RFID (Radio Frequency Identification) is a technology that uses radio waves to identify objects. The key components of an RFID system are RFID tags, readers, and middleware. RFID tags contain antennas that respond to radio wave signals from readers by transmitting digital data, such as a unique serial number. Readers then pass this data to middleware, which processes and routes it to various applications. There are different types of RFID including passive and active tags that operate at low, high, or ultra-high frequencies. While RFID provides benefits over barcodes like non-line-of-sight scanning, issues with RFID include a lack of universal standards, potential for signal disruption, collisions between readers/tags, and privacy
RFID Technology - Electronics and Communication Seminar TopicHimanshiSingh71
RFID Technology - Electronics and Communication Seminar Topic.
Radio Frequency Identification. Active tag and passive Tag
Scope of rfid. Current uses of RFID Technology. Applications.
RFID Technology - Electronics and Communication Seminar TopicHimanshiSingh71
RFID Technology - Electronics and Communication Seminar Topic.
Radio Frequency Identification. Active tag and passive Tag
Scope of rfid. Current uses of RFID Technology. Applications.
This slides about Wireless sensor network MAC protocol,
There are bunch of MAC protocol in research field.
It classify the MAC protocol and summarize the feature of typical sensor network MAC protcol
Location-based Services (LBSs) are IT services for providing information that has been created, compiled, selected, or filtered taking into consideration the current locations of the users or those of other persons or mobile objects.
Description and comparison of 3G, 4G and 5G Core Networks. You can find my detailed report in https://medium.com/@sarpkoksal/core-network-evolution-3g-vs-4g-vs-5g-7738267503c7
The RFID has been still an evolution in many parts of the world.This presentation gives you an overview about the RFID technology and helps you to implement in your projects and other stuff..Take a look at it and gain knowledge yourself..If you want identification RFID is the best technology employable.
Wireless Sensor Networks UNIT-1
You can watch my lectures at:
Digital electronics playlist in my youtube channel:
https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber
My Website : https://easyninspire.blogspot.com/
Lidar is an acronym for light detection and ranging. It is an optical remote sensing technology that can measure the distance to, or other properties of a target by illuminating the target with light, often using pulses from a laser.
This slides about Wireless sensor network MAC protocol,
There are bunch of MAC protocol in research field.
It classify the MAC protocol and summarize the feature of typical sensor network MAC protcol
Location-based Services (LBSs) are IT services for providing information that has been created, compiled, selected, or filtered taking into consideration the current locations of the users or those of other persons or mobile objects.
Description and comparison of 3G, 4G and 5G Core Networks. You can find my detailed report in https://medium.com/@sarpkoksal/core-network-evolution-3g-vs-4g-vs-5g-7738267503c7
The RFID has been still an evolution in many parts of the world.This presentation gives you an overview about the RFID technology and helps you to implement in your projects and other stuff..Take a look at it and gain knowledge yourself..If you want identification RFID is the best technology employable.
Wireless Sensor Networks UNIT-1
You can watch my lectures at:
Digital electronics playlist in my youtube channel:
https://www.youtube.com/channel/UC_fItK7wBO6zdWHVPIYV8dQ?view_as=subscriber
My Website : https://easyninspire.blogspot.com/
Lidar is an acronym for light detection and ranging. It is an optical remote sensing technology that can measure the distance to, or other properties of a target by illuminating the target with light, often using pulses from a laser.
Radio-frequency identification (RFID) uses electronic tags and label.pdfarchiesgallery
Radio-frequency identification (RFID) uses electronic tags and labels to identify objects
wirelessly over short distances. Discuss.
Solution
Please follow the data and description :
RFID :
This is the general abbrevation for the Radio-frequency identification (RFID). This is a regular
and the widely used technology to record the presence of an object using radio signals. It is used
for inventory control or timing sporting events. This is not a replacement for the process and the
detection of the barcoding, but a complement or an substitute for the distant reading of codes
apart form the barcoding technique. This technology is used for the automatic detection or an
identification of a person, a package or an item based on the context. This is fulfilled with the use
of the RFID tags. These are the small transponders that comprises of the combination of a radio
receiver and the transmitter as well that will transmit and even used for the identity information
over a short distance, when needed. The other piece to make use of RFID tags is an RFID tag
reader.
An RFID tag is an object that can be applied to or incorporated into a product, animal, or person
for the purpose of identification and tracking using radio waves. Some tags can be read from
several meters away and beyond the line of sight of the reader. Most tags carry a plain text
inscription and a barcode as complements for direct reading and for cases of any failure of radio
frequency electronics. Most RFID tags contain at least two parts. One is an integrated circuit for
storing and processing information, that is used for the purpose of the modulating and de-
modulating a radio-frequency (RF) signal, and other specialized functions. The second is an
antenna for receiving and transmitting the signal.
Uses :
The uses of the tags include the :
a) For the use of the objects and the goods in the malls.
b) Robbery proof chips to avoid insecure entry for the users.
c) Use of the safety products.
d) In the stream of the health care.
e) Tracking devices.
Hope this is helpful..
Radio Frequency Identification(RFID) is one of the most exciting technology that revolutionize the working practices by increasing efficiencies and improving profitability.
Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders
My presentation explores how RFID system works and describes briefly about history of RFID, active & passive tags, modes of transmission of data and applications
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
This is a very useful application of RFID (Radio-frequency identification) and is very commonly used in institutes, offices, homes and so on. An RFID system consists of a reader device and a transponder. A transponder or tag has a unique serial number which is identified by the reader. Here RFID has been interfaced with ARM Processor to provide secured access. The relevant messages are also displayed on a 16x2 LCD.RFID automated access for door controls to buildings, departments, rooms, secured closets (wiring, PBX, etc.) and cabinets is very cost effective and secure to use. Many people do not realize how easy it is to implement card access systems such as card access door or doors using RFID readers and RFID Cards or Key fobs for Secured Access Control Management. You can even use smart readers for computer rooms and securing individual computers. RFID tags are categorized as either active or passive. Active tags are powered by an internal battery and are typically read/write,i.e tag data can be rewritten or modified. Passive tags operate without a separate external power source and obtain operating power generated from the reader.
Looking for high-quality RFID readers and desktop readers in India? Look no further! We are your trusted RFID manufacturer, providing high-quality products that meet your needs. Explore our wide range of RFID solutions and enhance your business operations with seamless tracking and data management. Shop now for the best RFID technology in India.
visit for more details: https://poxo.in/
RFID and its implementations in different fields like logistics, animal keeping. Details regarding how it works and what the various components of rfid.
we all topics which related to RFID Sensor and how the RFID sensor works ..
AND
This content be good then please share and press the like button .
Thanks You,
Technology development s at the pic in today's world. Even the existing technology and devices are being upgraded. So, the idea is here to understand about one of the best technologies called Radio Frequency Identification (RFID) which is now in use everywhere for many application. Here I have used it for one of those application which is object detection which have been applied at many places.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
3. INTRODUCTION
★RFID stands for Radio Frequency
Identification
★This rapidly-growing technology transmits
information wirelessly, through the use of radio
waves.
★RFID requires using a device known as a
reader.
★The reader device contains an antenna and a
small chip to transmit information via the radio-
4. INTRODUCTION
★Radio Frequency Identification (RFID) is a method that is
used to track or identify an object by radio transmission uses
over the web.
★Data digitally encoded in an RFID tag which might be read by
the reader.
★This is device work as a tag or label during which data read
from tags that are stored in the database through the reader
as compared to traditional barcodes and QR codes.
★It is often read outside the road of sight either passive or
active RFID.
6. KINDS OF RFID
★There are many kinds of RFID, each with different
properties
★Most RFID tags have neither an electric plug nor a
battery.
★All of the energy needed to operate them is
supplied in the form of radio waves by RFID readers.
★This technology is called passive RFID to
distinguish it from the(less common) active RFID in
which there is a power source on the tag.
7. KINDS OF RFID
UHF RHID ( Ultra-High Frequency RFID ). It is used on
shipping pallets and some driver’s licenses. Readers send
signals in the 902-928 MHz band. Tags communicate at
distances of several meters by changing the way they reflect the
reader signals; the reader is able to pick up these reflections.
This way of operating is called backscatter.
HF RFID (High-Frequency RFID ). It operates at 13.56 MHz
and is likely to be in your passport, credit cards, books, and
noncontact payment systems. HF RFID has a short-range,
typically a meter or less because the physical mechanism is
based on induction rather than backscatter.
8. KINDS OF RFID
★There are also other forms of RFID using other frequencies,
such as LF RFID(Low-Frequency RFID), which was developed
before HF RFID and used for animal tracking
★There are two types of RFID :
○Passive RFID –
In this device, RF tags are not attached by a power supply and passive
RF tag stored their power. When it is emitted from active antennas and
the RF tag are used specific frequency like 125-134MHZ as low
frequency, 13.56MHZ as a high frequency and 856MHZ to 960MHZ as
ultra-high frequency.
○Active RFID –
In this device, RF tags are attached by a power supply that emits a
signal and there is an antenna which receives the data.
10. CLASSIFICATION OF RFID
SYSTEM
★Near Field RFID –
Near Field RFID has small, Omni-directional reader
antenna & tag read range between 5mm to 10cm
depending on frequency & antenna.
○Passive
★Far Field RFID –
Far Field RFID has resonant, directional antenna &
tag range that can reach up to 22.1m.
○Passive
○Active
11. RFID SYSTEM
★RFID System composed of RFID Reader & RFID Tags.
★RFID Reader –
It is a device used to communicate with RFID Tag which consists of one
or more antennas, used to emit radio waves & receive signals back, from
RFID Tag. The RFID reader is also called as interrogator as it used to
interrogate RFID Tag.
★RFID Tags –
RFID Tags consists of 2 parts:
○Integrated Circuit :
It is used for storing & processing data.
○Antenna :
It is used for transmitting receiving signal.
○Active Tag :
These have their own power supply and allows a read range of about 100 feet.
○Passive Tag :
A reader inductively gives power to Passive Tags as they don’t have their own power
supply. Passive Tags are most widely used Tag and their read range is approximately
30 feet.
12. WORKING PRINCIPLE OF RFID
★RFID uses radio waves to perform AIDC function.
★AIDC stands for Automatic Identification and Data
Capture technology which performs object identification
and collection and mapping of the data.
★An antenna is an device which converts power into
radio waves which are used for communication between
reader and tag. RFID readers retrieve the information
from RFID tag which detects the tag and reads or writes
the data into the tag.
★It may include one processor, package, storage and
transmitter and receiver unit.
14. FEATURES OF RFID
★An RFID tag consists of two-part
which is an microcircuit and an
antenna.
★This tag is covered by protective
material which acts as a shield against
the outer environment effect.
★This tag may active or passive in
which we mainly and widely used
passive RFID.
15. APPLICATION OF RFID
★It utilized in tracking shipping containers, trucks and
railroad, cars.
★It uses in Asset tracking.
★It utilized in credit-card shaped for access application.
★It uses in Personnel tracking.
★Controlling access to restricted areas.
★It uses ID badging.
★Supply chain management.
★Counterfeit prevention (e.g., in the pharmaceutical
industry).
16. APPLICATIONS OF RFID
★Document tracking.
★Controlling access to restricted areas
★Asset tracking
★Personnel tracking
★Inventory management
★ID badging
★Supply chain management
★Manufacturing
★Healthcare
17. ADVANTAGES OF RFID
★It provides data access and real-time information
without taking to much time.
★RFID tags follow the instruction and store a large
amount of information.
★The RFID system is non-line of sight nature of the
technology.
★It improves the Efficiency, traceability of production.
★In RFID hundred of tags read in a short time.
18. DISADVANTAGES OF RFID
★It takes longer to program RFID Devices.
★RFID intercepted easily even it is
Encrypted.
★In an RFID system, there are two or three
layers of ordinary household foil to dam the
radio wave.
★There is privacy concern about RFID
devices anybody can access information
about anything.
★Active RFID can costlier due to battery.
19. DIFFERENCE BETWEEN RFID
AND BARCODE
Radio-Frequency Identification (RFID) :
It is an acronym for “radio-frequency identification” and refers to science
whereby digital data encoded in RFID tags or smart labels are captured with
aid of a reader by radio waves. In RFID data from a tag or label are captured
via a gadget that stores data in a database. RFID, however, has quite a few
benefits over systems that use barcode asset monitoring software. The most
incredible is that RFID tag statistics can be examined outside line-of-sight.
An RFID tag incorporates a sensor connected to an antenna that allows
transmission of data to reader. Each sensor carries a unique identifier and
an RFID reader that can concurrently scan a lot of tags.
20. DIFFERENCE BETWEEN RFID
AND BARCODE
Barcode :
Barcode is a type of code which is machine-readable i.e. a machine-
code/machine language in structure of numbers and a pattern of parallel
lines of various widths, printed on a commodity and used specifically for
stock control. Barcoding makes use of a scanner with a beam of light to
“read” black and white traces of a barcode.
The scanner consists of a sensor that creates a signal from the mirrored or
reflected light, and a decoder then interprets sign into textual content and
sends it to a PC or database. Barcode scanners require line of sight and
ought to “see” every barcode one at a time in order to seize data.
21. S.No. RFID Barcode
1.
It is based totally on radio-
frequency.
It is primarily based on optical
technology.
2.
It does no longer require Line
of sight.
It requires Line of sight
because scanner must have an
unobstructed view and must
be oriented properly.
3.
It has greater data storage as in
contrast to barcodes.
It has much less data storage
up to solely 24 characters.
4.
Memory storage is possible in
RFID with assist of tags.
Memory storage is not
possible in barcodes.
5.
It is more resistant or durable
than a barcode.
It is much less resistant than
RFID.
6.
Several RFID tags can be
examined simultaneously i.e.
multiple read is allowed in
RFID.
Only a single barcode can be
scanned at a time i.e one card
can be read at a time.
7.
Read/write abilities using RFID
tags.
Barcode has totally reading
capabilities and can’t write
anything.
22. DIFFERENCE BETWEEN RFID
AND BARCODE
⮚RFID or Radio Frequency Identification is an automatic
identification method that uses wireless non-contact radio
frequency waves in which data is digitally encoded in RFID
tags or smart labels which can be read by reader through
radio waves.
⮚The transfer of data takes place between a reader and a
movable thing that can be identified & track. RFID can be
considered similar to barcodes as data read from tags are
stored in database or you can say device which captures
label’s data, stores data in a database.
23. DIFFERENCE BETWEEN RFID
AND BARCODE
⮚The major difference between barcodes or QR codes and
RFID is that RFID tag data can be read outside line-of-sight
whereas traditional barcodes can’t.
⮚RFID doesn’t require any physical contact between reader
or scanner and tagged item.
⮚There is a microchip placed inside a label which is used to
transfer data when label is exposed to radio waves.
⮚RFID tags are mainly used in industries for tracking
progress of a product.
24. RFID MIDDLEWARE
COMPONENTS
A RFID middleware is the interface that sits between the RFID hardware and
RFID applications. It provides the following advantages:
It hides the RFID hardware details from the applications;
It handles and processes the raw RFID data before passing it as aggregated
events to the applications;
It provides an application level interface for managing RFID readers and
querying the RFID data.
25. RFID MIDDLEWARE
COMPONENTS
⮚A layer of the RFID middleware incorporates all the device drivers of
different hardware and exposes to the application standard interfaces
to access this hardware.
⮚If the application was provided with all the device drivers of all
connected readers, it will be a hard job to manage and interface each
of the devices.
⮚The application developer will then need to understand all the
hardware specific internals and operations.
⮚Also, the application, if provided with the huge amount of raw tag
data reported by the readers, will find it very difficult to process the
data in real time.
⮚A RFID middleware provides a standardized way of dealing with this
flood of information, which processes the raw data and provides the
26. RFID MIDDLEWARE
COMPONENTS
As shown in figure RFID middleware is
generally composed of four major layers:
1. Reader Interface
2. Data Processor and Storage
3. Application Interface
4. Middleware Management
28. RFID MIDDLEWARE
COMPONENTS
Reader interface
The reader interface is the lowest layer of the RFID middleware which
handles the interaction with the RFID hardware. It maintains the
device drivers of all the devices supported by the system, and
manages all the hardware related parameters like reader protocol, air
interface, and host-side communication.
Data processor and storage
The data processor and storage layer is responsible for processing
and storing the raw data coming from the readers. Examples of
processing logic carried by this layer are data filtering, aggregation,
and transformation. This layer also processes the data level events
associated with a specific application.
29. RFID MIDDLEWARE
COMPONENTS
Application interface
The application interface provides the application with an API to
access, communicate, and configure the RFID middleware. It
integrates the enterprise applications with the RFID middleware by
translating the applications’ requests to low level middleware
commands.
Middleware management
The middleware management layer helps managing the
configuration of the RFID middleware, and provides the following
capabilities:
⮚Add, configure, and modify connected RFID readers;
⮚Modify application level parameters such as filters, and duplicate
removal timing window;
⮚Add and remove services supported by the RFID middleware.
30. RFID MIDDLEWARE
COMPONENTS
⮚RFID readers are typically abstracted as a logical
reader which is either a collection of several readers
or a part of the reader.
⮚This grouping mechanism is used where there is a
need to have a set of readers capturing data from a
particular area such as a warehouse with many
loading docks.
⮚The advantage of this is that the application can
query a small number of logical readers rather than
having to aggregate events from each of the
individual readers.
31. RFID MIDDLEWARE
COMPONENTS
There are two standardized interaction models used to define the
communication between the middleware and the applications.
An application can operate at synchronous mode when requesting services
on demand or asynchronous mode when it registers for information to be
sent to it when certain conditions are met.
RFID middleware usually provide some kind of data filtering, because
sometimes it might be required to report only certain type and value of the
tag data to the application.
The application needs to provide a set of defined patterns to the middleware.
The middleware then allows only data that matches the pattern to be
reported to the application.
32. ISSUES: Technical problems with RFID
★ Problems with RFID Standards
RFID has been implemented in different ways by different
manufacturers; global standards are still being worked on. It should be
noted that some RFID devices are never meant to leave their network
(as in the case of RFID tags used for inventory control within a
company). This can cause problems for companies.
There are several guidelines and specifications for RFID technology,
but the main standards organizations are:
International Organization for Standardization (ISO)
Electronics Product Code Global Incorporated (EPCglobal)
International Electrotechnical Commission (IEC)
Each radio frequency has associated standards, including ISO 14223
and ISO/IEC 18000-2 for LF RFID, ISO 15693 and ISO/IEC 14443 for
HF RFID, and ISO 18000-6C for UHF RFID.
33. ISSUES: Technical problems
with RFID
★ RFID systems can be easily disrupted
○ Since RFID systems make use of the electromagnetic spectrum (like WiFi
networks or cellphones), they are relatively easy to jam using energy at
the right frequency. Although this would only be an inconvenience for
consumers in stores (longer waits at the checkout), it could be disastrous
in other environments where RFID is increasingly used, like hospitals or in
the military in the field.
○ Also, active RFID tags (those that use a battery to increase the range of
the system) can be repeatedly interrogated to wear the battery down,
disrupting the system.
34. ISSUES: Technical problems with
RFID
★ RFID Reader Collision
Reader collision occurs when the signals from two or more readers overlap. The
tag is unable to respond to simultaneous queries. Systems must be carefully set
up to avoid this problem; many systems use an anti-collision protocol (also
called a singulation protocol. Anti-collision protocols enable the tags to take
turns in transmitting to a reader. (http://www.technovelgy.com/ct/Technology-
Article.asp?ArtNum=58)
★ RFID Tag Collision
Tag collision occurs when many tags are present in a small area; but since the
read time is very fast, it is easier for vendors to develop systems that ensure
that tags respond one at a time. (http://www.technovelgy.com/ct/Technology-
Article.asp?ArtNum=57)
35. ISSUES: Security, privacy and ethics problems with RFID
The following problems with RFID tags and readers have been reported.
The contents of an RFID tag can be read after the item leaves the supply chain
An RFID tag cannot tell the difference between one reader and another. RFID scanners are very
portable; RFID tags can be read from a distance, from a few inches to a few yards. This allows anyone
to see the contents of your purse or pocket as you walk down the street. Some tags can be turned off
when the item has left the supply chain
RFID tags are difficult to remove
RFID tags are difficult to for consumers to remove; some are very small (less than a half-millimeter
square, and as thin as a sheet of paper) - others may be hidden or embedded inside a product where
consumers cannot see them. New technologies allow RFID tags to be "printed" right on a product and
may not be removable at all
RFID tags can be read without your knowledge
Since the tags can be read without being swiped or obviously scanned (as is the case with magnetic
strips or barcodes), anyone with an RFID tag reader can read the tags embedded in your clothes and
other consumer products without your knowledge. For example, you could be scanned before you enter
the store, just to see what you are carrying. You might then be approached by a clerk who knows what
you have in your backpack or purse, and can suggest accessories or other items.
36. ISSUES: Security, privacy and ethics problems with RFID
RFID tags can be read a greater distances with a high-gain antenna
For various reasons, RFID reader/tag systems are designed so that distance
between the tag and the reader is kept to a minimum (see the material on tag
collision above). However, a high-gain antenna can be used to read the tags
from much further away, leading to privacy problems.
RFID tags with unique serial numbers could be linked to an individual
credit card number
At present, the Universal Product Code (UPC) implemented with barcodes
allows each product sold in a store to have a unique number that identifies
that product. Work is proceeding on a global system of product identification
that would allow each individual item to have its own number. When the item
is scanned for purchase and is paid for, the RFID tag number for a particular
item can be associated with a credit card number.
37. Zombie RFID Tags
★ One of the main concerns with RFID tags is that their contents can be
read by anyone with an appropriately equipped scanner - even after you
take it out of the store.
★ One technology that has been suggested is a zombie RFID tag, a tag
that can be temporarily deactivated when it leaves the store. The process
would work like this: you bring your purchase up to the register, the RFID
scanner reads the item, you pay for it and as you leave the store, you
pass a special device that sends a signal to the RFID tag to "die." That is,
it is no longer readable.
★ The "zombie" element comes in when you bring an item back to the store.
A special device especially made for that kind of tag "re-animates" the
RFID tag, allowing the item to reenter the supply chain.
38. Next-Generation Uses of RFID
★ Some vendors have been combining RFID tags with sensors of
different kinds. This would allow the tag to report not simply the
same information over and over, but identifying information along
with current data picked up by the sensor.
★ For example, an RFID tag attached to a leg of lamb could report
on the temperature readings of the past 24 hours, to ensure that
the meat was properly kept cool.
★ Over time, the proportion of "scan-it-yourself" aisles in retail
stores will increase. Eventually, we may wind up with stores that
have mostly "scan-it-yourself" aisles and only a few checkout
stations for people who are disabled or unwilling.
39. Next-generation RFID use
RFID systems are becoming increasingly used to support internet of
things deployments. Combining the technology with smart sensors
and/or GPS technology enables sensor data including temperature,
movement and location to be wirelessly transmitted.