SlideShare a Scribd company logo
1 of 33
Hearty Welcome!
Introduction
• Access control system protects and preserve Enterprise
   resources with the help of Computerized control
• Only authorized person is allowed to grant access to the
  system and denied all
• For Person authorization it first verifies the persons Identity
• Person Identity can be based on person Physiological or
   behavioral characteristics unique to that person
• The system based on person’s Physiological or behavioral
   characteristics for allowing or denying access to the system is
   known as Biometrics
Biometrics Technologies
Biometrics
Biometrics
 A Definition
• Biometrics is a branch of computer Security centering
  on Authenticating a person’s Identity based on some
  Physiological or Behavioral Characteristic Unique to that
  person
• Authentication System verifies the Identity of a User
  before allowing them access to the Internal System
Stages of Operation
• Enrollment
  Biometric Data is collected for a known Identity
  Reference template is created and stored
• Authentication
    Verification:
     Work with Id + Biometrics
     Fast Processing Involving only one Matching
     Direct go to ID and Matches the Finger Print Template
   Identification:
     Work with Biometrics and searches the Entire Database
     Processing Time depends upon the number of Finger Print Template
Stages of Operation
A Better Approach to Security…
Biometrics is seen as more secure than traditional
methods:
  • Passwords
  • Tokens

  “ Security Passwords and Tokens are used to
       Prove one's Identity Electronically ”
Types of Biometric Authentication
•Fingerprints
•Retina / Iris Scans
•Facial Recognition
•Hand Recognition
•DNA Matching
Finger Print
• Ridges vs. Valleys
• Scanning Mechanisms
    Optical Scanner
    Capacitance Scanner




                   Ridge


                    Valley
Retina Scans
• Small Surface
• Detailed Scan
• Uses Blood Vessels Pattern for Authentication
• Slow Scan and Compare Procedure
• Long Exposure to Scanner Light Emitted
Iris Scans
• More than 250 unique spots
• Compares Trabecular Meshwork (Area of Tissues
  in the Eyes) of the Iris
• Fast and distance Scans
• Requires a human Eye
Facial Recognition
• Uses a video Image to look at distances between
  Features and overall Structure
• Requires a human Face
Hand Recognition
• Hand Geometry, not as Unique as Fingerprints
• Uses hand features and Measurements increases
  Uniqueness
• Measures up to 90 different points on the hand
  including Characteristics of the Finger and
  features on the skin
DNA Matching
• Comparison of a sample of a user’s DNA with a
  Stored Sample of the real Person’s DNA
• DNA is Readily available to collect
• Comparison process is slow and not completely
  Automated
Basics of Finger Print
     Technology
Finger Print
• A Fingerprint pattern is comprised of a sequence
  of Ridges and Valleys
The dark lines In a Fingerprint Image is called Ridges
The Valleys are the areas between the Ridges
• The Finger Image is used to Authenticate person
   Identity


                       Ridge


                       Valley
Finger Print Readers

• Optical Scanner

• Capacitive Scanner
Finger Print Optical Scanner
Optical sensor
• The Optical Sensor is based on light Sensing method
• The CCD (Charge Couple Device) is used as light
  Sensing device
• The CCD Generate Inverted Image of the Finger
• Darker Areas represent more Reflected Light and Lighter
  Areas represent less Reflected Light
• According to the Light intensity, CCD generates an
  Analog signal
Finger Print Capacitive Scanner
Capacitive sensor
• In this method, the Finger skin is act as a plate of the Capacitor
• Measurement of the capacitance between the skin and the
  Sensor plates(Pixel)
• Where there is a Ridge or a Valley, the distance varies, as does
  the Capacitance
• Sensor Read the Capacitive value from conductive plates &
  send it to Integrator circuit for Analog to Digital converter to
  create Digital Image for the Finger
Basics of RFID Technology
Radio Frequency Identification
• A System that transmits the Identity (in the form of a
  unique serial number) of an object or person wirelessly,
  using radio waves

• Uses Tags (Cards), Readers, and Software to exchange
  Data over Electro-Magnetic waves in RF communication

• The Card uniquely Identifies the item it is attached to
Radio Frequency Identification
• The Reader sends out a radio signals, and the Card
  respond with a signal to Identify itself
• The Reader converts the radio waves returned form
  the Tag into Data

• The Data is send to Information processing system
  ( Host or Processing computer) for identification
  processing ( Filter, categorized and Analyze)

• System Grant or denied access to user based on the
  Information received
Component of RFID System
• RF tags ( Cards)
 Contain Chip and Antenna

• Readers (Interrogators)
 Contain RF Module (Transmitter and Receiver), Control Unit,
  Antenna and Several Interfaces (RS 232, RS 485, Ethernet etc.)

•   Host Computers
   Contains Application software, Database and Monitoring
    software
                                             Application,
                                            Database and
       Tag              Reader               Monitoring
                                              Software
Component of RFID System
                           Antenna
Card/Tag
                                            Reader

                                             Firmware
                        COMMANDS

 Controller
    Antenna             RESPONSES
                                                     Interface




                    Host
                                                     Power

              Application ,Controlling
              And Monitoring Software
                                Interface
Component of RFID System
RFID Cards
A Card is a Transponder which Receives a Radio
signal and in response to it sends out a radio signals

  Card contains an Antenna, and small Chip for storing
   small amount of Data
  Card can be Program at Manufacturer or on Installation
  Card can be battery feed or powered by the high power
   EM field generated by the Reader Antenna
  Field allows the Card Chip/Antenna to send the Signal
   containing the Data
Component of RFID System
RFID Card(tags)
•Tags can be attached to almost anything:
    – Items, cases or luggages of products, high value goods
    – vehicles, assets, personnel
•Passive Tags( Proximity card)
    – Do not require power – Draws power from Interrogator Field
    – Lower storage capacities (few bits to 1 KB)
    – Shorter read ranges (4 inches to 15 feet)
    – Usually Write-Once-Read-Many/Read-Only tags
    – Cost around 25 cents to few dollars
•Active Tags( Smart Card)
    – Battery powered
    – Higher storage capacities (512 KB)
    – Longer read range (300 feet)
    – Typically can be re-written by RF Interrogators
    – Cost around 50 to 250 dollars
RFID Card Construction
RFID Cards Construction
                                        A paper label
                                       with RFID inside




                                        an antenna,
                                      printed, etched
                                       or stamped ...


      … and a chip        … on a substrate
      attached to it       e.g. a plastic
                               foil ...
RFID Tag Memory
• Read-only tags
  – Tag ID is assigned at the factory during manufacturing
     • Can never be changed
     • No additional Data can be assigned to the tag
• Write once, read many (WORM) tags
  – Data written once, e.g., during packing or manufacturing
     • Tag is locked once Data is written
     • Similar to a compact disc or DVD
• Read/Write
  – Tag Data can be changed over time
     • Part or all of the Data section can be locked
RFID Readers
• Reader functions:
   – Remotely power tags
   – Establish a bidirectional Data link
   – Inventory tags, filter results
   – Communicate with networked server
• Readers (Interrogators) can be at a fixed point
  such as
   – Entrance/exit
   – Point of sale
• Readers can also be mobile/hand-held
How RFID Works?
          1




              2
Operational frequencies
Frequency         LF               HF            UHF             Microwave
Range             125 KHz          13.56 MHz     868-915 MHz     2.45GHz and 5.8
                                                                 GHz


Read Range        Shorter( 2.54cm-3 Short(5.08cm”- Medium(0.35m- Longest(0.35m-
                  0.48cm”)          60.96cm”)      3.48m’)       4.57m)

Tag Power         Passive Tag      Passive Tag   Active Tag      Active Tag
Source
Data Rate         Slower           Moderate      Fast            Faster

Ability to read   Better           Moderate      Poor            Worse
near metal or
wet surfaces
RFID applications
• Manufacturing and Processing
• Supply Chain Management
• Retail
• Security
• Location Tracking
• Traffic movement Control

More Related Content

What's hot

Simple Introduction about RFID
Simple Introduction about RFIDSimple Introduction about RFID
Simple Introduction about RFIDYudhi Irawan
 
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final PresentationRfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final Presentationblkirkwood
 
Scanners by Amir Hamza Khan (SZABISTIAN)
Scanners by Amir Hamza Khan (SZABISTIAN)Scanners by Amir Hamza Khan (SZABISTIAN)
Scanners by Amir Hamza Khan (SZABISTIAN)Ameer Hamxa
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDEcoTrackSystemsETSRF
 
12206644 pps7
12206644 pps712206644 pps7
12206644 pps7lydialo15
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency IdentificationNadeem Raza
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance systemA.k. Goverdhan
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introductionMouhanad Alkhaldi
 
Radio Frequency Identification (RFID) by Bikram Kumar Sinha
Radio Frequency Identification (RFID) by Bikram Kumar SinhaRadio Frequency Identification (RFID) by Bikram Kumar Sinha
Radio Frequency Identification (RFID) by Bikram Kumar SinhaBikram Kumar Sinha
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance systemafserfec56
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationBECLIBRARY
 
Rfid & its Implentation
Rfid & its ImplentationRfid & its Implentation
Rfid & its ImplentationSonal Tiwari
 
wireless technology
wireless technologywireless technology
wireless technologylaiwaiho
 

What's hot (20)

Simple Introduction about RFID
Simple Introduction about RFIDSimple Introduction about RFID
Simple Introduction about RFID
 
What is rfid
What is rfidWhat is rfid
What is rfid
 
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final PresentationRfid08 Ppt Kirkwood Rfid101 Final Presentation
Rfid08 Ppt Kirkwood Rfid101 Final Presentation
 
Rfid 05
Rfid 05Rfid 05
Rfid 05
 
Scanners by Amir Hamza Khan (SZABISTIAN)
Scanners by Amir Hamza Khan (SZABISTIAN)Scanners by Amir Hamza Khan (SZABISTIAN)
Scanners by Amir Hamza Khan (SZABISTIAN)
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID Library Automation - ETS RFID
RFID Library Automation - ETS RFIDRFID Library Automation - ETS RFID
RFID Library Automation - ETS RFID
 
12206644 pps7
12206644 pps712206644 pps7
12206644 pps7
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance system
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Bar code VS RFID
Bar code VS RFIDBar code VS RFID
Bar code VS RFID
 
Presentation 1 rfid introduction
Presentation 1 rfid introductionPresentation 1 rfid introduction
Presentation 1 rfid introduction
 
Radio Frequency Identification (RFID) by Bikram Kumar Sinha
Radio Frequency Identification (RFID) by Bikram Kumar SinhaRadio Frequency Identification (RFID) by Bikram Kumar Sinha
Radio Frequency Identification (RFID) by Bikram Kumar Sinha
 
Rfid based smart attendance system
Rfid based smart attendance systemRfid based smart attendance system
Rfid based smart attendance system
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
13251503 pss7
13251503 pss713251503 pss7
13251503 pss7
 
Rfid & its Implentation
Rfid & its ImplentationRfid & its Implentation
Rfid & its Implentation
 
Rfid seminar
Rfid seminarRfid seminar
Rfid seminar
 
wireless technology
wireless technologywireless technology
wireless technology
 

Similar to Biometrics Technology1

Radio frequency identification(rfid)
Radio frequency identification(rfid)Radio frequency identification(rfid)
Radio frequency identification(rfid)Soori Joy
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And ApplicationFishEyeBox
 
Rfid technology
Rfid technologyRfid technology
Rfid technologyDeepak Raj
 
12207284‐pss7
12207284‐pss712207284‐pss7
12207284‐pss7kamiyung
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentationAkash Maurya
 
Mwc microproject .pptx
Mwc microproject .pptxMwc microproject .pptx
Mwc microproject .pptxAdityaRaut39
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTrajeshplacherikunnel
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-anstigertsang
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)Akash Karwande
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7kayi0920
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7kayi0920
 
Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Bhautik Vaghela
 

Similar to Biometrics Technology1 (20)

Aidc technology
Aidc technologyAidc technology
Aidc technology
 
Radio frequency identification(rfid)
Radio frequency identification(rfid)Radio frequency identification(rfid)
Radio frequency identification(rfid)
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid&digitization service
Rfid&digitization serviceRfid&digitization service
Rfid&digitization service
 
RFID And Application
RFID And ApplicationRFID And Application
RFID And Application
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
12207284‐pss7
12207284‐pss712207284‐pss7
12207284‐pss7
 
ashok mule rfid presentation
ashok mule   rfid presentationashok mule   rfid presentation
ashok mule rfid presentation
 
Mwc microproject .pptx
Mwc microproject .pptxMwc microproject .pptx
Mwc microproject .pptx
 
RFID and its Applications
RFID and its ApplicationsRFID and its Applications
RFID and its Applications
 
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPTRFID RADIO FREQUENCY IDENTIFICATION ..PPT
RFID RADIO FREQUENCY IDENTIFICATION ..PPT
 
15215237 pss7-ans
15215237 pss7-ans15215237 pss7-ans
15215237 pss7-ans
 
RFID
RFIDRFID
RFID
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
 
Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 

More from Gateway Business Solutions

More from Gateway Business Solutions (19)

Cosec reports
Cosec reportsCosec reports
Cosec reports
 
Matrix cosec presentation
Matrix cosec presentationMatrix cosec presentation
Matrix cosec presentation
 
Matrix cosec tam_presentation_v1_r1
Matrix cosec tam_presentation_v1_r1Matrix cosec tam_presentation_v1_r1
Matrix cosec tam_presentation_v1_r1
 
Matrix cosec acm_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1Matrix cosec acm_presentation_v1_r1
Matrix cosec acm_presentation_v1_r1
 
Matrix sapex vs grandstream gxe502 x series
Matrix sapex vs grandstream gxe502 x seriesMatrix sapex vs grandstream gxe502 x series
Matrix sapex vs grandstream gxe502 x series
 
Matrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentationMatrix sapex ip pbx-presentation
Matrix sapex ip pbx-presentation
 
Matrix setu ata211 ce_certificate
Matrix setu ata211 ce_certificateMatrix setu ata211 ce_certificate
Matrix setu ata211 ce_certificate
 
Matrix setu ata vs linksys spa3102
Matrix  setu ata vs linksys spa3102Matrix  setu ata vs linksys spa3102
Matrix setu ata vs linksys spa3102
 
Matrix setu ata vs_linksys_pap2_t
Matrix  setu ata vs_linksys_pap2_tMatrix  setu ata vs_linksys_pap2_t
Matrix setu ata vs_linksys_pap2_t
 
Matrix setu ata brochure
Matrix setu ata brochureMatrix setu ata brochure
Matrix setu ata brochure
 
Matrix pbx products catalogue
Matrix pbx products catalogueMatrix pbx products catalogue
Matrix pbx products catalogue
 
Matrix gateway products catalogue
Matrix gateway products catalogueMatrix gateway products catalogue
Matrix gateway products catalogue
 
Why Matrix
Why MatrixWhy Matrix
Why Matrix
 
Matrix Cosec Presentation
Matrix Cosec PresentationMatrix Cosec Presentation
Matrix Cosec Presentation
 
Matrix Cosec Brochure
Matrix Cosec BrochureMatrix Cosec Brochure
Matrix Cosec Brochure
 
Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Acm Presentation V1 R1Matrix Cosec Acm Presentation V1 R1
Matrix Cosec Acm Presentation V1 R1
 
Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1Matrix Cosec Tam Presentation V1 R1
Matrix Cosec Tam Presentation V1 R1
 
MATRIX Cosec Introduction New
MATRIX Cosec Introduction NewMATRIX Cosec Introduction New
MATRIX Cosec Introduction New
 
MATRIX License Comparison
MATRIX License ComparisonMATRIX License Comparison
MATRIX License Comparison
 

Biometrics Technology1

  • 2. Introduction • Access control system protects and preserve Enterprise resources with the help of Computerized control • Only authorized person is allowed to grant access to the system and denied all • For Person authorization it first verifies the persons Identity • Person Identity can be based on person Physiological or behavioral characteristics unique to that person • The system based on person’s Physiological or behavioral characteristics for allowing or denying access to the system is known as Biometrics
  • 5. Biometrics A Definition • Biometrics is a branch of computer Security centering on Authenticating a person’s Identity based on some Physiological or Behavioral Characteristic Unique to that person • Authentication System verifies the Identity of a User before allowing them access to the Internal System
  • 6. Stages of Operation • Enrollment Biometric Data is collected for a known Identity Reference template is created and stored • Authentication  Verification: Work with Id + Biometrics Fast Processing Involving only one Matching Direct go to ID and Matches the Finger Print Template  Identification: Work with Biometrics and searches the Entire Database Processing Time depends upon the number of Finger Print Template
  • 8. A Better Approach to Security… Biometrics is seen as more secure than traditional methods: • Passwords • Tokens “ Security Passwords and Tokens are used to Prove one's Identity Electronically ”
  • 9. Types of Biometric Authentication •Fingerprints •Retina / Iris Scans •Facial Recognition •Hand Recognition •DNA Matching
  • 10. Finger Print • Ridges vs. Valleys • Scanning Mechanisms  Optical Scanner  Capacitance Scanner Ridge Valley
  • 11. Retina Scans • Small Surface • Detailed Scan • Uses Blood Vessels Pattern for Authentication • Slow Scan and Compare Procedure • Long Exposure to Scanner Light Emitted
  • 12. Iris Scans • More than 250 unique spots • Compares Trabecular Meshwork (Area of Tissues in the Eyes) of the Iris • Fast and distance Scans • Requires a human Eye
  • 13. Facial Recognition • Uses a video Image to look at distances between Features and overall Structure • Requires a human Face
  • 14. Hand Recognition • Hand Geometry, not as Unique as Fingerprints • Uses hand features and Measurements increases Uniqueness • Measures up to 90 different points on the hand including Characteristics of the Finger and features on the skin
  • 15. DNA Matching • Comparison of a sample of a user’s DNA with a Stored Sample of the real Person’s DNA • DNA is Readily available to collect • Comparison process is slow and not completely Automated
  • 16. Basics of Finger Print Technology
  • 17. Finger Print • A Fingerprint pattern is comprised of a sequence of Ridges and Valleys The dark lines In a Fingerprint Image is called Ridges The Valleys are the areas between the Ridges • The Finger Image is used to Authenticate person Identity Ridge Valley
  • 18. Finger Print Readers • Optical Scanner • Capacitive Scanner
  • 19. Finger Print Optical Scanner Optical sensor • The Optical Sensor is based on light Sensing method • The CCD (Charge Couple Device) is used as light Sensing device • The CCD Generate Inverted Image of the Finger • Darker Areas represent more Reflected Light and Lighter Areas represent less Reflected Light • According to the Light intensity, CCD generates an Analog signal
  • 20. Finger Print Capacitive Scanner Capacitive sensor • In this method, the Finger skin is act as a plate of the Capacitor • Measurement of the capacitance between the skin and the Sensor plates(Pixel) • Where there is a Ridge or a Valley, the distance varies, as does the Capacitance • Sensor Read the Capacitive value from conductive plates & send it to Integrator circuit for Analog to Digital converter to create Digital Image for the Finger
  • 21. Basics of RFID Technology
  • 22. Radio Frequency Identification • A System that transmits the Identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves • Uses Tags (Cards), Readers, and Software to exchange Data over Electro-Magnetic waves in RF communication • The Card uniquely Identifies the item it is attached to
  • 23. Radio Frequency Identification • The Reader sends out a radio signals, and the Card respond with a signal to Identify itself • The Reader converts the radio waves returned form the Tag into Data • The Data is send to Information processing system ( Host or Processing computer) for identification processing ( Filter, categorized and Analyze) • System Grant or denied access to user based on the Information received
  • 24. Component of RFID System • RF tags ( Cards)  Contain Chip and Antenna • Readers (Interrogators)  Contain RF Module (Transmitter and Receiver), Control Unit, Antenna and Several Interfaces (RS 232, RS 485, Ethernet etc.) • Host Computers  Contains Application software, Database and Monitoring software Application, Database and Tag Reader Monitoring Software
  • 25. Component of RFID System Antenna Card/Tag Reader Firmware COMMANDS Controller Antenna RESPONSES Interface Host Power Application ,Controlling And Monitoring Software Interface
  • 26. Component of RFID System RFID Cards A Card is a Transponder which Receives a Radio signal and in response to it sends out a radio signals  Card contains an Antenna, and small Chip for storing small amount of Data  Card can be Program at Manufacturer or on Installation  Card can be battery feed or powered by the high power EM field generated by the Reader Antenna  Field allows the Card Chip/Antenna to send the Signal containing the Data
  • 27. Component of RFID System RFID Card(tags) •Tags can be attached to almost anything: – Items, cases or luggages of products, high value goods – vehicles, assets, personnel •Passive Tags( Proximity card) – Do not require power – Draws power from Interrogator Field – Lower storage capacities (few bits to 1 KB) – Shorter read ranges (4 inches to 15 feet) – Usually Write-Once-Read-Many/Read-Only tags – Cost around 25 cents to few dollars •Active Tags( Smart Card) – Battery powered – Higher storage capacities (512 KB) – Longer read range (300 feet) – Typically can be re-written by RF Interrogators – Cost around 50 to 250 dollars
  • 28. RFID Card Construction RFID Cards Construction A paper label with RFID inside an antenna, printed, etched or stamped ... … and a chip … on a substrate attached to it e.g. a plastic foil ...
  • 29. RFID Tag Memory • Read-only tags – Tag ID is assigned at the factory during manufacturing • Can never be changed • No additional Data can be assigned to the tag • Write once, read many (WORM) tags – Data written once, e.g., during packing or manufacturing • Tag is locked once Data is written • Similar to a compact disc or DVD • Read/Write – Tag Data can be changed over time • Part or all of the Data section can be locked
  • 30. RFID Readers • Reader functions: – Remotely power tags – Establish a bidirectional Data link – Inventory tags, filter results – Communicate with networked server • Readers (Interrogators) can be at a fixed point such as – Entrance/exit – Point of sale • Readers can also be mobile/hand-held
  • 32. Operational frequencies Frequency LF HF UHF Microwave Range 125 KHz 13.56 MHz 868-915 MHz 2.45GHz and 5.8 GHz Read Range Shorter( 2.54cm-3 Short(5.08cm”- Medium(0.35m- Longest(0.35m- 0.48cm”) 60.96cm”) 3.48m’) 4.57m) Tag Power Passive Tag Passive Tag Active Tag Active Tag Source Data Rate Slower Moderate Fast Faster Ability to read Better Moderate Poor Worse near metal or wet surfaces
  • 33. RFID applications • Manufacturing and Processing • Supply Chain Management • Retail • Security • Location Tracking • Traffic movement Control