SlideShare a Scribd company logo
1 of 20
M A N A G E M E N T I N F O R M A T I O N S Y S T E M
PRESENTATION
ON
RFID
4/20/2014
1
Overview
 What is RFID?
 Brief History
 How RFID Works
 Current Applications
 Future Applications
 Potential Research
 Advantages and Disadvantages
 Privacy concern
 Regulations
 Conclusion
4/20/2014
2
What is RFID?
 RFID is an acronym for radio frequency
identification.
 Briefly the RF stand for “radio-frequency” and ID
means “identifier” that allows an item,
 The use of radio frequency tags to identify real
objects, for instance a library book, to be identified,
accessed, stored, reprogrammed and communicated
by using radio waves
4/20/2014
3
Brief History
 First Bar code patents – 1930s
 First use of RFID device – 2nd world war – Britain used
RFID-like technology for Identify- Friend or Foe
 Commercial Operation begun from 1960’s …
 In 1970s developers, inventors, companies, academic
institution and government sectors were actively worked
on RFID
 Most common application were tracked person and
objects, identified goods in supply chain, reusable
container, high value tools, security, controlling access to
building, networks, payment systems and other assets.
4/20/2014
4
Identification Examples
 Bar Codes
 License Plates
 Social Security Numbers
 Student ID
 Serial Numbers
 Car Keys
 Database Keys
4/20/2014
5
How Does RFID Work?
 3 Components
 Transceiver – Tag Reader
 Transponder – RFID tag
 Antenna
4/20/2014
6
A generic RFID system
4/20/2014
7
RFID Hardware
Propagation Coupling
Transceiver
Tag Reader
antenna
RFID
Tag
IC or microprocessor
antenna
4/20/2014
8
Passive Tags Active Tags
 No battery: passive
tags use the incoming
signal through
induction
 Passive tags only
function in the closer
range (at the most a
few meters).
 Low cost: Generally,
$0.15 to $5.00
 Active tags are powered
by batteries.
 Longer range (100m+)
 High cost: Generally,
$15 to $100
Types of Tags
4/20/2014
9
RFID Applications
 Tracking Books in Libraries
 Inventory Tracking:
Walmart required it of their
top 100 vendors
 Authorized building access
(Prox Cards)
 Passports (US passports
recently)
 AmEx Blue credit card
 Prison inmates (embedded)
 Livestock Tagging
 Passive / Secure Entry
 Airline Baggage Tracking
 Postal Package Tracking
 Time and Attendance
 Electronic Article
Surveillance (EAS)
 Automated Toll Collection
 Vehicle Anti-Theft
 Wild Animal Tracking
4/20/2014
10
Automated Toll Collection
4/20/2014
11
Smart Groceries Enhanced
4/20/2014
12
Smart Fridge
 Recognizes what’s been put in it
 Recognizes when things are removed
 Creates automatic shopping lists
 Notifies you when things are past their expiration
4/20/2014
13
RFID’s Advantages
 Automatically identify
objects
 Store data on a tag
 Can be hidden
 Work in harsh
environments
 Improve Customer
Services
 Easily Prevent Theft
 An AUTO-ID based
System
 A method for controlling
inventory
 Saving Time and Money
 Minimize Work Stress of
Staff
 Offering Self Check out/in
4/20/2014
14
RFID’s Disadvantages
 Lack of standards!
 Short range in case of passive tag
 Cost
 Privacy concerns
4/20/2014
15
Privacy Concerns
 Tracking an individual’s movements. If RFID tags are embedded in
clothing or vehicles, for example, and if there is a sufficiently dense
network of readers in place, it becomes possible to track those tags in
time and space.
 Sense of limiting or controlling: the revelation of personal information
such as medical prescription or personal health histories could have an
impact on the availability of insurance or employment;
 Information leakage. Consumer rights organizations worry about the
possibility that e.g. authorities or thieves will be able to monitor people’s
personal belongings through small embedded RFID microchips
remaining active after purchase.
 Impersonation: Impersonation of RFID tags can be achieved by tag
cloning, tag swapping, tag reprogramming or spoofing.
4/20/2014
16
Potential RFID tag-related threats: information leakage and traceability
possibility
4/20/2014
17
Regulation
 Currently no global body governing RFID frequency
allocation
 In Europe, tags must be removed from packaging
before disposal due to recycling disruptions and
health regulations
 There is limited or no regulation of RFID’s for the
most part leading to more controversy
4/20/2014
18
Conclusion
 RFID technology is rapidly is becoming more
standardized, but problems do still exist
 The number of adopters of RFID technology is
growing
 Regulation and education is necessary to quell some
of the fears regarding RFID technology and it’s
implications
4/20/2014
19
4/20/201420
THANK
YOU

More Related Content

What's hot

RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food SystemsMohsinAga1
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations managementmusicalmood
 
The future is now final
The future is now finalThe future is now final
The future is now finalBrian Berger
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application15225763
 
An impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.pptAn impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.pptfodyy
 
Using RFID to Improve the Customer Experience and Generate Revenue
Using RFID to Improve the Customer Experience and Generate Revenue Using RFID to Improve the Customer Experience and Generate Revenue
Using RFID to Improve the Customer Experience and Generate Revenue Samuel Streicher
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMHristo Borislavov Kolev
 
Passive UHF Sensing Inlays
Passive UHF Sensing InlaysPassive UHF Sensing Inlays
Passive UHF Sensing InlaysSMARTRAC
 
Converter Guidebook
Converter GuidebookConverter Guidebook
Converter GuidebookSMARTRAC
 
Automatic identification by RFID Test Tube 2013.11.03
Automatic identification by RFID Test Tube 2013.11.03Automatic identification by RFID Test Tube 2013.11.03
Automatic identification by RFID Test Tube 2013.11.03JAMATECH
 
20160310 general corporative presentation
20160310   general corporative presentation20160310   general corporative presentation
20160310 general corporative presentationGriselda Miralles
 
Annuaire de référence des acteurs RFID et NFC
Annuaire de référence des acteurs RFID et NFCAnnuaire de référence des acteurs RFID et NFC
Annuaire de référence des acteurs RFID et NFCCNRFID
 
Converter guidebook
Converter guidebookConverter guidebook
Converter guidebookPaulo R
 

What's hot (18)

RFID Technology in Food Systems
RFID Technology in Food SystemsRFID Technology in Food Systems
RFID Technology in Food Systems
 
Use of rfid in operations management
Use of rfid in operations managementUse of rfid in operations management
Use of rfid in operations management
 
The future is now final
The future is now finalThe future is now final
The future is now final
 
Rfid
RfidRfid
Rfid
 
RFID & IOT
RFID & IOTRFID & IOT
RFID & IOT
 
15225763 RFID Application
15225763 RFID Application15225763 RFID Application
15225763 RFID Application
 
An impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.pptAn impact of radio frequency identityfication on supply.ppt
An impact of radio frequency identityfication on supply.ppt
 
RFID Unleashed
RFID UnleashedRFID Unleashed
RFID Unleashed
 
Presentation.rfid
Presentation.rfidPresentation.rfid
Presentation.rfid
 
Using RFID to Improve the Customer Experience and Generate Revenue
Using RFID to Improve the Customer Experience and Generate Revenue Using RFID to Improve the Customer Experience and Generate Revenue
Using RFID to Improve the Customer Experience and Generate Revenue
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
 
Passive UHF Sensing Inlays
Passive UHF Sensing InlaysPassive UHF Sensing Inlays
Passive UHF Sensing Inlays
 
Converter Guidebook
Converter GuidebookConverter Guidebook
Converter Guidebook
 
Automatic identification by RFID Test Tube 2013.11.03
Automatic identification by RFID Test Tube 2013.11.03Automatic identification by RFID Test Tube 2013.11.03
Automatic identification by RFID Test Tube 2013.11.03
 
20160310 general corporative presentation
20160310   general corporative presentation20160310   general corporative presentation
20160310 general corporative presentation
 
Annuaire de référence des acteurs RFID et NFC
Annuaire de référence des acteurs RFID et NFCAnnuaire de référence des acteurs RFID et NFC
Annuaire de référence des acteurs RFID et NFC
 
Converter guidebook
Converter guidebookConverter guidebook
Converter guidebook
 
Ppt version1090
Ppt version1090Ppt version1090
Ppt version1090
 

Similar to RFID Presentation Overview, Applications, Advantages & Concerns

Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identificationRavi Teja
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Liz Sims
 
Rfid article
Rfid articleRfid article
Rfid articletrangbk
 
It in the news group 7 mfr audio added
It in the news group 7   mfr audio addedIt in the news group 7   mfr audio added
It in the news group 7 mfr audio addedsigep176
 
RFID - Radio frequency identification Device
RFID - Radio frequency identification DeviceRFID - Radio frequency identification Device
RFID - Radio frequency identification Devicefaisalkhan786
 
Rfi dtechnology.doc
Rfi dtechnology.docRfi dtechnology.doc
Rfi dtechnology.docArtechno7
 
Rfid in retail(kapil)
Rfid in retail(kapil)Rfid in retail(kapil)
Rfid in retail(kapil)isme
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologieskunal13309
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodLuz Martinez
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security IssuesBrent Muir
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxnettletondevon
 
ANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdfANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdfmukhtaransarcloth
 

Similar to RFID Presentation Overview, Applications, Advantages & Concerns (20)

Radio frequency identification
Radio frequency    identificationRadio frequency    identification
Radio frequency identification
 
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID)
 
RFID
RFIDRFID
RFID
 
Rfid article
Rfid articleRfid article
Rfid article
 
RFID Whitepaper for Steel Industry
RFID Whitepaper for Steel IndustryRFID Whitepaper for Steel Industry
RFID Whitepaper for Steel Industry
 
It in the news group 7 mfr audio added
It in the news group 7   mfr audio addedIt in the news group 7   mfr audio added
It in the news group 7 mfr audio added
 
RFID - Radio frequency identification Device
RFID - Radio frequency identification DeviceRFID - Radio frequency identification Device
RFID - Radio frequency identification Device
 
Rfi dtechnology.doc
Rfi dtechnology.docRfi dtechnology.doc
Rfi dtechnology.doc
 
Rfid in retail(kapil)
Rfid in retail(kapil)Rfid in retail(kapil)
Rfid in retail(kapil)
 
Sagar kaknale e2 20
Sagar kaknale e2 20Sagar kaknale e2 20
Sagar kaknale e2 20
 
RFID
RFID RFID
RFID
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
Vicinity-Future Is RFID
Vicinity-Future Is RFIDVicinity-Future Is RFID
Vicinity-Future Is RFID
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain MethodA Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
 
RFID Privacy & Security Issues
RFID Privacy & Security IssuesRFID Privacy & Security Issues
RFID Privacy & Security Issues
 
Demystifying Rfid
Demystifying RfidDemystifying Rfid
Demystifying Rfid
 
RFID
RFIDRFID
RFID
 
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docxAn Ethical Exploration of Privacy andRadio Frequency Ident.docx
An Ethical Exploration of Privacy andRadio Frequency Ident.docx
 
ANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdfANS Radio frequency identification (RFID) has been around for dec.pdf
ANS Radio frequency identification (RFID) has been around for dec.pdf
 

More from Mubashir Hassan

WhatsApp and facebook usage differences amongst genders project report
WhatsApp and facebook usage differences amongst genders project reportWhatsApp and facebook usage differences amongst genders project report
WhatsApp and facebook usage differences amongst genders project reportMubashir Hassan
 
Consumer behaviour towards a smartphone purchasing decision in The United Ara...
Consumer behaviour towards a smartphone purchasing decision in The United Ara...Consumer behaviour towards a smartphone purchasing decision in The United Ara...
Consumer behaviour towards a smartphone purchasing decision in The United Ara...Mubashir Hassan
 
Online Shopping (Mangoshoppers.com)
Online Shopping (Mangoshoppers.com)Online Shopping (Mangoshoppers.com)
Online Shopping (Mangoshoppers.com)Mubashir Hassan
 
Indian finanacial Market
Indian finanacial MarketIndian finanacial Market
Indian finanacial MarketMubashir Hassan
 
“ATTITUDE, PRECEPTION & APTITUDE”
“ATTITUDE, PRECEPTION & APTITUDE”“ATTITUDE, PRECEPTION & APTITUDE”
“ATTITUDE, PRECEPTION & APTITUDE”Mubashir Hassan
 

More from Mubashir Hassan (9)

WhatsApp and facebook usage differences amongst genders project report
WhatsApp and facebook usage differences amongst genders project reportWhatsApp and facebook usage differences amongst genders project report
WhatsApp and facebook usage differences amongst genders project report
 
Consumer behaviour towards a smartphone purchasing decision in The United Ara...
Consumer behaviour towards a smartphone purchasing decision in The United Ara...Consumer behaviour towards a smartphone purchasing decision in The United Ara...
Consumer behaviour towards a smartphone purchasing decision in The United Ara...
 
Hdfc bank
Hdfc bankHdfc bank
Hdfc bank
 
Online Shopping (Mangoshoppers.com)
Online Shopping (Mangoshoppers.com)Online Shopping (Mangoshoppers.com)
Online Shopping (Mangoshoppers.com)
 
Uttarakhand
UttarakhandUttarakhand
Uttarakhand
 
Indian finanacial Market
Indian finanacial MarketIndian finanacial Market
Indian finanacial Market
 
“ATTITUDE, PRECEPTION & APTITUDE”
“ATTITUDE, PRECEPTION & APTITUDE”“ATTITUDE, PRECEPTION & APTITUDE”
“ATTITUDE, PRECEPTION & APTITUDE”
 
Corporate law
Corporate lawCorporate law
Corporate law
 
Bodylanguage
BodylanguageBodylanguage
Bodylanguage
 

Recently uploaded

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

RFID Presentation Overview, Applications, Advantages & Concerns

  • 1. M A N A G E M E N T I N F O R M A T I O N S Y S T E M PRESENTATION ON RFID 4/20/2014 1
  • 2. Overview  What is RFID?  Brief History  How RFID Works  Current Applications  Future Applications  Potential Research  Advantages and Disadvantages  Privacy concern  Regulations  Conclusion 4/20/2014 2
  • 3. What is RFID?  RFID is an acronym for radio frequency identification.  Briefly the RF stand for “radio-frequency” and ID means “identifier” that allows an item,  The use of radio frequency tags to identify real objects, for instance a library book, to be identified, accessed, stored, reprogrammed and communicated by using radio waves 4/20/2014 3
  • 4. Brief History  First Bar code patents – 1930s  First use of RFID device – 2nd world war – Britain used RFID-like technology for Identify- Friend or Foe  Commercial Operation begun from 1960’s …  In 1970s developers, inventors, companies, academic institution and government sectors were actively worked on RFID  Most common application were tracked person and objects, identified goods in supply chain, reusable container, high value tools, security, controlling access to building, networks, payment systems and other assets. 4/20/2014 4
  • 5. Identification Examples  Bar Codes  License Plates  Social Security Numbers  Student ID  Serial Numbers  Car Keys  Database Keys 4/20/2014 5
  • 6. How Does RFID Work?  3 Components  Transceiver – Tag Reader  Transponder – RFID tag  Antenna 4/20/2014 6
  • 7. A generic RFID system 4/20/2014 7
  • 8. RFID Hardware Propagation Coupling Transceiver Tag Reader antenna RFID Tag IC or microprocessor antenna 4/20/2014 8
  • 9. Passive Tags Active Tags  No battery: passive tags use the incoming signal through induction  Passive tags only function in the closer range (at the most a few meters).  Low cost: Generally, $0.15 to $5.00  Active tags are powered by batteries.  Longer range (100m+)  High cost: Generally, $15 to $100 Types of Tags 4/20/2014 9
  • 10. RFID Applications  Tracking Books in Libraries  Inventory Tracking: Walmart required it of their top 100 vendors  Authorized building access (Prox Cards)  Passports (US passports recently)  AmEx Blue credit card  Prison inmates (embedded)  Livestock Tagging  Passive / Secure Entry  Airline Baggage Tracking  Postal Package Tracking  Time and Attendance  Electronic Article Surveillance (EAS)  Automated Toll Collection  Vehicle Anti-Theft  Wild Animal Tracking 4/20/2014 10
  • 13. Smart Fridge  Recognizes what’s been put in it  Recognizes when things are removed  Creates automatic shopping lists  Notifies you when things are past their expiration 4/20/2014 13
  • 14. RFID’s Advantages  Automatically identify objects  Store data on a tag  Can be hidden  Work in harsh environments  Improve Customer Services  Easily Prevent Theft  An AUTO-ID based System  A method for controlling inventory  Saving Time and Money  Minimize Work Stress of Staff  Offering Self Check out/in 4/20/2014 14
  • 15. RFID’s Disadvantages  Lack of standards!  Short range in case of passive tag  Cost  Privacy concerns 4/20/2014 15
  • 16. Privacy Concerns  Tracking an individual’s movements. If RFID tags are embedded in clothing or vehicles, for example, and if there is a sufficiently dense network of readers in place, it becomes possible to track those tags in time and space.  Sense of limiting or controlling: the revelation of personal information such as medical prescription or personal health histories could have an impact on the availability of insurance or employment;  Information leakage. Consumer rights organizations worry about the possibility that e.g. authorities or thieves will be able to monitor people’s personal belongings through small embedded RFID microchips remaining active after purchase.  Impersonation: Impersonation of RFID tags can be achieved by tag cloning, tag swapping, tag reprogramming or spoofing. 4/20/2014 16
  • 17. Potential RFID tag-related threats: information leakage and traceability possibility 4/20/2014 17
  • 18. Regulation  Currently no global body governing RFID frequency allocation  In Europe, tags must be removed from packaging before disposal due to recycling disruptions and health regulations  There is limited or no regulation of RFID’s for the most part leading to more controversy 4/20/2014 18
  • 19. Conclusion  RFID technology is rapidly is becoming more standardized, but problems do still exist  The number of adopters of RFID technology is growing  Regulation and education is necessary to quell some of the fears regarding RFID technology and it’s implications 4/20/2014 19