SlideShare a Scribd company logo
3D printing pen
15250113 XIE Kaiqi
February 26, 2016
Contents
Introduction
of RFID
Applications
Survey
Results
Future
development
and
opportunities
Conclusion
RFID
 RFID = Radio Frequency Identification
 Electronic labeling and wireless identification of objects using radio
frequency
 Tag carries with its information
 a serial number
 Model number
 Color or any other imaginable data
 When these tags pass through a field generated by a compatible
reader, they transmit this information back to the reader, thereby
identifying the object
RFID components
 A basic RFID system consists of these components:
 A programmable RFID tag/inlay for storing item data;
 Consisting of an RFID chip for data storage
 an antenna to facilitate communication with the RFID chip
 A reader/antenna system to interrogate the RFID inlay
 Application software and a host computer system
RFID Tag
 The RFID tag consists of an integrated circuit (IC) embedded in a thin
film medium.
 Information stored in the memory of the RFID chip is transmitted by
the antenna circuit embedded in the RFID inlay via radio frequencies,
to an RFID reader
 3 types
 Passive
 Semi-passive
 Active
Types of RFID Tags
Active Tags
• Use a battery
• communicate over
distances of several
meters
Semi-passive Tags
• Contain built-in
batteries to power
the chip’s circuitry,
resist interference
and circumvent a lack
of power from the
reader signal due to
long distance.
• They are different
from active tags in
that they only
transmit data at the
time a response is
received
Passive Tags
• Derive their power
from the field
generated by the
reader
• without having an
active transmitter to
transfer the
information stored
Applications
Frequency Appx. Read
Range
Data Speed Cost of
Tags
Application
Low Frequency
(125kHz)
<5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency
(13.56 Mhz)
10 cm – 1m
(passive)
Low to
Moderate
Medium
to Low
• Smart Cards
• Payment (paywave)
Ultra High
Frequency (433,
868-928 Mhz)
3m -7m
(passive)
Moderate to
High
Low • Logistics and Supply
Chain
• Baggage Tracking
Microwave (2.45
& 5.8 Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll collection
(Autotoll)
• Container Tracking
Current Applications
Application Segment Representative
Applications
Competitive
Technologies
Current
Penetration
Typical Tag Type
Access Control Doorway entry Other keyless entry
technologies
High Passive
Asset Tracking Locating tractors
within a freight yard
None Low Active
Asset Tagging Tracking corporate
computing systems
Bar Code Low Passive
Authentication Luxury goods
counterfeit
prevention
Holograms Low Passive
Baggage Tracking Positive bag
matching
Bar Code, Optical
Character Recognition
Low Passive
POS Applications SpeedPass Credit Cards, Smart
Cards, Wireless Phones
Medium Passive
SCM (Container Level) Tracking containers
in shipping terminals
GPS-based Systems Low Active
SCM (Pallet Level) Tracking palletized
shipments
Bar Code Minimal Active, Passive
SCM (Item Level) Identifying
individual items
Bar Code Minimal Passive
Vehicle Identification Electronic toll
collection
Bar Code, License
plate, reader systems
Medium Active, Passive
Vehicle Immobilizers Automotive ignition
systems
Other theft prevention
technologies
High Passive
Applications
Credit Cards with RFID
(Paywave function)
Octopus (Smart Card)
Applications
Autotoll (Electronic toll collection)
Access Control
Online Survey
 Target: SME
 Information: Opinion on RFID and its applications
 Site:
 http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
Survey Result
Logistics and Supply Chain
Management
20%
Pharmaceutic manufacturing
industries
15%
Library Management
21%
Inventory Control
10%
Document
Management
8%
Security
8% Customer Services
5%
Hotel Management
5%
Banking and Finance
5%
Social Services
3%
Other
18%
Types of industries that respondentsthink
it is possible to apply RFID technology
Further Development
 In medical uses and library management
Video
Conclusion
 Positive
 RFID is a contactless reading technology and can read through other materials
 Hold more data than barcode does
 RFID tags data can be changed or added
 More effective, bring lots of convenience to us
 Negative
 Cost is relatively remain high (compare to barcode)
 RFID signals may have problems with some materials
 RFID standards are still being developed

More Related Content

What's hot

RDIF Application
RDIF ApplicationRDIF Application
RDIF Application
15219518
 
15224147 pss7
15224147 pss715224147 pss7
15224147 pss7
kiko ip
 
RFID Application
RFID ApplicationRFID Application
RFID Application
lhcdenise
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15217639
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15200736
 
Smart watch
Smart watch Smart watch
Smart watch
Arthur Cheung
 
RFID application
RFID applicationRFID application
RFID application
Wissely Cheung
 
15224554 pss7
15224554 pss715224554 pss7
15224554 pss7
navidmak1122
 
RFID Application
RFID ApplicationRFID Application
RFID Application
RimoFan
 
15214087 pss7-ans
15214087 pss7-ans15214087 pss7-ans
15214087 pss7-ans
LukWO
 
15217388 pss7
15217388 pss715217388 pss7
15217388 pss7
tsf1014
 
13209116 pss7
13209116 pss713209116 pss7
13209116 pss7
calvin6c05
 
RFID application
RFID applicationRFID application
RFID application
14208490
 
13205129 pss7
13205129 pss713205129 pss7
13205129 pss713205129
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7kwokyy
 
14200058 pss7
14200058 pss714200058 pss7
14200058 pss7
kelvin chan
 
13250442 pss7
13250442 pss713250442 pss7
13250442 pss7
13250442
 

What's hot (20)

RDIF Application
RDIF ApplicationRDIF Application
RDIF Application
 
15224147 pss7
15224147 pss715224147 pss7
15224147 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13209000 pss7
13209000 pss713209000 pss7
13209000 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
Smart watch
Smart watch Smart watch
Smart watch
 
RFID application
RFID applicationRFID application
RFID application
 
15224554 pss7
15224554 pss715224554 pss7
15224554 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13210939 pss7
13210939 pss713210939 pss7
13210939 pss7
 
15214087 pss7-ans
15214087 pss7-ans15214087 pss7-ans
15214087 pss7-ans
 
Sample PPT
Sample PPTSample PPT
Sample PPT
 
15217388 pss7
15217388 pss715217388 pss7
15217388 pss7
 
13209116 pss7
13209116 pss713209116 pss7
13209116 pss7
 
RFID application
RFID applicationRFID application
RFID application
 
13205129 pss7
13205129 pss713205129 pss7
13205129 pss7
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7
 
14200058 pss7
14200058 pss714200058 pss7
14200058 pss7
 
13250442 pss7
13250442 pss713250442 pss7
13250442 pss7
 

Similar to RFID Applicaiton

RFID Application
RFID ApplicationRFID Application
RFID Application
wingki
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
15225763
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7cypfiona
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7cypfiona
 
RFID Application
RFID ApplicationRFID Application
RFID Application
14208490
 
13210696 pss7
13210696 pss713210696 pss7
13210696 pss7
13210696
 
RFID Application
RFID ApplicationRFID Application
RFID Application
12208752
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7kwokyy
 
13252399 pss7
13252399 pss713252399 pss7
13252399 pss7
Jingwen MAI
 
15220117 pss7
15220117 pss715220117 pss7
15220117 pss7
15220117
 
RFID Application
RFID ApplicationRFID Application
RFID Application
nkwing302
 
RFID
RFIDRFID
RFID
nkwing302
 
wireless technology
wireless technologywireless technology
wireless technology
laiwaiho
 
Rfid application demo
Rfid application demoRfid application demo
Rfid application demo7richard
 

Similar to RFID Applicaiton (14)

RFID Application
RFID ApplicationRFID Application
RFID Application
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7
 
13251910.pss7
13251910.pss713251910.pss7
13251910.pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13210696 pss7
13210696 pss713210696 pss7
13210696 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
13211110 pss7
13211110 pss713211110 pss7
13211110 pss7
 
13252399 pss7
13252399 pss713252399 pss7
13252399 pss7
 
15220117 pss7
15220117 pss715220117 pss7
15220117 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID
RFIDRFID
RFID
 
wireless technology
wireless technologywireless technology
wireless technology
 
Rfid application demo
Rfid application demoRfid application demo
Rfid application demo
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

RFID Applicaiton

  • 1. 3D printing pen 15250113 XIE Kaiqi February 26, 2016
  • 3. RFID  RFID = Radio Frequency Identification  Electronic labeling and wireless identification of objects using radio frequency  Tag carries with its information  a serial number  Model number  Color or any other imaginable data  When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID components  A basic RFID system consists of these components:  A programmable RFID tag/inlay for storing item data;  Consisting of an RFID chip for data storage  an antenna to facilitate communication with the RFID chip  A reader/antenna system to interrogate the RFID inlay  Application software and a host computer system
  • 5. RFID Tag  The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium.  Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader  3 types  Passive  Semi-passive  Active
  • 6. Types of RFID Tags Active Tags • Use a battery • communicate over distances of several meters Semi-passive Tags • Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. • They are different from active tags in that they only transmit data at the time a response is received Passive Tags • Derive their power from the field generated by the reader • without having an active transmitter to transfer the information stored
  • 7. Applications Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 8. Current Applications Application Segment Representative Applications Competitive Technologies Current Penetration Typical Tag Type Access Control Doorway entry Other keyless entry technologies High Passive Asset Tracking Locating tractors within a freight yard None Low Active Asset Tagging Tracking corporate computing systems Bar Code Low Passive Authentication Luxury goods counterfeit prevention Holograms Low Passive Baggage Tracking Positive bag matching Bar Code, Optical Character Recognition Low Passive POS Applications SpeedPass Credit Cards, Smart Cards, Wireless Phones Medium Passive SCM (Container Level) Tracking containers in shipping terminals GPS-based Systems Low Active SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive SCM (Item Level) Identifying individual items Bar Code Minimal Passive Vehicle Identification Electronic toll collection Bar Code, License plate, reader systems Medium Active, Passive Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive
  • 9. Applications Credit Cards with RFID (Paywave function) Octopus (Smart Card)
  • 10. Applications Autotoll (Electronic toll collection) Access Control
  • 11. Online Survey  Target: SME  Information: Opinion on RFID and its applications  Site:  http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 12. Survey Result Logistics and Supply Chain Management 20% Pharmaceutic manufacturing industries 15% Library Management 21% Inventory Control 10% Document Management 8% Security 8% Customer Services 5% Hotel Management 5% Banking and Finance 5% Social Services 3% Other 18% Types of industries that respondentsthink it is possible to apply RFID technology
  • 13. Further Development  In medical uses and library management
  • 14. Video
  • 15. Conclusion  Positive  RFID is a contactless reading technology and can read through other materials  Hold more data than barcode does  RFID tags data can be changed or added  More effective, bring lots of convenience to us  Negative  Cost is relatively remain high (compare to barcode)  RFID signals may have problems with some materials  RFID standards are still being developed