Tracking People s Movements by RFID Implants
|
|
|
- Hilary White
- 10 years ago
- Views:
Transcription
1 Tracking People s Movements by RFID Implants Name: Seyed Saeid Saadatmand [email protected] Phone number: Address: 15 Windham Way - Apt # c Amherst NY Program: Urban Planning University at Buffalo, The State University of New York Date: Fall 2012
2 Abstract: Assume it is There is no place and time which cannot be tracked. There is nothing that anybody can hide. Everything has an identity number in a central database in United States and it is connected to internet. It is obvious that one is sitting on a chair, the chair is in a room and the room is located on the thirtieth floor of a skyscraper in Manhattan. Spatial relationship of objects can be measured. It is real time city where anything can be tracked. Rolex Company wants to measure the density of its watches which has been bought by customers in Brooklyn. They want to be more specific and find the percentage of Asian people who have their watches on their hand at this moment in Brooklyn. They narrow down their scope and apply apartment price to this measurement. Now Rolex can make decision about its new employee who is going to be employed in that area. According to previous researches the new staff must be a female and be aware of Chinese culture. She has to be a little conservative because Rolex has found the majority of its customers in that area are rich Chinese people who are so conservative. This science fiction story will be feasible if the identity of everything can be scanned at any time. That identity can be a code which comes with goods and people from the first day of their lives. Newborn babies will not be brought out of hospitals without identity code. New goods and products will not be accepted by sellers. Nowadays it is happening. Babies have identity code and goods have bar code. The question is how these codes can be alive and be used in a real time city. 2
3 In this article the nature of these controversial codes will be discussed and some examples of their application in transportation planning and urban planning will be mentioned. 3
4 Introduction: What is RFID? The acronym means Radio-Frequency Identification. They are small devices which consist of a chip and antenna. The RFID chip is like traditional bar code on an object in a shopping mall which provides unique information for that object. There are some differences between RFID chips and bar codes. Barcodes have to be scanned by a linear scanner but RFID chips do not need to be positioned in front of the scanner. As an example you can have a bag full of stuff which has RFID chip and you can scan the bag quickly and all the stuff will be scanned(landt 2005). Each RFID chip has a unique identification number and this identification number can be linked with other information in external databases. For example medical history, personal identification numbers, contact information and any other information. When a RFID tag passes through a scanner, its ID can be stored and linked to the other existing information (Foster, Jaeger, 2007). RFID tags can contain more data than identification numbers. For example, they can include information about the host object. If RFID tags combined with sensors, they are able to save some information about the environment where they are in. For instance, temperature and humidity can be sensed and stored in the tag (Rotter, Daskala, Compano, 2008). RFID human implant is a rice-grain size RFID chip which can be implanted in body(arellano 2008). They can be tracked and data can be stored in these implants too. They 4
5 are always with people and they can be used as an identification card in airports, hospitals and any other places which require identification information. There are different issues about RFID and human right. Some scholars believe the concept of RFID implant is a kind of violation of people s freedom (Reynolds, 2004). In this paper we will focus on the positive effects of RFID technology in society. 5
6 6 Figure 1 Tracking people's movemnets in cities
7 RFID tag number Zone Enterance time Exit time Credit info Bill amount A 8:25 AM 8:56 AM A 12:36 PM 14:43 PM 037 Place 1 data base (ex: local store, commercial zone) RFID tag number Zone Enterance time Exit time health background Allergic to B 12:51 PM 13:39:00 PM B 16:12 16: Place 2 data base (ex: Hospital) RFID tag number Zone Enterance time Exit time Apartment number rent balance C 16:27 PM Place 3 data base (residential area) Zone A Zone B Zone C Enterance Exit Enterance Exit Enterance Exit :25 AM 8:56 AM 12:51 PM 13:39 PM 16:27 PM :36 PM 14:43 PM :12 PM 16:47 PM - - Central data base 7
8 History of different applications of RFID: In 1948 of the earliest articles about RFID systems were published (Roberts, 2006). During the Second World War this technology were used for the first time. The Germans, Japanese, Americans and British all used radar during the war but they could not determine which plane belonged to the enemy and which was their own (Mark Roberti, n.d.). On the basis of the Watson-Watt secret researches, the British developed a transmitter which they put under each plane. When the transmitter received signals from their own radar, it began broadcasting a radio wave back. In this way the British could find which plane is for enemy and which is belonged to alley. Nowadays RFID system works based on this concept. When RFID tags receive a signal, they send a signal back (Mark Roberti, n.d.). From that time onward, different scientists all over the world tried to develop RFID systems. In 1950 to 1960 RFID tags were used in stores. They called it anti-theft systems and stores used it to know whether an item had been paid or not. This technology is being used nowadays in stores too. Each tag has 1 bit data. It is either on or off. If someone pays for it, the tag will be off. If the person does not pay for it, it will be on and readers in front of the door will detect them and sound an alarm (Mark Roberti, n.d.). In 1970s, there was a lot of research and development in the field of RFID and first animal tags were used. In 1980s, different countries used RFID tags for pay tolls and drivers could pay the toll without stop. In 1990 a great deal of researches were done to reduce the size of RFID chips. In early 1990s IBM developed an ultra-high frequency (UHF) RFID system. The read range of this system was up to 20 feet under good conditions. IBM did a pilot project in 8
9 Walmart but they did not finish the project due to financial problem. In the mid-1990, Intermec, a bar code systems provider bought the patents from IBM. RFID systems offered by Intermec were used in warehouse tracking and farming. The technology was expensive at that time (Mark Roberti, n.d.). In 1999, two professors, David Brock and Sanjay Sarma, worked on RFID systems in the Auto-ID Center at the Massachusetts Institute of Technology. They wanted to develop a low cost RFID system. Their initial idea was put RFID tags on all products. It gave ability to manufacturers to track product through the supply chain. A serial number in the tags could be linked to a database through the internet (Mark Roberti, n.d.). Between 1999 and 2003 the Auto-ID center gained the support of big companies. It opened a research lab in different countries such as Australia, the United Kingdom, Switzerland, Japan and China. Two air interface protocols, EPC 1 numbering scheme, and a network architecture for looking up data associated on an RFID tag on the Internet were developed by Auto-ID center (Mark Roberti, n.d.). Some of the biggest companies in the world announce that they will use RFID chips in their products widely. On the other hand, Department of Defense has said they plan to use EPC 2 to track goods in supply chain (Mark Roberti, n.d.). 1 Electronic Product Code: A serial, created by the Auto-ID Center, which will complement barcodes. The EPC has digits to identify the manufacturer, product category and the individual item. 2 Electronic Product Code 9
10 Main Components of RFID: Each RFID system consists of three main components: an RFID device (tag) a tag reader with an antenna and transceiver a host system or connection to an enterprise system (Roberts, 2006) Figure 2 Three main components of a RFID system (Roberts, 2006) There are different kinds of tags. Tags are chosen according to their application. Three different categories of tags are: Passive tags, Semi Passive tags and Active tags. Passive tags do not have a battery in them and they use the power generated by reader. When a passive tag is placed in the scanner or reader it will become active (Smith, 2008). Passive tags are generally read only. These tags are lighter, cheaper and smaller than other kinds of tags and they have a longer life. They need higher power reader and their read range is short (Roberts, 2006). Passive RFID tags could have different read range according to the frequency of waves and reader. These tags can be activated in frequencies between 30 KHz and 2.5 GHz. Low frequencies have shorter reading range and high frequencies have longer reading range. Higher frequency systems usually are used in automated toll collections (Smith, 2008). 10
11 In semi passive tags battery powers the chip but the device communicate by power gained from reader (Roberts, 2006). The device can beep, blink or perform other operations using battery. The semi-passive tags are faster than passive tags but they are not faster than active tags (Smith, 2008). Active tags have an internal battery in them and they are read/write capable. The read range of active tags differs from very close range to 100 m (Smith, 2008). Active tags have larger memory and they can store more data than passive tags. These tags are more expensive than two other kinds of tags. The battery shortens the life of the tag and they usually work for 10 years (Roberts, 2006). For the cases which manufacturers and clients need a longer read range, active tag is the best choice for instance in container tracking systems(mizuno, Shimizu, 2007). Read rang vary according to different factors. These factors influence the read range: frequency of the radio waves, the size of the tag antenna, the power output of the reader, whether a tag has a battery or gather energy from a reader. As mentioned before batterypowered tags have a read range of 100 meters. These kinds of tags are used for toll collection. UFH 3 tags which are used in supply chains and on the pallets have a read range between 20 to 30 feet in ideal condition (A Summary of RFID Standards, n.d.). The cost of the RFID systems is one of the important issues which has to be considered. The most popular tags are Article Surveillance (EAS, class 0 4 ) which cost between 1 and 6 US cents each. These EAS tags contain 1-bit or no information and they determine presence or 3 Ultra-high frequency 4 Class 1: a simple, passive, read-only backscatter tag with one-time, field-programmable non-volatile memory 11
12 absence. Passive tags (class 1 5 ) with data storage cost between 5 and 10 US cents each. For large and value items, Class are being used and they cost up to US$100 each (Roberts, 2006). The cost of the reader differs according to features. Most UHF7 readers cost between $500 to $2000. Low frequency readers cost less than 100$ and high frequency readers cost $200 to $300 (A Summary of RFID Standards, n.d.). Presently other technologies are being used to reduce the costs of RFID systems specially RFID tags. There are some companies that seek to replace metal tags with organic material. This method allows cheap mass-production of tags. One of the projects to replace the tags material is MaDriX. This project is supported by German Federal Ministry of Education and Research (Zudor, Keme ny, Blommestein,Monostori, Meulen, 2010). 5 Class 2: a passive backscatter tag with up to 65 KB of read-write memory. 6 Class 3: a semi-passive backscatter tag, with up to 65 KB read-write memory; essentially, a Class 2 tag with a built-in battery to support increased read range. Class 4: an active tag that uses a built-in battery to run the microchip's circuitry and to power a transmitter that broadcasts a signal to a reader. Class 5: an active RFID tag that can communicate with other Class 5 tags and/or other devices (RFID Journal, n.d.) 7 The read range for UHF readers is 1m to 15m 12
13 RFID applications: The technology of RFID systems have been developing since World War Two. Anti-theft systems, toll collection systems, tagged pallets in supply chain are only some examples to show how the RFID concept is being widespread. RFID can be used in every place where we need information about an object or person. This information can be about the object, person, the environment where they are in or the time when they are in a place. Here some examples of application of RFID are provided. Yo-Ping Huang, Shan-Shan Wang, Frode Eika Sandnes discuss how RFID system can provide a more interactive experience in museum? When a visitor with a PDA (with a RFID) reader approaches a tagged object in museum, the information about the object will be shown in his or her PDA (Huang, S Wang, Sandnes, 2011). If a person has a personal RFID with language background, information could be shown in his or her language. The US military and United Kingdom armed forces have used RFID systems for years to control their warehouses and supply chain (Radio frequency identification ready to deliver, 2005). UK s Tesco supermarket chain has used RFID systems to control distribution of their products to 98 branches all over the country (Tesco Begins RFID Rollout, 2004). Walmart and US Department of Defense use RFID tags to organize their products (RFID Gazette, 2004). 13
14 RFID implants: RFID implant is a rice-grain size RFID chip which can be put in the human body. In 2004, a first RFID implant was approved by U.S Food and Drug Administration. The name of this implant is VerChip. They include a 16 digit identification number and they can be scanned from a distance up to cm. The ID number is long enough to be given to everybody in the world. Other information related to the owner is not stored in the chip. When an implanted person goes through a scanner, this Figure 3 3RFID Implants (Foster, Jaeger, 2007) unique ID can be linked to the data base and other data related to the person will be extracted from data base. VeriMed, the commercial application is designed to identify patient in the healthcare system. In a healthcare center the patients with implants can be scanned and an authorized doctor will have access to the health background of the patient. This kind of implant is a passive tag and has a short read range (Rotter, Daskala, Compano, 2008). Veri Chips now is being used in Mexican hospitals and over one thousand patients are using these implants. They tell each person s blood type, known allergies, prior treatments and any other possible information about the person s health background. The idea is to reduce errors by doctors (Smith, 2008) Richard Seeling, Vice president of VerChip Corporation estimates 45 million people will use these implants. He believes cancer patients, people with pacemakers, people suffering from 14
15 loss of consciousness, diabetes, Alzheimer s disease will use these implants (Foster, Jaeger, 2007). There are some other applications of RFID implants. When an implanted person approaches the door it will be opened if the person is authorized. Readers can be put in cars and when the owner of the car sits in the car, it will be started (Foster, Jaeger, 2007). There are thousands of examples of application of RFID implants but there are some security issues which have to be solved. Martin Reynolds discuses how RFID implants can be scanned without permission and readers can be hidden. Gartner 8 believes these RFID implants will not be used widespread until secure devices become available (Reynolds, 2004) 8 Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company 15
16 Figure 4 Components of a RFID Implant (Foster, Jaeger, 2007) 16
17 RFID implant and urban planning: If we assume a day will come when everyone has an implanted RFID chip in his or her body and everywhere has a RFID scanner, we will have spatially distributed people with unique ID which can be scanned everywhere and anytime. Why do we have to assume this nightmare will happen? This question does not have a simple answer. You have to think who are the most influential people in the world? People who assume RFID implants are nightmare; owners of big companies wanting control thousands of workers with RFID implants, directors of insurance companies with millions of clients 9, politicians who strive for power or leaders of the society who seek for security 10? If Google and IBM announce their personnel have to be implanted and implanted personnel are eligible for some incentives, If insurance companies announce implanted clients have to pay less than others, If airports say implanted passengers can pass easily through gates without security check, if schools do not take responsibility of students without RFID implants, if U.S Homeland Security does not allow international students without RFID implant come to the United States and thousands of other if, then people who assume RFID is a nightmare have two choice: living in a desert or being implanted. Now it is more feasible to have spatially distributed people with unique ID in near future. In this hypothetical society everything has a unique ID. Everything and everyone could 9 RFID could have an important influence in insurance systems. When doctors have access to health background of the patients, the number of errors in healthcare systems will be reduced. 10 If everyone has an RFID implant and everywhere equipped with reader, criminals can be tracked easily. For example if computers only start up after RFID scanning, it will be more feasible to track hackers. 17
18 be connected to internet. There could be thousands of proposals for this utopia (or dystopia).does this network of people, objects and places have any application in urban planning? There are different theories and methods in urban planning which focus on the relationship between people and place. Kevin Lynch in his book Image of the City talks about the Image of the city in people s mind. He discusses landmarks and their visual quality. He believes land marks have to be different from their surrounding and they have to be in nodes in cities. These qualities make them more attractive and people can recognize them better (Lynch, 1960). On the basis of Lynch theory there must be a visual relationship between people and environment. Why do we not have a relationship between land use and people s interests? Why do people not have a map of their favorite places in their minds? To build this new image of the city we need to digitize people s background and interests. RFID implant is the key to solve this mystery. As mentioned before RFID implant can be linked to a central database and this data base can include any data. For example it includes your search history in Google 11 or history of restaurants where you have been this week 12. Now you are passing through a street and one shop on the other side of the street has the book you searched yesterday in Google 13. Bookstore can scan your RFID 14 or Mobile phone. So the bookstore finds your favorite book according to your search history. It sends a message to your cell phone to inform you it has your 11 If we assume every object has a reader, every computer will have a RFID reader too. So what we searched can be stored in a data base linked to our ID. 12 If we assume every place has a RFID reader so every restaurant where you have been, have scanned your RFID and it is obvious what you have eaten there because you were connected to the data base of the restaurant. 13 The book has a RFID chip in it and the shop has a reader so the book is connected to the data base of the shop. 14 RFID implants have short read range but they can connect to your mobile phone (equipped with RFID reader) and then you can be connected to internet and your data base (Rotter, Daskala, Compano, 2008). 18
19 favorite book. The shop can show the picture of the book which you searches yesterday in an advertisement screen in front of it. In the case of restaurants: yesterday you have been in Pizza Hut and in your food history there are some fatty foods. When you are passing a fitness club, a message will be sent to your cell phone and shows that you need some exercise today. These are only two examples to show how RFID implant can be used to integrate our personality and background with built environment. RFID implants have this potential to be used in transportation studies. According to figure 1 In forecasting travel demand, we usually split the city to different zones and then we calculate how many travels have been accrued from zone A to Zone B and then we forecast travel demand. For example Zone A is a commercial zone and Zone B is a residential zone. Questionnaire is the traditional way to find the trend of people s travel. In our assumed city with implanted residents where, when, who and speed and any other useful information for transportation planning could be found. For example it is apparent that you left your home at 4:00 pm and then you went to Walmart at 4: This information can be surveyed for millions of people not only a limited number of people in a sample. Transportation planning on the basis of this information will be more accurate. In this paper a short history of RFID and main components of RFID systems were mentioned. These two issues were discussed to show how a concept can be developed and 15 Your home has RFID reader and Walmart has RFID reader too. Your home is in residential zone and walmart is in commercial zone. They are connected to GIS land use data bases. All these data bases are connected to a central server. 19
20 what limitations we are facing. Costs and read range of RFID chips were discussed because without mentioning them the new idea for cities is only a simple dream. It is obvious which two proposed ideas are only initial ideas on the basis on a hypothetical society. It is a little disappointing when we think these ideas are fiction but every new thing comes from a dream. Also if we take a look at the history of RFID, cell phones or internet, the hypothetical society will be feasible. 20
21 References: 1. Arellano, J. (2008). Human RFID chip implants. Rural Telecommunications. 27: Landt, J. (2005). "The history of RFID." Potentials, IEEE 24(4): Retrieved from Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D Foster, K.R.; Jaeger, J.;, "RFID Inside," Spectrum, IEEE, vol.44, no.3, pp.24-29, March 2007 Retrieved from Rotter, P.; Daskala, B.; Compano, R.;, "RFID implants: Opportunities and and challenges for identifying people," Technology and Society Magazine, IEEE, vol.27, no.2, pp.24-32, Summer Smith, A. D. (2007). "Evolution and Acceptability of Medical Applications of RFID Implants Among Early Users of Technology." Health Marketing Quarterly 24(1-2): Foster, K. R. and J. Jaeger (2008). "Ethical Implications of Implantable Radiofrequency Identification (RFID) Tags in Humans." The American Journal of Bioethics 8(8): Ilie-Zudor, E., Z. Kemény, et al. (2011). "A survey of applications and requirements of unique identification systems and RFID techniques." Computers in Industry 62(3): Unique-Identification-Systems-and-RFID-Techniques 8. Chang, J. M., Y.-P. Huang, et al. (2011). "Real-Time Location Systems and RFID." IT Professional 13(2): Arellano, J. (2008). Human RFID chip implants. Rural Telecommunications. 27: Roberts, C. M. (2006). Radio frequency identification (RFID). Computers & Security, 25(1), doi: /j.cose
22 11. Mizuno, K. and M. Shimizu (2007). Transportation Quality Monitor Using Sensor Active RFID. Applications and the Internet Workshops, SAINT Workshops =1 12. From how far away can a typical RFID tag be read? RFID Journal, 20 November 2012, A Summary of RFID Standards, 20 November 2012, How much do RFID readers cost today?, 20 November 2012, Martin Reynolds. (2004, October 2004). RFID Implants Need Better Privacy Protection Radio frequency identification ready to deliver, Signal Magazine, January 2005, Armed Forces Communications and Electronics RFID Gazette, 18 November 2012, Tesco Begins RFID Rollout. RFID Journal, 20 November 2012, Mark Roberti. The History of RFID Technology. RFID Journal 22
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
RFID in a nutshell. Colin Jervis, Director, Kinetic Consulting Ltd
Colin Jervis, Director, Kinetic Consulting Ltd Enthusiasts in healthcare fields suggest that one day a tiny RFID (or radio-frequency identification) tag implanted under your skin could transmit your NHS
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
Small Tech, Big Issues
Small Tech, Big Issues How It Works Advantages of RFID History of the RFID Proposed Uses Identification Medical Records Immigration Security Authentication Ethical Issues Purchase tracking Lack of encryption
Why Has the Development in RFID Technology Made Asset Management More Urgent?
E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
RF ID Security and Privacy
RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
WHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
Radio Frequency Identification (RFID) Vs Barcodes
Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want
International Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
How To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
RFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium.
RFID Basics RFID Basics Introduction Radio Frequency Identification (RFID) technology has been attracting considerable attention with the expectation of improved supply chain visibility for both suppliers
RFID the next step in consumer-product relations or Orwellian nightmare?
RFID the next step in consumer-product relations or Orwellian nightmare? Nordic Consumer Policy Research Conference 2007 TOWARDS A NEW CONSUMER? TOWARDS A NEW CONSUMER POLICY? Helsinki, October 3-5, 2007
SATO RFID White Paper
SATO RFID White Paper Rev_0710 1 Overview This white paper describes the basic components of a Radio Frequency Identification (RFID) system and explores the technology, applications, and competitive advantages
RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department
RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an
The Place of Emerging RFID Technology in National Security and Development
The Place of Emerging RFID Technology in National Security and Development Akintola K.G. Boyinbode O.K. Computer Science Department, Computer Science Department, University of Houston-Victoria, University
ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)
ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you
Cloud RFID UHF Gen 2
Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system
The Research and Application of College Student Attendance System based on RFID Technology
The Research and Application of College Student Attendance System based on RFID Technology Zhang Yuru, Chen Delong and Tan Liping School of Computer and Information Engineering, Harbin University of Commerce,
The Marriage of Passive and Active Technologies in Healthcare. Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari
The Marriage of Passive and Active Technologies in Healthcare Authors: Dr. Erick C. Jones, Angela Garza, Gowthaman Anatakrishnan, and Jaikrit Kandari Automated Identification Technologies in Healthcare
Typical System Architecture YOU CAN T MANAGE WHAT YOU CAN T MEASURE
HEALTHCARE Typical System Architecture Why RFID.. Bar Code Requires Line of - Site Requires correct orientation Easily obscured by dirt Easily scratched or damaged Contents cannot be modified Can only
RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings
RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings Are You Missing Out On Huge Savings through Better Asset Management? Many schools around the country have implemented wireless networking
RFID Radio Frequency Identification
RFID Radio Frequency Identification 11 February 2004 Dr. Bradley J. Bazuin Assistant Professor, ECE Dept. With material from the ECE 481 & 482 project by Shen-Ping Lee, Young-Sun Kim, and Pradeep Kannan
Active RFID Solutions for Asset Tracking and Inventory Management
Active RFID Solutions for Asset Tracking and Inventory Management Introduction RFID (Radio Frequency Identification) technology is fast replacing ScanCode technology for asset tracking and inventory management.
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Data Protection Technical Guidance Radio Frequency Identification
Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
EPCglobal RFID standards & regulations. Henri Barthel OECD Paris, 5 October 2005
EPCglobal RFID standards & regulations Henri Barthel OECD Paris, 5 October 2005 Roots of EPCglobal Auto ID Center (launched in 1999) Six world-class academia Labs: MIT (US), Cambridge (UK), Adelaide (Australia),
Using Hybrid RFID for Improved Asset Tracking
Using Hybrid RFID for Improved Asset Tracking Sponsored by: Presented by: Tom O Boyle Director of RFID, Barcoding, Inc. 2015 MHI Copyright claimed for audiovisual works and sound recordings of seminar
RF Attendance System Framework for Faculties of Higher Education
RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,
SOURCE ID RFID Technologies and Data Capture Solutions
SOURCE ID RFID Technologies and Data Capture Solutions RFID - a vital link for streamlining in-store inventory and supply chain management Source ID believes that worldwide demand for RFID based technology
Time & Access System An RFID based technology
Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
Asset Management Services. White Paper
Asset Management Services White Paper Asset Management Solutions provide a comprehensive and systematic method for managing equipment and intelligence in complex IT infrastructure environments. Through
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Feature. Security and Privacy Trade-offs in RFID Use. Operational Zone RFID Tag. RFID Reader
Feature Security and Privacy Trade-offs in RFID Use S. Srinivasan is a professor of computer information systems at the University of Louisville in Kentucky, USA. He can be reached at [email protected].
The Drug Quality & Security Act
The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply
Automated Identification Technologies
Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions [email protected] Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT
whitepaper How RFID Technology Can Enhance Your Asset Management Program
whitepaper How RFID Technology Can Enhance Your Asset Management Program TABLE OF CONTENTS: PAGE Introduction...3 How RFID Technology Works...4 RFID Versus Barcode...6 RFID Technology in Real-world Applications...7
RFID Applications in the Healthcare and Pharmaceutical Industries
RFID Applications in the Healthcare and Pharmaceutical Industries White Paper Revolutionizing Asset Management and the Supply Chain Document Revision: 1.0 Release Date: February 7, 2005 Written by: Johnny
Modern Multipurpose Security Management System
Modern Multipurpose Security Management System Swaranambigai 1,Sabari 2 Dhanabal 3 1 Assistant Professor, 2,3 PG Scholar Department of Electronics and Communication Engineering Jay Shriram Group of Institutions
Efficient Asset Tracking: From Manual to Automated
White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies
BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID
267 BOARDING SCHOOL STUDENTS MONITORING SYSTEMS (E-ID) USING RFID Herdawatie binti Abdul Kadir, Siti Nurul Aqmariah binti Mohd Kanafiah and Mohd Helmy bin Abd. Wahab Faculty of Electrical and Electronic
Michael I. Shamos, Ph.D., J.D. School of Computer Science Carnegie Mellon University
Michael I. Shamos, Ph.D., J.D. School of Computer Science Carnegie Mellon University Background Ph.D., Yale University (computer science, 1978) J.D., Duquesne University (law, 1981) Carnegie Mellon computer
RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008
RFID Tags Prasanna Kulkarni Motorola ILT Workshop Smart Labels USA February 21, 2008 Agenda RFID tags Brief overview Roadmap of key attribute needs Existing tag technologies Emerging tag technologies Critical
CHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
Automated Security System using ZigBee
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School
Using RFID for Supply Chain Management
DÉPARTEMENT D INFORMATIQUE / DEPARTEMENT FÜR INFORMATIK Information Systems Research Group Electronic Business course Using RFID for Supply Chain Management Project work Written by Fabien Ropraz Student
RFID Based Centralized Patient Monitoring System and Tracking (RPMST)
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 08-15 RFID Based Centralized Patient Monitoring System and Tracking
rf Technology to automate your BUsiness
Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,
On the Security of RFID
On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com
If you are interested in Radio Frequency Identification technology, then this is the best investment that you can make today!
If you are interested in Radio Frequency Identification technology, then this is the best investment that you can make today! Here s Here's a training course on on RFID technology, with which CERTIFICATION
Internet of Things. Hafedh Yahmadi LOGO
Internet of Things Hafedh Yahmadi LOGO Contents 1 What s Internet of Things 2 State of the Art of IoT 3 Challenges and Limitation of IoT 4 Future of IoT Ask google : where is my keys.? Where are my kids?
Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform
Results of IMES (Indoor Messaging System) Implementation for Seamless Indoor Navigation and Social Infrastructure Platform Dinesh Manandhar, Seiya Kawaguchi, Hideyuki Torimoto GNSS Technologies Inc., Japan
Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER
Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Published 10/29/2012 I ndustries are facing fierce market competition, making more data about
Military Usage of Passive RFID 1
Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third
WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?
WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? TABLE OF CONTENTS What is RFID? 1 Will RFID replace Barcodes? 1 How does RFID work? 1 What is an RFID Tag? 3 What are Smart Labels? 4 Why use RFID? 5 Why
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Network Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 2 Collaboration with Frank Akujobi
Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda
Security Issues in RFID systems By Nikhil Nemade Krishna C Konda Agenda Introduction to an RFID System Possible Application Areas Need for Security Vulnerabilities of an RFID system Security Measures currently
RFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam [email protected] 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
RFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
LibRFID: Automation Software for Library Management System Using RFID Technology
LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi,
Improving production and operation systems with RFID. Taking manufacturing to the next level: RFID Work-in-Process solutions from IBM
Improving production and operation systems with RFID Taking manufacturing to the next level: RFID Work-in-Process solutions from IBM RFID: A proven technology changing the factory floor Today the most
Application of Tracking Technology to Access-control System
Hitachi Review Vol. 53 (2004),. 2 83 Application of Tracking Technology to Access-control System OVERVIEW: An access-control system that applies tracking technology to control the movement of people and
A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
Ambient Intelligence WS 08/09 V8: RFID. Prof. Dr.-Ing. José L. Encarnação
WS 08/09 V8: RFID Prof. Dr.-Ing. José L. Encarnação TUD, FB20, Graphisch-Interaktive Systeme (GRIS) Gino Brunetti INI-GraphicsNet Stiftung Holger Graf Zentrum für Graphische Datenverarbeitung (ZGDV) Dr.-Ing.
tags Figure D-1 Components of a Passive RFID System
Attachment D: RFID Technology Overview The following sections provide an overview to RFID technology, the applications in which they are currently used and other considerations of RFID technology as it
Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract
Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract This talk presents a brief overview of the ultra-wideband (UWB) RFID system with emphasis on the performance evaluation
RFID Applications: An Introductory and Exploratory Study
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 RFID Applications: An Introductory and Exploratory Study Kamran AHSAN 1, Hanifa SHAH 2 and Paul KINGSTON 3 1,2 Faculty of Computing, Engineering & Technology
AAS. Automatic Attendance System. Grant Hornback, Alex Babu, Bobby Martin, Ben Zoghi, Madhav Pappu, Rohit Singhal
AAS Automatic Attendance System Grant Hornback, Alex Babu, Bobby Martin, Ben Zoghi, Madhav Pappu, Rohit Singhal Abstract Due to the easy availability of almost all information on the internet these days,
A. Background. In this Communication we can read:
On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background
Smart Wheel Loader Based on RFID and Positioning Technologies
Smart Wheel Loader Based on RFID and Positioning Technologies Sakari Pieskä, Mika Luimula, Juha Alaspää CENTRIA Research and Development Vierimaantie 5, RFMedia Laboratory Ylivieska, Finland {firstname.lastname}@centria.fi
RFID BASED AUTOMATED LOW COST DATA ACQUISITION SYSTEM FORPUBLIC TRANSPORT
RFID BASED AUTOMATED LOW COST DATA ACQUISITION SYSTEM FORPUBLIC TRANSPORT Anirban Patra 1, Dr. Arijit Saha 2 1. Assistant Professor, ECE Dept., JIS College of Engineering, Kalyani, West Bengal (India)
Identitovigilance technologies
Identitovigilance technologies Typologies and future developments Séverine Dewerpe, Healthcare & Barcodes Manager, GS1 Belgilux Tuesday, 10 th of March 2015 100 000 130 270 million 3 30 years 4 Agenda
NEW TECHNOLOGY. Figure 1. Simplified view of data transfer in low-frequency passive RFID tags (the tag is enlarged for clarity).
RFID offers tantalizing benefits for supply chain management, inventory control, and many other applications. Find out whether your company could benefit. Ron Weinstein RFID: A Technical Overview and Its
ACTA UNIVERSITATIS APULENSIS No 9/2005. Burja Lucian and Tanase Mihai
ACTA UNIVERSITATIS APULENSIS No 9/2005 IMPLEMENTING A DOCUMENT MANAGEMENT SYSTEM USING RFID TECHNOLOGY Burja Lucian and Tanase Mihai Abstract.With strong support in the industry from important players
Study of Logistics Warehouse Management System Based on RFID
Advanced Materials Research Vol. 748 (2013) pp 1281-1284 Online available since 2013/Aug/30 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.748.1281
Redundant Data Removal Technique for Efficient Big Data Search Processing
Redundant Data Removal Technique for Efficient Big Data Search Processing Seungwoo Jeon 1, Bonghee Hong 1, Joonho Kwon 2, Yoon-sik Kwak 3 and Seok-il Song 3 1 Dept. of Computer Engineering, Pusan National
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Healthcare versus Biochemical Industries
RFID in Healthcare Healthcare versus Biochemical Industries Where is the infusion pump? Where is patient Brown? Has Mrs. Jones already left the department? I cannot find the device that needs maintenance!
Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial Database Framework
International Journal of Research in Information Technology (IJRIT) www.ijrit.com ISSN 2001-5569 Development of a Radio Frequency Identification Based Attendance Management Application With A Pictorial
