SlideShare a Scribd company logo
1 of 8
Download to read offline
Emerging Technologies Series (Volume 2.1.)
By Nora Boyle
5/25/2011
The RFID Solution
Radio Frequency I.D. is a low tech, high concept approach to ‘tagging’ objects
electronically. Dubbed ‘spy chips’ by some, there are tremendous business benefits for
speeding up travel, emergency services, and perhaps, tracking child predators – and
products.
Radio-frequency identification (RFID) is an automatic identification method, and is
capable of storing, remotely retrieving, and collecting data through the RFID tags or
transponder device. RFID uses a tag incorporated into a product, animal, or person to
identify, track, and locate the embedded person or thing using radio waves. The RFID
‘tags’ are read from remote locations. Radio-frequency identification comprises
interrogators sometimes referred to 'readers, and tags also referred to labels.
Range and Distance
The read range of a tag is limited to the distance from the reader over which the tag
can draw enough energy from the reader field to power the tag. Read distance then
becomes the signal-to-noise ratio of the signal reflected from the tag back to the
reader. Researchers at two security conferences have demonstrated that passive
Ultra-HighFID tags, not of the HighFID type used in US passports, normally read at
ranges of up to 30 feet, can be read at ranges of 50 to 69 feet using suitable
equipment.
Read range is both a function of the reader and the tag itself. Improvements in
technology may increase read ranges for tags. Having readers very close to the tags
makes short range tags readable. Tags may be read at longer ranges than they are
designed for by increasing reader power. Depending on the RFID transmitter and
reader improvements allow tags to be scanned and read from up to 350 feet or 100 m
as in Smart Label RFID's, and because RFID utilizes an assortment of frequencies,
there is some concern over whether sensitive information could be collected from an
unwilling source.
RFID tags contain at least two parts, an integrated circuit for information storage and
processing and modulating a radio-frequency (RF) signal, and the second is an
antenna for receiving and transmitting the signal.
Types of RFID tags
● Active RFID tags
equipped with a battery so as to electricity transmit signals autonomously,
● Passive RFID tags
which have no battery and require an external source to provoke signal
transmission,
● Battery Assisted Passive (BAP) tags require an external source to activate
have significant higher forward link capability providing great read range.
Emerging Technologies Series (Volume 2.1.)
By Nora Boyle
5/25/2011
Applications
RFID is now part of mobile computing and internet technologies, allowing companies
and organizations to identify and manage their assets.
Integrated RFID readers deliver a complete set of tools that eliminate paperwork,
prove identity and attendance, thus eliminating manual data entry. Web based
management tools can monitor assets from anywhere in the world with web
applications that allow third party access to that data in real time. Many
organizations use RFID tags combined with a mobile asset management solution to
record and monitor the location of their assets, the status, and/or the condition.
RFID is used in retail for product inventory and storage, and is a superior self
checkout process for consumers. Not only do RFID tags enhance Product tracking
methods, but begin with factory-based production through to post-sale. Companies
use RFID to track I.T. assets where previously they were been recorded by barcodes.
Current uses include animal management or an ear tag for herd management,
inventory, commuting cars, and for passports, and prison inmate tracking, even for
parolees.
Commuting
Already RFID tags are used for electronic toll collection in many states. The E-Z Pass,
an ETC system used on most tolled roads, bridges, and tunnels has provided
commuters a swift bypass of coin or man operated tolls. E-Z Pass is usually offered as
a debit account: tolls are deducted from prepayments made by the users. Most rental
cars come equipped with the transponder. The tags are read remotely as vehicles
pass through tollbooths, and information gleaned not only debits the toll amount but
the system records the date, time, and billing data for the vehicle. This eliminates the
need to identify the car by its license plate.
Passports
RFID tags are used in passports issued by many countries, including Malaysia, New
Zealand, Belgium, The Netherlands, Norway, Ireland, Japan, Pakistan, Germany,
Portugal, Poland, Spain, The United Kingdom, Australia, Korea, Serbia, and the United
States.
The first RFID passports or "E-passport" contained the visual data of the passport,
and recorded the travel history (time, date, and place) of entries and exits from the
country. Now, they include biometrics and a digital signature to ensure the
integrity of the passport. The currently standardized biometrics used for this type of
identification system are facial, fingerprint, and iris recognition. These were adopted
after assessment of several different kinds of biometrics including retinal scanning.
A digital signature or digital signature scheme is a type of cryptography where if
messages are sent through an insecure channel, a properly implemented digital
signature gives the receiver reason to believe the message was sent by the claimed
sender. Correctly monitored, digital signatures are more difficult to forge than the
handwritten type.
In 2006, RFID tags were included in new US passports. The chips store the same
information that is printed within the passport and also includes a digital picture of the
owner. The passport and chips can be read from a distance of 33 feet away and
Emerging Technologies Series (Volume 2.1.)
By Nora Boyle
5/25/2011
incorporate a thin metal lining to make it more difficult for unauthorized readers to
"skim" information when the passport is closed. The State Department has
implemented Basic Access Control (BAC), which functions as a Personal Identification
Number (PIN) in the form of characters printed on the passport data page. Before a
passport's tag can be read, this PIN must be entered into an RFID reader.
Baggage Claims
Hong Kong International Airport uses RFID sticker tags on all incoming baggage when
received, encoded with the destination and flight.
Military
The Iraqi army uses an RFID security card that contains a biometric picture of the
soldier. The picture in the chip must match the picture on the card and prevents
forgeries and theft.
The United States Department of Defense recently adopted RFID tagging for supply
chain management in 2007.
Employee Access
Many places that employ traditional swipe cards for entry are shifting to RFID
no-contact cards.
Poker
RFID tags are embedded into playing cards used for televised poker tournaments, so
commentators know exactly what cards have been dealt to whom, as soon as the
deal is complete. And, some casinos are embedding RFID tags into their chips. This
allows the casinos to track the locations of chips on the casino floor, identify
counterfeit chips, and prevent theft. There are some casinos that use RFID systems
to study the betting behavior of players.
Products
Superstores like Wal-Mart, Target, and others, have pushed for embedding electronic
product code (EPC) RFID tags into all their products. The Post Office is also
considering embedding RFID in postage stamps and packages to enable point to point
tracking.
Human identification
Micro-chipping pets have become commonplace, but micro-chipping humans?
After the success of various animal identification uses since the early '90's
RFID research has ventured into various human tracking alternatives. Some vendors
place them in clothing. A few examples of human RFID tags are:
Osaka, Japan - school authorities in have chipped children's clothing, back packs, and
student IDs in school.
England – The same student tagging it is being considered through a pilot program for
a monitoring system designed to keep tabs on pupils by tracking radio chips in their
uniforms.
Also in England, one school began using an RFID card system to check in and out of
Emerging Technologies Series (Volume 2.1.)
By Nora Boyle
5/25/2011
the main gate, to both track attendance and prevent unauthorized entrance.
The Philippines - some schools already use RFID in IDs for borrowing books and
equipped gates with RFID ID scanners for in-school stores, the cafeteria, and the
library, and both students and teachers must sign in for attendance.
And, there are home RFID systems to track the elderly or infirmed patients in case
they should wander off.
RFID chips designed for animal tagging are also implanted in humans, after an early
experiment by a British professor of cybernetics who implanted a chip in his arm in
1998. And in 2004, the Mexican Attorney General implanted its staff members with the
Verichip to control access to a secure data room.
Verichip is approved by the FDA as a human implant RFID. A person gets a tiny tag
implanted into his right arm and transmits a 16 digit number that links to a database
for identification, medical records, and tracking. According to the FDA, an RFID chip
implant poses potential medical risk from electrical hazards, MRI incompatibility,
adverse tissue reaction, and possible migration of the implanted transponder. And
security experts are not convinced that the risk of identity theft is foolproof.
Tracking prison inmates with RFID is underway in several states. The prisoners wear
wristwatch-sized transmitters that detect attempted removal and alerts prison
computers. Facilities in Ohio, Michigan, California, and Illinois employ the technology.
Ankle Monitor
The electronic ankle monitor sends either a radio frequency or a GPS signal to a
receiver if the offender moves out of range. The police are notified, and the offender
hopefully apprehended. This has been in use for those under house arrest, and as of
2007, approximately 130,000 units were used in the United States. With the advance
in cellular and broadband networks in the 1990s, the tracking device allows offenders
to roam about at a greater range.
Parolees
The implications for law enforcement are under review, as government budgets
tighten, prison populations’ overflow, and parolees are left unmonitored. Recent
events in child predator cases reveal paroled sex offenders were not adequately
supervised and committed crimes that had escalated from molestation and rape to
murder. Certain types of offenders might be eligible for electronic tagging to ascertain
their whereabouts, track their movements, and alert law enforcement should they
violate their parole. This human tracking comes under scrutiny from watchdogs of
privacy laws, but given the increased numbers of parolees, law enforcement and court
probation officers are overwhelmed.
Emerging Technologies Series (Volume 2.1.)
By Nora Boyle
5/25/2011
Privacy
The monitoring systems, including the ‘cuff’ or ankle monitor, allow parolees to hold
down jobs, stay within certain boundaries, and maintain curfews. There are also
devices that monitor blood alcohol levels, to prohibit drunk drivers from getting behind
the wheel. While most people laud these advances, there is a backlash. People fear
their privacy will be invaded up to the point where the government tracks everybody
and everything.
RFID is permeating society on many levels, from employee badges to each and every
product that people buy. It is on the clothing that they wear, but mostly, this is for
inventory and marketing purposes, for access, and not surveillance. Infringement upon
one’s civil liberties, however, is a plausible reality, should the system be abused. The
technology gives the government the ability to ‘electronically frisk’ citizens without
their knowledge or even their permission.
One security concern is the illicit tracking of RFID tags. Tags which are
world-readable pose a risk to both personal location privacy and corporate or military
security.
Will companies or groups attempt to use RFID for criminal or even political activities?
The negatives for RFID include conjecture by theorists and Hollywood alike. While
‘Speedpass,’ the Exxon/Mobil gas card allows the driver to bypass the cashier, the
RFID tag holds cryptographic information that according some use weak encryption
keys that can be hacked easily. This was discovered after Ford Motors implemented
its keyless car system using RFID where thieves could break the code and steal the
car anyway. And, American Express and Chase Corp. issued RFID enabled credit
cards, an innovative contactless pay system as a new feature in credit and debit
cards, only hackers managed to compromise these too.
Security experts have warned against using RFID for authenticating people due to the
risk of identity theft. Unless the tags were equipped with a sophisticated protocol,
someone could mug a person for their tag, and make it possible for an attacker to
steal their identity of a person in real-time. As with the Iraqi soldier’s tag, there are
methods of tagging, but due to the resource constraints of RFIDs it is virtually
impossible to protect against all attack models as this would require complex
distance-binding protocols.
In ‘Zeitgeist” (2007) a movie written and directed by Peter Joseph, proposed RFID
chips will one day be used to track the world population and keep them under control.
The world banking institutions combine and use RFID as a negative technology. This
theme is also the subject of research in both a book and a website called “Spychips,”
which says, “How major corporations and government plan to track your every
purchase and watch your every move.” They argue that consumer privacy is infringed
by RFID and have started a group, CASPIAN, Consumers Against Supermarket Privacy
Invasion and Numbering. They are against customer loyalty programs with cards
issued by large supermarkets to track their customers’ purchases and offer discounts.
Emerging Technologies Series (Volume 2.1.)
By Nora Boyle
5/25/2011
Standards
EPC Global, a joint venture between countries is working on international standards for
the use of mostly passive RFID and the Electronic Product Code (EPC) in the
identification of many items in the supply chain for companies worldwide. One of the
missions of EPC global was to simplify all the protocols.
These protocols, commonly known as Class 0 and Class 1, saw significant commercial
implementation in 2002–2005.
In 2004 the Hardware Action Group created a new protocol, the Class 1 Generation 2
interface, which addressed a number of problems that had been experienced with
Class 0 and Class 1 tags. The EPC Gen2 standard was approved in December 2004,
and is likely to form the backbone of passive RFID tag standards. The EPC Gen2
standard was adopted with minor modifications as ISO 18000-6C in 2006.
EPC Global Network, by design, is also susceptible to service malfunctions as it uses a
similar mechanism as Domain Name System (DNS) RFID is not immune to the same
infrastructure security weaknesses by computer hackers familiar with network
security.
Bar-coding
RFID tags are often a replacement for Universal Product Code or UPC or European
Article Number (EAN). They may not ever completely replace barcodes, due in part to
their higher cost and the advantage of multiple data sources on the same object. The
new Electronic Product Code (EPC) is widely
available at reasonable cost.
The track items requires huge amounts of
storage and filtering and categorizing RFID
data is needed to create functional retrievable
information, so there is a mixture of goods and
inventory tracking by both RFID and by bar
coding.
A unique identity is a mandatory requirement for
RFID tags, and each individual tag has a unique
code, while current bar codes are limited to a single type code for a particular
product. The uniqueness of RFID tags means that a product is tracked from its source
location to every location therein until it hits the consumer. This combats theft and
ensures quality control and loss prevention. Tracing the product from raw goods to
consumer is crucial in manufacturing shipping, and inventory. Unique RFID identifiers
along with serial numbers help companies trace defects, quality deficiencies, or any
recall notices. The end result is consumer profiling and there are significant concerns
and objection to this.
Emerging Technologies Series (Volume 2.1.)
By Nora Boyle
5/25/2011
Deciphering Barcodes
The first 3 digits of the barcode is the country code wherein the product was made.
All barcodes that start with 690,691,692 until 695 are made in The People’s Republic
of China, and 471 are made in Taiwan.
Barcodes
00 ~ 13 USA & CANADA 30 ~ 37 FRANCE
40 ~ 44 GERMANY 49 ~ JAPAN
50 ~ UK 57 ~ Denmark
64 ~ Finland 76 ~ Switzerland and
Liechtenstein
480 ~ Philippines 471 ~ Taiwan
629 ~ United Arab
Emirates
628 ~ Saudi Arabia
740 to 745 ~ Central America 690 to 695 ~ China PRC
Checkout
RFID, like barcodes, can be used at the point of sale (POS) store checkout to replace
the cashier. The automatic system replaces the barcode scanning now popular in
many grocery stores as previously, the high cost of tags and existing POS process
technologies prevented it.
History
The history of RFID began in 1946 when LĂŠon Theremin invented an espionage tool for
the Soviet Union which retransmitted incidental radio waves with audio information.
Sound waves vibrated a diaphragm which slightly altered the shape of the resonator,
and modulated the reflected radio frequency. He invented the infamous BUG. And,
even though this was a passive covert listening device, not an identification tag, it
spawned RFID technology.
The Future
Innovation and research is expansive and ongoing in the RFID field and here are a few
indications of things to come:
● Potential alternatives to the radio frequencies used are seen in optical RFID or
OPID at 333 Hertz, 380 THz, 750 THz.
● The antennas of RFID may be replaced with photovoltaic components and
Infrared or LEDs on the integrated circuit (ICs).
● Low-frequency (Low FID) tags and high-frequency (HighFID) tags can be used
globally without a license.
● Ultra-high-frequency (UHFID) tags cannot be used globally as there is no
single global standard.
● Bandwidths are licensed and there are complex band restrictions globally
● Readers are required to monitor a channel before transmitting ("Listen Before
Talk"); this requirement has led to some restrictions on performance with no
current resolution
● Cryptographic protocols will achieve privacy against unauthorized readers
Summary
Emerging Technologies Series (Volume 2.1.)
By Nora Boyle
5/25/2011
RFID is deeply entwined with many emerging technologies and is here to stay. Its
potential for useful applications far outweighs the privacy concerns of many, although
regulations and vigilance can prevent unnecessary infringement upon personal
freedoms. As RFID as used as a consumer tool will certainly undergo further scrutiny
of practices by companies in retrieving personal data on the buyer.
As a security measure, the ramifications for monitoring inmates and offenders are
important to securing liberty for law abiding citizens. As budget crises continue to
plague state and local governments, and prisons overflow with a burgeoning inmate
population, this electronic form of social control may be the last frontier in humane
treatment.

More Related Content

What's hot

Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFIDOmer Almas
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) Chetan Pandey
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentationashish pal
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
No Barcodes? No Problem!
No Barcodes? No Problem!No Barcodes? No Problem!
No Barcodes? No Problem!Barcoding, Inc.
 
RFID
RFIDRFID
RFIDdont
 
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...Manos Theocharopoulos
 
Rfid Tags India
Rfid Tags IndiaRfid Tags India
Rfid Tags IndiaEcartesTech1
 
RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDRFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDFaisal Razzak
 
Rfid technology
Rfid technologyRfid technology
Rfid technologyhkpeterpeter
 
RFID:A pragmatic approach
RFID:A pragmatic approachRFID:A pragmatic approach
RFID:A pragmatic approachZetes srl
 
Symonds
SymondsSymonds
Symondsjsymonds
 

What's hot (20)

Introduction to RFID
Introduction to RFIDIntroduction to RFID
Introduction to RFID
 
RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification) RFID (Radio Frequency Identification)
RFID (Radio Frequency Identification)
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Rfid
RfidRfid
Rfid
 
No Barcodes? No Problem!
No Barcodes? No Problem!No Barcodes? No Problem!
No Barcodes? No Problem!
 
RFID and Barcode
RFID and BarcodeRFID and Barcode
RFID and Barcode
 
RFID
RFIDRFID
RFID
 
RFID
RFIDRFID
RFID
 
RFID AND LIBRARIES
RFID AND LIBRARIESRFID AND LIBRARIES
RFID AND LIBRARIES
 
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
The Economics, Practical Applications and Constraints in Enterprise-Wide RFID...
 
Rfid Tags India
Rfid Tags IndiaRfid Tags India
Rfid Tags India
 
RFID
RFIDRFID
RFID
 
RFID
RFID RFID
RFID
 
RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFIDRFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFID
 
Rfid 05
Rfid 05Rfid 05
Rfid 05
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID:A pragmatic approach
RFID:A pragmatic approachRFID:A pragmatic approach
RFID:A pragmatic approach
 
Symonds
SymondsSymonds
Symonds
 

Viewers also liked

Viewers also liked (8)

Shashank Sharma Resume
Shashank Sharma Resume Shashank Sharma Resume
Shashank Sharma Resume
 
Career+dot+com
Career+dot+comCareer+dot+com
Career+dot+com
 
Anatomía de las vías aéreas
Anatomía de las vías aéreasAnatomía de las vías aéreas
Anatomía de las vías aéreas
 
Rodrigo gomez galindez_actividad1_2_mapac
Rodrigo gomez galindez_actividad1_2_mapacRodrigo gomez galindez_actividad1_2_mapac
Rodrigo gomez galindez_actividad1_2_mapac
 
What is RFID and Barcode
What is RFID and BarcodeWhat is RFID and Barcode
What is RFID and Barcode
 
Vb.Net
Vb.NetVb.Net
Vb.Net
 
Lesson plan presentation
Lesson plan presentationLesson plan presentation
Lesson plan presentation
 
BPM and BizFlow
BPM and BizFlowBPM and BizFlow
BPM and BizFlow
 

Similar to Rfi dtechnology.doc

Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Onyebuchi nosiri
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Liz Sims
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identificationRavi Teja
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisSMO Clicks
 
RFID - Radio frequency identification Device
RFID - Radio frequency identification DeviceRFID - Radio frequency identification Device
RFID - Radio frequency identification Devicefaisalkhan786
 
Input and output devices 2015
Input  and output devices 2015Input  and output devices 2015
Input and output devices 2015angelavalmont
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Diana Oliva
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Editor IJARCET
 
Sagar kaknale e2 20
Sagar kaknale e2 20Sagar kaknale e2 20
Sagar kaknale e2 20Sagar Kaknale
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxKondiVinay
 
Decribe RFID technology as much as you can. Do not use Google. 23 p.pdf
Decribe RFID technology as much as you can. Do not use Google. 23 p.pdfDecribe RFID technology as much as you can. Do not use Google. 23 p.pdf
Decribe RFID technology as much as you can. Do not use Google. 23 p.pdfalareej1989
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxnettletondevon
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSBino Mathew Varghese
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technologyAbdullah Khosa
 
Radio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfRadio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfarchiesgallery
 
It in the news group 7 mfr audio added
It in the news group 7   mfr audio addedIt in the news group 7   mfr audio added
It in the news group 7 mfr audio addedsigep176
 
RFID security ppt
RFID security pptRFID security ppt
RFID security pptSandeep Singh
 

Similar to Rfi dtechnology.doc (20)

Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
Automatic Door Unit Radio Frequency Identification (RFID) Based Attendance Sy...
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
Rfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | IdentisRfid Tag Manufacturer | Identis
Rfid Tag Manufacturer | Identis
 
RFID
RFIDRFID
RFID
 
RFID - Radio frequency identification Device
RFID - Radio frequency identification DeviceRFID - Radio frequency identification Device
RFID - Radio frequency identification Device
 
Input and output devices 2015
Input  and output devices 2015Input  and output devices 2015
Input and output devices 2015
 
Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...Identification Of An Object, Animal Or A Person With The...
Identification Of An Object, Animal Or A Person With The...
 
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
 
Sagar kaknale e2 20
Sagar kaknale e2 20Sagar kaknale e2 20
Sagar kaknale e2 20
 
Radio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptxRadio-Frequency IDentification ppt.pptx
Radio-Frequency IDentification ppt.pptx
 
Decribe RFID technology as much as you can. Do not use Google. 23 p.pdf
Decribe RFID technology as much as you can. Do not use Google. 23 p.pdfDecribe RFID technology as much as you can. Do not use Google. 23 p.pdf
Decribe RFID technology as much as you can. Do not use Google. 23 p.pdf
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
 
RFID with INTERNET OF THINGS
RFID with INTERNET OF THINGSRFID with INTERNET OF THINGS
RFID with INTERNET OF THINGS
 
RFId (radio frequency identification) technology
RFId (radio frequency identification) technologyRFId (radio frequency identification) technology
RFId (radio frequency identification) technology
 
Radio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdfRadio-frequency identification (RFID) uses electronic tags and label.pdf
Radio-frequency identification (RFID) uses electronic tags and label.pdf
 
It in the news group 7 mfr audio added
It in the news group 7   mfr audio addedIt in the news group 7   mfr audio added
It in the news group 7 mfr audio added
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
Marketing and sales paper
Marketing and sales paperMarketing and sales paper
Marketing and sales paper
 

More from Artechno7

Vm network hld iad ord 1.2
Vm network hld iad ord 1.2Vm network hld iad ord 1.2
Vm network hld iad ord 1.2Artechno7
 
233477 a
233477 a233477 a
233477 aArtechno7
 
Desk+to+desk
Desk+to+deskDesk+to+desk
Desk+to+deskArtechno7
 
Digital literature.1
Digital literature.1Digital literature.1
Digital literature.1Artechno7
 
Emerging technologiesatt.doc
Emerging technologiesatt.docEmerging technologiesatt.doc
Emerging technologiesatt.docArtechno7
 
Look future wireless_communications_beyond3_g
Look future wireless_communications_beyond3_gLook future wireless_communications_beyond3_g
Look future wireless_communications_beyond3_gArtechno7
 
The sorcerer's guide to power v.1
The sorcerer's guide to power v.1The sorcerer's guide to power v.1
The sorcerer's guide to power v.1Artechno7
 
Wgi0973300 scriptmasterpj2011
Wgi0973300 scriptmasterpj2011Wgi0973300 scriptmasterpj2011
Wgi0973300 scriptmasterpj2011Artechno7
 
Geezer master july
Geezer master julyGeezer master july
Geezer master julyArtechno7
 
Job shark-quick-start-guide-for-the-unemployed
Job shark-quick-start-guide-for-the-unemployedJob shark-quick-start-guide-for-the-unemployed
Job shark-quick-start-guide-for-the-unemployedArtechno7
 
Slideshare gfx
Slideshare gfxSlideshare gfx
Slideshare gfxArtechno7
 

More from Artechno7 (11)

Vm network hld iad ord 1.2
Vm network hld iad ord 1.2Vm network hld iad ord 1.2
Vm network hld iad ord 1.2
 
233477 a
233477 a233477 a
233477 a
 
Desk+to+desk
Desk+to+deskDesk+to+desk
Desk+to+desk
 
Digital literature.1
Digital literature.1Digital literature.1
Digital literature.1
 
Emerging technologiesatt.doc
Emerging technologiesatt.docEmerging technologiesatt.doc
Emerging technologiesatt.doc
 
Look future wireless_communications_beyond3_g
Look future wireless_communications_beyond3_gLook future wireless_communications_beyond3_g
Look future wireless_communications_beyond3_g
 
The sorcerer's guide to power v.1
The sorcerer's guide to power v.1The sorcerer's guide to power v.1
The sorcerer's guide to power v.1
 
Wgi0973300 scriptmasterpj2011
Wgi0973300 scriptmasterpj2011Wgi0973300 scriptmasterpj2011
Wgi0973300 scriptmasterpj2011
 
Geezer master july
Geezer master julyGeezer master july
Geezer master july
 
Job shark-quick-start-guide-for-the-unemployed
Job shark-quick-start-guide-for-the-unemployedJob shark-quick-start-guide-for-the-unemployed
Job shark-quick-start-guide-for-the-unemployed
 
Slideshare gfx
Slideshare gfxSlideshare gfx
Slideshare gfx
 

Recently uploaded

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 

Recently uploaded (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 

Rfi dtechnology.doc

  • 1. Emerging Technologies Series (Volume 2.1.) By Nora Boyle 5/25/2011 The RFID Solution Radio Frequency I.D. is a low tech, high concept approach to ‘tagging’ objects electronically. Dubbed ‘spy chips’ by some, there are tremendous business benefits for speeding up travel, emergency services, and perhaps, tracking child predators – and products. Radio-frequency identification (RFID) is an automatic identification method, and is capable of storing, remotely retrieving, and collecting data through the RFID tags or transponder device. RFID uses a tag incorporated into a product, animal, or person to identify, track, and locate the embedded person or thing using radio waves. The RFID ‘tags’ are read from remote locations. Radio-frequency identification comprises interrogators sometimes referred to 'readers, and tags also referred to labels. Range and Distance The read range of a tag is limited to the distance from the reader over which the tag can draw enough energy from the reader field to power the tag. Read distance then becomes the signal-to-noise ratio of the signal reflected from the tag back to the reader. Researchers at two security conferences have demonstrated that passive Ultra-HighFID tags, not of the HighFID type used in US passports, normally read at ranges of up to 30 feet, can be read at ranges of 50 to 69 feet using suitable equipment. Read range is both a function of the reader and the tag itself. Improvements in technology may increase read ranges for tags. Having readers very close to the tags makes short range tags readable. Tags may be read at longer ranges than they are designed for by increasing reader power. Depending on the RFID transmitter and reader improvements allow tags to be scanned and read from up to 350 feet or 100 m as in Smart Label RFID's, and because RFID utilizes an assortment of frequencies, there is some concern over whether sensitive information could be collected from an unwilling source. RFID tags contain at least two parts, an integrated circuit for information storage and processing and modulating a radio-frequency (RF) signal, and the second is an antenna for receiving and transmitting the signal. Types of RFID tags ● Active RFID tags equipped with a battery so as to electricity transmit signals autonomously, ● Passive RFID tags which have no battery and require an external source to provoke signal transmission, ● Battery Assisted Passive (BAP) tags require an external source to activate have significant higher forward link capability providing great read range.
  • 2. Emerging Technologies Series (Volume 2.1.) By Nora Boyle 5/25/2011 Applications RFID is now part of mobile computing and internet technologies, allowing companies and organizations to identify and manage their assets. Integrated RFID readers deliver a complete set of tools that eliminate paperwork, prove identity and attendance, thus eliminating manual data entry. Web based management tools can monitor assets from anywhere in the world with web applications that allow third party access to that data in real time. Many organizations use RFID tags combined with a mobile asset management solution to record and monitor the location of their assets, the status, and/or the condition. RFID is used in retail for product inventory and storage, and is a superior self checkout process for consumers. Not only do RFID tags enhance Product tracking methods, but begin with factory-based production through to post-sale. Companies use RFID to track I.T. assets where previously they were been recorded by barcodes. Current uses include animal management or an ear tag for herd management, inventory, commuting cars, and for passports, and prison inmate tracking, even for parolees. Commuting Already RFID tags are used for electronic toll collection in many states. The E-Z Pass, an ETC system used on most tolled roads, bridges, and tunnels has provided commuters a swift bypass of coin or man operated tolls. E-Z Pass is usually offered as a debit account: tolls are deducted from prepayments made by the users. Most rental cars come equipped with the transponder. The tags are read remotely as vehicles pass through tollbooths, and information gleaned not only debits the toll amount but the system records the date, time, and billing data for the vehicle. This eliminates the need to identify the car by its license plate. Passports RFID tags are used in passports issued by many countries, including Malaysia, New Zealand, Belgium, The Netherlands, Norway, Ireland, Japan, Pakistan, Germany, Portugal, Poland, Spain, The United Kingdom, Australia, Korea, Serbia, and the United States. The first RFID passports or "E-passport" contained the visual data of the passport, and recorded the travel history (time, date, and place) of entries and exits from the country. Now, they include biometrics and a digital signature to ensure the integrity of the passport. The currently standardized biometrics used for this type of identification system are facial, fingerprint, and iris recognition. These were adopted after assessment of several different kinds of biometrics including retinal scanning. A digital signature or digital signature scheme is a type of cryptography where if messages are sent through an insecure channel, a properly implemented digital signature gives the receiver reason to believe the message was sent by the claimed sender. Correctly monitored, digital signatures are more difficult to forge than the handwritten type. In 2006, RFID tags were included in new US passports. The chips store the same information that is printed within the passport and also includes a digital picture of the owner. The passport and chips can be read from a distance of 33 feet away and
  • 3. Emerging Technologies Series (Volume 2.1.) By Nora Boyle 5/25/2011 incorporate a thin metal lining to make it more difficult for unauthorized readers to "skim" information when the passport is closed. The State Department has implemented Basic Access Control (BAC), which functions as a Personal Identification Number (PIN) in the form of characters printed on the passport data page. Before a passport's tag can be read, this PIN must be entered into an RFID reader. Baggage Claims Hong Kong International Airport uses RFID sticker tags on all incoming baggage when received, encoded with the destination and flight. Military The Iraqi army uses an RFID security card that contains a biometric picture of the soldier. The picture in the chip must match the picture on the card and prevents forgeries and theft. The United States Department of Defense recently adopted RFID tagging for supply chain management in 2007. Employee Access Many places that employ traditional swipe cards for entry are shifting to RFID no-contact cards. Poker RFID tags are embedded into playing cards used for televised poker tournaments, so commentators know exactly what cards have been dealt to whom, as soon as the deal is complete. And, some casinos are embedding RFID tags into their chips. This allows the casinos to track the locations of chips on the casino floor, identify counterfeit chips, and prevent theft. There are some casinos that use RFID systems to study the betting behavior of players. Products Superstores like Wal-Mart, Target, and others, have pushed for embedding electronic product code (EPC) RFID tags into all their products. The Post Office is also considering embedding RFID in postage stamps and packages to enable point to point tracking. Human identification Micro-chipping pets have become commonplace, but micro-chipping humans? After the success of various animal identification uses since the early '90's RFID research has ventured into various human tracking alternatives. Some vendors place them in clothing. A few examples of human RFID tags are: Osaka, Japan - school authorities in have chipped children's clothing, back packs, and student IDs in school. England – The same student tagging it is being considered through a pilot program for a monitoring system designed to keep tabs on pupils by tracking radio chips in their uniforms. Also in England, one school began using an RFID card system to check in and out of
  • 4. Emerging Technologies Series (Volume 2.1.) By Nora Boyle 5/25/2011 the main gate, to both track attendance and prevent unauthorized entrance. The Philippines - some schools already use RFID in IDs for borrowing books and equipped gates with RFID ID scanners for in-school stores, the cafeteria, and the library, and both students and teachers must sign in for attendance. And, there are home RFID systems to track the elderly or infirmed patients in case they should wander off. RFID chips designed for animal tagging are also implanted in humans, after an early experiment by a British professor of cybernetics who implanted a chip in his arm in 1998. And in 2004, the Mexican Attorney General implanted its staff members with the Verichip to control access to a secure data room. Verichip is approved by the FDA as a human implant RFID. A person gets a tiny tag implanted into his right arm and transmits a 16 digit number that links to a database for identification, medical records, and tracking. According to the FDA, an RFID chip implant poses potential medical risk from electrical hazards, MRI incompatibility, adverse tissue reaction, and possible migration of the implanted transponder. And security experts are not convinced that the risk of identity theft is foolproof. Tracking prison inmates with RFID is underway in several states. The prisoners wear wristwatch-sized transmitters that detect attempted removal and alerts prison computers. Facilities in Ohio, Michigan, California, and Illinois employ the technology. Ankle Monitor The electronic ankle monitor sends either a radio frequency or a GPS signal to a receiver if the offender moves out of range. The police are notified, and the offender hopefully apprehended. This has been in use for those under house arrest, and as of 2007, approximately 130,000 units were used in the United States. With the advance in cellular and broadband networks in the 1990s, the tracking device allows offenders to roam about at a greater range. Parolees The implications for law enforcement are under review, as government budgets tighten, prison populations’ overflow, and parolees are left unmonitored. Recent events in child predator cases reveal paroled sex offenders were not adequately supervised and committed crimes that had escalated from molestation and rape to murder. Certain types of offenders might be eligible for electronic tagging to ascertain their whereabouts, track their movements, and alert law enforcement should they violate their parole. This human tracking comes under scrutiny from watchdogs of privacy laws, but given the increased numbers of parolees, law enforcement and court probation officers are overwhelmed.
  • 5. Emerging Technologies Series (Volume 2.1.) By Nora Boyle 5/25/2011 Privacy The monitoring systems, including the ‘cuff’ or ankle monitor, allow parolees to hold down jobs, stay within certain boundaries, and maintain curfews. There are also devices that monitor blood alcohol levels, to prohibit drunk drivers from getting behind the wheel. While most people laud these advances, there is a backlash. People fear their privacy will be invaded up to the point where the government tracks everybody and everything. RFID is permeating society on many levels, from employee badges to each and every product that people buy. It is on the clothing that they wear, but mostly, this is for inventory and marketing purposes, for access, and not surveillance. Infringement upon one’s civil liberties, however, is a plausible reality, should the system be abused. The technology gives the government the ability to ‘electronically frisk’ citizens without their knowledge or even their permission. One security concern is the illicit tracking of RFID tags. Tags which are world-readable pose a risk to both personal location privacy and corporate or military security. Will companies or groups attempt to use RFID for criminal or even political activities? The negatives for RFID include conjecture by theorists and Hollywood alike. While ‘Speedpass,’ the Exxon/Mobil gas card allows the driver to bypass the cashier, the RFID tag holds cryptographic information that according some use weak encryption keys that can be hacked easily. This was discovered after Ford Motors implemented its keyless car system using RFID where thieves could break the code and steal the car anyway. And, American Express and Chase Corp. issued RFID enabled credit cards, an innovative contactless pay system as a new feature in credit and debit cards, only hackers managed to compromise these too. Security experts have warned against using RFID for authenticating people due to the risk of identity theft. Unless the tags were equipped with a sophisticated protocol, someone could mug a person for their tag, and make it possible for an attacker to steal their identity of a person in real-time. As with the Iraqi soldier’s tag, there are methods of tagging, but due to the resource constraints of RFIDs it is virtually impossible to protect against all attack models as this would require complex distance-binding protocols. In ‘Zeitgeist” (2007) a movie written and directed by Peter Joseph, proposed RFID chips will one day be used to track the world population and keep them under control. The world banking institutions combine and use RFID as a negative technology. This theme is also the subject of research in both a book and a website called “Spychips,” which says, “How major corporations and government plan to track your every purchase and watch your every move.” They argue that consumer privacy is infringed by RFID and have started a group, CASPIAN, Consumers Against Supermarket Privacy Invasion and Numbering. They are against customer loyalty programs with cards issued by large supermarkets to track their customers’ purchases and offer discounts.
  • 6. Emerging Technologies Series (Volume 2.1.) By Nora Boyle 5/25/2011 Standards EPC Global, a joint venture between countries is working on international standards for the use of mostly passive RFID and the Electronic Product Code (EPC) in the identification of many items in the supply chain for companies worldwide. One of the missions of EPC global was to simplify all the protocols. These protocols, commonly known as Class 0 and Class 1, saw significant commercial implementation in 2002–2005. In 2004 the Hardware Action Group created a new protocol, the Class 1 Generation 2 interface, which addressed a number of problems that had been experienced with Class 0 and Class 1 tags. The EPC Gen2 standard was approved in December 2004, and is likely to form the backbone of passive RFID tag standards. The EPC Gen2 standard was adopted with minor modifications as ISO 18000-6C in 2006. EPC Global Network, by design, is also susceptible to service malfunctions as it uses a similar mechanism as Domain Name System (DNS) RFID is not immune to the same infrastructure security weaknesses by computer hackers familiar with network security. Bar-coding RFID tags are often a replacement for Universal Product Code or UPC or European Article Number (EAN). They may not ever completely replace barcodes, due in part to their higher cost and the advantage of multiple data sources on the same object. The new Electronic Product Code (EPC) is widely available at reasonable cost. The track items requires huge amounts of storage and filtering and categorizing RFID data is needed to create functional retrievable information, so there is a mixture of goods and inventory tracking by both RFID and by bar coding. A unique identity is a mandatory requirement for RFID tags, and each individual tag has a unique code, while current bar codes are limited to a single type code for a particular product. The uniqueness of RFID tags means that a product is tracked from its source location to every location therein until it hits the consumer. This combats theft and ensures quality control and loss prevention. Tracing the product from raw goods to consumer is crucial in manufacturing shipping, and inventory. Unique RFID identifiers along with serial numbers help companies trace defects, quality deficiencies, or any recall notices. The end result is consumer profiling and there are significant concerns and objection to this.
  • 7. Emerging Technologies Series (Volume 2.1.) By Nora Boyle 5/25/2011 Deciphering Barcodes The first 3 digits of the barcode is the country code wherein the product was made. All barcodes that start with 690,691,692 until 695 are made in The People’s Republic of China, and 471 are made in Taiwan. Barcodes 00 ~ 13 USA & CANADA 30 ~ 37 FRANCE 40 ~ 44 GERMANY 49 ~ JAPAN 50 ~ UK 57 ~ Denmark 64 ~ Finland 76 ~ Switzerland and Liechtenstein 480 ~ Philippines 471 ~ Taiwan 629 ~ United Arab Emirates 628 ~ Saudi Arabia 740 to 745 ~ Central America 690 to 695 ~ China PRC Checkout RFID, like barcodes, can be used at the point of sale (POS) store checkout to replace the cashier. The automatic system replaces the barcode scanning now popular in many grocery stores as previously, the high cost of tags and existing POS process technologies prevented it. History The history of RFID began in 1946 when LĂŠon Theremin invented an espionage tool for the Soviet Union which retransmitted incidental radio waves with audio information. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator, and modulated the reflected radio frequency. He invented the infamous BUG. And, even though this was a passive covert listening device, not an identification tag, it spawned RFID technology. The Future Innovation and research is expansive and ongoing in the RFID field and here are a few indications of things to come: ● Potential alternatives to the radio frequencies used are seen in optical RFID or OPID at 333 Hertz, 380 THz, 750 THz. ● The antennas of RFID may be replaced with photovoltaic components and Infrared or LEDs on the integrated circuit (ICs). ● Low-frequency (Low FID) tags and high-frequency (HighFID) tags can be used globally without a license. ● Ultra-high-frequency (UHFID) tags cannot be used globally as there is no single global standard. ● Bandwidths are licensed and there are complex band restrictions globally ● Readers are required to monitor a channel before transmitting ("Listen Before Talk"); this requirement has led to some restrictions on performance with no current resolution ● Cryptographic protocols will achieve privacy against unauthorized readers Summary
  • 8. Emerging Technologies Series (Volume 2.1.) By Nora Boyle 5/25/2011 RFID is deeply entwined with many emerging technologies and is here to stay. Its potential for useful applications far outweighs the privacy concerns of many, although regulations and vigilance can prevent unnecessary infringement upon personal freedoms. As RFID as used as a consumer tool will certainly undergo further scrutiny of practices by companies in retrieving personal data on the buyer. As a security measure, the ramifications for monitoring inmates and offenders are important to securing liberty for law abiding citizens. As budget crises continue to plague state and local governments, and prisons overflow with a burgeoning inmate population, this electronic form of social control may be the last frontier in humane treatment.