SlideShare a Scribd company logo
RFID & Its Application
MEMBER: CICI ,CLARIE AND PANG
GCIT1015
Content Flow of Presentation
Introduction Application
Survey
Result
Conclusion Video
RFID(introduction)
 RFID = Radio Frequency Identification
 Electronic labeling and wireless identification of objects using radio
frequency
 Tag carries with its information
 a serial number
 Model number
 Color or any other imaginable data
 When these tags pass through a field generated by a compatible
reader, they transmit this information back to the reader, thereby
identifying the object
RFID components
 A basic RFID system consists of these components:
 A programmable RFID tag/inlay for storing item data;
 Consisting of an RFID chip for data storage
 an antenna to facilitate communication with the RFID chip
 A reader/antenna system to interrogate the RFID inlay
 Application software and a host computer system
RFID Tag
 The RFID tag consists of an integrated circuit (IC) embedded in a
thin film medium.
 Information stored in the memory of the RFID chip is transmitted by
the antenna circuit embedded in the RFID inlay via radio
frequencies, to an RFID reader
 3 types
 Passive
 Semi-passive
 Active
Types of RFID Tags
ActiveTags
•Use a battery
•communicate
over distances of
several meters
Semi-passiveTags
Contain built-in
batteries to power
the chip’s circuitry,
resist interference
and circumvent a
lack of power from
the reader signal due
to long distance.
They are different
from active tags in
that they only
transmit data at the
time a response is
received
PassiveTags
Derive their power
from the field
generated by the
reader
without having an
active transmitter to
transfer the
information stored
Applications
Frequency Appx. Read
Range
Data Speed Cost of
Tags
Application
Low Frequency
(125kHz)
<5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency
(13.56 Mhz)
10 cm – 1m
(passive)
Low to Moderate Medium
to Low
• Smart Cards
• Payment (paywave)
Ultra High
Frequency (433,
868-928 Mhz)
3m -7m
(passive)
Moderate to High Low • Logistics and Supply Chain
• Baggage Tracking
Microwave (2.45 &
5.8 Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll collection
(Autotoll)
• Container Tracking
Current Applications
Application Segment Representative Applications Competitive Technologies Current Penetration Typical Tag Type
Access Control Doorway entry Other keyless entry technologies High Passive
Asset Tracking Locating tractors within a freight
yard
None Low Active
Asset Tagging Tracking corporate computing
systems
Bar Code Low Passive
Authentication Luxury goods counterfeit
prevention
Holograms Low Passive
Baggage Tracking Positive bag matching Bar Code, Optical Character
Recognition
Low Passive
POS Applications SpeedPass Credit Cards, Smart Cards, Wireless
Phones
Medium Passive
SCM (Container Level) Tracking containers in shipping
terminals
GPS-based Systems Low Active
SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive
SCM (Item Level) Identifying individual items Bar Code Minimal Passive
Vehicle Identification Electronic toll collection Bar Code, License plate, reader systems Medium Active, Passive
Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive
ApplicationsCredit Cards with RFID
(Paywave function)
Octopus (Smart Card)
Applications
Autotoll (Electronic toll collection)
Access Control
Online Survey
 Target: SME
 Information: Opinion on RFID and its applications
 Site:
 http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
Survey Result
Logistics and
Supply Chain
Management
20%
Pharmaceutic
manufacturing
industries
15%
Library
Management
21%
Inventory
Control
10%
Document
Management
8%
Security
8%
Customer Services
5%
Hotel
Management
5%
Banking and
Finance
5%
Social Services
3%
Other
18%
Types of industries that respondents think
it is possible to apply RFID technology
Further Development
 In medical uses and library management
Frequency Appx. Read
Range
Data Speed Cost of
Tags
Application
Low Frequency
(125kHz)
<5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency
(13.56 Mhz)
10 cm – 1m
(passive)
Low to
Moderate
Mediu
m to
Low
• Smart Cards
• Payment (paywave)
Ultra High
Frequency (433,
868-928 Mhz)
3m -7m
(passive)
Moderate to
High
Low • Logistics and Supply
Chain
• Baggage Tracking
Microwave (2.45
& 5.8 Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll
collection (Autotoll)
• Container Tracking
Video
Conclusion
 Positive
 RFID is a contactless reading technology and can read through
other materials
 Hold more data than barcode does
 RFID tags data can be changed or added
 More effective, bring lots of convenience to us
 Negative
 Cost is relatively remain high (compare to barcode)
 RFID signals may have problems with some materials
 RFID standards are still being developed

More Related Content

What's hot

RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
Chetan Pandey
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
Publicis Sapient
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
Ayush Dixit
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
ashtopustech
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
Kshitij Varma
 
RFID Application
RFID ApplicationRFID Application
RFID Application
tianna15223779
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
Smart shopping trolley.
Smart shopping trolley.Smart shopping trolley.
Smart shopping trolley.
Professional Presentation designer
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing system
laharipothula
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
Shashank Karamballi
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)GITAM
 
Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )
Bhautik Vaghela
 
Smart shopping system
Smart shopping systemSmart shopping system
Smart shopping system
Mahantesh Hiremath
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin System
Shahrikh Khan
 

What's hot (20)

RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEMRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Smart shopping trolley.
Smart shopping trolley.Smart shopping trolley.
Smart shopping trolley.
 
RFID based smart shopping cart and billing system
RFID based smart shopping cart and billing systemRFID based smart shopping cart and billing system
RFID based smart shopping cart and billing system
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Smart card technology
Smart card technologySmart card technology
Smart card technology
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
Smart card
Smart cardSmart card
Smart card
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)
 
Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )
 
Smart shopping system
Smart shopping systemSmart shopping system
Smart shopping system
 
Seminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin SystemSeminar Report on RFID Based Trackin System
Seminar Report on RFID Based Trackin System
 

Similar to RFID and its application

14219360 PSS7
14219360 PSS714219360 PSS7
14219360 PSS7
hollychn
 
RFID Application
RFID ApplicationRFID Application
RFID Application
yuewingyan
 
14253828 pss7
14253828 pss714253828 pss7
14253828 pss7
ZHENGHao1115
 
14225077 pss7
14225077 pss7 14225077 pss7
14225077 pss7
123wwcc
 
14218631 pss7
14218631 pss714218631 pss7
14218631 pss7
ecect
 
14225077 pss7
14225077 pss714225077 pss7
14225077 pss7123wwcc
 
14215128 pss7
14215128 pss714215128 pss7
14215128 pss7
LamAlice
 
13250221 pss7
13250221 pss713250221 pss7
13250221 pss7
13250221
 
14221780-pss7
14221780-pss714221780-pss7
14221780-pss7
Zoeso
 
12209813 pss7
12209813 pss712209813 pss7
12209813 pss7
12209813
 
12201375 PSS7
12201375 PSS712201375 PSS7
12201375 PSS7
12201375
 
14224119 pss7
14224119 pss714224119 pss7
14224119 pss7
Ng Fai
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15250296
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
Merek Lee
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
Hui Tin Yan
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
sarah ho
 
RFID Application
RFID ApplicationRFID Application
RFID Application
benkalok
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
Lenox1224
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Jeanie Lo
 
15226778 pss7-ans
15226778 pss7-ans15226778 pss7-ans
15226778 pss7-ans
15226778
 

Similar to RFID and its application (20)

14219360 PSS7
14219360 PSS714219360 PSS7
14219360 PSS7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
14253828 pss7
14253828 pss714253828 pss7
14253828 pss7
 
14225077 pss7
14225077 pss7 14225077 pss7
14225077 pss7
 
14218631 pss7
14218631 pss714218631 pss7
14218631 pss7
 
14225077 pss7
14225077 pss714225077 pss7
14225077 pss7
 
14215128 pss7
14215128 pss714215128 pss7
14215128 pss7
 
13250221 pss7
13250221 pss713250221 pss7
13250221 pss7
 
14221780-pss7
14221780-pss714221780-pss7
14221780-pss7
 
12209813 pss7
12209813 pss712209813 pss7
12209813 pss7
 
12201375 PSS7
12201375 PSS712201375 PSS7
12201375 PSS7
 
14224119 pss7
14224119 pss714224119 pss7
14224119 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
16204751 pss6
16204751 pss616204751 pss6
16204751 pss6
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15226778 pss7-ans
15226778 pss7-ans15226778 pss7-ans
15226778 pss7-ans
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 

RFID and its application

  • 1. RFID & Its Application MEMBER: CICI ,CLARIE AND PANG GCIT1015
  • 2. Content Flow of Presentation Introduction Application Survey Result Conclusion Video
  • 3. RFID(introduction)  RFID = Radio Frequency Identification  Electronic labeling and wireless identification of objects using radio frequency  Tag carries with its information  a serial number  Model number  Color or any other imaginable data  When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID components  A basic RFID system consists of these components:  A programmable RFID tag/inlay for storing item data;  Consisting of an RFID chip for data storage  an antenna to facilitate communication with the RFID chip  A reader/antenna system to interrogate the RFID inlay  Application software and a host computer system
  • 5. RFID Tag  The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium.  Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader  3 types  Passive  Semi-passive  Active
  • 6. Types of RFID Tags ActiveTags •Use a battery •communicate over distances of several meters Semi-passiveTags Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. They are different from active tags in that they only transmit data at the time a response is received PassiveTags Derive their power from the field generated by the reader without having an active transmitter to transfer the information stored
  • 7. Applications Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 8. Current Applications Application Segment Representative Applications Competitive Technologies Current Penetration Typical Tag Type Access Control Doorway entry Other keyless entry technologies High Passive Asset Tracking Locating tractors within a freight yard None Low Active Asset Tagging Tracking corporate computing systems Bar Code Low Passive Authentication Luxury goods counterfeit prevention Holograms Low Passive Baggage Tracking Positive bag matching Bar Code, Optical Character Recognition Low Passive POS Applications SpeedPass Credit Cards, Smart Cards, Wireless Phones Medium Passive SCM (Container Level) Tracking containers in shipping terminals GPS-based Systems Low Active SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive SCM (Item Level) Identifying individual items Bar Code Minimal Passive Vehicle Identification Electronic toll collection Bar Code, License plate, reader systems Medium Active, Passive Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive
  • 9. ApplicationsCredit Cards with RFID (Paywave function) Octopus (Smart Card)
  • 10. Applications Autotoll (Electronic toll collection) Access Control
  • 11. Online Survey  Target: SME  Information: Opinion on RFID and its applications  Site:  http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 12. Survey Result Logistics and Supply Chain Management 20% Pharmaceutic manufacturing industries 15% Library Management 21% Inventory Control 10% Document Management 8% Security 8% Customer Services 5% Hotel Management 5% Banking and Finance 5% Social Services 3% Other 18% Types of industries that respondents think it is possible to apply RFID technology
  • 13. Further Development  In medical uses and library management Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Mediu m to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 14. Video
  • 15. Conclusion  Positive  RFID is a contactless reading technology and can read through other materials  Hold more data than barcode does  RFID tags data can be changed or added  More effective, bring lots of convenience to us  Negative  Cost is relatively remain high (compare to barcode)  RFID signals may have problems with some materials  RFID standards are still being developed