SlideShare a Scribd company logo
RFID & Its
Applications
MEMBERS
ALICE WANG(152323232)
BOB YEUNG(152333333)
Flow of presentation
introduction applications
Survey &
results
Video Conclusion
RFID
 RFID = Radio Frequency Identification
 Electronic labeling and wireless identification of objects using radio
frequency
 Tag carries with its information
 a serial number
 Model number
 Color or any other imaginable data
 When these tags pass through a field generated by a compatible
reader, they transmit this information back to the reader, thereby
identifying the object
RFID components
 A basic RFID system consists of these components:
 A programmable RFID tag/inlay for storing item data;
 Consisting of an RFID chip for data storage
 an antenna to facilitate communication with the RFID chip
 A reader/antenna system to interrogate the RFID inlay
 Application software and a host computer system
RFID Tag
 The RFID tag consists of an integrated circuit (IC) embedded in a
thin film medium.
 Information stored in the memory of the RFID chip is transmitted by
the antenna circuit embedded in the RFID inlay via radio
frequencies, to an RFID reader
 3 types
 Passive
 Semi-passive
 Active
Types of RFID Tags
Active Tags
• Use a battery
• communicate over
distances of several
meters
Semi-passive Tags
• Contain built-in
batteries to power the
chip’s circuitry, resist
interference and
circumvent a lack of
power from the
reader signal due to
long distance.
• They are different
from active tags in
that they only transmit
data at the time a
response is received
Passive Tags
• Derive their power
from the field
generated by the
reader
• without having an
active transmitter to
transfer the
information stored
Applications
Frequency Appx. Read Range Data Speed Cost of
Tags
Application
Low Frequency
(125kHz)
<5cm
(passive)
Low High • Animal Identification
• Access Control
High Frequency (13.56
Mhz)
10 cm – 1m
(passive)
Low to Moderate Medium
to Low
• Smart Cards
• Payment (paywave)
Ultra High Frequency
(433, 868-928 Mhz)
3m -7m
(passive)
Moderate to High Low • Logistics and Supply Chain
• Baggage Tracking
Microwave (2.45 & 5.8
Ghz)
10m -15m
(passive)
20m – 40m
(active)
High High • Electronic toll collection
(Autotoll)
• Container Tracking
Current Applications
Applications
Credit Cards with RFID
(Paywave function)
Octopus (Smart Card)
Applications
Autotoll (Electronic toll collection)
Access Control
Online Survey
 Target: SME
 Information: Opinion on RFID and its applications
 Site:
 http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
Survey Result
Logistics and Supply
Chain Management
20%
Pharmaceutic
manufacturing
industries
15%
Library Management
21%
Inventory
Control
10%
Document
Management
8%
Security
8%
Customer Services
5%
Hotel Management
5%
Banking and Finance
5%
Social Services
3%
Other
18%
Types of industries that respondents think
it is possible to apply RFID technology
Further Development
 In medical uses and library management
Video
Conclusion
 Positive
 RFID is a contactless reading technology and can read through
other materials
 Hold more data than barcode does
 RFID tags data can be changed or added
 More effective, bring lots of convenience to us
 Negative
 Cost is relatively remain high (compare to barcode)
 RFID signals may have problems with some materials
 RFID standards are still being developed

More Related Content

What's hot

RFID Application
RFID ApplicationRFID Application
RFID Application
benkalok
 
15223108 pss7
15223108 pss715223108 pss7
15223108 pss7
Jenna Chan
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
sarah ho
 
15250059 pss7-ans
15250059 pss7-ans 15250059 pss7-ans
15250059 pss7-ans
chengdonghuang
 
14221152 pss7-ans
14221152 pss7-ans14221152 pss7-ans
14221152 pss7-ans
chaahan724
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Jeanie Lo
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
15251705
 
17206081 pss5
17206081 pss517206081 pss5
17206081 pss5
chanszeyan17
 
14218232 pss7-ans
14218232 pss7-ans14218232 pss7-ans
14218232 pss7-ans
Man Yee Tai
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
liuyingxi971017
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
David Zhang
 
15217817 pss7-ans
15217817 pss7-ans15217817 pss7-ans
15217817 pss7-ans
veronica_lui
 
RFID Application
RFID ApplicationRFID Application
RFID Application
lee163
 
RFID & Its applications
 RFID & Its applications RFID & Its applications
RFID & Its applications
Group8
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15216535
 
15224198 pps7-ans
15224198 pps7-ans15224198 pps7-ans
15224198 pps7-ans
Tung Ko
 
RFID Application
RFID ApplicationRFID Application
RFID Application
lau_hkbu
 

What's hot (18)

RFID Application
RFID ApplicationRFID Application
RFID Application
 
15223108 pss7
15223108 pss715223108 pss7
15223108 pss7
 
RFID APPLICATION
RFID APPLICATIONRFID APPLICATION
RFID APPLICATION
 
15250059 pss7-ans
15250059 pss7-ans 15250059 pss7-ans
15250059 pss7-ans
 
14221152 pss7-ans
14221152 pss7-ans14221152 pss7-ans
14221152 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15251705 pss7-ans (1)
15251705 pss7-ans (1)15251705 pss7-ans (1)
15251705 pss7-ans (1)
 
17206081 pss5
17206081 pss517206081 pss5
17206081 pss5
 
14218232 pss7-ans
14218232 pss7-ans14218232 pss7-ans
14218232 pss7-ans
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
 
15251195 pss7-ans
15251195 pss7-ans15251195 pss7-ans
15251195 pss7-ans
 
15217817 pss7-ans
15217817 pss7-ans15217817 pss7-ans
15217817 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID & Its applications
 RFID & Its applications RFID & Its applications
RFID & Its applications
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15224198 pps7-ans
15224198 pps7-ans15224198 pps7-ans
15224198 pps7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 

Similar to RIFD Application

15216047 pss7-ans
15216047 pss7-ans15216047 pss7-ans
15216047 pss7-ans
Jaime Lee
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
christy LEE
 
15250059 pss7-ans
15250059 pss7-ans15250059 pss7-ans
15250059 pss7-ans
chengdonghuang
 
13207415 pss7
13207415 pss713207415 pss7
13207415 pss7kwuntanki
 
RFID Application
RFID ApplicationRFID Application
RFID Application
15250296
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
DavidCheng1996
 
RFID AND ITS APPLICATION
RFID AND ITS APPLICATIONRFID AND ITS APPLICATION
RFID AND ITS APPLICATION
keromandy
 
15225089 pss7-ans
15225089 pss7-ans15225089 pss7-ans
15225089 pss7-ans
whting
 
15251810 pss6
15251810 pss615251810 pss6
15251810 pss6
15251810
 
15251209 pss7.pptx
15251209 pss7.pptx15251209 pss7.pptx
15251209 pss7.pptx
羽鸿 张
 
15207854 pss7-ans
15207854 pss7-ans15207854 pss7-ans
15207854 pss7-ans
wongchihung123
 
RFID Application
RFID ApplicationRFID Application
RFID Application
Kayan To
 

Similar to RIFD Application (13)

15216047 pss7-ans
15216047 pss7-ans15216047 pss7-ans
15216047 pss7-ans
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
15250059 pss7-ans
15250059 pss7-ans15250059 pss7-ans
15250059 pss7-ans
 
13207415 pss7
13207415 pss713207415 pss7
13207415 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
RFID AND ITS APPLICATION
RFID AND ITS APPLICATIONRFID AND ITS APPLICATION
RFID AND ITS APPLICATION
 
15225089 pss7-ans
15225089 pss7-ans15225089 pss7-ans
15225089 pss7-ans
 
15251810 pss6
15251810 pss615251810 pss6
15251810 pss6
 
15251209 pss7.pptx
15251209 pss7.pptx15251209 pss7.pptx
15251209 pss7.pptx
 
15207854 pss7-ans
15207854 pss7-ans15207854 pss7-ans
15207854 pss7-ans
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

RIFD Application

  • 1. RFID & Its Applications MEMBERS ALICE WANG(152323232) BOB YEUNG(152333333)
  • 2. Flow of presentation introduction applications Survey & results Video Conclusion
  • 3. RFID  RFID = Radio Frequency Identification  Electronic labeling and wireless identification of objects using radio frequency  Tag carries with its information  a serial number  Model number  Color or any other imaginable data  When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID components  A basic RFID system consists of these components:  A programmable RFID tag/inlay for storing item data;  Consisting of an RFID chip for data storage  an antenna to facilitate communication with the RFID chip  A reader/antenna system to interrogate the RFID inlay  Application software and a host computer system
  • 5. RFID Tag  The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium.  Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader  3 types  Passive  Semi-passive  Active
  • 6. Types of RFID Tags Active Tags • Use a battery • communicate over distances of several meters Semi-passive Tags • Contain built-in batteries to power the chip’s circuitry, resist interference and circumvent a lack of power from the reader signal due to long distance. • They are different from active tags in that they only transmit data at the time a response is received Passive Tags • Derive their power from the field generated by the reader • without having an active transmitter to transfer the information stored
  • 7. Applications Frequency Appx. Read Range Data Speed Cost of Tags Application Low Frequency (125kHz) <5cm (passive) Low High • Animal Identification • Access Control High Frequency (13.56 Mhz) 10 cm – 1m (passive) Low to Moderate Medium to Low • Smart Cards • Payment (paywave) Ultra High Frequency (433, 868-928 Mhz) 3m -7m (passive) Moderate to High Low • Logistics and Supply Chain • Baggage Tracking Microwave (2.45 & 5.8 Ghz) 10m -15m (passive) 20m – 40m (active) High High • Electronic toll collection (Autotoll) • Container Tracking
  • 9. Applications Credit Cards with RFID (Paywave function) Octopus (Smart Card)
  • 10. Applications Autotoll (Electronic toll collection) Access Control
  • 11. Online Survey  Target: SME  Information: Opinion on RFID and its applications  Site:  http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 12. Survey Result Logistics and Supply Chain Management 20% Pharmaceutic manufacturing industries 15% Library Management 21% Inventory Control 10% Document Management 8% Security 8% Customer Services 5% Hotel Management 5% Banking and Finance 5% Social Services 3% Other 18% Types of industries that respondents think it is possible to apply RFID technology
  • 13. Further Development  In medical uses and library management
  • 14. Video
  • 15. Conclusion  Positive  RFID is a contactless reading technology and can read through other materials  Hold more data than barcode does  RFID tags data can be changed or added  More effective, bring lots of convenience to us  Negative  Cost is relatively remain high (compare to barcode)  RFID signals may have problems with some materials  RFID standards are still being developed