SlideShare ist ein Scribd-Unternehmen logo
1 von 15
RFID Application




                   10/18/2012
Workflow


Introduction                                         Future
               Applications    Survey   Results                 Conclusion
  of RFID                                         development




                                                                10/18/2012
Types of RFID Tags




                                                                                  Passive Tags
Active Tags




                                      Semi-passive Tags
              •Use a battery                              •Contain built-in                      •Derive their power
              •communicate over                            batteries to power                     from the field
               distances of several                        the chip’s                             generated by the
               meters                                      circuitry, resist                      reader
                                                           interference and                      •without having an
                                                           circumvent a lack                      active transmitter
                                                           of power from the                      to transfer the
                                                           reader signal due                      information stored
                                                           to long distance.
                                                          •They are different
                                                           from active tags in
                                                           that they only
                                                           transmit data at the
                                                           time a response is
                                                           received




                                                                                                                       10/18/2012
Applications
Frequency           Appx. Read   Data Speed    Cost of   Application
                    Range                      Tags
Low Frequency       <5cm         Low           High      •   Animal Identification
(125kHz)
                    (passive)                            •   Access Control
High Frequency      10 cm – 1m   Low to        Mediu     •   Smart Cards
(13.56 Mhz)                      Moderate      m to
                    (passive)                  Low       •   Payment (paywave)
Ultra High          3m -7m       Moderate to   Low       •   Logistics and Supply
Frequency (433,                  High                        Chain
868-928 Mhz)        (passive)
                                                         •   Baggage Tracking
Microwave (2.45 &   10m -15m     High          High      •   Electronic toll collection
5.8 Ghz)                                                     (Autotoll)
                    (passive)
                                                         •   Container Tracking
                    20m – 40m

                    (active)




                                                                                          10/18/2012
RFID
• RFID = Radio Frequency Identification
• Electronic labeling and wireless identification of
  objects using radio frequency
• Tag carries with its information
   o a serial number
   o Model number
   o Color or any other imaginable data

• When these tags pass through a field generated by
  a compatible reader, they transmit this information
  back to the reader, thereby identifying the object
RFID components
• A basic RFID system consists of these components:
   o A programmable RFID tag/inlay for storing item data;
      • Consisting of an RFID chip for data storage
      • an antenna to facilitate communication with the RFID chip

• A reader/antenna system to interrogate the RFID
  inlay
• Application software and a host computer system
RFID Tag
• The RFID tag consists of an integrated circuit (IC)
  embedded in a thin film medium.
• Information stored in the memory of the RFID chip is
  transmitted by the antenna circuit embedded in
  the RFID inlay via radio frequencies, to an RFID
  reader
• 3 types
   o Passive
   o Semi-passive
   o Active
Applications
Applications
Credit Cards with RFID
 (Paywave function)




                                    Octopus (Smart Card)
Applications



Autotoll (Electronic toll collection)




                                                Access Control
Online Survey
• Target: SME
• Information: Opinion on RFID and its applications
• Site:
   o http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
Survey Result
Further Development
• In medical uses and library management
Video
Conclusion
• Positive
   o RFID is a contactless reading technology and can read through other
     materials
   o Hold more data than barcode does
   o RFID tags data can be changed or added
   o More effective, bring lots of convenience to us

• Negative
   o Cost is relatively remain high (compare to barcode)
   o RFID signals may have problems with some materials
   o RFID standards are still being developed

Weitere ähnliche Inhalte

Was ist angesagt?

Novel Spike-based architecture for RFID and Sensor Communication System
Novel Spike-based architecture  for RFID and Sensor Communication SystemNovel Spike-based architecture  for RFID and Sensor Communication System
Novel Spike-based architecture for RFID and Sensor Communication SystemJaved G S, PhD
 
Sample pss7
Sample pss7Sample pss7
Sample pss712202312
 
15220737 pss7-ans
15220737 pss7-ans15220737 pss7-ans
15220737 pss7-anspangchiying
 
12207128 pss7
12207128 pss712207128 pss7
12207128 pss7wongfai10
 
13212850 pss7
13212850 pss713212850 pss7
13212850 pss713212850
 
12206598 pss7
12206598 pss712206598 pss7
12206598 pss7e12206598
 
12206644 pps7
12206644 pps712206644 pps7
12206644 pps7lydialo15
 
Rfid application
Rfid applicationRfid application
Rfid applicationwonglokman
 
Overview of RFID Technology and Applications
Overview of RFID Technology and ApplicationsOverview of RFID Technology and Applications
Overview of RFID Technology and ApplicationsTelaeris
 
wireless technology
wireless technologywireless technology
wireless technologylaiwaiho
 
13207415 pss7
13207415 pss713207415 pss7
13207415 pss7kwuntanki
 
12203483 pss7
12203483 pss712203483 pss7
12203483 pss712203483
 

Was ist angesagt? (18)

12214191 pss7
12214191 pss712214191 pss7
12214191 pss7
 
12214191 pss7
12214191 pss712214191 pss7
12214191 pss7
 
Novel Spike-based architecture for RFID and Sensor Communication System
Novel Spike-based architecture  for RFID and Sensor Communication SystemNovel Spike-based architecture  for RFID and Sensor Communication System
Novel Spike-based architecture for RFID and Sensor Communication System
 
Sample pss7
Sample pss7Sample pss7
Sample pss7
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
15220737 pss7-ans
15220737 pss7-ans15220737 pss7-ans
15220737 pss7-ans
 
12207128 pss7
12207128 pss712207128 pss7
12207128 pss7
 
13212850 pss7
13212850 pss713212850 pss7
13212850 pss7
 
12206598 pss7
12206598 pss712206598 pss7
12206598 pss7
 
12206644 pps7
12206644 pps712206644 pps7
12206644 pps7
 
12212431 pss7
12212431 pss712212431 pss7
12212431 pss7
 
Rfid application
Rfid applicationRfid application
Rfid application
 
Rfid
RfidRfid
Rfid
 
Overview of RFID Technology and Applications
Overview of RFID Technology and ApplicationsOverview of RFID Technology and Applications
Overview of RFID Technology and Applications
 
wireless technology
wireless technologywireless technology
wireless technology
 
Rfid seminar
Rfid seminarRfid seminar
Rfid seminar
 
13207415 pss7
13207415 pss713207415 pss7
13207415 pss7
 
12203483 pss7
12203483 pss712203483 pss7
12203483 pss7
 

Andere mochten auch

Master presentatie 2
Master presentatie 2Master presentatie 2
Master presentatie 2Ben Meulemans
 
You whitepaper google_analytics_06072015
You whitepaper google_analytics_06072015You whitepaper google_analytics_06072015
You whitepaper google_analytics_06072015Ben Meulemans
 
Presentatie 1/ 26/09/12
Presentatie 1/ 26/09/12Presentatie 1/ 26/09/12
Presentatie 1/ 26/09/12Ben Meulemans
 
Incidencia de las tic sobre los procesos de enseñanza y de aprendizaje
Incidencia de las tic sobre los procesos de enseñanza y de aprendizajeIncidencia de las tic sobre los procesos de enseñanza y de aprendizaje
Incidencia de las tic sobre los procesos de enseñanza y de aprendizajeMaria Alexis Dominguez
 
Web server token granting flow
Web server token granting flowWeb server token granting flow
Web server token granting flowAditya Mehta
 
Guia de deteccion de la violencia de género desde el ambito educativo
Guia de deteccion de la violencia de género desde el ambito educativoGuia de deteccion de la violencia de género desde el ambito educativo
Guia de deteccion de la violencia de género desde el ambito educativoampamediterraneopto
 
Normas del BiblioCRA eru 2015
Normas del BiblioCRA eru 2015Normas del BiblioCRA eru 2015
Normas del BiblioCRA eru 2015Bel Brenes
 
Presentatie New Media
Presentatie New MediaPresentatie New Media
Presentatie New MediaBen Meulemans
 
Környezetszennyezés2
Környezetszennyezés2Környezetszennyezés2
Környezetszennyezés2mkbveszprem
 
Környezetszennyezés
KörnyezetszennyezésKörnyezetszennyezés
Környezetszennyezésmkbveszprem
 
BAB III. metodologi penelitian btr
BAB III. metodologi penelitian btrBAB III. metodologi penelitian btr
BAB III. metodologi penelitian btrbrammarpaung
 
презентација механичко движење
презентација механичко движењепрезентација механичко движење
презентација механичко движењеБорче Ацески
 
150 cançons per a treballar la prevenció de la violència de gènere en el mar...
150 cançons per a treballar la prevenció  de la violència de gènere en el mar...150 cançons per a treballar la prevenció  de la violència de gènere en el mar...
150 cançons per a treballar la prevenció de la violència de gènere en el mar...ampamediterraneopto
 

Andere mochten auch (17)

Master presentatie 2
Master presentatie 2Master presentatie 2
Master presentatie 2
 
Mappres33
Mappres33Mappres33
Mappres33
 
Bab 3
Bab 3Bab 3
Bab 3
 
1st presentation
1st presentation1st presentation
1st presentation
 
You whitepaper google_analytics_06072015
You whitepaper google_analytics_06072015You whitepaper google_analytics_06072015
You whitepaper google_analytics_06072015
 
Presentatie 1/ 26/09/12
Presentatie 1/ 26/09/12Presentatie 1/ 26/09/12
Presentatie 1/ 26/09/12
 
Incidencia de las tic sobre los procesos de enseñanza y de aprendizaje
Incidencia de las tic sobre los procesos de enseñanza y de aprendizajeIncidencia de las tic sobre los procesos de enseñanza y de aprendizaje
Incidencia de las tic sobre los procesos de enseñanza y de aprendizaje
 
Los tres cerditos
Los tres cerditosLos tres cerditos
Los tres cerditos
 
Web server token granting flow
Web server token granting flowWeb server token granting flow
Web server token granting flow
 
Guia de deteccion de la violencia de género desde el ambito educativo
Guia de deteccion de la violencia de género desde el ambito educativoGuia de deteccion de la violencia de género desde el ambito educativo
Guia de deteccion de la violencia de género desde el ambito educativo
 
Normas del BiblioCRA eru 2015
Normas del BiblioCRA eru 2015Normas del BiblioCRA eru 2015
Normas del BiblioCRA eru 2015
 
Presentatie New Media
Presentatie New MediaPresentatie New Media
Presentatie New Media
 
Környezetszennyezés2
Környezetszennyezés2Környezetszennyezés2
Környezetszennyezés2
 
Környezetszennyezés
KörnyezetszennyezésKörnyezetszennyezés
Környezetszennyezés
 
BAB III. metodologi penelitian btr
BAB III. metodologi penelitian btrBAB III. metodologi penelitian btr
BAB III. metodologi penelitian btr
 
презентација механичко движење
презентација механичко движењепрезентација механичко движење
презентација механичко движење
 
150 cançons per a treballar la prevenció de la violència de gènere en el mar...
150 cançons per a treballar la prevenció  de la violència de gènere en el mar...150 cançons per a treballar la prevenció  de la violència de gènere en el mar...
150 cançons per a treballar la prevenció de la violència de gènere en el mar...
 

Ähnlich wie 12211893 pss7

Rfid applications
Rfid applicationsRfid applications
Rfid applicationspinkyliu22
 
12201731 PSS7
12201731 PSS712201731 PSS7
12201731 PSS7kayiwendy
 
12200778 pss7
12200778 pss712200778 pss7
12200778 pss7tommyk789
 
12213861 pss7
12213861 pss712213861 pss7
12213861 pss712213861
 
12208914‐pss7
12208914‐pss712208914‐pss7
12208914‐pss7ka312312
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ansDavid Zhang
 
12213764 pss7
12213764 pss712213764 pss7
12213764 pss7Wing Lo
 
13213822 pss7
13213822 pss713213822 pss7
13213822 pss713213822
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7kayi0920
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7kayi0920
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-anstigertsang
 
15215288 pss7 ans
15215288 pss7 ans15215288 pss7 ans
15215288 pss7 ansCarol Ko
 
RFID Application
RFID ApplicationRFID Application
RFID ApplicationKayan To
 
15251810 pss6
15251810 pss615251810 pss6
15251810 pss615251810
 
12200646 pss7
12200646 pss712200646 pss7
12200646 pss7sarah889
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applicationsckmsara
 

Ähnlich wie 12211893 pss7 (20)

Rfid applications
Rfid applicationsRfid applications
Rfid applications
 
12201731 PSS7
12201731 PSS712201731 PSS7
12201731 PSS7
 
12200778 pss7
12200778 pss712200778 pss7
12200778 pss7
 
12213861 pss7
12213861 pss712213861 pss7
12213861 pss7
 
12208914‐pss7
12208914‐pss712208914‐pss7
12208914‐pss7
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
 
12213764 pss7
12213764 pss712213764 pss7
12213764 pss7
 
13213822 pss7
13213822 pss713213822 pss7
13213822 pss7
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
 
RFID Applications
RFID Applications RFID Applications
RFID Applications
 
15215288 pss7 ans
15215288 pss7 ans15215288 pss7 ans
15215288 pss7 ans
 
15218473 pss7-ans
15218473 pss7-ans15218473 pss7-ans
15218473 pss7-ans
 
12251011 pss7
12251011 pss712251011 pss7
12251011 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15251810 pss6
15251810 pss615251810 pss6
15251810 pss6
 
12202401 pss7
12202401 pss712202401 pss7
12202401 pss7
 
12200646 pss7
12200646 pss712200646 pss7
12200646 pss7
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 

12211893 pss7

  • 1. RFID Application 10/18/2012
  • 2. Workflow Introduction Future Applications Survey Results Conclusion of RFID development 10/18/2012
  • 3. Types of RFID Tags Passive Tags Active Tags Semi-passive Tags •Use a battery •Contain built-in •Derive their power •communicate over batteries to power from the field distances of several the chip’s generated by the meters circuitry, resist reader interference and •without having an circumvent a lack active transmitter of power from the to transfer the reader signal due information stored to long distance. •They are different from active tags in that they only transmit data at the time a response is received 10/18/2012
  • 4. Applications Frequency Appx. Read Data Speed Cost of Application Range Tags Low Frequency <5cm Low High • Animal Identification (125kHz) (passive) • Access Control High Frequency 10 cm – 1m Low to Mediu • Smart Cards (13.56 Mhz) Moderate m to (passive) Low • Payment (paywave) Ultra High 3m -7m Moderate to Low • Logistics and Supply Frequency (433, High Chain 868-928 Mhz) (passive) • Baggage Tracking Microwave (2.45 & 10m -15m High High • Electronic toll collection 5.8 Ghz) (Autotoll) (passive) • Container Tracking 20m – 40m (active) 10/18/2012
  • 5. RFID • RFID = Radio Frequency Identification • Electronic labeling and wireless identification of objects using radio frequency • Tag carries with its information o a serial number o Model number o Color or any other imaginable data • When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 6. RFID components • A basic RFID system consists of these components: o A programmable RFID tag/inlay for storing item data; • Consisting of an RFID chip for data storage • an antenna to facilitate communication with the RFID chip • A reader/antenna system to interrogate the RFID inlay • Application software and a host computer system
  • 7. RFID Tag • The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium. • Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader • 3 types o Passive o Semi-passive o Active
  • 9. Applications Credit Cards with RFID (Paywave function) Octopus (Smart Card)
  • 10. Applications Autotoll (Electronic toll collection) Access Control
  • 11. Online Survey • Target: SME • Information: Opinion on RFID and its applications • Site: o http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 13. Further Development • In medical uses and library management
  • 14. Video
  • 15. Conclusion • Positive o RFID is a contactless reading technology and can read through other materials o Hold more data than barcode does o RFID tags data can be changed or added o More effective, bring lots of convenience to us • Negative o Cost is relatively remain high (compare to barcode) o RFID signals may have problems with some materials o RFID standards are still being developed