RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title



Similar documents
Delivery. Enterprise Software. Bringing Agility and Efficiency. Global Software Supply Chain. AAddison-Wesley. Alan W. Brown.

Winning the Hardware-Software Game

The Data Access Handbook

BUSINESS INTELLIGENCE

ENTERPRISE SYSTEMS FOR MANAGEMENT

RFID in the Supply Chain

Building. Applications. in the Cloud. Concepts, Patterns, and Projects. AAddison-Wesley. Christopher M. Mo^ar. Cape Town Sydney.

MIKE COHN. Software Development Using Scrum. VAddison-Wesley. Upper Saddle River, NJ Boston Indianapolis San Francisco

Public Relations in Schools

Practical Intrusion Analysis

Software Security. Building Security In. Gary McGraw. A Addison-Wesley

Relationship marketing

Managing the Unmanageable

SOA with Java. Realizing Service-Orientation with Java Technologies UPPER SADDLE RIVER, NJ BOSTON INDIANAPOLIS SAN FRANCISCO

CONTEMPORARY DIRECT & INTERACTIVE MARKETING

If you are interested in Radio Frequency Identification technology, then this is the best investment that you can make today!

Enterprise. ESXi in the. VMware ESX and. Planning Deployment of. Virtualization Servers. Edward L. Haletky

Supply Chain Strategies

IBM Solution for Pharmaceutical Track & Trace

IBM Solution for Pharmaceutical Track & Trace: Supply chain visibility drives overall performance

THE PSYCHOLOGY OF INVESTING

IBM WebSphere Premises Server

Agile Methods. Introduction to. AAddison-Wesley. Sondra Ashmore, Ph.D. Kristin Runyan. Capetown Sydney Tokyo Singapore Mexico City

Customer Relationship Management

Social Media Marketing

Performance Management

RFID Applications in the Healthcare and Pharmaceutical Industries

An Introduction. Global Edition. "University of North Carolina. Northwestern University

AGILE GAME DEVELOPMENT WITH SCRUM

MARKETING. Elnora W.!b II Ufluu 1 UNIVERSITY OF SOUTH CAROLINA UPSTATE. Michael R. SAINT JOSEPH'S UNIVERSITY. Greg W.

Web Development with TIBCO General Interface

SOA Governance. Stephen G. Bennett, Clive Gee, Robert Laird, Co-authored and edited by Thomas Erl. Governing

Financial Statement Analysis

SERVICES MARKETING PEOPLE, TECHNOLOGY, STRATEGY. Global Edition. Christopher Lovelock. Yale University Jochen Wirtz National University of Singapore

Underground Mine Rescue Equipment and Technology

Lean Supply Chain and Logistics Management

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

Sixth Edition. Global Edition STRATEGY, FLANNING, AND OPERATION. Sunil Chopra. Kellogg School of Management. Peter Meindl.

Customer Relationship. Management. Ed Peelen and Rob Beltman

Efficient Data Sharing in Healthcare

HP Brazil RFID CoE Center of Excellence

2015 Third-Party Logistics Study

Tuning Tips & Techniques

Configuration. Management for. Senior Managers. Essential Product Configuration. and Lifecycle Management

Compensating the Sales Force

BUSINESS AND PROFESSIONAL COMMUNICATION

Privacy Guidelines for RFID Information Systems (RFID Privacy Guidelines)

Big Data Analytics From Strategie Planning to Enterprise Integration with Tools, Techniques, NoSQL, and Graph

How To Write A Web Framework In Java

A. Background. In this Communication we can read:

Tracking metal parts with passive UHF RFID. April 2007

Marketin. Global Edition 14

SOURCE ID RFID Technologies and Data Capture Solutions

The Crossroads of Accounting & IT

RFID Design Principles

Enabling the secure use of RFID

QUANTITATIVE METHODS. for Decision Makers. Mik Wisniewski. Fifth Edition. FT Prentice Hall

Getting Started with TraSer from Requirements to a Solution

CHAINED EXPLOITS Advanced Hacking Attacks from Start to Finish

Cyber Attacks. Protecting National Infrastructure Student Edition. Edward G. Amoroso

Developer's Cookbook. Building Applications with. The Android. the Android SDK. A Addison-Wesley. James Steele Nelson To

Maximum vsphere. Tips, How-Tos,and Best Practices for. Working with VMware vsphere 4. Eric Siebert. Simon Seagrave. Tokyo.

Purchasing and Supply Chain Management

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

Privacy and Security in library RFID Issues, Practices and Architecture

Delivery. Continuous. Jez Humble and David Farley. AAddison-Wesley. Upper Saddle River, NJ Boston Indianapolis San Francisco

RFID current applications and potential economic benefits

GS1 EPCglobal Transportation and Logistics Phase 3 Pilot Program Completion PRESS RELEASE

Network Security Essentials:

TECHNOLOGY BRIEF. Business Benefits from Radio Frequency Identification (RFID)

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER

Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO

BIRT: A Field Guide to Reporting

RFID the next step in consumer-product relations or Orwellian nightmare?

INCIDENT RESPONSE CHECKLIST

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

VALUATION The Art and Science of Corporate Investment Decisions

RFID Design Principles

NP Collection Benefits RFID in Logistics and Stores. Markus Rosendahl, CEO of Senso Global

HARTING Auto-ID System Integration

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier

What Do We Really Mean By Security for RFID

The Perusal and Review of Different Aspects of the Architecture of Information Security

RFID System Description for Logistics & Inventory

CHAPTER 1 Introduction 1

Transcription:

RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference Upper Saddle River, NJ Boston* Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney Tokyo Singapore Mexico City

About the Authors xiii Preface xv PART I. WHAT Is RFID? 1 Chapter 1: A Better Way of Doing Things 3 Security and Authentication 7 Electronic Article Surveillance 7 Document Authentication 8 Access Control 8 Electronic Drug Pedigree 9 Safety 9 People Monitoring 10 Patient Care 11 Environmental Sensing and Monitoring 12 Convenience 14 Payment and Loyalty 14 Crowd Control 14 Sports Timing 15 Golf Ball Tracking 15 Process Efficiency 16 Track and Trace 16 Industrial Automation 19 Supply Chain Integration 20 Summary 22 Chapter 2: The History and Evolution of RFID 23 RFID Technology and the Radio 24 The Early Days of RFID 25 From Detection to Unique Identification 26 RFID Flourishes Across the Globe 29 Texas Instruments Leads Pioneering Efforts in the U.S. 29 Europe Gets an Early Start 29 Passive Tags Grow Up in the '90s 30 Summary 32

viii CONTENTS Chapter 3: Components of RFID Systems 35 Operational Description of RFID Systems 36 Hardware Components 38 Tag 39 Reader 43 Antenna 47 Limitations of Tag and Reader Communications 49 Host Computer 49 Software Components 50 RFID System Software 50 RFID Middleware 52 Host Application 53 The EPCglobal Network 54 Electronic Product Code (EPC) 55 The ID System 55 EPC Middleware 56 Object Name Service (ONS) 56 EPC Information Services (EPCIS) 56 Summary 57 Part II How to Deploy RFID 59 Chapter 4: Standards Related to RFID 61 Role of Standards in Technology Advancement and Adoption 62 Standards and RFID An Overview of EPCglobal 63 Version 1.0/1.1 Specifications 64 Implementation of EPC through EPCglobal Network 69 Functions and Features of EPCglobal 70 ISO and RFID Standards 72 Other Standardization Initiatives 73 Recommendations for the Practitioner 74 Summary 75

Chapter 5: Framework for Deployment 77 Introducing RFID Deployment Framework 78 Identify Business Problem 80 Define and Pilot Solution 84 Build and Deploy Solution 89 Sustain and Improve 93 Knowledge Base 95 Summary 97 Chapter 6: Organizational Mobilization 99 Achieving Organizational Mobilization 100 Provide Leadership Focus 102 Communicate Shared Vision 104 Engage Support and Resistance 107 Institutionalize Results and Lessons 109 Summary 111 Chapter 7: Cost-Benefit Analysis 113 Analyzing Benefits 115 Types of Benefits 115 Finding the Right Benefit Level 116 Elements of Cost 118 Tags 119 Readers 120 Antennae 120 Host Computer, Middleware, and Host Applications 121 Installation 121 Tuning 122 Integration and Business Process Reengineering 122 Support and Maintenance 123 Cost-Benefit Characterization of Selected Applications 123 Summary 126 ix

Chapter 8: Vendor Considerations and Landscape 127 Vendor Selection Approach 128 Best-of-Breed 128 One-Stop-Shop 129 Trusted Advisor 130 Vendor Comparison Criteria 131 Vendor Categories 133 Tag and Reader Vendors 133 RFID Middleware Vendors 133 Computer Systems Vendors 134 Application Vendors 134 Systems Integration Vendors 135 Value Added Vendors 135 Specialty Services Vendors 135 Vendor Guide 136 Summary 136 Part III The Path Ahead 139 Chapter 9: Mandates as Business Catalysts 141 Wal-Mart and RFID 143 Background 143 Wal-Mart Mandate 144 Implications for Suppliers 146 Implications for RFID Component Vendors 147 U.S. Department of Defense and RFID 147 Details of the Mandate 149 Implications for Suppliers 151 Recommendations for Suppliers of Wal-Mart, Other Retailers, and the DoD 153 RFID Initiatives at Other Organizations 155 Summary 156

X Chapter 10: Security and Privacy 157 Distinguishing Between Security and Privacy Issues 158 Security Challenges 160 Areas of Security Vulnerability in RFID Components 160 Assessing Security Risks in RFID Applications 162 Solutions for Securing and Protecting RFID Data 163 Privacy Considerations 169 Consumer RFID Applications and Privacy 169 Consumer Willingness to Disclose Personal Data 170 RFID Privacy Best Practices 171 Summary 173 Chapter 11: Emerging Trends in RFID 175 Technological Advancements 176 New and Improved Tags 177 Architecture for the New Network 178 Falling RFID Tag Price 180 Business Process Innovations 180 Item-Level Tagging 181 Third-Party Logistics Management 182 Real-Time Inventory Management 182 Business Intelligence 183 IT Outsourcing 183 Real-Time Data Sharing for Total Supply Chain Integration 183 Evolving Standards and Legislation 184 Industry Standards 184 Government Regulations and Mandates 184 Privacy Related Regulations 185 Consumer Application Innovations 185 Summary 186