SlideShare uma empresa Scribd logo
1 de 15
RFID APPLICATION
   Name: Ng Ho Nam
     ID:12210943
Future
Introduction                  Survey    Development
               Applications                             Conclusion
  of RFID                     Results       and
                                        opportunities
RFID


                    RFID = Radio Frequency Identification
Electronic labeling and wireless identification of objects using radio frequency
                        Tag carries with its information
                                 a serial number
                                 Model number
                        Color or any other imaginable data
 When these tags pass through a field generated by a compatible reader, they
 transmit this information back to the reader, thereby identifying the object
RFID COMPONENTS


 A basic RFID system consists of these components:
   A programmable RFID tag/inlay for storing item data;
           Consisting of an RFID chip for data storage
    an antenna to facilitate communication with the RFID chip
A reader/antenna system to interrogate the RFID inlay
   Application software and a host computer system
RFID TAG


 The RFID tag consists of an integrated circuit (IC) embedded in a thin film
                                 medium.
  Information stored in the memory of the RFID chip is transmitted by the
antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID
                                  reader
                                  3 types
                                  Passive
                                Semi-passive
                                   Active
TYPES OF RFID TAGS



       Active Tags           Semi-passive Tags              Passive Tags

• Use a battery          • Contain built-in           • Derive their power
• communicate over         batteries to power the       from the field
  distances of several     chip’s circuitry, resist     generated by the reader
  meters                   interference and           • without having an
                           circumvent a lack of         active transmitter to
                           power from the reader        transfer the
                           signal due to long           information stored
                           distance.
                         • They are different from
                           active tags in that they
                           only transmit data at
                           the time a response is
                           received
APPLICATIONS


Frequency           Appx. Read   Data Speed         Cost of   Application
                    Range                           Tags
Low Frequency       <5cm         Low                High      •   Animal Identification
(125kHz)
                    (passive)                                 •   Access Control
High Frequency      10 cm – 1m   Low to Moderate    Medium    •   Smart Cards
(13.56 Mhz)                                         to Low
                    (passive)                                 •   Payment (paywave)
Ultra High          3m -7m       Moderate to High   Low       •   Logistics and Supply Chain
Frequency (433,
                    (passive)                                 •   Baggage Tracking
868-928 Mhz)
Microwave (2.45 &   10m -15m     High               High      •   Electronic toll collection
5.8 Ghz)                                                          (Autotoll)
                    (passive)
                                                              •   Container Tracking
                    20m – 40m

                    (active)
CURRENT APPLICATIONS


Application Segment      Representative Applications                 Competitive Technologies                     Current Penetration   Typical Tag Type


Access Control           Doorway entry                               Other keyless entry technologies             High                  Passive


Asset Tracking           Locating tractors within a freight yard     None                                         Low                   Active



Asset Tagging            Tracking corporate computing systems        Bar Code                                     Low                   Passive




Authentication           Luxury goods counterfeit prevention         Holograms                                    Low                   Passive



Baggage Tracking         Positive bag matching                       Bar Code, Optical Character Recognition      Low                   Passive



POS Applications         SpeedPass                                   Credit Cards, Smart Cards, Wireless Phones   Medium                Passive



SCM (Container Level)    Tracking containers in shipping terminals   GPS-based Systems                            Low                   Active




SCM (Pallet Level)       Tracking palletized shipments               Bar Code                                     Minimal               Active, Passive



SCM (Item Level)         Identifying individual items                Bar Code                                     Minimal               Passive


Vehicle Identification   Electronic toll collection                  Bar Code, License plate, reader systems      Medium                Active, Passive



Vehicle Immobilizers     Automotive ignition systems                 Other theft prevention technologies          High                  Passive
Credit Cards with RFID   APPLICATIONS
  (Paywave function)




                                        Octopus (Smart Card)
APPLICATIONS



Autotoll (Electronic toll collection)




                                                       Access Control
ONLINE SURVEY


                   Target: SME
 Information: Opinion on RFID and its applications
                       Site:
http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
SURVEY RESULT


                 Types of industries that respondents think
                   it is possible to apply RFID technology
                         Document Management
                                  8%


            Inventory Control
                  10%
                                           Security            Customer Services
                                             8%                      5%



Library Management                                             Hotel Management
        21%                                            Other          5%
                                                       18%

                                                               Banking and Finance
                                                                       5%
     Pharmaceutic
     manufacturing
                                                               Social Services
      industries          Logistics and Supply Chain                 3%
         15%                     Management
                                     20%
FURTHER DEVELOPMENT


In medical uses and library management
VIDEO
CONCLUSION

                                  Positive
RFID is a contactless reading technology and can read through other materials
                     Hold more data than barcode does
                  RFID tags data can be changed or added
               More effective, bring lots of convenience to us
                                 Negative
             Cost is relatively remain high (compare to barcode)
            RFID signals may have problems with some materials
                  RFID standards are still being developed

Mais conteúdo relacionado

Mais procurados

12208175 pss7
12208175 pss712208175 pss7
12208175 pss7kyfan
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7yuti_3011
 
12208388 pps7
12208388 pps712208388 pps7
12208388 pps712208388
 
12205079‐pss7
12205079‐pss712205079‐pss7
12205079‐pss7kyuenrandi
 
12205958 pss7
12205958 pss712205958 pss7
12205958 pss7mwhang
 
12200581 pss7
12200581 pss712200581 pss7
12200581 pss7ducking94
 
12200581 pss7
12200581 pss712200581 pss7
12200581 pss7ducking94
 
12212016 pss7
12212016 pss712212016 pss7
12212016 pss712212016
 
12203866 pps7
12203866 pps712203866 pps7
12203866 pps7pandytam
 
12211044 pps7
12211044 pps712211044 pps7
12211044 pps7s192555
 
12250511 pss7
12250511 pss712250511 pss7
12250511 pss7mudi0920
 

Mais procurados (20)

12208175 pss7
12208175 pss712208175 pss7
12208175 pss7
 
12203505 pss7
12203505 pss712203505 pss7
12203505 pss7
 
12205451 pss7
12205451 pss712205451 pss7
12205451 pss7
 
12208388 pps7
12208388 pps712208388 pps7
12208388 pps7
 
12205079‐pss7
12205079‐pss712205079‐pss7
12205079‐pss7
 
12205958 pss7
12205958 pss712205958 pss7
12205958 pss7
 
12251135 pss7
12251135 pss712251135 pss7
12251135 pss7
 
12200581 pss7
12200581 pss712200581 pss7
12200581 pss7
 
Rfid applications
Rfid applicationsRfid applications
Rfid applications
 
12200581 pss7
12200581 pss712200581 pss7
12200581 pss7
 
Rfid application
Rfid applicationRfid application
Rfid application
 
12251496 pss7
12251496 pss712251496 pss7
12251496 pss7
 
12212016 pss7
12212016 pss712212016 pss7
12212016 pss7
 
12203866 pps7
12203866 pps712203866 pps7
12203866 pps7
 
12209783 pss7
12209783 pss712209783 pss7
12209783 pss7
 
Sample PPT
Sample PPTSample PPT
Sample PPT
 
12211044 pps7
12211044 pps712211044 pps7
12211044 pps7
 
12214116 pp7
12214116 pp712214116 pp7
12214116 pp7
 
12251011 pss7
12251011 pss712251011 pss7
12251011 pss7
 
12250511 pss7
12250511 pss712250511 pss7
12250511 pss7
 

Destaque

Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck finalScalar Decisions
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Decisions
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Decisions
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...patmisasi
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storagepatmisasi
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...centralohioissa
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT InfrastructureScalar Decisions
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsSpredfast
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck finalScalar Decisions
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Scalar Decisions
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overviewpatmisasi
 
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...Thomas Wendt
 

Destaque (20)

Reader's Circle
Reader's CircleReader's Circle
Reader's Circle
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging Brocade
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck final
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker Entertainment
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overview
 
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
 

Semelhante a 12210943 pss7

12208175 pss7
12208175 pss712208175 pss7
12208175 pss7kyfan
 
12201618 pss7
12201618 pss712201618 pss7
12201618 pss7s0123456
 
12209260_PSS7
12209260_PSS712209260_PSS7
12209260_PSS7kaman514
 
12200697 pss7
12200697 pss712200697 pss7
12200697 pss712200697
 
Sample pss7
Sample pss7Sample pss7
Sample pss7siusingw
 
12251151 pss7
12251151 pss712251151 pss7
12251151 pss7LINLING00
 
12213217 pss7
12213217 pss712213217 pss7
12213217 pss7irenechau
 
Sample pss7
Sample pss7Sample pss7
Sample pss712206210
 

Semelhante a 12210943 pss7 (13)

12208175 pss7
12208175 pss712208175 pss7
12208175 pss7
 
12201618 pss7
12201618 pss712201618 pss7
12201618 pss7
 
12209384 pss7
12209384 pss712209384 pss7
12209384 pss7
 
12206571 pss7
12206571 pss712206571 pss7
12206571 pss7
 
12209260_PSS7
12209260_PSS712209260_PSS7
12209260_PSS7
 
12200697 pss7
12200697 pss712200697 pss7
12200697 pss7
 
Sample pss7
Sample pss7Sample pss7
Sample pss7
 
12251151 pss7
12251151 pss712251151 pss7
12251151 pss7
 
12213217 pss7
12213217 pss712213217 pss7
12213217 pss7
 
Sample pss7
Sample pss7Sample pss7
Sample pss7
 
Rfid applications
Rfid applicationsRfid applications
Rfid applications
 
12207640 pss7
12207640 pss712207640 pss7
12207640 pss7
 
12204560 pss7
12204560 pss712204560 pss7
12204560 pss7
 

12210943 pss7

  • 1. RFID APPLICATION Name: Ng Ho Nam ID:12210943
  • 2. Future Introduction Survey Development Applications Conclusion of RFID Results and opportunities
  • 3. RFID RFID = Radio Frequency Identification Electronic labeling and wireless identification of objects using radio frequency Tag carries with its information a serial number Model number Color or any other imaginable data When these tags pass through a field generated by a compatible reader, they transmit this information back to the reader, thereby identifying the object
  • 4. RFID COMPONENTS A basic RFID system consists of these components: A programmable RFID tag/inlay for storing item data; Consisting of an RFID chip for data storage an antenna to facilitate communication with the RFID chip A reader/antenna system to interrogate the RFID inlay Application software and a host computer system
  • 5. RFID TAG The RFID tag consists of an integrated circuit (IC) embedded in a thin film medium. Information stored in the memory of the RFID chip is transmitted by the antenna circuit embedded in the RFID inlay via radio frequencies, to an RFID reader 3 types Passive Semi-passive Active
  • 6. TYPES OF RFID TAGS Active Tags Semi-passive Tags Passive Tags • Use a battery • Contain built-in • Derive their power • communicate over batteries to power the from the field distances of several chip’s circuitry, resist generated by the reader meters interference and • without having an circumvent a lack of active transmitter to power from the reader transfer the signal due to long information stored distance. • They are different from active tags in that they only transmit data at the time a response is received
  • 7. APPLICATIONS Frequency Appx. Read Data Speed Cost of Application Range Tags Low Frequency <5cm Low High • Animal Identification (125kHz) (passive) • Access Control High Frequency 10 cm – 1m Low to Moderate Medium • Smart Cards (13.56 Mhz) to Low (passive) • Payment (paywave) Ultra High 3m -7m Moderate to High Low • Logistics and Supply Chain Frequency (433, (passive) • Baggage Tracking 868-928 Mhz) Microwave (2.45 & 10m -15m High High • Electronic toll collection 5.8 Ghz) (Autotoll) (passive) • Container Tracking 20m – 40m (active)
  • 8. CURRENT APPLICATIONS Application Segment Representative Applications Competitive Technologies Current Penetration Typical Tag Type Access Control Doorway entry Other keyless entry technologies High Passive Asset Tracking Locating tractors within a freight yard None Low Active Asset Tagging Tracking corporate computing systems Bar Code Low Passive Authentication Luxury goods counterfeit prevention Holograms Low Passive Baggage Tracking Positive bag matching Bar Code, Optical Character Recognition Low Passive POS Applications SpeedPass Credit Cards, Smart Cards, Wireless Phones Medium Passive SCM (Container Level) Tracking containers in shipping terminals GPS-based Systems Low Active SCM (Pallet Level) Tracking palletized shipments Bar Code Minimal Active, Passive SCM (Item Level) Identifying individual items Bar Code Minimal Passive Vehicle Identification Electronic toll collection Bar Code, License plate, reader systems Medium Active, Passive Vehicle Immobilizers Automotive ignition systems Other theft prevention technologies High Passive
  • 9. Credit Cards with RFID APPLICATIONS (Paywave function) Octopus (Smart Card)
  • 10. APPLICATIONS Autotoll (Electronic toll collection) Access Control
  • 11. ONLINE SURVEY Target: SME Information: Opinion on RFID and its applications Site: http://qtrial.qualtrics.com/SE/?SID=SV_9N5UPRZuyuWtsk4
  • 12. SURVEY RESULT Types of industries that respondents think it is possible to apply RFID technology Document Management 8% Inventory Control 10% Security Customer Services 8% 5% Library Management Hotel Management 21% Other 5% 18% Banking and Finance 5% Pharmaceutic manufacturing Social Services industries Logistics and Supply Chain 3% 15% Management 20%
  • 13. FURTHER DEVELOPMENT In medical uses and library management
  • 14. VIDEO
  • 15. CONCLUSION Positive RFID is a contactless reading technology and can read through other materials Hold more data than barcode does RFID tags data can be changed or added More effective, bring lots of convenience to us Negative Cost is relatively remain high (compare to barcode) RFID signals may have problems with some materials RFID standards are still being developed