SlideShare ist ein Scribd-Unternehmen logo
1 von 35
RFID: Technology and Applications
By: Sweta Dargad
Assistant Professor
ITM Universe
The Wave of the Future
Outline
• History of RFID
• Types & Systems
• Current Uses
• Future Applications
• Controversies
What is RFID?
• A technology that employs a microchip with
an antenna that broadcasts its unique
identifier and location to receivers.
• Employs a microchip called a smart tag,
broadcasts unique 96-bit identifier to receiver.
• Receiver relays the data to a computer.
Ethernet
RFID
Reader
RFID Tag RF Antenna Network Workstation
RFID vs. Bar Codes
• Does not require human to manually pass
item
over scanner.
• More accurate inventory count.
• Can be incorporated into product, person,
animal.
• Can track each individual item.
History of RFID
• 1939
– IFF Transponder: Identification, friend or foe
(IFF) is an identification system designed for
command and control. It enables military and
national (civilian air traffic control)
interrogation systems to identify aircraft,
vehicles or forces as friendly and to determine
their bearing and range from the interrogator
– Used by allies in WWII
• 1945
– Leon Theremin made “The Thing”, also known
as listening device
– Espionage tool for Soviet Union
History cont.
• 1973
– Claims U.S. patent was first true ancestor
• 1980
– Retail
– Use of RFID in tracking and access applications
appeared
– Price, color, date of purchase
RFID Tags
• Contains two main parts:
– Silicon chips
– Antennas
• Components enable tags to receive and
respond to radio frequencies queries from
RFID transceivers.
• Three types:
– Passive
– Semi-Passive
– Active
RFID Tags cont.
• Passive
– Have no internal power supply
– Electrical current inducted in antenna by the incoming signal
proves power for integrated circuit in tag to power up and
transmit response
– Very Small, Limited Range, Unlimited Life
• Semi Passive
– Similar to passive tags, with the addition of a small battery
– Battery powers the integrated circuit
– Bigger, Longer Range, Limited Life
• Active
– Have their own internal power source
– Many operate at fixed intervals
– Also called beacons (broadcast own signal)
– Large ( coin), Much larger memories, Longer range
Tag block diagram
Antenna
Power Supply
Tx Modulator
Rx Demodulator
Control Logic
(Finite State
machine)
Memory
Cells
Tag Integrated Circuit (IC)
RFID readers
• Reader functions:
– Remotely power tags
– Establish a bidirectional data link
– Inventory tags, filter results
– Communicate with networked server(s)
– Can read 100-300 tags per second
• Readers (interrogators) can be at a fixed point such as
– Entrance/exit
– Point of sale
• Readers can also be mobile/hand-held
RFID System
 Objects equipped with RFID tag
 Tag contains transponder
with digital memory chip.
 Interrogator: an antenna
packaged with transceiver and
decoder.
 emits signal activating tag.
 Reader detects activation
signal, decodes the data on the
tag’s silicon chip.
 Data passed to host computer.
Growing Technology
• “Line of Sight” Technology
• RFID superior over Barcode
– Elements and accidents can disturb or damage
barcodes
• Best Buy, Wal-Mart, And Target began
implementation
– Efficient in ability to track & respond accordingly
Product Marketing – 75 years ago
You can have any
color,
as long as its black !
Product Marketing - Today
5
Add consumer
flexibility,
courtesy of
robotics,
computers …
Customer
window into
final stage of
manufacturing
Need to ensure error-free, custom assembly
Need inventory of components for the various customization
options
Critical Issues
Assembly process control
Inventory management
Supply chain integration
Customer insight
Effect on manufacturing
Applications of RFID
 Manufacturing and Processing
 Inventory and production process monitoring
 Warehouse order fulfillment
 Supply Chain Management
 Inventory tracking systems
 Logistics management
 Retail
 Inventory control and customer insight
 Auto checkout with reverse logistics
 Security
 Access control
 Counterfeiting and Theft control/prevention
 Location Tracking
 Traffic movement control and parking management
 Wildlife/Livestock monitoring and tracking
Current Uses
• Wal-Mart now requires its
suppliers to use RFID tags
on shipping crates and
pallets to improve
inventory management in
the supply chain.
• Fed Ex bought RFID-
enabled aircraft from
Airbus to reduce
maintenance time and
costs.
• Cattle and farm animals
are being tagged to
Smart groceries enhanced
Track products through their
entire lifetime.
Issues in Defense solved
• U.S. Department of Defense – to better track
goods along supply chain (logistics and
inventory).
• Electronic payment – credit card companies
moving to RFID-enabled cards to increase
efficiency and reduce time at point-of-sale for
customer, merchant, and card issuer.
Some more smart devices
• “Smart” appliances:
– Closets that advice on style depending on clothes available.
– Ovens that know recipes to cook pre-packaged food.
• “Smart” products:
– Clothing, appliances, CDs, etc. tagged for store returns.
• “Smart” paper:
– Airline tickets that indicate your location in the airport.
• “Smart” currency:
– Anti-counterfeiting and tracking.
• “Smart” people ??
The Future of RFID
 Medical
Drug Counterfeiting
Tracking & Tracing
Medical “Passports”
Foster Care System
Food Chain Precautions
 Shopping
Cashier-less check out
and payment
 Household Technology
Smart keys
Intelligent washing
machines
Monitoring refrigerators
Intelligent
ovens/microwaves
Controversy
• Privacy
– Consumer Rights
• Consumers should be informed if their products have
an RFID tag.
– Tracking of consumers (Profiling)
• RFID chips withstand dirt and scratches and can be
scanned from distances upward of 25 feet.
• Personal Information Leakage.
• Drawing the Line – Need for Legislation?
– Who Should Regulate?
Controversy cont.
• “Killing” of RFID Tags
– Tracking vs. the washing machine
– Options of killing after purchase
• Medical
– Implants/Personal Information
• Verichip is a tiny implantable chip that holds medical
records
• Bracelets to track infants in medical wards and elderly
in nursing homes.
– Used in animals for tracking.
Controversy cont.
• Medical
– Health Risks
• Hard to remove once implanted.
• Long term effects unknown.
• Religious
– Mark of the Beast, etc.
• The implanted RFID chip is certain to inflame Christian
fundamentalists, some of whom believe that such chips
are the Satanic “mark of the Beast” predicted in
Revelations 13:16 “And he causeth all, both small and
great, rich and poor, free and bond to receive a mark in
their right hand, or in their foreheads.”
RF effects of common materials
Communication protocols
ETSI EN 302 208 standard
• Shared operation in band 865.0 – 868.0 MHz at
transmit powers upto 2 W ERP.
– Operation in 10 sub-bands of 200 kHz.
– Power levels of 100 mW, 500 mW and 2 W ERP.
• Mandatory “listen before talk” and “look before leap”.
865.7MHz 867.5MHz
FT
865.1MHz 867.9MHz
100mW
867.7MHz865.5MHz
LT
FT
LT LT
FT
600kHz 600kHz600kHz
2W
FT
LT
500mW
865.0MHz 865.6MHz 867.6MHz 868.0MHz
Reader Collision Problem
• Reader-Reader Interference
• Reader-Tag Interference
Reader Collision and Hidden Terminal
• The passive tags are not able to take part in the collision
resolution or avoidance, as in other wireless systems
• Consider: RTS-CTS for hidden terminal problem in 802.11
– rfid: T is not able to send a CTS in response to an RTS from R
 In case multiple readers try to read
the same tag, the tag cannot
respond selectively to a particular
reader
TDMA based solution
• Assign different time slots and/or frequencies
to nearby readers
– Reduces to graph coloring problem (readers form
vertices)
• Only reader to reader interference
– Assign different operating frequencies
• Only multiple reader to tag interference
– Assign different time slots for operation
• Both types of interference
– First allot different time slots, then frequencies
Main Points
• Slowly becoming an industry standard
• Speeds up the supply chain process
• Easier to manage inventory
• Continually evolving
• Controversial technology
Questions for you….
• Define RFID technology?
• When was RFID introduced?
• What are two main reasons RFID is
controversial?
• Name the three types of RFID tags?
• How are they currently using RFID tags?
• How is RFID Technology expected to effect
households?
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
RFID
RFIDRFID
RFIDdont
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutionsashtopustech
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identificationbansarirajani
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identificationRavi Teja
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenariosDavide Del Monte
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance systemafserfec56
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance systemA.k. Goverdhan
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management Systemrabeena tasleem
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationyuewingyan
 
Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)AWANISHKUMAR84
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMAyush Dixit
 

Was ist angesagt? (20)

RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
RFID
RFIDRFID
RFID
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid
RfidRfid
Rfid
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance system
 
RFID Asset Tracking ppt
RFID Asset Tracking pptRFID Asset Tracking ppt
RFID Asset Tracking ppt
 
RFID
RFIDRFID
RFID
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance system
 
RFID Based Library Management System
RFID Based Library Management SystemRFID Based Library Management System
RFID Based Library Management System
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)Rfid based attendance system using arduino (1)
Rfid based attendance system using arduino (1)
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
RFID based Attendance System
RFID based Attendance SystemRFID based Attendance System
RFID based Attendance System
 

Andere mochten auch

Andere mochten auch (8)

Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
 
Acoustic wave form
Acoustic wave formAcoustic wave form
Acoustic wave form
 
Acoustic transducers
Acoustic transducersAcoustic transducers
Acoustic transducers
 
Surface Acoustic Wave Devices
Surface Acoustic Wave DevicesSurface Acoustic Wave Devices
Surface Acoustic Wave Devices
 
RFID
RFIDRFID
RFID
 
Meriam bibile IMaRC2016
Meriam bibile IMaRC2016Meriam bibile IMaRC2016
Meriam bibile IMaRC2016
 
RFID: Past, Present, and Future
RFID: Past, Present, and FutureRFID: Past, Present, and Future
RFID: Past, Present, and Future
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 

Ähnlich wie RFID Technology and Its Growing Applications

Ähnlich wie RFID Technology and Its Growing Applications (20)

rfid presentation
rfid presentationrfid presentation
rfid presentation
 
Rifd
RifdRifd
Rifd
 
RFID Part-19
RFID Part-19RFID Part-19
RFID Part-19
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Radio frequency identification
Radio frequency identificationRadio frequency identification
Radio frequency identification
 
13251503 pss7
13251503 pss713251503 pss7
13251503 pss7
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
 
RFID_NFC_Tags.ppt
RFID_NFC_Tags.pptRFID_NFC_Tags.ppt
RFID_NFC_Tags.ppt
 
Aidc technology
Aidc technologyAidc technology
Aidc technology
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
 
Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002  Rfid ppt anjali 12mt07ind002
Rfid ppt anjali 12mt07ind002
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
 
15205487pss7 ans
15205487pss7 ans15205487pss7 ans
15205487pss7 ans
 
R1x g22 rfid ii
R1x g22 rfid iiR1x g22 rfid ii
R1x g22 rfid ii
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
Rfid 05
Rfid 05Rfid 05
Rfid 05
 
12201375 PSS7
12201375 PSS712201375 PSS7
12201375 PSS7
 

Mehr von sweta dargad

RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoringsweta dargad
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring Systemsweta dargad
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring systemsweta dargad
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimessweta dargad
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’ssweta dargad
 

Mehr von sweta dargad (11)

Sock Puppet.pptx
Sock Puppet.pptxSock Puppet.pptx
Sock Puppet.pptx
 
Stacks
StacksStacks
Stacks
 
RRD Tool and Network Monitoring
RRD Tool and Network MonitoringRRD Tool and Network Monitoring
RRD Tool and Network Monitoring
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
Snmp based network monitoring system
Snmp based network monitoring systemSnmp based network monitoring system
Snmp based network monitoring system
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
All about snmp
All about snmpAll about snmp
All about snmp
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’s
 
Cacti
CactiCacti
Cacti
 

Kürzlich hochgeladen

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 

RFID Technology and Its Growing Applications

  • 1. RFID: Technology and Applications By: Sweta Dargad Assistant Professor ITM Universe The Wave of the Future
  • 2. Outline • History of RFID • Types & Systems • Current Uses • Future Applications • Controversies
  • 3. What is RFID? • A technology that employs a microchip with an antenna that broadcasts its unique identifier and location to receivers. • Employs a microchip called a smart tag, broadcasts unique 96-bit identifier to receiver. • Receiver relays the data to a computer. Ethernet RFID Reader RFID Tag RF Antenna Network Workstation
  • 4. RFID vs. Bar Codes • Does not require human to manually pass item over scanner. • More accurate inventory count. • Can be incorporated into product, person, animal. • Can track each individual item.
  • 5. History of RFID • 1939 – IFF Transponder: Identification, friend or foe (IFF) is an identification system designed for command and control. It enables military and national (civilian air traffic control) interrogation systems to identify aircraft, vehicles or forces as friendly and to determine their bearing and range from the interrogator – Used by allies in WWII • 1945 – Leon Theremin made “The Thing”, also known as listening device – Espionage tool for Soviet Union
  • 6. History cont. • 1973 – Claims U.S. patent was first true ancestor • 1980 – Retail – Use of RFID in tracking and access applications appeared – Price, color, date of purchase
  • 7. RFID Tags • Contains two main parts: – Silicon chips – Antennas • Components enable tags to receive and respond to radio frequencies queries from RFID transceivers. • Three types: – Passive – Semi-Passive – Active
  • 8. RFID Tags cont. • Passive – Have no internal power supply – Electrical current inducted in antenna by the incoming signal proves power for integrated circuit in tag to power up and transmit response – Very Small, Limited Range, Unlimited Life • Semi Passive – Similar to passive tags, with the addition of a small battery – Battery powers the integrated circuit – Bigger, Longer Range, Limited Life • Active – Have their own internal power source – Many operate at fixed intervals – Also called beacons (broadcast own signal) – Large ( coin), Much larger memories, Longer range
  • 9. Tag block diagram Antenna Power Supply Tx Modulator Rx Demodulator Control Logic (Finite State machine) Memory Cells Tag Integrated Circuit (IC)
  • 10. RFID readers • Reader functions: – Remotely power tags – Establish a bidirectional data link – Inventory tags, filter results – Communicate with networked server(s) – Can read 100-300 tags per second • Readers (interrogators) can be at a fixed point such as – Entrance/exit – Point of sale • Readers can also be mobile/hand-held
  • 11.
  • 12.
  • 13. RFID System  Objects equipped with RFID tag  Tag contains transponder with digital memory chip.  Interrogator: an antenna packaged with transceiver and decoder.  emits signal activating tag.  Reader detects activation signal, decodes the data on the tag’s silicon chip.  Data passed to host computer.
  • 14. Growing Technology • “Line of Sight” Technology • RFID superior over Barcode – Elements and accidents can disturb or damage barcodes • Best Buy, Wal-Mart, And Target began implementation – Efficient in ability to track & respond accordingly
  • 15. Product Marketing – 75 years ago You can have any color, as long as its black !
  • 16. Product Marketing - Today 5 Add consumer flexibility, courtesy of robotics, computers … Customer window into final stage of manufacturing
  • 17. Need to ensure error-free, custom assembly Need inventory of components for the various customization options Critical Issues Assembly process control Inventory management Supply chain integration Customer insight Effect on manufacturing
  • 18. Applications of RFID  Manufacturing and Processing  Inventory and production process monitoring  Warehouse order fulfillment  Supply Chain Management  Inventory tracking systems  Logistics management  Retail  Inventory control and customer insight  Auto checkout with reverse logistics  Security  Access control  Counterfeiting and Theft control/prevention  Location Tracking  Traffic movement control and parking management  Wildlife/Livestock monitoring and tracking
  • 19. Current Uses • Wal-Mart now requires its suppliers to use RFID tags on shipping crates and pallets to improve inventory management in the supply chain. • Fed Ex bought RFID- enabled aircraft from Airbus to reduce maintenance time and costs. • Cattle and farm animals are being tagged to
  • 20. Smart groceries enhanced Track products through their entire lifetime.
  • 21. Issues in Defense solved • U.S. Department of Defense – to better track goods along supply chain (logistics and inventory). • Electronic payment – credit card companies moving to RFID-enabled cards to increase efficiency and reduce time at point-of-sale for customer, merchant, and card issuer.
  • 22. Some more smart devices • “Smart” appliances: – Closets that advice on style depending on clothes available. – Ovens that know recipes to cook pre-packaged food. • “Smart” products: – Clothing, appliances, CDs, etc. tagged for store returns. • “Smart” paper: – Airline tickets that indicate your location in the airport. • “Smart” currency: – Anti-counterfeiting and tracking. • “Smart” people ??
  • 23. The Future of RFID  Medical Drug Counterfeiting Tracking & Tracing Medical “Passports” Foster Care System Food Chain Precautions  Shopping Cashier-less check out and payment  Household Technology Smart keys Intelligent washing machines Monitoring refrigerators Intelligent ovens/microwaves
  • 24. Controversy • Privacy – Consumer Rights • Consumers should be informed if their products have an RFID tag. – Tracking of consumers (Profiling) • RFID chips withstand dirt and scratches and can be scanned from distances upward of 25 feet. • Personal Information Leakage. • Drawing the Line – Need for Legislation? – Who Should Regulate?
  • 25. Controversy cont. • “Killing” of RFID Tags – Tracking vs. the washing machine – Options of killing after purchase • Medical – Implants/Personal Information • Verichip is a tiny implantable chip that holds medical records • Bracelets to track infants in medical wards and elderly in nursing homes. – Used in animals for tracking.
  • 26. Controversy cont. • Medical – Health Risks • Hard to remove once implanted. • Long term effects unknown. • Religious – Mark of the Beast, etc. • The implanted RFID chip is certain to inflame Christian fundamentalists, some of whom believe that such chips are the Satanic “mark of the Beast” predicted in Revelations 13:16 “And he causeth all, both small and great, rich and poor, free and bond to receive a mark in their right hand, or in their foreheads.”
  • 27. RF effects of common materials
  • 29. ETSI EN 302 208 standard • Shared operation in band 865.0 – 868.0 MHz at transmit powers upto 2 W ERP. – Operation in 10 sub-bands of 200 kHz. – Power levels of 100 mW, 500 mW and 2 W ERP. • Mandatory “listen before talk” and “look before leap”. 865.7MHz 867.5MHz FT 865.1MHz 867.9MHz 100mW 867.7MHz865.5MHz LT FT LT LT FT 600kHz 600kHz600kHz 2W FT LT 500mW 865.0MHz 865.6MHz 867.6MHz 868.0MHz
  • 30. Reader Collision Problem • Reader-Reader Interference • Reader-Tag Interference
  • 31. Reader Collision and Hidden Terminal • The passive tags are not able to take part in the collision resolution or avoidance, as in other wireless systems • Consider: RTS-CTS for hidden terminal problem in 802.11 – rfid: T is not able to send a CTS in response to an RTS from R  In case multiple readers try to read the same tag, the tag cannot respond selectively to a particular reader
  • 32. TDMA based solution • Assign different time slots and/or frequencies to nearby readers – Reduces to graph coloring problem (readers form vertices) • Only reader to reader interference – Assign different operating frequencies • Only multiple reader to tag interference – Assign different time slots for operation • Both types of interference – First allot different time slots, then frequencies
  • 33. Main Points • Slowly becoming an industry standard • Speeds up the supply chain process • Easier to manage inventory • Continually evolving • Controversial technology
  • 34. Questions for you…. • Define RFID technology? • When was RFID introduced? • What are two main reasons RFID is controversial? • Name the three types of RFID tags? • How are they currently using RFID tags? • How is RFID Technology expected to effect households?