DOC PREVIEW
OSU BA 471 - RFID Technology

This preview shows page 1-2-3-4-5-6 out of 19 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 19 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

RFID Technology Radio Frequency IDentification TechnologyOverviewRFID IntroductionHistory of RFIDRFID SystemTypes of RFID TagsSupply Chain ManagementMore Uses for RFID TechnologyUsing RFID Tags for TrackingTracking People?The Future of RFID TechnologySlide 12Slide 13Slide 14Slide 15RFID LegislationRFID ControversySlide 18SummaryRFID Technology Radio Frequency IDentification Technology Jennifer Landis, Michelle Cassinelli, Andrew JonesMay 23, 2006Overview•RFID Introduction•History of RFID Technology•Current Uses•Potential Uses•Regulation and Standardization•RFID Legislation•ControversyRFID Introduction•Radio Frequency Identification–Automatic identification method–Stores and retrieves data using RFID tag–Uses radio frequencyHistory of RFID•Discovery of radar (1935)•First passive and active RFID systems developed and used during WWII•RFID development - commercial uses (1950s and 1960s)•Mario Cardullo received 1st U.S. patent for active RFID tag (1973)RFID System•Tag (Transponder)–Antenna, Microchip, and Distinct Product Code•Reader (Interrogator)–Antenna, Transceiver, and Decoder•Process1. Reader detects signal, decodes data on tag’s chip2. Data passes to host computer3. Application software on computer processes dataTypes of RFID Tags•Passive Tag–No internal power source, can be very small, used on low-cost items•Semi-Passive Tag–Small battery, tracking high-value goods•Active Tag–Internal power source, transmitter, tracking high-value goodsSupply Chain Management•Sears Holding Company–2005, Sears starts tracking appliances; 3,800 stores–Reduces incorrect placements of goods–Reduces need for operators• Gillette Company –Tracks retail store stock with sales promotions –48% higher sales if product on the shelf before the promotion. (CPA Advisor)More Uses for RFID Technology•Ford and Texas Instruments –Teamed up on a vehicle immobilizer project for all 2005 model Fords–Reduced auto theft by as much as 90% (Bono)•Robert Bosch Tool Corporation–Tools are embedded with RFID technology to prevent theftUsing RFID Tags for Tracking•RFIDs are used to track•Books from the Public Library•Airline Baggage•Cattle to help identify a bovine’s herd of origin •Family Pets•Car TiresTracking People?•Los Angeles County Police Department has used RFID technology to track prison inmates •Reasoning: “to track anti-social behavior and prisoner movements” (RFID)•California Public School used RFID chips that were embedded in ID tags to track students •Reasoning: ensure the safety of the students and prevent truancyThe Future of RFID Technology•RFIDs are often seen as the replacement for UPC and barcodes •Potential to revolutionize grocery shopping•Smart Appliances- AKA a bachelor’s dream•These potential uses won’t be around any time soon due to:•Cost Barriers•Lack of products being embedded with RFID tags•Changes to operational processes•Standards•What are some potential uses for RFID technology?Abbr. Number of WavelengthsEach SecondHertz Hz One Kilohertz KHz Thousand Megahertz MHz Million Gigahertz GHz Billion FrequenciesAbbr. Freq. and Wavelength Example of uses< 3 Hz> 100,000 kmExtremely low frequencyELF 3–30 Hz100,000 km – 10,000 kmCommunication with submarinesSuper low frequencySLF 30–300 Hz10,000 km – 1000 kmCommunication with submarinesUltra low frequencyULF 300–3000 Hz1000 km – 100 kmCommunication within minesVery low frequencyVLF 3–30 kHz100 km – 10 kmSubmarine communication, avalanche beacons, wireless heart rate monitorsLow frequency LF 30–300 kHz10 km – 1 kmNavigation, time signals, AM long wave broadcastingMedium frequencyMF 300–3000 kHz1 km – 100 mAM (Medium-wave) broadcastsHigh frequency HF 3–30 MHz100 m – 10 mShortwave broadcasts and amateur radioVery high frequencyVHF 30–300 MHz10 m – 1 mFM and television broadcastsUltra high frequencyUHF 300–3000 MHz1 m – 100 mmtelevision broadcasts, mobile phones, wireless LAN, ground-to-air and air-to-air communicationsSuper high frequencySHF 3–30 GHz100 mm – 10 mmmicrowave devices, mobile phones (W-CDMA), WLAN, most modern RadarsExtremely high frequencyEHF 30–300 GHz10 mm – 1 mmRadio astronomy, high-speed microwave radio relayAbove 300 GHz< 1 mmNight visionRFID Regulation•No global governing body•Low and High Frequency used globally•UHF does not have a global standard •ISM bands are UHF and have different frequencies•Power restrictions and Frequency emission Standards•RFIDs must be certified•End users can be affected if manufactures do not comply•Regulations designed to reduce interferenceRFID Legislation•Problem once goods are purchased•RFIDsec makes tags which transfer control to consumer•Some tags uses cryptography •State LegislationRFID Controversy•Privacy advocates call them “spy chips” and warn of possible abuse from stalkers, marketers and the government•US passports •Ubisense makes tags for employees, real time, precise location•US DoD will use them to track weapons movements in 2007RFID Controversy•Wal-Mart requires top suppliers to use them•RFID tags where shown in March 2006 that software viruses can be inserted into them•“It shouldn't surprise you that a system that is designed to be manufactured as cheaply as possible is designed with no security constraints whatsoever.“ (Peter Neumann)Summary•RFID Introduction•History of RFID Technology•RFID Systems•Current Uses•Potential Uses•Regulation and Standardization•RFID


View Full Document

OSU BA 471 - RFID Technology

Documents in this Course
D B M S

D B M S

13 pages

D B M S

D B M S

13 pages

RFID

RFID

12 pages

XML

XML

8 pages

W3C- Web

W3C- Web

23 pages

Linux

Linux

21 pages

Telecoms

Telecoms

11 pages

Linux

Linux

11 pages

Load more
Download RFID Technology
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view RFID Technology and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view RFID Technology 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?