What is RFID ?
Components of RFID
RFID Tags & Readers
How does RFID work ?
Block Diagram
Applications of RFID
Security issues
Next-Generation RFID
Advantages
2. RFID ?
It allows an object or person to be identified at a distance,
using radio waves.
It energize and communicate with some form of tag or card.
An Automated Data Collection (ADC) technology.
It uses radio-frequency waves.
It transfers data between a reader and a movable item.
It can identify, categorize, tracking, etc.
It is fast & reliable
It does not require physical sight.
It can contact between reader/scanner and the tagged item.
3. RFID : Components
Transponder/Tag
Uniquely identifiable data item with RFID tag.
Antenna
Transmits Radio Frequency signals between Tag & RFID Reader.
Transceiver
Receives Radio Frequency signals from RFID devices, and reads &
passes data to the host for processing.
Contains a decoder to interpret the data.
5. RFID Tags : Types
Active
Transmits radio signal.
Battery powered memory, radio & circuitry.
High Read Range (300 feet).
Passive
Reflects radio signal from reader.
Reader powered.
Shorter Read Range (4 inches - 15 feet).
Self-active-tags
Built-in battery to power the Only when the reader read first tag.
6. RIFD Reader ?
A device used to gather information from an RFID tag.
Used to track individual objects.
Used to transfer data from the tag to a reader.
Transmit information to the microcontroller .
The information known as Electronics Product Code(EPC) .
7. RFID : Mechanism
It is referred to as Automatic Identification and Data Capture (AIDC).
Automatically identify objects, collect data about them.
Enter those data directly into computer systems with little or no human
intervention.
It utilizes radio waves to accomplish this.
RFID systems consist of three components:
RFID tag or smart label,
RFID reader,
Antenna.
RFID tags contain an integrated circuit and an antenna.
It is used to transmit data to the RFID reader or interrogator.
The reader then converts the radio waves to data.
Information collected from the tags.
It transferred through a communications interface to a host computer.
Here the data can be stored in a database and analyzed at a later time.
8. RFID : Mechanism
RFID
reader t
a
g
1243234909.23AE2F.345K4D055
Smart
antenna
antenna
Interface to host
computer (RS485,
RS232/422, ethernet,
802.11, etc)
1- The Reader
sends an
interrogation
command which
radiated by the
antennas
2- The tag responds
to the reader’s
command by
sending its tag
identifier
3- The reader
communicates the
ID read from tag to
the host computer.
ID: 01.43200B9.23AE1F.345C4D012
10. RFID : SECURITY SYSTEM
Allows only authorized people to enter a particular area.
Authorized people are provided with unique tags, to access the area.
Control by microcontroller or an Arduino.
In a microcontroller a RIFD module, a LCD module, buzzer motor, etc used.
11. Security Components
Microcontroller
This is the CPU of security system.
The various functions like reading digital i/p from reader, turn on buzzer for
invalid card, turn on the motor or relay perform if card is valid.
LCD
Used to display alphabets along with numbers on its screen.
Used to display the details of the card .
MOTOR
It is turned on to indicate the door opening based on valid card .
12. RFID : WORKING PRINCIPLE SECURITY
SYSTEM
The reader sends signal to the tag using an antenna.
The tag receives this information and resends this information along with the information in
its memory.
The reader receives this signal and transmits to the processor for further processing.
Micro
controller
LCD
Buzzer
RFID
Card
RFID
Reader
Motor
Driver
ICMotor
13. RFID : APPLICATION
Instructions based : Schools , colleges, and hospitals etc.
Communication based : Transportation , tracking of birds and animals.
Security based system.
Detect any defect in products etc.
Inventory based : Item management for retail, health care, etc.
Railway & car identification and tracking and Electronic toll collection
15. RFID : Versions
Gen 2 and UHF standards.
Faster read rates (up to 1500 tags / second).
Reduced level of interference with multiple tags.
Tags can be re-written multiple times.
Security – password protection, encryption, authentication.
Service Companies Impinj Inc., Qualcomm, Unilever, UPS, etc.
16. RFID : Advantages
No Physical Communication.
Fast read/write capability
Response in Real-time
Tag more authenticate than bar code
Distance not matter.
18. Updating Required
More secureness & restrictive.
To build new systems with new platform.
Support “Zombie” RFID tags.
New standardization such as UHF, Gen 2, etc.
Adapt learning experience.