SlideShare a Scribd company logo
1 of 19
Sciontech barcode
solutions
The Wave of the Future
 History of RFID
 Types & Systems
 Current Uses
 Future Applications
 Controversies
 A technology that employs a microchip with an
antenna that broadcasts its unique identifier
and location to receivers.
 Employs a microchip called a smart tag,
broadcasts unique 96-bit identifier to receiver.
 Receiver relays the data to a computer.
 Does not require human to manually pass item
over scanner.
 More accurate inventory count.
 Can be incorporated into product, person,
animal.
 Can track each individual item.
 1939
 IFF Transponder
 Used by allies in WWII
 1945
 Leon Theremin
 Espionage tool for Soviet Union
 1973
 Claims U.S. patent was first true ancestor
 1980
 Retail
 Use of RFID in tracking and access applications
appeared
 Price, color, date of purchase
 Contains two main parts:
 Silicon chips
 Antennas
 Components enable tags to receive and
respond to radio frequencies queries from
RFID transceivers.
 Three types:
 Passive
 Semi-Passive
 Active
 Passive
 Have no internal power supply
 Electrical current inducted in antenna by the incoming signal
proves power for integrated circuit in tag to power up and
transmit response
 Very Small, Limited Range, Unlimited Life
 Semi Passive
 Similar to passive tags, with the addition of a small battery
 Battery powers the integrated circuit
 Bigger, Longer Range, Limited Life
 Active
 Have their own internal power source
 Many operate at fixed intervals
 Also called beacons (broadcast own signal)
 Large ( coin), Much larger memories, Longer range
 Objects equipped with
RFID tag
 Tag contains
transponder with
digital memory chip.
 Interrogator: an antenna
packaged with transceiver
and decoder.
 emits signal activating
tag.
 Reader detects activation
signal, decodes the data
on the tag’s silicon chip.
 Data passed to host
computer.
 “Line of Sight” Technology
 RFID superior over Barcode
 Elements and accidents can disturb or damage
barcodes
 Best Buy, Wal-Mart, And Target began
implementation
 Efficient in ability to track & respond accordingly
 Wal-Mart now requires its suppliers to use
RFID tags on shipping crates and pallets to
improve inventory management in the supply
chain.
 Fed Ex bought RFID-enabled aircraft from
Airbus to reduce maintenance time and costs.
 Cattle and farm animals are being tagged to
improve tracking and monitoring of health.
 U.S. Department of Defense – to better track
goods along supply chain (logistics and
inventory).
 Electronic payment – credit card companies
moving to RFID-enabled cards to increase
efficiency and reduce time at point-of-sale for
customer, merchant, and card issuer.
 Medical
 Drug
Counterfeiting
 Tracking & Tracing
 Medical
“Passports”
 Foster Care System
 Food Chain
Precautions
 Shopping
 Cashier-less check
out and payment
 Household Technology
 Smart keys
 Intelligent washing
machines
 Monitoring
refrigerators
 Intelligent
ovens/microwaves
 Privacy
 Consumer Rights
 Consumers should be informed if their products have
an RFID tag.
 Tracking of consumers (Profiling)
 RFID chips withstand dirt and scratches and can be
scanned from distances upward of 25 feet.
 Personal Information Leakage.
 Drawing the Line – Need for Legislation?
 Who Should Regulate?
 “Killing” of RFID Tags
 Tracking vs. the washing machine
 Options of killing after purchase
 Medical
 Implants/Personal Information
 Verichip is a tiny implantable chip that holds medical
records
 Bracelets to track infants in medical wards and elderly
in nursing homes.
 Used in animals for tracking.
 Medical
 Health Risks
 Hard to remove once implanted.
 Long term effects unknown.
 Religious
 Mark of the Beast, etc.
 The implanted RFID chip is certain to inflame Christian
fundamentalists, some of whom believe that such chips are
the Satanic “mark of the Beast” predicted in Revelations
13:16 “And he causeth all, both small and great, rich and
poor, free and bond to receive a mark in their right hand, or
in their foreheads.”
 Slowly becoming an industry standard
 Speeds up the supply chain process
 Easier to manage inventory
 Continually evolving
 Controversial technology
 Define RFID technology?
 When was RFID introduced?
 What are two main reasons RFID is
controversial?
 Name the three types of RFID tags?
 How are they currently using RFID tags?
 How is RFID Technology expected to effect
households?
Rfid technology

More Related Content

What's hot

RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)Amber Bhaumik
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDILA SHARMA
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identificationbansarirajani
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technologysweta dargad
 
Applications of rfid
Applications of rfidApplications of rfid
Applications of rfidMandar Jagtap
 
RFID
RFIDRFID
RFIDdont
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and ApplicationsAnal Mandal
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)GITAM
 
Rfid in retail(kapil)
Rfid in retail(kapil)Rfid in retail(kapil)
Rfid in retail(kapil)isme
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) Chetan Pandey
 
RFID Application
RFID ApplicationRFID Application
RFID Applicationyuewingyan
 

What's hot (20)

RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
RFID
RFIDRFID
RFID
 
Rfid radio frequency identification
Rfid radio frequency identificationRfid radio frequency identification
Rfid radio frequency identification
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
 
RFID
RFIDRFID
RFID
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
RFID in Logistics
RFID in LogisticsRFID in Logistics
RFID in Logistics
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Rfid
RfidRfid
Rfid
 
RFID
RFIDRFID
RFID
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
Rfid seminar (1)
Rfid seminar (1)Rfid seminar (1)
Rfid seminar (1)
 
Rfid in retail(kapil)
Rfid in retail(kapil)Rfid in retail(kapil)
Rfid in retail(kapil)
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 

Similar to Rfid technology

Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Liz Sims
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxKondiVinay
 
It in the news group 7 mfr audio added
It in the news group 7   mfr audio addedIt in the news group 7   mfr audio added
It in the news group 7 mfr audio addedsigep176
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Diana Oliva
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutionsashtopustech
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionsaeed001
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technologyAbdullah Khosa
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisoliaPositive Hack Days
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Positive Hack Days
 
Rfi dtechnology.doc
Rfi dtechnology.docRfi dtechnology.doc
Rfi dtechnology.docArtechno7
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDOmer Almas
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industrybizpresenter
 
RFID - Radio frequency identification Device
RFID - Radio frequency identification DeviceRFID - Radio frequency identification Device
RFID - Radio frequency identification Devicefaisalkhan786
 
Rfid article
Rfid articleRfid article
Rfid articletrangbk
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraqmontaser185
 

Similar to Rfid technology (20)

RFID Whitepaper for Steel Industry
RFID Whitepaper for Steel IndustryRFID Whitepaper for Steel Industry
RFID Whitepaper for Steel Industry
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
 
It in the news group 7 mfr audio added
It in the news group 7   mfr audio addedIt in the news group 7   mfr audio added
It in the news group 7 mfr audio added
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...
 
Rfid technology next generation application solutions
Rfid technology next generation application solutionsRfid technology next generation application solutions
Rfid technology next generation application solutions
 
Use of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introductionUse of rfid in operations management operations management 3 introduction
Use of rfid in operations management operations management 3 introduction
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technology
 
Rfid complete
Rfid completeRfid complete
Rfid complete
 
Rfid security workshop v0.9 -nahuel_grisolia
Rfid security workshop v0.9  -nahuel_grisoliaRfid security workshop v0.9  -nahuel_grisolia
Rfid security workshop v0.9 -nahuel_grisolia
 
Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.Nahuel Grisolia. RFID Workshop.
Nahuel Grisolia. RFID Workshop.
 
Rfi dtechnology.doc
Rfi dtechnology.docRfi dtechnology.doc
Rfi dtechnology.doc
 
Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Secondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID IndustrySecondary Research Study Summary of RFID Industry
Secondary Research Study Summary of RFID Industry
 
RFID - Radio frequency identification Device
RFID - Radio frequency identification DeviceRFID - Radio frequency identification Device
RFID - Radio frequency identification Device
 
Rfid article
Rfid articleRfid article
Rfid article
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
Rfid montaser hamza iraq
Rfid montaser hamza iraqRfid montaser hamza iraq
Rfid montaser hamza iraq
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Rfid technology

  • 2.  History of RFID  Types & Systems  Current Uses  Future Applications  Controversies
  • 3.  A technology that employs a microchip with an antenna that broadcasts its unique identifier and location to receivers.  Employs a microchip called a smart tag, broadcasts unique 96-bit identifier to receiver.  Receiver relays the data to a computer.
  • 4.  Does not require human to manually pass item over scanner.  More accurate inventory count.  Can be incorporated into product, person, animal.  Can track each individual item.
  • 5.  1939  IFF Transponder  Used by allies in WWII  1945  Leon Theremin  Espionage tool for Soviet Union
  • 6.  1973  Claims U.S. patent was first true ancestor  1980  Retail  Use of RFID in tracking and access applications appeared  Price, color, date of purchase
  • 7.  Contains two main parts:  Silicon chips  Antennas  Components enable tags to receive and respond to radio frequencies queries from RFID transceivers.  Three types:  Passive  Semi-Passive  Active
  • 8.  Passive  Have no internal power supply  Electrical current inducted in antenna by the incoming signal proves power for integrated circuit in tag to power up and transmit response  Very Small, Limited Range, Unlimited Life  Semi Passive  Similar to passive tags, with the addition of a small battery  Battery powers the integrated circuit  Bigger, Longer Range, Limited Life  Active  Have their own internal power source  Many operate at fixed intervals  Also called beacons (broadcast own signal)  Large ( coin), Much larger memories, Longer range
  • 9.  Objects equipped with RFID tag  Tag contains transponder with digital memory chip.  Interrogator: an antenna packaged with transceiver and decoder.  emits signal activating tag.  Reader detects activation signal, decodes the data on the tag’s silicon chip.  Data passed to host computer.
  • 10.  “Line of Sight” Technology  RFID superior over Barcode  Elements and accidents can disturb or damage barcodes  Best Buy, Wal-Mart, And Target began implementation  Efficient in ability to track & respond accordingly
  • 11.  Wal-Mart now requires its suppliers to use RFID tags on shipping crates and pallets to improve inventory management in the supply chain.  Fed Ex bought RFID-enabled aircraft from Airbus to reduce maintenance time and costs.  Cattle and farm animals are being tagged to improve tracking and monitoring of health.
  • 12.  U.S. Department of Defense – to better track goods along supply chain (logistics and inventory).  Electronic payment – credit card companies moving to RFID-enabled cards to increase efficiency and reduce time at point-of-sale for customer, merchant, and card issuer.
  • 13.  Medical  Drug Counterfeiting  Tracking & Tracing  Medical “Passports”  Foster Care System  Food Chain Precautions  Shopping  Cashier-less check out and payment  Household Technology  Smart keys  Intelligent washing machines  Monitoring refrigerators  Intelligent ovens/microwaves
  • 14.  Privacy  Consumer Rights  Consumers should be informed if their products have an RFID tag.  Tracking of consumers (Profiling)  RFID chips withstand dirt and scratches and can be scanned from distances upward of 25 feet.  Personal Information Leakage.  Drawing the Line – Need for Legislation?  Who Should Regulate?
  • 15.  “Killing” of RFID Tags  Tracking vs. the washing machine  Options of killing after purchase  Medical  Implants/Personal Information  Verichip is a tiny implantable chip that holds medical records  Bracelets to track infants in medical wards and elderly in nursing homes.  Used in animals for tracking.
  • 16.  Medical  Health Risks  Hard to remove once implanted.  Long term effects unknown.  Religious  Mark of the Beast, etc.  The implanted RFID chip is certain to inflame Christian fundamentalists, some of whom believe that such chips are the Satanic “mark of the Beast” predicted in Revelations 13:16 “And he causeth all, both small and great, rich and poor, free and bond to receive a mark in their right hand, or in their foreheads.”
  • 17.  Slowly becoming an industry standard  Speeds up the supply chain process  Easier to manage inventory  Continually evolving  Controversial technology
  • 18.  Define RFID technology?  When was RFID introduced?  What are two main reasons RFID is controversial?  Name the three types of RFID tags?  How are they currently using RFID tags?  How is RFID Technology expected to effect households?