RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference Upper Saddle River, NJ Boston* Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney Tokyo Singapore Mexico City
About the Authors xiii Preface xv PART I. WHAT Is RFID? 1 Chapter 1: A Better Way of Doing Things 3 Security and Authentication 7 Electronic Article Surveillance 7 Document Authentication 8 Access Control 8 Electronic Drug Pedigree 9 Safety 9 People Monitoring 10 Patient Care 11 Environmental Sensing and Monitoring 12 Convenience 14 Payment and Loyalty 14 Crowd Control 14 Sports Timing 15 Golf Ball Tracking 15 Process Efficiency 16 Track and Trace 16 Industrial Automation 19 Supply Chain Integration 20 Summary 22 Chapter 2: The History and Evolution of RFID 23 RFID Technology and the Radio 24 The Early Days of RFID 25 From Detection to Unique Identification 26 RFID Flourishes Across the Globe 29 Texas Instruments Leads Pioneering Efforts in the U.S. 29 Europe Gets an Early Start 29 Passive Tags Grow Up in the '90s 30 Summary 32
viii CONTENTS Chapter 3: Components of RFID Systems 35 Operational Description of RFID Systems 36 Hardware Components 38 Tag 39 Reader 43 Antenna 47 Limitations of Tag and Reader Communications 49 Host Computer 49 Software Components 50 RFID System Software 50 RFID Middleware 52 Host Application 53 The EPCglobal Network 54 Electronic Product Code (EPC) 55 The ID System 55 EPC Middleware 56 Object Name Service (ONS) 56 EPC Information Services (EPCIS) 56 Summary 57 Part II How to Deploy RFID 59 Chapter 4: Standards Related to RFID 61 Role of Standards in Technology Advancement and Adoption 62 Standards and RFID An Overview of EPCglobal 63 Version 1.0/1.1 Specifications 64 Implementation of EPC through EPCglobal Network 69 Functions and Features of EPCglobal 70 ISO and RFID Standards 72 Other Standardization Initiatives 73 Recommendations for the Practitioner 74 Summary 75
Chapter 5: Framework for Deployment 77 Introducing RFID Deployment Framework 78 Identify Business Problem 80 Define and Pilot Solution 84 Build and Deploy Solution 89 Sustain and Improve 93 Knowledge Base 95 Summary 97 Chapter 6: Organizational Mobilization 99 Achieving Organizational Mobilization 100 Provide Leadership Focus 102 Communicate Shared Vision 104 Engage Support and Resistance 107 Institutionalize Results and Lessons 109 Summary 111 Chapter 7: Cost-Benefit Analysis 113 Analyzing Benefits 115 Types of Benefits 115 Finding the Right Benefit Level 116 Elements of Cost 118 Tags 119 Readers 120 Antennae 120 Host Computer, Middleware, and Host Applications 121 Installation 121 Tuning 122 Integration and Business Process Reengineering 122 Support and Maintenance 123 Cost-Benefit Characterization of Selected Applications 123 Summary 126 ix
Chapter 8: Vendor Considerations and Landscape 127 Vendor Selection Approach 128 Best-of-Breed 128 One-Stop-Shop 129 Trusted Advisor 130 Vendor Comparison Criteria 131 Vendor Categories 133 Tag and Reader Vendors 133 RFID Middleware Vendors 133 Computer Systems Vendors 134 Application Vendors 134 Systems Integration Vendors 135 Value Added Vendors 135 Specialty Services Vendors 135 Vendor Guide 136 Summary 136 Part III The Path Ahead 139 Chapter 9: Mandates as Business Catalysts 141 Wal-Mart and RFID 143 Background 143 Wal-Mart Mandate 144 Implications for Suppliers 146 Implications for RFID Component Vendors 147 U.S. Department of Defense and RFID 147 Details of the Mandate 149 Implications for Suppliers 151 Recommendations for Suppliers of Wal-Mart, Other Retailers, and the DoD 153 RFID Initiatives at Other Organizations 155 Summary 156
X Chapter 10: Security and Privacy 157 Distinguishing Between Security and Privacy Issues 158 Security Challenges 160 Areas of Security Vulnerability in RFID Components 160 Assessing Security Risks in RFID Applications 162 Solutions for Securing and Protecting RFID Data 163 Privacy Considerations 169 Consumer RFID Applications and Privacy 169 Consumer Willingness to Disclose Personal Data 170 RFID Privacy Best Practices 171 Summary 173 Chapter 11: Emerging Trends in RFID 175 Technological Advancements 176 New and Improved Tags 177 Architecture for the New Network 178 Falling RFID Tag Price 180 Business Process Innovations 180 Item-Level Tagging 181 Third-Party Logistics Management 182 Real-Time Inventory Management 182 Business Intelligence 183 IT Outsourcing 183 Real-Time Data Sharing for Total Supply Chain Integration 183 Evolving Standards and Legislation 184 Industry Standards 184 Government Regulations and Mandates 184 Privacy Related Regulations 185 Consumer Application Innovations 185 Summary 186