Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Page 1 54
1. CHAPTER 1 - INTRODUCTION
1.1 RADIO FREQUENCY IDENTIFICATION-AN OVERVIEW
RFID is only one of numerous technologies grouped under the term Automatic
Identification (Auto ID), such as bar code, magnetic inks, optical character recognition,
voice recognition, touch memory, smart cards, biometrics etc. Auto ID technologies are a
new way of controlling information and material flow, especially suitable for large
production networks.
In RFID systems, an item is tagged with a tiny silicon chip and an antenna; the chip
plus antenna together called a ―tag‖ can then be scanned by mobile or stationary readers,
using radio waves (the ―RF‖). The chip can be encoded with a unique identifier, allowing
tagged items to be individually identified by a reader (the ―ID‖). Thus, for example, in a
clothing store, each particular suit jacket, including its style, colour, and size, can be
identified electronically. In a pharmacy, a druggist can fill a prescription from a bottle
bearing an RFID-chipped label confirming the authenticity of its contents. On the highway,
cars with RFID tags on their windshields can move swiftly through highway tollbooths,
saving time and reducing traffic congestion. At home, pets can be implanted with chips so
that lost animals can be identified and returned to their owners more readily. In each case, a
reader must scan the tag for the data it contains and then send that information to a database,
which interprets the data stored on the tag. The tag, reader, and database are the key
components of an RFID system.
Radio-frequency identification (RFID) is the use of a wireless non-contact radio
system to transfer data from a tag attached to an object, for the purposes of automatic
identification and tracking. Some tags require no battery and are powered by the radio
waves used to read them. Others use a local power source. The tag contains electronically
stored information which can be read from up to several metres (yards) away. Unlike a bar
code, the tag does not need to be within line of sight of the reader and may be embedded in
the tracked object.
1
2. 1.2 PRIMARY COMPONENTS OF RFID DEVICES
RFID devices have three primary elements: a chip, an antenna, and a reader. A
fourth important part of any RFID system is the database where information about tagged
objects is stored.
1.2.1 THE CHIP, usually made of silicon, contains information about the item to which it
is attached. Chips used by retailers and manufacturers to identify consumer goods may
contain an Electronic Product Code (―EPC‖). The EPC is the RFID equivalent of the
familiar Universal Product Code (―UPC‖), or bar code, currently imprinted on many
products. Bar codes must be optically scanned, and contain only generic product
information. By contrast, EPC chips are encrypted with a unique product code that
identifies the individual product to which it is attached, and can be read using radio
frequency. These codes contain the type of data that product manufacturers and retailers
will use to track the authenticity and location of goods throughout the supply chain.
An RFID chip may also contain information other than an EPC, such as biometric
data (a digitized image of a fingerprint or photograph, for example). In addition, some chips
may not be loaded with information uniquely identifying the tagged object at all; so-called
―electronic article surveillance systems‖ (―EAS‖) may utilize 3 radio frequency
communication to combat shoplifting, but not to uniquely identify individual items.
Fig 1.1 – key ring tag
2
3. 1.2.2 THE ANTENNA attached to the chip is responsible for transmitting information
from the chip to the reader, using radio waves. Generally, the bigger the antenna, the longer
the read range. The chip and antenna combination is referred to as a transponder or, more
commonly, as a tag. Antennas are available in a variety of shapes and sizes; they can be
built into a door frame to receive tag data from persons or things passing through the door,
or mounted on an interstate tollbooth to monitor traffic passing by on a freeway. The
electromagnetic field produced by an antenna can be constantly present when multiple tags
are expected continually. If constant interrogation is not required, a sensor device can
activate the field.
Often the antenna is packaged with the transceiver and decoder to become a reader
which can be configured either as a handheld or a fixed-mount device. The reader emits
radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its
power output and the radio frequency used. When an RFID tag passes through the
electromagnetic zone, it detects the reader's activation signal. The reader decodes the data
encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host
computer for processing.
1.2.3 THE READER, or scanning device, also has its own antenna, which it uses to
communicate with the tag. Readers vary in size, weight, and power, and may be mobile or
stationary. Although anyone with access to the proper reader can scan an RFID tag, RFID
systems can employ authentication and encryption to prevent unauthorized reading of data.
―Reading‖ tags refers to the communication between the tag and reader via radio waves
operating at a certain frequency. In contrast to bar codes, one of RFID‘s principal
distinctions is tags and readers can communicate with each other without being in each
other‘s line-of-sight. Therefore, a reader can scan a tag without physically ―seeing‖ it.
Further, RFID readers can process multiple items at one time, resulting in a much-increased
(again as compared to UPC codes) ―speed of read.‖
1.2.4 THE DATABASE, or other back-end logistics system, stores information about
RFID-tagged objects. Access to both a reader and its corresponding database are necessary
before information stored on an RFID tag can be obtained and understood. In order to
3
4. interpret such data, RFID readers must be able to communicate with a database or other
computer program.
1.2.5 CONTROLLER, The controller is the interface between one or more antenna and the
device requesting information from or writing information to the RF tags. There are
controllers for interfacing antenna to PCs servers and networks. The selection of controller
and interface device will affect the antenna‘s transmission speed. Some controllers can be
programmed to perform data translation and interrogation. This transfers some of data
processing load from the devices to the controllers.
1.2.6 RADIO FREQUENCY, Communication between RFID tags and readers is also
affected by the radio frequency used, which determines the speed of communications as
well as the distance from which tags can be read. Higher frequency typically means longer
read range. Low-frequency (―LF‖) tags, which operate at less than 135 kilohertz (KHz), are
thus appropriate for short-range uses, like animal identification and anti-theft systems, such
as RFID-embedded automobile keys. Systems that operate at 13.56 megahertz (MHz) are
characterized as high frequency (―HF‖). Both low-frequency and high-frequency tags can
be passive. Scanners can read multiple HF tags at once and at a faster rate than LF tags. A
key use of HF tags is in contactless ―smart cards,‖ such as mass transit cards or building-
access badges.
The third frequency, Ultra-High Frequency (―UHF‖), is contemplated for widespread
use by some major retailers, who are working with their suppliers to apply UHF tags to
cases and pallets of goods. These tags, which operate at around 900 MHz, can be read at
longer distances, which outside the laboratory environment range between three and
possibly fifteen feet. However, UHF tags are more sensitive to environmental factors like
water, which absorb the tag‘s energy and thus block its ability to communicate with a
reader.
4
5. Table 1- different frequency bands
Frequency Typical RFID Characteristics Typical
band frequencies Applications
low 125 – 134 kHz Short to medium read Access control
30 – 300 KHz range Animal
Inexpensive identification
Low reading speed Inventory control
Car immobilizer
intermediate 13.56 MHz Short to medium read Access control
3 – 30 MHz range Smarts cards
Potentially inexpensive
Medium reading speed
high 433 MHz / 2.45 Long read range Railroad car
300MHz -3GHz GHz Expensive monitoring
Line of sight required Toll collection
High reading speed systems
Although all RFID systems have these essential components, other variables affect
the use or set of applications for which a particular tag is appropriate. As discussed further
below, key factors include whether the tag used is ―active‖ or ―passive‖; what radio
frequency is used; the size of the antennas attached to the chip and to the reader; what and
how much information can be stored on a tag; and whether the tag is ―read/write‖ or ―read-
only.‖ These factors affect the read ranges of the systems as well as the kind of object that
can usefully be tagged. They also impact the cost, which is an especially important
commercial consideration when tagging a large volume of items.
5
6. Fig 1.2 – radio wave frequency spectrum
There are three types of RFID tags, differentiated by how they communicate and how
that communication is initiated:
Passive tags have no onboard power source – meaning no battery – and do not initiate
communication. A reader must first query a passive tag, sending electromagnetic waves that
form a magnetic field when they ―couple‖ with the antenna on the RFID tag. Consistent
with any applicable authorization, authentication, and encryption, the tag will then respond
to the reader, sending via radio waves the data stored on it. Currently, depending on the size
of the antenna and the frequency, passive tags can be read, at least theoretically, from up to
thirty feet away. However, real-world environmental factors, such as wind and interference
from substances like water or metal, can reduce the actual read range for passive tags to ten
feet or less. Passive tags are already used for a wide array of applications, including
building-access cards, mass transit tickets, and, increasingly, tracking consumer products
through the supply chain.
6
7. Semi-passive tags, like passive tags, do not initiate communication with readers, but they
do have batteries. This onboard power is used to operate the circuitry on the chip, storing
information such as ambient temperature. Semi-passive tags can be combined, for example,
with sensors to create ―smart dust‖ – tiny wireless sensors that can monitor environmental
factors. A grocery chain might use smart dust to track energy use, or a vineyard to measure
incremental weather changes that could critically affect grapes.
Active tags can initiate communication and typically have onboard power. They can
communicate the longest distances – 100 or more feet. A familiar application of active tags
is for automatic toll payment systems.
7
8. Table 2- passive tag V/s active tag
PASSIVE RFID ACTIVE RFID
POWER SOURCE External(reader provided) Internal (battery)
TAG READABILITY Only within the area covered Can provide signals over an
by the reader, typically up to extended range, typically up
3 meters. to 100 meters..
ENERGIZATION A passive tag is energized An active tag is always
only when there is a reader energized.
present.
MAGNETIC High, since the tag draws Low, since the tag emits
FIELD STRENGTH power from the signals using internal battery
electromagnetic field source.
provided by the reader.
SHELF LIFE Very high, ideally does not Limited to about 5 years, the
expire over a life time. life of a battery.
DATA STORAGE Limited data storage, Can store larger amounts of
typically 128 bytes. data.
COST Cheap Expensive
SIZE Smaller Slightly bulky(due to
battery)
8
9. The tag type used depends on many factors:
• Distance between the tag and reader.
• Speed at which tags will pass the reader.
• Environmental obstructions between the tag and reader.
These factors define the requirements of the RFID system and hence the cost of
implementation and on-going support.
The data storage component of a tag typically supports one of the following read-
write capabilities; read-only, write once, or full read-write.
Read-only tags are loaded with data once, typically in the manufacturing process of the
RFID. In addition, this type of tag enables multiple read operations.
Write-once-read-many (WORM) chips enable the user to customize the chip with
information. Data can be loaded with a special write unit in the field that enables an entire
box of chips to be coded with the same data. These, however, are a one-time write operation
that requires a special RFID writing device.
Read-write tags allow repeated write and read operations to the tag. These are the most
expensive type of tags, but are also the most versatile.
.
9
10. CHAPTER 2 – HISTORY OF RFID
It is generally said that the roots of radio frequency identification technology can be
traced back to World War II. The Germans, Japanese, Americans and British were all using
radar—which had been discovered in 1935 by Scottish physicist Sir Robert Alexander
Watson-Watt—to warn of approaching planes while they were still miles away. The
problem was there was no way to identify which planes belonged to the enemy and which
were a country‘s own pilots returning from a mission. The Germans discovered that if pilots
rolled their planes as they returned to base, it would change the radio signal reflected back.
This crude method alerted the radar crew on the ground that these were German planes and
not allied aircraft (this is, essentially, the first passive RFID system).
An early published work exploring RFID is the landmark paper by Harry
Stockman, ―Communication by Means of Reflected Power‖. Stockman stated then that
―Evidently, considerable research and development work has to be done before the remain-
ing basic problems in reflected-power communication are solved, and before the field of
useful applications is explored.‖
Under Watson-Watt, who headed a secret project, the British developed the first
active identify, friend or foe (IFF) system. They put a transmitter on each British plane.
When it received signals from radar stations on the ground, it began broadcasting a signal
back that identified the aircraft as friendly. RFID works on this same basic concept. A
signal is sent to a transponder, which wakes up and either reflects back a signal (passive
system) or broadcasts a signal (active system).
The 1960s were the prelude to the RFID explosion of the 1970s. R.F. Harrington
studied the electromagnetic theory related to RFID in his papers including ―Theory of
Loaded Scatterers‖ in 1964. Inventors were busy with RFID-related inventions such as
Robert Richardson‘s ―Remotely activated radio frequency powered devices,‖ and J. H.
Vogelman‘s ―Passive data transmission techniques utilizing radar echoes.‖ Commercial
activities were beginning in the 1960s. Sensormatic and Checkpoint were founded in the
late 1960s. These companies, with others such as Knogo, developed electronic article
surveillance (EAS) equipment to counter the theft of merchandise. These types of systems
are often use 1-b tags; only the presence or absence of a tag could be detected, but the tags
10
11. could be made inexpensively and provided effective antitheft measures. These types of
systems used either microwave (generation of harmonics using a semiconductor) or
inductive (resonant circuits) technology. EAS is arguably the first and most widespread
commercial use of RFID. Tags containing multiple bits were generally experimental in
nature and were built with discrete components. While single-bit EAS tags were small,
multi bit tags were the size of a loaf of bread, constrained in size by the dictates of the
circuitry.
A decade of further development of RFID theory and applications followed,
including the use of RFID by the U.S. Department of Agriculture for tracking the movement
of cows. In the 1970‘s the very first commercial applications of the technology were
deployed, and in the 1980‘s commercial exploitation of RFID technology started to
increase, led initially by small companies.
In the 1970s developers, inventors, companies, academic institutions, and
government laboratories were actively working on RFID, and notable advances were being
realized at research laboratories and academic institutions such as Los Alamos Scientific
Laboratory, North-western University, and the Microwave Institute Foundation in Sweden.
An early and important development was the Los Alamos work that was presented by
Alfred Koelle, Steven Depp, and Robert Freyman, ―Short-Range Radio- Telemetry for
Electronic Identification Using Modulated Backscatter,‖ in 1975. This development
signalled the beginning of practical, completely passive tags with an operational range of
tens of meters. Large companies were also developing RFID technology, such as
Raytheon‘s Raytag in 1973 and Richard Klensch of RCA developing an electronic
identification system in 1975. Research efforts continued as well. R.J. King authored a book
about microwave homodyne techniques in 1978. This book is an early compendium of
theory and practice used in backscatter RFID systems.
Tag technology had improved with reductions in size and improvements in
functionality. The key to these advancements was the use of low-voltage, low power CMOS
logic circuits. Tag memory utilized switches or wire bonds and had improved with use of
fusible link diode arrays by the end of the decade. The 1980s became the decade for full
implementation of RFID technology, though interests developed somewhat differently in
various parts of the world.
11
12. The 1990s were a significant decade for RFID since it saw the wide scale
deployment of electronic toll collection in the United States and the installation of over 3
million RFID tags on rail cars in North America. Important deployments included several
innovations in electronic tolling. The world‘s first open highway electronic tolling system
opened in Oklahoma in 1991, where vehicles could pass toll collection points at highway
speeds, unimpeded by a toll plaza or barriers and with video cameras for enforcement. The
first combined toll collection and traffic management system was installed in the Houston
area by the Harris County Toll Road Authority in 1992.
In the 1990‘s, RFID became much more widely deployed. However, these
deployments were in vertical application areas, which resulted in a number of different
proprietary systems being developed by the different RFID solutions providers. Each of
these systems had slightly different characteristics (primarily relating to price and
performance) that made them suitable for different types of application. However, the
different systems were incompatible with each other – e.g. tags from one vendor would not
work with readers from another. This significantly limited adoption beyond the niche
vertical application areas – the interoperability needed for more widespread adoption could
not be achieved without a single standard interoperable specification for the operation of
RFID systems. Such standardisation was also needed to drive down costs.
The drive towards standardisation started in the late 1990‘s.There were a number of
standardisation efforts, but the two successful projects were:
➜ The ISO 18000 series of standards that essentially specify how an RFID system should
communicate information between readers and tags
➜ the Auto-ID Centre specifications on all aspects of operation of an RFID asset tracking
system, which has subsequently been passed onto EAN.UCC (the custodians of the
common barcode) for international standardisation
The pace of developments in RFID continues to accelerate. The future looks very
promising for this technology. The full potential also requires advancements in other areas
as well such as development of applications software; careful development of privacy
policies and consideration of other legal aspects; development of supporting infrastructure
to design, install, and maintain RFID systems; and other such activities now that RFID has
truly entered the mainstream. At first glance, the concept of RFID and its application seems
12
13. simple and straightforward. But in reality, the contrary is true. RFID is a technology that
spans systems engineering, software development, circuit theory, antenna theory, radio
propagation, microwave techniques, receiver design, integrated circuit design, encryption,
materials technology, mechanical design, and network engineering, to mention a few.
Increasing numbers of engineers are involved in the development and application of RFID,
and this trend will likely continue. At present, the shortage of technical and business people
trained in RFID is hampering the growth of the industry.
Fig 2.1 – history timeline of RFID
13
14. CHAPTER 3-
RADIO FREQUENCY IDENTIFICATION- HOW IT WORKS
RFID relies on radio frequency communication. The RFID reader emits energy, in
the form of a radio wave at a particular frequency, which is used to power and to
communicate with the RFID tags. As the radio waves propagate through the environment,
their energy gradually dissipates – so a tag that is beyond a certain distance from the RFID
reader will not be able to pick up enough signal to operate reliably. In other words, the
maximum operating distance between the RFID reader and a tag (also known as the range)
is limited. The exact range depends on a great many factors, including the radio frequency
being used for communication, the power emitted by the RFID reader, sources of radio
interference and objects in the environment that are likely to reflect or absorb radio waves.
A typical range for a passive RFID system will be anywhere between a few centimetres and
a few metres. If a battery is incorporated into the tag, the range is increased dramatically, to
many tens of metres or more.
Since the communication mechanism is based on radio wave propagation, a direct
‗line of sight‘ between the reader and the tag is not required. (Contrast this with barcode
systems where the reader must be able to ‗see‘ the barcode label.) This means that tagged
objects may be identified even if the tag or even the entire object is not in direct view of the
reader – for example they may be inside packaging or hidden behind other objects. Also,
most modern RFID systems can identify multiple tags in very quick succession (from tens
to hundreds per second). This means that many tagged objects can be read in effect
‗simultaneously‘ as they pass by an RFID reader, something that is not easily achievable
with other technologies such as barcodes. Although the relative orientation of the tag and
the reader does alter the operating range to some extent, it is often possible to set up an
RFID system so that this effect is not important – in other words, tagged objects may pass
by a reader with little constraint on their orientation or alignment, another big advantage
over many other identification technologies
A variety of radio frequencies and techniques are used in RFID systems. RFID is
generally characterized by use of simple devices on one end of the link and more complex
devices on the other end of the link. The simple devices (often called tags or transponders)
14
15. are small and inexpensive, can be deployed economically in very large numbers, are
attached to the objects to be managed, and operate automatically. The more complex
devices (often called readers, interrogators, beacons) are more capable and are usually
connected to a host computer or network. Radio frequencies from 100 kHz to 10 GHz have
been used.
The RFID tag includes a small RF transmitter and receiver. RFID tags contain at
least two parts: an integrated circuit for storing and processing information, modulating and
demodulating a radio-frequency (RF) signal, collecting DC power from the incident reader
signal, and other specialized functions; and an antenna for receiving and transmitting the
signal.
The tags are usually built using CMOS circuitry while other technologies can be
used such as surface acoustic wave (SAW) devices or tuned resonators. Tags can send data
to the reader by changing the loading of the tag antenna in a coded manner or by generating,
modulating, and transmitting a radio signal. A variety of modulation and coding techniques
have been used.
15
16. Fig 3.1- sequence of communication in RFID system
An Electronic Product Code (EPC) is one common type of data stored in a tag (The
Electronic Product Code (EPC) is designed as a universal identifier that provides a unique
identity for every physical object anywhere in the world, for all time). When written into the
tag by an RFID printer, the tag contains a 96-bit string of data. The first eight bits are a
header which identifies the version of the protocol. The next 28 bits identify the
organization that manages the data for this tag; the organization number is assigned by the
EPC Global consortium. The next 24 bits are an object class, identifying the kind of
product; the last 36 bits are a unique serial number for a particular tag. These last two fields
are set by the organization that issued the tag. Rather like a URL, the total electronic
product code number can be used as a key into a global database to uniquely identify a
particular product.
16
17. A typical RFID system can use the principle of modulated backscatter. This is the
same technique used in radar technology. The term backscatter refers to the portion of the
transmitted signal that is reflected back 180 degrees opposite the direction of the incident
signal, as opposed to random scattering that is lost in the space. In this type of RFID
system, to transfer data from the tag to the reader, the reader sends an unmodulated signal to
the tag. The tag reads its internal memory of stored data and changes the loading on the tag
antenna in a coded manner corresponding to the stored data. The signal reflected from the
tag is thus modulated with this coded information. This modulated signal is received by the
reader, demodulated using a homodyne receiver, and decoded and output as digital
information that contains the data stored in the tag. To send data from the reader to the tag,
the reader amplitude modulates its transmitted radio signal. This modulated signal is
received by the tag and detected with a diode. The data can be used to control operation of
the tag, or the tag can store the data. A simple diode detector allows the detection circuitry
in the tag to be simple and consume little power.
Fig 3.2 - Functional blocks for reading data from a backscatter RFID tag.
The reader is on the left, and the tag is on the right.
17
18. Fig 3.3- modulated wave
The above diagram provides a simplified modulated carrier signals from the RFID
tag. A 1 is represented with high carrier level, and a 0 is represented by a low carrier level
(tag coil shunted). The reader demodulates the signals to recover the data.
18
19. CHAPTER - 4
APPLICATION OF RFID
4.1 RFID AND COMMERCE
4.1.1 PAYMENT BY MOBILE PHONES - Since summer 2009, two credit card
companies have been working with Dallas, Texas-based Device Fidelity to develop
specialized microSD cards. When inserted into a mobile phone, the microSD card can be
both a passive tag and an RFID reader. After inserting the microSD, a user's phone can be
linked to bank accounts and used in mobile payment.
Dairy Queen in conjunction with Vivotech has also begun using RFIDs on mobile
phones as part of their new loyalty and rewards program. Patrons can ask to receive an
RFID tag to place on their phone. After activation, the phone can receive promotions and
coupons, which can be read by ViVOtech's specialized NFC devices.
Similarly, 7-Eleven has been working alongside MasterCard to promote a new
touch-free payment system. Those joining the trial are given a complimentary Nokia 3220
cell phone – after activation, it can be used as an RFID-capable MasterCard credit card at
any of 7-Eleven's worldwide chains.
Nokia's 2008 device, the 6212, has RFID capabilities also. Credit card information
can be stored, and bank accounts can be directly accessed using the enabled handset. The
phone, if used as a vector for mobile payment, has added security in that users would be
required to enter a pass code or PIN before payment is authorized.
4.1.2 ASSETS MANAGEMENT - RFID combined with mobile computing and Web
technologies provide a way for organizations to identify and manage their assets. It was
initially introduced to major retail by Craig Patterson, Knoxville, TN. Mobile computers,
with integrated RFID readers, can now deliver a complete set of tools that eliminate
paperwork, give proof of identification and attendance. This approach eliminates manual
data entry.
19
20. Web based management tools allow organizations to monitor their assets and make
management decisions from anywhere in the world. Web based applications now mean that
third parties, such as manufacturers and contractors can be granted access to update asset
data, including for example, inspection history and transfer documentation online ensuring
that the end user always has accurate, real-time data. Organizations are already using RFID
tags combined with a mobile asset management solution to record and monitor the location
of their assets, their current status, and whether they have been maintained.
RFID is being adopted for item-level retail uses. Aside from efficiency and product
availability gains, the system offers a superior form of electronic article surveillance (EAS),
and a superior self checkout process for consumers. The first commercial, public item-level
RFID retail system installation is believed to be in May 2005 by Freedom Shopping, Inc. in
North Carolina, USA.2009 witnessed the beginning of wide-scale asset tracking with
passive RFID. Wells Fargo and Bank of America made announcements that they would
track every item in their data centers using passive RFID. Most of the leading banks have
since followed suit. The Financial Services Technology Consortium (FSTC) set a technical
standard for tagging IT assets and other industries have used that standard as a guideline.
For instance the US State Department is now tagging IT assets with passive RFID using the
ISO/IEC 18000-6 standard.
4.1.3 INVENTORY SYSTEMS - An advanced automatic identification technology based
on RFID technology has significant value for inventory systems. The system can provide
accurate knowledge of the current inventory. In an academic study performed at Wal-Mart,
RFID reduced Out-of-Stocks by 30 percent for products selling between 0.1 and 15 units a
day. Other benefits of using RFID include the reduction of labor costs, the simplification of
business processes, and the reduction of inventory inaccuracies.
In 2004, Boeing integrated the use of RFID technology to help reduce maintenance
and inventory costs on the Boeing 787 Dream liner. With the high costs of aircraft parts,
RFID technology allowed Boeing to keep track of inventory despite the unique sizes, shapes
and environmental concerns. During the first six months after integration, the company was
able to save $29,000 in labour. In 2007, Recall Corporation integrated the use of RFID to
help organizations track and audit their records, to support compliance with regulations
such as the Sarbanes-Oxley Act and HIPAA.
20
21. 4.1.4 PRODUCT TRACKING - RFID use in product tracking applications begins with
plant-based production processes, and then extends into post-sales configuration
management policies for large buyers.
In 2005, the Wynn Casino, Las Vegas, began placing individual RFID tags on high
value chips. These tags allowed casinos the ability to detect counterfeit chips, track betting
habits of individual players, speed up chip tallies, and determine counting mistakes of
dealers. In 2010, the Bellagio casino was robbed of $1.5 million in chips. The RFID tags of
these chips were immediately invalidated, thus making the cash value of these chips $0.
RFID can also be used for supply chain management in the fashion industry. The
RFID label is attached at the garment at production, can be read/traced throughout the entire
supply chain and is removed at the point of sale (POS).
4.1.5 ACCESS CONTROL - High-frequency tags are widely used in identification badges,
replacing earlier magnetic stripe cards. These badges need only be held within a certain
distance of the reader to authenticate the holder. The American Express Blue credit card
now includes a High FID tag. In Feb 2008, Emirates Airline started a trial of RFID baggage
tracing at London and Dubai airports
4.1.6 PROMOTION TRACKING - To prevent retailers diverting products, manufacturers
are exploring the use of RFID tags on promoted merchandise so that they can track exactly
which product has sold through the supply chain at fully discounted prices.
4.1.7 ADVERTISING - When customers enter a dressing room, the mirror reflects their
image and also images of the apparel item being worn by celebrities on an interactive
display. A webcam also projects an image of the consumer wearing the item on the website
for everyone to see. This creates an interaction between the consumers inside the store and
their social network outside the store. The technology in this system is an RFID interrogator
antenna in the dressing room and Electronic Product Code RFID tags on the apparel item.
21
22. 4.2 RFID AND HEALTHCARE
RFID has made its way into almost all the day to day operations of a Healthcare facility.
4.2.1 PATIENT TRACKING - RFID is being used to track and authenticate patients,
from new born babies to seniors suffering from dementia and everything in between. The
technologies that are being used for patient tracking include almost all the RFID
technologies. LF and HF are used for applications such as bedside care and mother and
baby matching. UHF is being used to monitor patient movement and establish geo-fencing
as required. Active technology is a more robust form of movement and motion tracking.
4.2.2 MEDICATION AUTHENTICATION AND CONTROL - Bedside care has leap
forged the use of bar codes and embraced RFID to ensure the right medication is given to
the right patient. Nursing staff find RFID easier to work with than bar codes and realize the
additional privacy that RFID brings to the process. For example, when the nurse is away
from the computer on wheels (COW) administering medication to a patient the computer
can be programmed to go into screen save mode thus maintaining patient information
confidentiality. Bedside care RFID typically employs contact like HF technology. Nurses or
meds administrators can be virtually tethered to the COW using UHF technology.
4.2.3 WAIT TIME MONITORING - RFID technology is being deployed to monitor
patient wait times in real time. Reusable active technology let‘s an ER see exactly the
number of patients in the queue and length of wait time by patient.
4.3 RFID AND AUTOMOTIVE
Microwave RFID tags are used in long range access control for vehicles.
Since the 1990's RFID tags have been used in car keys. Without the correct RFID,
the car will not start.
22
23. In January 2003, Michelin began testing RFID transponders embedded into tires.
After an 18 month testing period, the manufacturer will offer RFID-enabled tires to
car makers. Their primary purpose is tire tracking in compliance with the United
States Transportation, Recall, Enhancement, Accountability and Documentation Act
(TREAD Act).
Starting with the 2004 model year, a Smart Key/Smart Start option became available
to the Toyota Prius. Since then, Toyota has been introducing the feature on various
models globally under both the Toyota and Lexus brands, including the Toyota
Avalon (2005 model year), Toyota Camry (2007 model year), and the Lexus GS
(2006 model year). The key uses an active RFID circuit allowing the car to detect
the key approximately 3 feet from the sensor. The driver can open the doors and
start the car with the key in a purse or pocket.
4.4 RFID IN INVENTORY SYSTEMS
An advanced automatic identification technology such as the Auto-ID system based
on the Radio Frequency Identification (RFID) technology has two values for
inventory systems. First, the visibility provided by this technology allows an
accurate knowledge on the inventory level by eliminating the discrepancy between
inventory record and physical inventory. Second, the RFID technology can prevent
or reduce the sources of errors. Benefits of using RFID include the reduction of
labor costs, the simplification of business processes and the reduction of inventory
inaccuracies.
4.5 IDENTIFICATION USING RFID
4.5.1 ANIMAL IDENTIFICATION - A microchip implant is an identifying
integrated circuit placed under the skin of a dog, cat, horse, parrot or other animals.
The chips are about the size of a large grain of rice and are based on a passive RFID
(Radio Frequency Identification) technology. Microchips have been particularly
23
24. useful in the return of lost pets. They can also assist where the ownership of an
animal is in dispute.
Animal shelters and animal control centers benefit using microchip
identification products by more quickly and efficiently returning pets to their
owners. When a pet can be quickly matched to its owner, the shelter avoids the
expense of housing, feeding, providing medical care, and out placing or euthanizing
the pet. Micro chipping is becoming standard at shelters: many require all out placed
animals to receive a microchip, and provide the service as part of the adoption
package. Animal-control officers are trained and equipped to scan animals.
Fig 4.1 – microchip implant in a sheep
In addition to shelters and veterinarians, microchips are used by kennels, breeders,
brokers, trainers, registries, rescue groups, humane societies, clinics, farms, stables, animal
clubs and associations, researchers, and pet stores. There are also microchip related
appliances such as pet doors which provide programmable controlled access to specific
animals.
Several countries require a microchip when importing an animal to prove that the
animal and the vaccination record match. Microchip tagging may also be required for
24
25. CITES-regulated international trade in certain rare animals: for example, Asian Arowana
are so tagged, in order to ensure that only captive-bred fish are imported.
4.5.2 HUMAN IMPLANTS- Implantable RFID chips designed for animal tagging are
now being used in humans. An early experiment with RFID implants was conducted by
British professor of cybernetics Kevin Warwick, who implanted a chip in his arm in 1998.
Night clubs in Barcelona, Spain and in Rotterdam, The Netherlands, use an implantable
chip to identify their VIP customers, who in turn use it to pay for drinks.
Prisoners to Be Tracked Using RFID
In order to ascertain the position of its staff and prisoners ACT's first prison would
be RFID equipped which would enable real time tracking of staff and prisoners. Now at this
prison, inmates would be fitted with an anklet or a bracelet having a unique identifier and
the security guard would be wearing pagers emitting a radio signal. This would enable pin
pointing of staff and prisoners through triangulation of signals that would be read by
numerous readers. A combination of active and passive tags would be used. This is not only
going to reduce the pressure on prison staff engaged in continuo‘s monitoring or watching
CCTVs but also discipline the prison inmates .Certainly it would not only relieve the
headache of the prison authorities but also caution the prisoners that if they entered into any
illegal activity within the prison premises it could land them into soup.
25
26. (a) Hand with the planned location
(b) Just after the operation to insert of the RFID chip
Fig 4.2 – microchip implant in a human
4.6 RFID AND RAILWAY INDUSTRY
Rail Transportation Systems face a complex set of economic and operational challenges
such as competitive freight pricing, maximizing asset utilization, competition with trucking,
controlling capital expenditure levels, industry consolidation and worker safety issues.
RFID technology applications help the rail transportation industry to improve revenue
growth by reducing costs through improved efficiencies in operations, maintenance, asset
utilization, and capacity management.
The RFID systems technology provides exact location and status of any individual
rail car this enables timely, accurate and integral information and decision assistance for the
26
27. management of train transportation and the customer. RFID provides end-to-end Railroad /
Transit application management services
A RFID Railway system is available in a number of configurations designed to
economically meet a full range of service requirements. Reader systems provide automated
tracking of railcars via RFID tags, and make railcar location information available to
railroads for asset management and other purposes.
Traffic and Passenger Information: The system provides accurate and reliable
information about where a train is located. This real-time information is forwarded
to IT systems and can be used to update the passenger information displays at
stations and terminals.
Operation and Maintenance: Precise information about the configuration of
wagons within a train can be provided automatically by the system. This information
can be integrated with other systems such as track inspection systems, so that the
recorded information can be automatically matched to the actual wagon, thus
eliminating errors.
Location of the Train: The System with the help of the reader determines the
location of the train by reading the tag identity as the train passes over the tag at
speed. This location data is transferred to the onboard system and can be used to
update passenger information automatically
Controlling and Positioning of Trains: Some onboard systems require a precise
position of the train, for example to control stopping positions. The reader accurately
reports the position when the train passes over an ID-tag.
4.7 RFID AND OIL / GAS INDUSTRIES
The oil and gas sector is under mounting pressure to improve operational and
financial results, while continuing to meet the expected demand for energy. Use of RFID
has a proven track record for many other verticals such as retail and access security. The use
of RFID in the Oil and Gas industry is showing some significant positive returns.
The use of RFID has crept into almost every sector of the oil and gas industry. RFID
is beginning to be used in exploration and production, throughout the crude supply network,
27
28. through the refining process, and is widely accepted in the transportation and distribution
network and is becoming commonplace in the retail side of the business.
RFID is being used to ensure that pipe work joints are properly assembled in the
crude supply chain. Although bar code has been and continues to be used for these
requirements, RFID is proving to be a more reliable way of ensuing the right parts and
torque pressures are being used during the assembly process. RFID tags can withstand harsh
conditions and remain operable long after bar codes would have been washed or worn
away.
Refineries are always looking for ways to ensure that their processes meet safety and
audit requirements. RFID can assist refinery operators to identify key inspection points and
provide the audit trail required to meet audit standards. Adherence to inspection protocols of
critical components such as valves, flanges and pressure settings can be improved using
RFID technology.
RFID is being used throughout the distribution network from managing trucks down
to the actual shipments. RFID is being used to track the movement of trucks to ensure
optimum utilization of expensive capital and labour. Key assets are being tagged and
tracked throughout the entire oil and gas distribution supply chain. RFID is also well suited
for tagging parts that have to be maintained to predetermined routines. May fleet operators
are turning to RFID to make sure such repairs and maintenance are done on schedule but
only when required or specified. RFID tagging is also used to monitor cleaning schedules of
tankers.
The oil and gas sector has a problem common to almost any other business – asset
tracking. The special challenge is that some assets are hard to tag and even harder to track
because of size and geography. Active RFID technology is being used to monitor and
manage inventories and fixed assets in almost any kind of environment.
28
29. 4.8 LIBRARIES
Libraries have used RFID to replace the barcodes on library items. The tag can
contain identifying information or may just be a key into a database. An RFID system may
replace or supplement bar codes and may offer another method of inventory management
and self-service checkout by patrons. It can also act as a security device, taking the place of
the more traditional electromagnetic security strip.
Fig 4.3 - RFID tags used in libraries: square book tag, round CD/DVD tag and rectangular
VHS tag.
It is estimated that over 30 million library items worldwide now contain RFID tags,
including some in the Vatican Library in Rome. Since RFID tags can be read through an
item, there is no need to open a book cover or DVD case to scan an item, and a stack of
books can be read simultaneously. Book tags can be read while books are in motion on a
conveyor belt, which reduces staff time. This can all be done by the borrowers themselves,
reducing the need for library staff assistance. With portable readers, inventories could be
done on a whole shelf of materials within seconds.
29
30. However, as of 2008 this technology remains too costly for many smaller libraries,
and the conversion period has been estimated at 11 months for an average-size library. A
2004 Dutch estimate was that a library which lends 100,000 books per year should plan on a
cost of €50,000 (borrow- and return-stations: 12,500 each, detection porches 10,000 each;
tags 0.36 each). RFID taking a large burden off staff could also mean that fewer staff will
be needed, resulting in some of them getting fired, but that has so far not happened in North
America where recent surveys have not returned a single library that cut staff because of
adding RFID. In fact, library budgets are being reduced for personnel and increased for
infrastructure, making it necessary for libraries to add automation to compensate for the
reduced staff size. Also, the tasks that RFID takes over are largely not the primary tasks of
librarians. A finding in the Netherlands is that borrowers are pleased with the fact that staff
is now more available for answering questions.
A concern surrounding RFID in libraries that has received considerable publicity is
the issue of privacy. Because some RFID tags can be read from up to 100 meters (330 ft),
there is some concern over whether sensitive information could be collected from an
unwilling source. However, library RFID tags do not contain any patron information, and
the tags used in the majority of libraries use a frequency only readable from approximately
10 feet (3.0 m).Further, another non-library agency could potentially record the RFID tags
of every person leaving the library without the library administrator's knowledge or consent.
One simple option is to let the book transmit a code that has meaning only in conjunction
with the library's database. Another step further is to give the book a new code every time it
is returned. And if in the future readers become ubiquitous (and possibly networked), then
stolen books could be traced even outside the library. Tag removal could be made difficult
if the tags are so small that they fit invisibly inside a (random) page, possibly put there by
the publisher.
4.9 MUSEUMS
RFID technologies are now also implemented in end-user applications in museums.
An example was the custom-designed temporary research application, "export," at the
Exploratorium, a science museum in San Francisco, California. A visitor entering the
museum received an RF Tag that could be carried as a card. The export system enabled the
30
31. visitor to receive information about specific exhibits. Aside from the exhibit information,
the visitor could take photographs of themselves at the exhibit. It was also intended to allow
the visitor to take data for later analysis. The collected information could be retrieved at
home from a "personalized" website keyed to the RFID tag.
4.10 SCHOOLS AND UNIVERSITIES
School authorities in the Japanese city of Osaka are now chipping children's
clothing, back packs, and student IDs in a primary school. A school in Don Caster, England
is piloting a monitoring system designed to keep tabs on pupils by tracking radio chips in
their uniforms.St Charles Sixth Form College in west London, England, started September,
2008, is using an RFID card system to check in and out of the main gate, to both track
attendance and prevent unauthorized entrance. Similarly, Whitcliffe Mount School in
Cleckheaton, England uses RFID to track pupils and staff in and out of the building via a
specially designed card. In the Philippines, some schools already use RFID in IDs for
borrowing books and also gates in those particular schools have RFID ID scanners for
buying items at a school shop and canteen, library and also to sign in and sign out for
student and teacher's attendance.
4.11 SPORTS
RFID for timing races began in the early 1990s with pigeon racing, introduced by
the company Deister Electronics in Germany. RFID can provide race start and end timings
for individuals in large races where it is impossible to get accurate stopwatch readings for
every entrant.
31
32. Fig 4.4 - Champion Chip
In the race, the racers wear tags that are read by antennae placed alongside the track
or on mats across the track. UHF tags provide accurate readings with specially designed
antennas. Rush error, lap count errors and accidents at start time are avoided since anyone
can start and finish any time without being in a batch mode. Passive and active RFID
systems are used in off-road events such as Orienteering, Enduro and Hare and Hounds
racing. Riders have a transponder on their person, normally on their arm. When they
complete a lap they swipe or touch the receiver which is connected to a computer and log
their lap time.
RFID is being adapted by many recruitment agencies which have a PET (Physical
Endurance Test) as their qualifying procedure especially in cases where the candidate
volumes may run into millions (Indian Railway Recruitment Cells, Police and Power
sector).
A number of ski resorts have adopted RFID tags to provide skiers hands-free access
to ski lifts. Skiers do not have to take their passes out of their pockets. Early on skiers were
forced to use systems that required nearly contact - bending over to touch the turn styles.
These systems were based on high frequency (HF) at 13.56 megahertz. While effective at
tracking the skiers they were difficult to use and expensive to deploy. However the bulk of
ski areas in Europe, from Verbier to Chamonix use these systems.
32
33. 4.12 TELEMETRY
Active RFID tags also have the potential to function as low-cost remote sensors that
broadcast telemetry back to a base station. Applications of algometry data could include
sensing of road conditions by implanted beacons, weather reports, and noise level
monitoring.
Passive RFID tags can also report sensor data. For example, the Wireless
Identification and Sensing Platform is a passive tag that reports temperature, acceleration
and capacitance to commercial Gen2 RFID readers.
It is possible that active or battery assisted passive (BAP) RFID tags, used with or in
place of barcodes, could broadcast a signal to an in-store receiver to determine whether the
RFID tag (product) is in the store.
4.13 E-PASSPORT
Fig 4.5 – electronic passport
33
34. The first RFID passports ("E-passport") were issued by Malaysia in 1998. In
addition to information also contained on the visual data page of the passport, Malaysian e-
passports record the travel history (time, date, and place) of entries and exits from the
country.
Other countries that insert RFID in passports include Norway (2005),Japan (March
1, 2006), most EU countries (around 2006) including Spain, Ireland and the UK, Australia,
Hong Kong and the United States (2007), Serbia (July 2008), Republic of Korea (August
2008), Taiwan (December 2008), Albania (January 2009), The Philippines (August 2009),
Republic of Macedonia (2010).
Standards for RFID passports are determined by the International Civil Aviation
Organization (ICAO), and are contained in ICAO Document 9303, Part 1, Volumes 1 and 2
(6th edition, 2006). ICAO refers to the ISO/IEC 14443 RFID chips in e-passports as
"contactless integrated circuits". ICAO standards provide for e-passports to be identifiable
by a standard e-passport logo on the front cover.
Since 2006, RFID tags included in new US passports will store the same
information that is printed within the passport and also include a digital picture of the
owner. The US State Department initially stated the chips could only be read from a
distance of 10 cm (4 in), but after widespread criticism and a clear demonstration that
special equipment can read the test passports from 10 meters (33 ft) away, the passports
were designed to incorporate a thin metal lining to make it more difficult for unauthorized
readers to "skim" information when the passport is closed. The department will also
implement Basic Access Control (BAC), which functions as a Personal Identification
Number (PIN) in the form of characters printed on the passport data page. Before a
passport's tag can be read, this PIN must be entered into an RFID reader. The BAC also
enables the encryption of any communication between the chip and interrogator.
34
35. 4.14 OTHER
Sensors such as seismic sensors may be read using RFID transceivers, greatly
simplifying remote data collection.
Some smart cards embedded with RFID chips are used as electronic cash, e.g. Smart
Trip in Washington, DC, USA, Easy Card in Taiwan, Suica in Japan, T-Money in
South Korea, Octopus Card in Hong Kong, and the Netherlands and Oyster Card on
the London Underground in the United Kingdom to pay fares in mass transit
systems and/or retails. The Chicago Transit Authority recently began using RFID
technology in their Chicago Card.
In August 2004, the Ohio Department of Rehabilitation and Correction (ODRH)
approved a $415,000 contract to evaluate the personnel tracking technology of
Alanco Technologies. Inmates will wear wristwatch-sized transmitters that can
detect attempted removal and alert prison computers. This project is not the first
rollout of tracking chips in US prisons. Facilities in Michigan, California and Illinois
already employ the technology.
Automatic timing at mass sports events ―Champion Chip ".
Used as storage for a video game system produced by Mattel, "Hyper scan".
RFID in, designed by Vita Craft, is an automatic cooking device that has three
different sized pans, a portable induction heater, and recipe cards. Each pan is
embedded with a RFID tag that monitors the food 16 times per second while a MI
tag in the handle of the pans transmits signals to the induction heater to adjust the
temperature.
35
36. Fig 4.6 – different application areas of RFID
36
37. CHAPTER - 5
ADVANTAGES AND DISADVANTAGES OF RFID
5.1 ADVANTAGES
a. No line of sight requirement.
b. The tag can stand a harsh environment.
c. Long read range. Larger area of coverage. Up to several feet.
d. Portable database
e. Multiple tag read/write.
f. Tracking people, items, and equipment in realtime. Non-line of sight identification
of tags
g. Unattended operations are possible, minimizing human errors and high cost.
h. Ability to identify moving elements that have tags embedded.
i. Can be used in diverse environments, including live stock, military, and scientific
areas.
j. RFID can be used in addition to Bar Code. These two technologies can be
complementing each other.
k. Automatic integration with back end software solutions provide end to end
integration of data in real time.
l. Labor reduction
m. Enhanced visibility and forecasting
n. Improved inventory management.
o. Simultaneous automatic reading.
37
38. 5.2 DISADVANTAGES
Bulkier, due to embedding of electronic components in the tag. However, with
advanced techniques, it is possible to reduce the size, and weight of the tags to a
large extent.
Prone to physical/electrical damage due to environmental conditions. For example,
tags that are subjected to space exploration may encounter extreme temperatures.
The tags required to be designed for a given application, and may be costly when
designed for use under extreme environmental conditions.
Dead areas and orientation problems - RFID works similar to the way a cell
phone or wireless network does. Just like these technologies, there may be certain
areas that have weaker signals or interference. In addition, poor read rates are
sometimes a problem when the tag is rotated into an orientation that does not align
well with the reader. These issues can usually be minimized by properly
implementing multiple readers and using tags with multiple axis antennas.
Security concerns - Because RFID is not a line of sight technology like bar coding,
new security problems could develop. For example, a competitor could set up a high
gain directional antenna to scan tags in trucks going to a warehouse. From the data
received, this competitor could determine flow rates of various products.
Additionally, when RFID is used for high security operations such as payment
methods, fraud is always a possibility.
Ghost tags - In rare cases, if multiple tags are read at the same time the reader will
sometimes read a tag that does not exist. Therefore, some type of read verification,
such as a CRC, should be implemented in either the tag, the reader or the data read
from the tag.
38
39. Proximity issues - Tags cannot be read well when placed on metal or liquid objects
or when these objects are between the reader and the tag. Nearly any object that is
between the reader and the tag reduces the distance the tag can be read from.
High cost - Because this technology is new, the components and tags are expensive
compared to barcodes. In addition, software and support personnel that are needed to
install and operate the RFID reading systems (in a warehouse for example) may be
more costly to employ.
Unread tags - When reading multiple tags at the same time, it is possible that some
tags will not be read and there is no sure method of determining this when the
objects are not in sight. This problem does not occur with barcodes, because when
the barcode is scanned, it is instantly verified when read by a beep from the scanner
and the data can then be entered manually if it does not scan.
Vulnerable to damage - Water, static discharge or high power magnetic surges
(such as from a close lightning strike) may damage the tags.
Global standardization - The frequencies used for RFID in the USA are currently
incompatible with those of Europe or Japan. Furthermore, no emerging standard has
yet become as universal as the barcode. To address international trade concerns, it is
necessary to use a tag that is operational within all of the international frequency
domains.
Data flooding - Not every successful reading of a tag (observation) represents data
useful for the purposes of the business. A large amount of data may be generated
that is not useful for managing inventory or other applications. For example, a
customer moving a product from one shelf to another, or a pallet load of articles that
39
40. passes several readers while being moved in a warehouse, are events that do not
produce data that is meaningful to an inventory control system.
Event filtering is required to reduce this data inflow to a meaningful
depiction of moving goods passing a threshold. Various concepts have been
designed, mainly offered as middleware performing the filtering from noisy and
redundant raw data to significant processed data.
40
41. Chapter - 6
FUTURE OF RFID
Almost everything that you buy from retailers has a UPC bar code printed on it.
These bar codes help manufacturers and retailers keep track of inventory. They also give
valuable information about the quantity of products being bought and, to some extent, the
consumers buying them. These codes serve as product fingerprints made of machine-
readable parallel bars that store binary code.
Created in the early 1970s to speed up the check out process, bar codes have a few
disadvantages:
In order to keep up with inventories, companies must scan each bar code on every box of a
particular product.
Going through the checkout line involves the same process of scanning each bar code on
each item.
Bar code is a read-only technology, meaning that it cannot send out any information.
RFID tags are an improvement over bar codes because the tags have read and write
capabilities. Data stored on RFID tags can be changed, updated and locked. Some stores
that have begun using RFID tags have found that the technology offers a better way to track
merchandise for stocking and marketing purposes. Through RFID tags, stores can see how
quickly the products leave the shelves and which shoppers are buying them.
RFID tags won't entirely replace bar codes in the near future -- far too many retail
outlets currently use UPC scanners in billions of transactions every year. But as time goes
on we'll definitely see more products tagged with RFIDs and an increased focus on
seamless wireless transactions like that rosy instant checkout picture painted in the
introduction. In fact, the world is already moving toward using RFID technology in
payments through special credit cards and smart phones.
In addition to retail merchandise, RFID tags have also been added to transportation
devices like highway toll pass cards and subway passes. Because of their ability to store
data so efficiently, RFID tags can tabulate the cost of tolls and fares and deduct the cost
41
42. electronically from the amount of money that the user places on the card. Rather than
waiting to pay a toll at a tollbooth or shelling out coins at a token counter, passengers use
RFID chip-embedded passes like debit cards.
Radio frequency identification (RFID), the technology of the future, has long
established itself in our everyday lives. It is already deployed in various areas ranging from
efficient inventory management and road toll collection through to timing the performance
of individual participants in mass sporting events. Given RFID‘s enormous potential it is
only right that it is on everyone‘s lips. RFID chips combine the physical world of a product
with the virtual world of digital data. The technology meets the needs of companies
cooperating in a closely knit value chain. RFID will soon be considered an indispensable
part of the chain. Inefficiencies in the value chain and efforts to shore up internal security
are driving demand for RFID. The retail trade is playing a decisive part in the broad-based
roll-out of RFID projects. RFID represents an all-encompassing structural business concept
that far transcends simply superseding the bar code. Speed of processing, reading error
frequency, data protection and privacy issues, progress in standardisation, and investment
costs are still challenges that will ultimately decide the potential of RFID. RFID projects
focussed on transparency, reliability or speed of processing are particularly successful.
RFID systems will rapidly continue to gain significance. This holds especially in areas
where they can be used to manage processes within the value chain.
Radio frequency identification (RFID) technology builds a bridge between the
physical world of a product and the virtual world of digital data.1 the technology thus meets
the demands of companies cooperating in a closely knit value chain and is being deployed
promisingly in all sectors of the economy. Elgar Fleisch in Zurich already has visions of
RFID emerging as ―the internet of things‖. He envisions a future in which objects will grow
together to form a global, omnipresent cognitive and nervous system for the real world.
Such grand visions have awakened public interest in RFID.
The idea of RFID is, however, not really brand new. Back in the Second World War
the predecessor of RFID helped the allied forces distinguish between friend and foe when
aircraft and ships approached. RFID is still deployed for military uses today. Beyond
military applications RFID is also in broad civilian use. As it is becoming part of everyday
life, the public takes particular notice of the involvement of the retail trade. More and more
products are being fitted with RFID tags.
42
43. 6.1 RFID IN INDIA
Department of Information Technology has its focus on the R&D areas of RFID and
providing RFID based techno solutions to the Indian industries. With this objective, the
ambitious "National RFID Program" project was initiated in April, 2007. The program is
being implemented jointly by IIT, Kanpur, C-DAC, Noida and SAMEER, Mumbai. The
major highlights of the project are software/hardware development, middleware integration
and development of end-to-end solutions. Research component is mainly undertaken by IIT
Kanpur, application development including deployment and support is provided by C-DAC,
Noida while SAMEER Mumbai is focused primarily on RFID antenna design and other RF
related issues. C-DAC and IIT, Kanpur will also undertake RFID related manpower
development programs.
Presently, C-DAC, Noida is in the final stages of developing and testing pilot project
of Parcel Tracking System for Department of Posts. The pilot will be implemented at select
Speed Post Centers in some cities. The software will be later integrated with the existing
Speed-Net software of Department of Posts and the system will be scaled up at other Speed
Post Centers.
SAMEER has provided technical support to CDAC in field trials in terms of RF
characterization/modifications. These include characterization of RFID System, providing
technical assistance in field trials, designing of Reader Antenna for Gen II Tags, Linear
Polarized Planar Antennas and Circular Polarized Antennas and developing RFID System
Using Zigbee Modules.
SIEMENS is currently developing printable plastic-based RFID chips, called
flexible polymer semiconductors. As an IT service provider, Siemens Information Systems
Limited (SISL) provides support in all stages of RFID deployment, from a single source
with certified specialists all over the world.
Benefits at a glance
Benefit analysis of this innovative technology, particularly for supplier and customer
relationships
Traceable ROI analysis and maximum transparency of investment costs
Quick and comprehensive analysis of all major supply chain processes both
internally and with our client‘s business partners
43
44. A clear idea about the strengths and weaknesses of our clioent‘s logistics processes
An RFID Starter Kit that includes a complete pilot solution at a fixed price to make
getting started easier
44
45. REFERENCES
1. http://en.wikipedia.org/wiki/Radio-frequency_identification
2. http://www.traser-project.eu/documents/RFID_MITIP2006.pdf
3. http://www.fibre2fashion.com/industry-article/11/1023/rfid-applications1.asp
4. http://mit.gov.in/content/radio-frequency-identification-rfid
5.http://www.siemens.co.in/en/about_us/index/our_business_segments/sisl_energy/sisl_ene
rgy/rfid.htm
6. http://forum.rficdesign.com/YaBB.pl?num=1236337012/2
7. http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=3
8. Security and Privacy in RFID Applications by Paweł Rotter
45
46. APPENDIX-A
BARCODE TECHNOLOGY
A barcode is a sequence of dark bars on a light background, or the equivalent of this
with the respect to the light-reflecting properties on the surface. The coding is contains in
the relative widths or spacing of the dark bars and light spaces. Perhaps the most familiar
barcode is the Universal Product Code (UPC) which appears on nearly all of the grocery
items in supermarket today.
A barcode scanner is an optical device that reads the code by scanning a focused
beam of light, generally a laser beam, across the bar code and detecting the variations in
reflected light. The scanner converts these light variations into electrical variations that are
subsequently digitized and fed into the decoding unit, which is programmed to convert the
relative widths of the digitized dark/ light spacing into numbers and/or letters.
The concept of barcode scanning for automatic identification purposes was first
proposed by N.J. Woodland and B. Silver in a patent application field in 1949. The barcode
scanners can be classified into two main categories. They are contact readers and non
contact readers. Contact readers: These devices are normally held in the hands. To read a
barcode this type of readers must either touch the code or come close to it. Non-contact
readers: These devices need not be close to the barcode to read the code. These scanners
use either a moving beam or a stationary beam, but mostly they have a moving laser light
beam. These scanners come in both handheld and fixed mount configurations.
In barcode scanning, depth of field is the distance along the laser beam, centered
around the focal point of the scanner, over which the barcode can be successfully scanned.
The depth of field of a barcode scanner is established by the beam diameter at the focal
point of the scanner, the wavelength of the laser light source, and the size of the minimum
bar width in the barcode being read. Holographic scanning disks used in barcode scanners
are frequently designed to be illuminated with a collimated beam incident normal to the
surface of the holographic disk. How does the barcode scanner read the image? Well, there
is a linear photodiode within the scanner head. This photodiode can read the reflected light
off the lines on the barcode. This reflection is a digital image that is then scanned
46
47. electronically within the devise. When the image is scanned electronically, each bar on the
barcode is converted to the corresponding number or letter.
Figure 1- Barcode technology
Linear bar codes are used in many applications where the use of a simple numeric or
alpha-numeric code can provide the key to a database of "products". The most obvious
limitation is the amount of data that can be stored in a linear bar code, though other
problems can exist with the substrate that the bar code is printed on providing insufficient
contrast or poor ink receptivity which can cause the quality of the bar code to be less than
ideal.
A.1 ADVANTAGE OF BARCODE TECHNOLOGY
1) Use of barcodes provides a fast, easy and accurate mechanism to enter data into a
computer system for data collection or data lookup.
2) Accelerates workflow efficiency and speed ups throughput process
47
48. 3) Eliminate data entry errors.
4) Achieve data accuracy in backend host application.
5) The barcode scanner interprets a unique identity of every product.
6) The occurrence of errors is almost zero.
7) The process is time and cost-effective.
8) Access to total production costs is possible.
9) There is a huge saving in the terms of labor effort.
10) Established quality standard.
11) Easy to use.
12) Mature and proven technology.
13) Affordable.
A.2 DISADVANTAGE OF BARCODE TECHNOLOGY
1) Optical line-of-sight scanning.
2) Limited visibility.
3) Incapable of item level tracking.
4) Labor intensive.
5) Susceptible to environment damage and prone to human error.
48
49. A.3 RFID TECHNOLOGY VERSUS BARCODE TECHNOLOGY
Table A – RFID V/s bar technology
Parameter Bar Code RFID
Frequencies used for tag Optical frequencies Radio frequencies
reading
Type of communication Line of sight communication Non-line of sight
communication
Data Volume Physical limitation exists. It is very Can carry relatively large
difficult to read a very long barcode. volume of data.
Range of data Very limited range, less than a feet or Can be read up to several
readability two. feet.
Cost Cheap Expensive, but likely to cost
less as more industries adopt
the technology.
Physical Size Large Small
Lifespan Unlimited Multi-year lifespan
Counterfeiting Bar Codes may easily be duplicated Tags are produced with a
and attached to products and are, unique identity code (UIC) or
therefore, easily counterfeited serial number from the
manufacturer. This is
embedded digitally on the
microchip and may not be
changed, therefore, making
them extremely resistant to
counterfeiting
49
50. Dynamic Updates Once a Bar Code is printed it remains Tags may be written to and
frozen. The Code and the process of offer on board memory to
attaching the BC is not supportive of retain information. This
real time updates. It is a labor feature may be used to store
intensive process to update any a product calibration history,
information on a BC once printed. preventive maintenance, etc.
Updates may be made within
the blink of an eye and
automatically without human
intervention.
Scanning Bar Code must be presented to the Offers a range from inches to
scanner in an orientation and distance hundreds of feet and does not
that is very limited. Individual require line of sight. This
reading requires that each box on a means that individual Tags
pallet be opened and the item pulled placed within a carton,
for presentation to the scanner. packed in a box and stored
on a pallet may be read. You
do not have to open each box
and present the individual
item.
Simultaneous Scanning Standards have algorithms to support Limited to one bar code at a
simultaneous reading of Tags at one time. Unable to support
time. simultaneous reads.
Reusable Yes No
50
51. APPENDIX-B
OTHER SCANNING TECHNOLOGIES
Besides barcode and RFID technology, there are few of scanner systems which is
used in several field.
B.1 EBT SCANNING TECHNOLOGY
Electron Beam Tomography (EBT) is the only imaging technology approved by the
FDA for the early detection of heart disease.
It uses a high-speed electron beam to scan the heart, non-invasively, for the presence
of calcium deposits. Calcium is a marker for plaque formation, also called atherosclerosis.
By measuring the amount of calcium present in and around your coronary arteries, it can
provide an accurate picture of how much plaque you have accumulated. That's important,
because the more plaque you have, the more likely you are to have a heart attack.
EBT captures images at 1/20th of a second – far faster than imaging technologies
such as CT or MRI. Speed is critically important, because your heart is in constant motion.
EBT is the only non-invasive technology that's fast enough to create a clear picture of
what's happening inside your arteries.
1. EBT is the only scanning technology approved by the FDA to image calcified
plaque.
2. Only EBT has the scientific validation of hundreds of research studies at major
institutions across the nation.
3. Ultrafast CT may expose you to up to ten times the amount of radiation you'd
receive from an EBT scan.
4. EBT is highly targeted on the heart tissue.
51
52. 5. EBT has proven to be extremely accurate.
6. EBT is repeatable
B.2 BIOMETRIC SCANNING SYSTEM
The main biometrics systems on the market work by scanning an individual's
fingerprints, hands, face, iris, retina, voice pattern, signature, or strokes on a keyboard.
According to Hogan, finger scanning accounts for 34 percent of biometric system sales,
followed by hand scanning with 26 percent, face scanning with 15 percent, voice scanning
and eye scanning with 11 percent each, and signature scanning with 3 percent. Retinal
scanning—which reads the blood vessels in the back of the eye and requires the user to be
within six inches of the scanning device—is the most accurate system but also the least
likely to enjoy widespread use because of people's natural protectiveness toward their eyes.
When you present your fingerprint or iris, the biometric reader creates a digitised
template which will be used to recognize you in the future. The template is stored, either in
a central system, or on your card. Biometric scanning is already used in many workplaces,
high-tech laptops, and on passports in some European countries. It is also being proposed
for the new Identity Cards which could soon be compulsory in the UK. Biometric scanners
are currently used to register asylum seekers and monitor travelers passing through major
airports.
One benefit of biometrics is that it relieves people from the burden of remembering
dozens of different passwords to company computer networks, e-mail systems, Web sites,
etc. In addition to creating distinct passwords for each system they use or Web site they
visit, people are expected to change their passwords frequently. Employees who have
trouble remembering their passwords may be more likely to keep a written list in a desk
drawer or posted on a bulletin board, thus creating a security risk. But biometrics offers an
easy solution to this problem.
A related problem with passwords is that they do not provide reliable security. In
fact, hackers can download password-cracking software for free on the Internet that will test
the most obvious combinations of characters for each user on a system and often find a way
52
53. in. Electronic retailers have found that their prospective customers are aware of the
unreliable nature of password-based security systems.
53
54. CONCLUSION
This report has described the fundamentals of operation of radio frequency
identification technology and the application areas in which such systems have traditionally
been used. As the sophistication of the technology increases, and the component costs drop,
there will clearly be an increasing number of application areas in which the technology is
cost-effective. Additionally, the standardisation of a number of aspects of RFID
implementation means that systems deployed in different industries and by different compa-
nies will be interoperable, which further increases the cost-effectiveness of RFID
deployment because the same infrastructure can be shared.
RFID technology is already replacing bar codes in niche applications. Pundits have
high hopes for this technology to be a universal replacement for the barcode. Just like
photocopiers that replaced carbon paper, RFID provides greater options and is rich with
value add possibilities. Since RFID uses digital electronics the cost is dropping dramatically
while benefits improve. As a result, RFID is creating new processes, markets and
opportunities
54