RFID

= = toc =RFID (Radio Frequency Identification System)=

Introduction
Radio Frequency Identification or RFID is an automatic identification technology that allows for the identification of people, animals and objects using radio waves. In its current form, RFID technology differentiates itself from many other automatic identification technologies (like barcodes, for example) because tags can transmit and store data without human involvement. Recent testing of RFID in conjunction with satellite communication systems has resulted in the creation of new tags that can extend shipment visibility to remote areas with little RFID infrastructure. RFID works by using tags also called transponders which consist of a microchip and an antenna that transmit data through radio waves to readers that read and process the data. The tags usually contain a unique serial code that identifies each tag. The reader receives the data from the tag and converts it from radio waves to a medium that can be understood by computers.

The British military invented a system called Identification, Friend or Foe (IFF) in 1939, which enabled two way communications between ‘friendly’ planes and thus differentiated 'friend' from 'foe.' The planes emitted a pre-determined frequency that could be identified by a blip on the RADAR screen of other friendly planes. It was shortly after the war, when the concept of RFID systems arose in Harry Stockman’s paper called “Communication by Means of Reflected Power”. It was then that commercial companies began to use RFID technology in the form of one-bit tags to prevent theft. These anti theft devices introduced in the late sixties, were called Electronic Article Surveillance (EAS) Systems and were only capable of detecting whether an RFID tags were present or not. Earnest work on RFID systems began in the seventies. In 1972, Kriofsky and Kaplan patented the “Inductively coupled transmitter- responder arrangement”. This system utilized separate coils for receiving and transmitting signals. Successively, Beigel patented his “Identification device” in 1979, which combined two antennas. This application is considered as a landmark in RFID technology creation because it emphasized the potentially small size of RFID devices. The 1970’s also saw the creation of the livermore system, a handheld receiver that emitted and received coded radio signals to control access to a secure facility. This system marked the beginning of commercial use of RFID and was one of the first building entry systems based on proximity technology. (Garfinkel and Holtzman) In the 1980’s, RFID was implemented into more diverse domains, like personnel access, animals, toll roads, and shipment tracking. After several pilot program however, the 1990’s saw the full implementation of RFID. The focus of this paper is to evaluate the logistical effect of RFID implementation on Wal- Mart and its supplier Gillette. Their experiences with the technology give us crucial insights into organizational implementation in the future.

There are two main types of tags: Active and Passive. Passive tags do not have their own power source or transmitter. Instead they reflect back energy and can only be read very short distances, up to 30 feet (The Basics of RFID Technology). Active tags may have their own power source or use some external source like the sun. They can be read up to 300 feet and are ideal for large assets like cargo containers and rail cars in a distribution centre. The drawback of active tags is that they are larger and more expensive then passive tags. A passive tag can cost from 20 to 40 cents US while active tags costs $10 to $50 US (The Basics of RFID Technology). Readers can be constantly scanning for tags or scan when triggered. Middleware refers “to software that resides on a server between readers and enterprise applications” (Glossary of RFID Terms). It filters the data and only passes on useful information to the information systems; sometimes middleware also manages the readers on the system. RFID is used in supply chain management, asset management, payment systems, security and access control, and much more it was even used to prevent counterfeiting of tickets for the 2006 World Cup.
 * RFID Reader**

The RFID technology is used in everyday applications. The following are examples of low frequency RFID tags and one example is in animal identification (Witiger). Pet owners sometimes embed small chips in their pets in case they get lost. This way the pet can be returned back to the owner quickly and easily. Researchers also use these small chips to identify animals that they are researching. This is helpful because they want research changes in that same animal rather than a different one each time because it is efficient in their research. It is also used in automobile keys and locks. Door locks and car ignitions are equipped with RFID capabilities. Car keys are equipped with passive RFID tags to confirm that the appropriate key is used to start the right car. Without RFID or with the wrong RFID tag, the ignition will not start (Borysowich). Anti-theft systems also utilize RFID tags to prevent break-ins and to notify anti-theft companies of break-ins.

High frequency RFID tags are used in library books. Library’s track books by inserting RFID tags into each book so that it is easy to monitor the movements of the books. In libraries, the system is primarily designed to locate books in branches and speed up the checkout process (Libraries eye RFID to Track Books). The system requires that the chip be deactivated after the book is checked out, but there is no definite way of being sure that it has been deactivated or not. This raises concerns of privacy because the chips are used to track books and id they are not turned off, then they will also track the movements of the book borrower, which is not very comforting to some.

RFID technology can be adapted to many possible future uses. Possibilities include RFID tags as an anti counterfeiting tool. RFID tags can be incorporated into currency to make counterfeiting extremely difficult. All notes would have embedded tags in each note with a unique serial number. These notes could always be tracked if needed. When people would make a transaction their money would be read by a reader to see if an acceptable RFID tag is present. The US military is funding research to use RFID sensors to detect possible pathogens in foods (RFID Business Applications). In the post 911 world threat of terrorist attacks is a real concern. Using RFID to inspect foods is just one attempt to reduce it. Intel is developing a product that uses RFID technology to give people suffering from Alzheimer’s disease more functionality (RFID Business Applications). An Italian appliance maker has created a washing machine that uses information that is embedded RFID tags on clothes to wash clothes based on the manufacturer’s instructions (RFID Consumer Applications and Benefits). Of course this could only work if the clothes have RFID tags. A washing machine would be a great benefit to consumers and would ensure that consumers don’t ruin their clothes by washing them improperly. It may even possibly let you start the machine if you fot example mix whites and darks. Smart appliances like this could be very common in the near future.

Chan et al. //RFID -// //Radio Frequency Identification.// Consulted on November 2, 2006. http://www.witiger.com/ecommerce/RFID.htm Garfinkel, Simon and Henry Holtzman. "Understanding RFID Technology." __RFID Technology__ 2 May 2006. 2 November 2006 [|www.awprofessional.com/content/images/0321290968/samplechapter/garfinkel_ch02.pdf+Harry+Stockman&hl=en&gl=ca&ct=clnk&cd=2&client=firefox-a] //Glossary of RFID Terms,// RFID Journal. Consulted on November 8, 2006. http://www.rfidjournal.com/article/glossary/

“Libraries eye RFID to Track Books.” //MSNBC.// November 8, 2006. Online at: < http://www.msnbc.msn.com/id/3131173/>

"Radio Frequency Identification." __Wikipedia, the Free Encyclopedia__. 15 Nov. 2006. 17 Nov. 2006 http://en.wikipedia.org/wiki/RFID

Introductory photo courtesy of [|Barcode Solutions] = =