rense.com

RFID Report -
The Future Is Here
A Beginner's Guide To RFID

The RFID Gazette
2-7-5
 
Radio frequency identification technology (RFID) is beginning to revolutionize the way business is done. Already, the U.S. Department of Defense and Wal-Mart are requiring their top suppliers to have RFID technology implemented in their supply chains by January 1, 2005. As more manufacturers of RFID tags, readers and software solutions enter the market, the price of implementing the technology will continue to decline.
 
The technology, first invented by Harry Stockman with the publishing of his 1948 report "Communication by Means of Reflected Power," has only in the last few years become viable. As time passes, however, nearly every Fortune 500 company will join the DoD and Wal-Mart in employing the technology, making it an essential factor in almost any business.
 
The key feature of the technology is the ability for an RFID-tagged object to be tracked instantly from anywhere in the world, provided that a reader is in range. The main application for this today is tracking products along a supply chain. Everyone in the RFID-enabled supply chain, from the manufacturers at the factory to the inventory trackers at the retail location, has the ability to instantly call up the location, condition, and supply of a particular product. Industry professionals expect the RFID tag to eventually replace the barcode as the identification system of choice. And there are several reasons why this should eventually happen.
 
First, however, it is important to understand how the technology works. There are two types of RFID tags. An active tag uses its own battery power to contact the reader. It works over a greater distance than passive tags, but its larger size is its main drawback. On the other hand, a passive tag does not require a battery. Rather, a passive tag derives its power from the electromagnetic field created by the signal from the RFID reader. This generates enough power for the tag to respond to the reader with its information. While the range is smaller than active tags, having no need for a battery makes the passive tagís life virtually unlimited and its size potentially minute.
 
In contrast to the barcode, RFID tags can be read from a larger distance, up to nine meters with some readers. Also, unlike optical barcode scanners, the RFID chip can be read from a reader not in its line of sight. For instance, cargo within a truck does not need to be unloaded to be scanned by an RFID reader, as the radio waves can penetrate the walls of the truck. The truck example brings up another intriguing feature of the technology. While a barcode needs to scan products one at a time, an RFID reader can read hundreds of chips virtually instantaneously, speeding up the loading and delivery processes.
 
Furthermore, some RFID tags contain other sensors that can transmit valuable data to managers. For example, a manager shipping a refrigerated product may like to know if the temperature increases too much along a supply chain route. With thermometer readings being transmitted, this is possible.
 
Other features of RFID technology have caught the attention of privacy advocates. It has been acknowledged that RFID technology can be used for marketing purposes or even, in a Brave New World scenario, government tracking of its citizens. For instance, it is possible to ubiquitously embed the chip within a product, for instance a pair of jeans or a set of automobile tires. What is most frightening, however, is the ability to implant an RFID chip under the human skin.
 
If the tag is able to remain active after purchase of a product, this could potentially enable marketers with the ability to track information about the product after it leaves the store. For human tracking, sub-dermal RFID chips are already being offered. Of course, the human implant is more than just a tracking device. Credit card and other personal information can be stored on the chip and transmitted to a reader to pay for goods in a supermarket or gain access to personnel-restricted high security areas.
 
More practical uses of RFID tags have emerged as well:
 
-- In the pharmaceutical industry, RFID tags on drug bottles are being used as anti-counterfeiting devices.
 
-- Pet owners have begun implanting their cats and dogs with RFID chips to locate them should they become lost.
 
-- In libraries, books are being tagged for self-automated checkout, freeing up librarians to perform other tasks. This also allows a librarian to easily locate a book misplaced on the wrong shelf.
 
-- The USDA is pushing to give every cow in the United States its own unique identification number, making it easier to track diseases, such as mad cow disease, back to the originating farm.
 
Due to the lack of industry standards regarding the use of personal information that could be encoded on the chips, many privacy advocates have called on companies to state their intended use of the technology. Recently, the Privacy Rights Clearinghouse called on the Federal Trade Commission to regulate the use of RFID. As of yet, however, no federal agency has come forth to regulate the usage of the technology.
 
Technical standardization will bring the cost of RFID down drastically. EPCglobal Inc., which has taken over for the MIT Auto ID Center, is the non-profit organization that is working to standardize electronic product codes and RFID technology.
 
The EPCglobal Network uses RFID to enable true visibility of objects in the supply chain. The network has five fundamental elements:
 
1. The Electronic Product Code (EPC) is a unique number that identifies an item in the supply chain, whether that be an individual product or a case, or pallet, of many products being shipped. 2. Each silicon chip of each RFID tag is encoded with a unique EPC that identifies the product. The silicon chip is wired to an antenna, and, using radio frequency identification technology, each tag communicates to an RFID reader its EPC. 3. The Object Name Service (ONS) collects the EPC that is passed on from the reader. The ONS resides on a computer or local application system. It tells the computer systems where to locate information on the network about the item whose EPC it has just encountered. This information will typically reside on the Internet, making it readily available on a worldwide level. 4. Physical Markup Language (PML) is an XML-based language that is used to define data on objects. 5. Savant is the middleware technology that coordinates the movement of information over the computer systems.



Disclaimer






MainPage
http://www.rense.com


This Site Served by TheHostPros