SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Can RFID Tags Work
Inside Metal?
“If you build it, they will come”
Inventory management takes time. This costs companies money, both directly in labor costs and indirectly
by interrupting normal operations. RFID can significantly reduce the time it takes a company to complete
their inventory, improving their bottom line.
The benefits of RFID-based inventory management have been available only to companies with inventory
that was “RFID friendly”, excluding those whose inventory consists of metallic items. Companies with high
value metallic inventory could justify the use of expensive active or battery-assisted RFID systems, but these
were not economically justifiable for mainstream operations. Recently, however, passive RFID technology
has improved significantly. RFID tags have become available that work well near, or even directly attached
to, metal. This has made the benefits of RFID-based inventory management affordable for a much wider
range of companies.
There is still a step, however, in between the point of manufacture and the end customer when an RFID tag
is applied to an asset. This added step adds cost. In addition, the applied RFID tags are exposed externally
making them susceptible to damage from normal “wear and tear” and to deliberate tampering. Many
companies have been asking for an RFID solution that can be seamlessly and invisibly integrated into their
products at the time of manufacture.

XERAFY.com - Can RFID Work Inside Metal? 1
In addition to inventory management, embedded

and security into other products would bring

RFID

similar benefits.

can

be

valuable

for

authentication.

Financial institutions such as Visa, American

Traditionally,

Express and Discover have implemented RFID in

troublesome for RFID. The challenge of designing

credit

payment

a RFID tag to perform on a metallic surface has

mechanisms at retail and food establishments as

largely been solved. Embedding the tag into a

well as serving as an additional form of

metallic surface, however, has continued to

verification

render the tag unreadable, or readable from only

cards

of

for

use

the

as

card

instant

holder’s

identity.

metallic

material

has

been

Automobile manufacturers have embedded RFID

a very limited range.

tags containing the information required to

technology to do this exists today, and is available

unlock and start an automobile directly into

from XERAFY.

The good news is...the

plastic key fobs, making it much more difficult to
duplicate

the

owner’s

key

and

steal

an

automobile. Building this level of authentication

Metal-Embedded RFID
Embedding RFID tags at the point of manufacture

warranty repair or other reasons, the built in

enables the manufacturer to differentiate their

RFID may be utilized by the manufacturer for

product line from their competition by offering

real-time

product that is either “RFID ready” or fully “RFID

units.

management

of

returned/repaired

enabled”. With volume production, the cost of
adding an embedded RFID tag is more than offset

Large corporations who lease or purchase capital

by the return on investment from customers who

equipment such as laptop computers, wireless

prefer to purchase the product with the ability to

routers and other IT related items that need to be

readily have real-time inventory visibility.

accounted

for

each

business

quarter

for

accounting purposes will see instant ROI from
For a server manufacturer who sells thousands

real-time visibility of asset movement with

of blades to financial institutions and large

doorway portals and mobile RFID enabled carts

corporations, their customers are going to not

that are able to account for a company’s

only appreciate the fact that their datacenters are

complete inventory in a matter of hours versus

already RFID enabled, but also that the tags are

days.

not only appreciate the fact that their datacenters
are already RFID enabled, but also that the tags

Military and law enforcement agencies need to

are not vulnerable to being damaged or knocked

keep accurate inventory of their firearm inventory.

off during routine movement of servers from rack

Accountability of an agency’s firearm inventory

to rack. In addition, when servers return for

serves several purposes. One purpose is to

XERAFY.com - Can RFID Work Inside Metal? 2
ensure that all personnel are properly equipped

generators, jack hammers and cranes, are often

with equipment. Another is visibility to missing

purchased by firms that then lease those tools to

inventory (either misplaced or possibly stolen).

construction companies on a project to project

Finally,

periodic

basis. The leasing company’s inventory is highly

maintenance, a record needs to be maintained of

valuable, mobile and broadly dispersed, making

all equipment requiring service, what service

inventory of assets a significant challenge. The

needs to be performed and all equipment which

loss of a large item has an immediate business

has gone through a proper and complete

impact. Even smaller items, while not individually

cleaning cycle.

expensive, quickly become a liability when

when

equipment

requires

Embedded RFID enabled firearms provide instant
and discrete tracking to each agency. Not only
will the agency’s equipment inventory manager
be able to know real-time how many firearms are
checked out for service, but also how many
remain in inventory ready to use, amount in need

significant quantities are either misplaced or
stolen.
RFID-based tool tracking solutions have been
deployed

to

customers

for

several

years,

including RFID enabled tool boxes and truck bed
reader systems. It is relatively straight forward to
of service and reconcile total number of assets
registered with actual amount in inventory (i.e. if
any are missing). This prevents unnecessary
ordering of additional firearms. More importantly,
this allows the agency to immediately initiate a
search for missing equipment.

add an external mount-on-metal RFID tag to a
tool; however these tags are vulnerable to
damage or loss during normal use and their
obvious appearance may lead to intentional
tampering. Tools that contain an embedded RFID
tag eliminate these concerns, as the tag is now a
part of the tool itself.

Commercial tools, ranging from hammers,
screwdrivers and tape measures to large scale

XERAFY.com - Can RFID Work Inside Metal? 3
Privacy and the Cost of Manufacture
Like many product lines, particular features of a

standard Electronic Product Code (EPC) as the

part may be optional, but physically designed into

principle method of identifying a RFID tag and

all variants. Embedding of RFID is no exception.

corresponding

In volume production, the cost to manufacture an

information, such as product type, product stock

asset will remain the same. Likewise, the cost of

number, serial number or any other information

enabling a particular feature set for a specific

pertaining to product and manufacturer, can be

customer base is negligible compared to the cost

encoded into the user memory of the tag.

asset.

Additional

product

of inclusion. In the case of RFID, if a customer
requires RFID enabled product, the RFID tag may

Several methods may be employed to prevent

be

customer’s

unauthorized personnel from reading and/or

requirements and ship directly out the door ready

programmed

per

the

modifying the information contained within a

to work upon receipt. If a customer does not

RFID tag. Tag memory may be locked using

require RFID, the same product is likewise ready

several layers of password protection for both

to ship and work upon receipt, with the inactive

read and write capability. In addition, information

embedded RFID tag being completely invisible to

within tag user memory may be encrypted,

the customer.

making the information meaningless to a wouldbe thief interrogating the tag.

Information on a RFID tag may vary depending
upon what is contained. Many systems use a

XERAFY.com - Can RFID Work Inside Metal? 4
XERAFY Embedded Solution
Until now, mount-on-metal RFID technology has

XERAFY uniquely provides:

been strictly about surface mounting. The ability
to not only embed an RFID tag that will fully

 A revolutionary antenna design, enabling

perform, but also integrate it into an asset at the

XERAFY embedded RFID tags to deliver peak

point of manufacture was only a dream. XERAFY

performance when embedded in metal

has pioneered RFID that not only offers full

 A small footprint, for limited space assets

performance on and near metal, but also

such as bolts, IT equipment, metal faceplates
 Full performance without additional product

embedded within metal.

modifications such as spacing and additional
‘‘Managing and recording assets for industrial

case material

manufacturers requires an embed in metal

 Durability, backed by an industry leading

solution with long read range and XERAFY

warranty, for guaranteed tag longevity

provides the only embed-in-metal tags that meet
the

performance

requirements.’’

Said

Jim

Stradinger, Managing Partner, Holland 1916 Inc.

XERAFY.com - Can RFID Work Inside Metal? 5
Conclusion
Embedding RFID into products has substantial benefits in both cost and product value. Those benefits,
however, have only been available to manufacturers whose products are made of “RFID friendly” materials
such as plastics. XERAFY’s unique technology enables embedded RFID in metal products, bringing the
benefits of RFID to those products manufacturers and their customers.

Contact Us
For more information on this application, product overview or any other questions, please contact XERAFY.

XERAFY.com - Can RFID Work Inside Metal? 6

Mais conteúdo relacionado

Mais de Firman Indrianto

Managed cloud-transition-service-brief
Managed cloud-transition-service-briefManaged cloud-transition-service-brief
Managed cloud-transition-service-briefFirman Indrianto
 
Cloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguideCloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguideFirman Indrianto
 
Manual cms ( central management system ) / Video Viewer for AVTECH DVR
 Manual cms ( central management system ) / Video Viewer for AVTECH DVR Manual cms ( central management system ) / Video Viewer for AVTECH DVR
Manual cms ( central management system ) / Video Viewer for AVTECH DVRFirman Indrianto
 
V mware v center converter standalone user's guide
V mware v center converter standalone user's guideV mware v center converter standalone user's guide
V mware v center converter standalone user's guideFirman Indrianto
 
Membangun bisnis hosting ipi90530
Membangun bisnis hosting   ipi90530Membangun bisnis hosting   ipi90530
Membangun bisnis hosting ipi90530Firman Indrianto
 
V mware v-sphere-replication-overview
V mware v-sphere-replication-overviewV mware v-sphere-replication-overview
V mware v-sphere-replication-overviewFirman Indrianto
 
The rfid tagging_challenge
The rfid tagging_challengeThe rfid tagging_challenge
The rfid tagging_challengeFirman Indrianto
 
Materi workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedyMateri workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedyFirman Indrianto
 
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluhE book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluhFirman Indrianto
 
Thinapp47 packageini reference
Thinapp47 packageini referenceThinapp47 packageini reference
Thinapp47 packageini referenceFirman Indrianto
 

Mais de Firman Indrianto (13)

Tutorial c panel
Tutorial c panelTutorial c panel
Tutorial c panel
 
Managed cloud-transition-service-brief
Managed cloud-transition-service-briefManaged cloud-transition-service-brief
Managed cloud-transition-service-brief
 
Cloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguideCloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguide
 
Manual cms ( central management system ) / Video Viewer for AVTECH DVR
 Manual cms ( central management system ) / Video Viewer for AVTECH DVR Manual cms ( central management system ) / Video Viewer for AVTECH DVR
Manual cms ( central management system ) / Video Viewer for AVTECH DVR
 
V mware v center converter standalone user's guide
V mware v center converter standalone user's guideV mware v center converter standalone user's guide
V mware v center converter standalone user's guide
 
Membangun bisnis hosting ipi90530
Membangun bisnis hosting   ipi90530Membangun bisnis hosting   ipi90530
Membangun bisnis hosting ipi90530
 
V mware v-sphere-replication-overview
V mware v-sphere-replication-overviewV mware v-sphere-replication-overview
V mware v-sphere-replication-overview
 
Uhf regulations
Uhf regulationsUhf regulations
Uhf regulations
 
The rfid tagging_challenge
The rfid tagging_challengeThe rfid tagging_challenge
The rfid tagging_challenge
 
Materi workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedyMateri workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedy
 
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluhE book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
 
Wirelessconnect
WirelessconnectWirelessconnect
Wirelessconnect
 
Thinapp47 packageini reference
Thinapp47 packageini referenceThinapp47 packageini reference
Thinapp47 packageini reference
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Can rfid-tags-work-inside-metal

  • 1. Can RFID Tags Work Inside Metal? “If you build it, they will come” Inventory management takes time. This costs companies money, both directly in labor costs and indirectly by interrupting normal operations. RFID can significantly reduce the time it takes a company to complete their inventory, improving their bottom line. The benefits of RFID-based inventory management have been available only to companies with inventory that was “RFID friendly”, excluding those whose inventory consists of metallic items. Companies with high value metallic inventory could justify the use of expensive active or battery-assisted RFID systems, but these were not economically justifiable for mainstream operations. Recently, however, passive RFID technology has improved significantly. RFID tags have become available that work well near, or even directly attached to, metal. This has made the benefits of RFID-based inventory management affordable for a much wider range of companies. There is still a step, however, in between the point of manufacture and the end customer when an RFID tag is applied to an asset. This added step adds cost. In addition, the applied RFID tags are exposed externally making them susceptible to damage from normal “wear and tear” and to deliberate tampering. Many companies have been asking for an RFID solution that can be seamlessly and invisibly integrated into their products at the time of manufacture. XERAFY.com - Can RFID Work Inside Metal? 1
  • 2. In addition to inventory management, embedded and security into other products would bring RFID similar benefits. can be valuable for authentication. Financial institutions such as Visa, American Traditionally, Express and Discover have implemented RFID in troublesome for RFID. The challenge of designing credit payment a RFID tag to perform on a metallic surface has mechanisms at retail and food establishments as largely been solved. Embedding the tag into a well as serving as an additional form of metallic surface, however, has continued to verification render the tag unreadable, or readable from only cards of for use the as card instant holder’s identity. metallic material has been Automobile manufacturers have embedded RFID a very limited range. tags containing the information required to technology to do this exists today, and is available unlock and start an automobile directly into from XERAFY. The good news is...the plastic key fobs, making it much more difficult to duplicate the owner’s key and steal an automobile. Building this level of authentication Metal-Embedded RFID Embedding RFID tags at the point of manufacture warranty repair or other reasons, the built in enables the manufacturer to differentiate their RFID may be utilized by the manufacturer for product line from their competition by offering real-time product that is either “RFID ready” or fully “RFID units. management of returned/repaired enabled”. With volume production, the cost of adding an embedded RFID tag is more than offset Large corporations who lease or purchase capital by the return on investment from customers who equipment such as laptop computers, wireless prefer to purchase the product with the ability to routers and other IT related items that need to be readily have real-time inventory visibility. accounted for each business quarter for accounting purposes will see instant ROI from For a server manufacturer who sells thousands real-time visibility of asset movement with of blades to financial institutions and large doorway portals and mobile RFID enabled carts corporations, their customers are going to not that are able to account for a company’s only appreciate the fact that their datacenters are complete inventory in a matter of hours versus already RFID enabled, but also that the tags are days. not only appreciate the fact that their datacenters are already RFID enabled, but also that the tags Military and law enforcement agencies need to are not vulnerable to being damaged or knocked keep accurate inventory of their firearm inventory. off during routine movement of servers from rack Accountability of an agency’s firearm inventory to rack. In addition, when servers return for serves several purposes. One purpose is to XERAFY.com - Can RFID Work Inside Metal? 2
  • 3. ensure that all personnel are properly equipped generators, jack hammers and cranes, are often with equipment. Another is visibility to missing purchased by firms that then lease those tools to inventory (either misplaced or possibly stolen). construction companies on a project to project Finally, periodic basis. The leasing company’s inventory is highly maintenance, a record needs to be maintained of valuable, mobile and broadly dispersed, making all equipment requiring service, what service inventory of assets a significant challenge. The needs to be performed and all equipment which loss of a large item has an immediate business has gone through a proper and complete impact. Even smaller items, while not individually cleaning cycle. expensive, quickly become a liability when when equipment requires Embedded RFID enabled firearms provide instant and discrete tracking to each agency. Not only will the agency’s equipment inventory manager be able to know real-time how many firearms are checked out for service, but also how many remain in inventory ready to use, amount in need significant quantities are either misplaced or stolen. RFID-based tool tracking solutions have been deployed to customers for several years, including RFID enabled tool boxes and truck bed reader systems. It is relatively straight forward to of service and reconcile total number of assets registered with actual amount in inventory (i.e. if any are missing). This prevents unnecessary ordering of additional firearms. More importantly, this allows the agency to immediately initiate a search for missing equipment. add an external mount-on-metal RFID tag to a tool; however these tags are vulnerable to damage or loss during normal use and their obvious appearance may lead to intentional tampering. Tools that contain an embedded RFID tag eliminate these concerns, as the tag is now a part of the tool itself. Commercial tools, ranging from hammers, screwdrivers and tape measures to large scale XERAFY.com - Can RFID Work Inside Metal? 3
  • 4. Privacy and the Cost of Manufacture Like many product lines, particular features of a standard Electronic Product Code (EPC) as the part may be optional, but physically designed into principle method of identifying a RFID tag and all variants. Embedding of RFID is no exception. corresponding In volume production, the cost to manufacture an information, such as product type, product stock asset will remain the same. Likewise, the cost of number, serial number or any other information enabling a particular feature set for a specific pertaining to product and manufacturer, can be customer base is negligible compared to the cost encoded into the user memory of the tag. asset. Additional product of inclusion. In the case of RFID, if a customer requires RFID enabled product, the RFID tag may Several methods may be employed to prevent be customer’s unauthorized personnel from reading and/or requirements and ship directly out the door ready programmed per the modifying the information contained within a to work upon receipt. If a customer does not RFID tag. Tag memory may be locked using require RFID, the same product is likewise ready several layers of password protection for both to ship and work upon receipt, with the inactive read and write capability. In addition, information embedded RFID tag being completely invisible to within tag user memory may be encrypted, the customer. making the information meaningless to a wouldbe thief interrogating the tag. Information on a RFID tag may vary depending upon what is contained. Many systems use a XERAFY.com - Can RFID Work Inside Metal? 4
  • 5. XERAFY Embedded Solution Until now, mount-on-metal RFID technology has XERAFY uniquely provides: been strictly about surface mounting. The ability to not only embed an RFID tag that will fully  A revolutionary antenna design, enabling perform, but also integrate it into an asset at the XERAFY embedded RFID tags to deliver peak point of manufacture was only a dream. XERAFY performance when embedded in metal has pioneered RFID that not only offers full  A small footprint, for limited space assets performance on and near metal, but also such as bolts, IT equipment, metal faceplates  Full performance without additional product embedded within metal. modifications such as spacing and additional ‘‘Managing and recording assets for industrial case material manufacturers requires an embed in metal  Durability, backed by an industry leading solution with long read range and XERAFY warranty, for guaranteed tag longevity provides the only embed-in-metal tags that meet the performance requirements.’’ Said Jim Stradinger, Managing Partner, Holland 1916 Inc. XERAFY.com - Can RFID Work Inside Metal? 5
  • 6. Conclusion Embedding RFID into products has substantial benefits in both cost and product value. Those benefits, however, have only been available to manufacturers whose products are made of “RFID friendly” materials such as plastics. XERAFY’s unique technology enables embedded RFID in metal products, bringing the benefits of RFID to those products manufacturers and their customers. Contact Us For more information on this application, product overview or any other questions, please contact XERAFY. XERAFY.com - Can RFID Work Inside Metal? 6