempts or provide full protection against theft of IP, code, data, keys and identity information stored and used in a connected system. Figure 1 illustrates these measures in action. Figure 1: Local network security features in action The CC3220 Wi-Fi module actually integrates more than 25 additional security features to help provide tools that address potential thr...
  • Smart BLE Motion Capture Technology
    Smart BLE Motion Capture Technology
    Project Name: Smart BLE Motion Capture Technology Projection Location: China, Thailand, Singapore, Brazil The combination of sensor technology and Bluetooth communication is realized in more and more applications. VR motion navigation system and head-mounted wireless mouse system are sensitive to the movement of limbs or head through sensor technology. The sensing data is transmitted through RF-star’s BLE modules and Dongle devices, and finally obtained by the PC to realize data analysis. This type of application allows the players of VR somatosensory games to have a more relaxed and enjoyable experience or allows some people who are inconvenient to operate the hand mouse to use the computer through head movements.
  • Low Power Consumption in Beacon Positioning Technology
    Low Power Consumption in Beacon Positioning Technology
    With the rapid development of indoor positioning technology and the gradual implementation of the related projects, the indoor positioning technology based on Beacon has matured step by step, thus, Bluetooth Beacon is widely used in indoor positioning service. According to the survey data of Markets & Markets, the global indoor location market size to grow from USD 6.1 billion in 2020 to USD 17.0 billion by 2025, at a Compound Annual Growth Rate (CAGR) of 22.5% during the forecast period. The major factors driving the growth of the indoor location market are the increased number of applications powered by beacons and Bluetooth Low Energy (BLE) tags and growing integration of beacons in cameras; and Light Emitting Diode (LED) lightning, Point of Sales (PoS), and digital signage. The proliferation of smartphone connected devices and location-based applications is also expected to drive the market growth. North America is expected to hold the highest share in the global indoor location market, while Asia Pacific (APAC) is expected to grow at the highest CAGR during the forecast period. The region is witnessing significant developments in the market. North America is projected to hold the largest market size during the forecast period. Key factors favoring the growth of the market in North America include the increasing investments in the development of various technologies and application of indoor location solutions. The growing number of indoor location players across regions is expected to drive the market growth further. Asia-Pacific market will play an important role in driving the development of the global market, especially due to the rapid growth of China, India and Southeast Asian countries. In 2018, the market scale of China's indoor positioning was RMB 3.5 billion, an increase of 47.7% compared with 2017, with a compound annual growth rate of 39.3%. Business expansion based on data has become the most popular business model, especially the accumulation of economies of scale, which has gradually reduced the cost of positioning solutions. In particular, the cost advantages of positioning solutions based on Beacon technology have become more prominent, which also brings new opportunities for indoor positioning industry. For more information about this report visit: https://www.marketsandmarkets.com/Market-Reports/indoor-location-market-989.html The positioning accuracy of Beacon is 2 m ~ 3 m, which can basically meet the application needs of factory visitor tracking, indoor navigation of shopping mall, and anti-lost alarm of valuables. This kind of Beacon devices often have very high requirements for battery life. Let’s see how Beacon devices achieve a long battery life as follows. Beacon device has the advantages of ultra-low power consumption and low cost. Achieving better positioning accuracy needs large numbers of Beacon devices deployed in the sites. Most Beacon solutions on the market are used coin cell CR2032, because CR2032 ...
1 ... 7 8 9 10 11

A total of 11 pages

Leave A Message

Leave A Message
If you are interested in our products and want to know more details, please leave a message here, we will reply you as soon as we can.

Home

Product

skype

whatsapp