1. A PRESENTATION ON
RFID(RADIO FREQUENCY
IDENTIFICATION) TECHNOLOGY
MADE BY:-
R.GAYATRI
SHRI SHANKARACHARYA INSTITUTE OF
PROFESSIONAL MANAGEMENT
AND TECHNOLOGY
1
2. Contents
What is RFID?
Types of Tags
Design & Working
Applications
Scope
Conclusion
References
2
3. What is RFID?
3
Radio-frequency identification (RFID) is the use
of a wireless system that uses radio frequency
electromagnetic fields to transfer data from a tag
attached to an object, for the purposes of
automatic identification and tracking.
RFID is only one of the numerous technologies
grouped under the term Automatic Identification
(Auto ID), such as bar code, magnetic inks,
optical character recognition, voice recognition,
touch memory, smart cards, biometrics etc.
The latest RFID market research from IDTechEx
finds that in 2012 the value of the entire RFID
market will be $7.67 billion, up from $6.51 billion
in 2011.
4. Components of a RFID tag
4
The IC is a small microprocessor, which has a
logic unit that makes decisions and provides
memory to store data. The IC needs power to
operate.
The antenna is connected to the tag IC. It
receives the signals from the interrogator and,
depending on tag type, it either transmits or reflects
the received signal back. The geometry of an
antenna determines the frequency at which the tag
operates.
The substrate holds all other tag components
together. The tag antenna is deposited or printed
on the substrate, and the IC is then attached to this
antenna.
IC
Antenna
Substrate
6. Passive
Passive RFID tags have no internal power supply.
A small electric current is created in the antenna when
an incoming signal reaches it.
This current provides enough power to briefly activate
the tag, usually just long enough to relay simple
information, such as an ID number or product name.
Because passive RFID tags do not contain a power
supply, they can be very small in size, sometimes
thinner than a piece of paper.
These tags can be activated from a distance of ten
millimetres to over 6 meters away.
6
7. Active
Active RFID tags do contain an internal power source,
which allows for a longer read-range and for a bigger
memory on the tag itself.
The power source also makes it possible to store
information sent by the transceiver.
Active RFID tags are larger than passive tags, usually
slightly bigger than a coin.
They can be read from many meters away, and
generally have a battery life of about ten years.
Advantages of active tags include accuracy, reliability,
and superior performance in adverse environments,
such as damp or metallic.
7
8. 8
Type of tag EPC
Class
Memory
Type
Radio
frequency
used
Bits
Power
Source
Reading
Distance
(meters)
RFID Passive 0 ROM
138 Khz
13.95 Mhz 64
Reader
EMF 0.04-3
RFID Active 4 ROM 13.85 Mhz 64 Battery 3-10
RFID Passive
Programmable
1 EEPROM 138 Khz
13.95 Mhz
96,
128
Reader
EMF
0.04-3
RFID Active
Programmable
2, 3, 4 EEPROM 138 Khz
13.95 Mhz
>128 Battery 3-10
Data Tag 2, 3, 4 CMOS
RAM
13.85 Mhz
985 Mhz(UHF) >128 Battery 3-10
Types of RFID tags
11. RFID vs Barcode
Data capacity is more. Several
thousand characters.
Line of sight not required.
May last several years, depending
upon the type of tag.
Allows unattended identification.
Several tags can be read
simultaneously.
Some tags can store memory.
Data capacity is very less. Upto
24 characters.
Line of sight required.
Paper labels are subject to wear
and damage, hence less durable.
Only a single barcode can be
scanned at a time.
No memory storage possible.
RFID BARCODE
11
..but RFID are not only for identification scope..
But unlike Barcodes, RFID is not merely for identification purposes..
13. Supply Chain Management and
RFID13
•Information about the contents to be loaded from a factory
can be written onto the tag, e.g. quantity, weight, serial
number, date, time etc.
•This allows the information to be easily checked after transit,
without having access to an on-line database. This can be
very useful to check if items have gone "missing" during
transit.
•Using the tag on the shipment and RFID readers on each of
the loading bays, it is possible to identify the shipment, as it
is loaded.
•The advantage is that the reading and verification is done
completely automatically, therefore manual labour is
14. Healthcare
All patients admitted to the hospital are given
an RFID-based wristband with a passive RFID
chip in it.
This chip stores a unique patient ID number
and relevant medical information.
The caregiver uses a handheld computer with
an RFID interrogator to read the data encoded
on the patients ID bracelets.
Over a wireless LAN connection, the hospital
staff can access the patient’s medical history
as well as treatment record.
14
15. Passports
15
• The first RFID passports ("E-passports")
were issued by Malaysia in1998. In
addition to information also contained on
the visual data page of the passport, they
record the travel history (time, date, and
place) of entries and exits from the
country.
• Italian passports have a RFID tag since
26th
October 2006.
• Throughout Europe, RFID passes
conforming to the Calypso (RFID)
international standard are used for public
transport systems.
16. Each tag is augmented with a photo sensor to significantly extend the
functionality and support radio frequency identity and geometry (RFIG)
discovery
Objects become self
discovering16
17. Livestock and Animal Tracking
A tag is inserted through a Single Use
Disposable syringe into the animal. It remains
under the skin of the animal.
The number of the RFID tag is unique and
cannot be altered.
When an animal is to be scanned, it is either
brought near RFID reader or scanner or a
hand-held reader is used.
The reader is connected to a remote database
which correlates the unique RFID tag number
on the animal with other data on the animal.
This helps in easily maintaining electronic
records of vaccination and medication, health
checkups, etc.
17
18. Mobile phones will be integrated with
RFID reader powered by mobile phone’s
battery.
RFID tags can be read through these
mobile phones and information can be
sent to the mobile phone service provider
for many types of transactions.
This functionality can provide many
services like banking, billing, purchasing,
electronic payment etc.
18
RFID reader integrated mobile phones
19. Conclusion
19
•The real value of RFID technology stems from the insight that
stands to be gained from the identification, location and subsequent
control of that item and applying that insight to business.
•RFID is not industry specific—it’s business value specific. RFID is
more than a locator beacon.
•RFID is an enabling tool that is not only a source of powerful
information, but a source of true business innovation.
20. References
K Finkenzeller, RFID handbo o k: fundam e ntals and applicatio ns in
co ntactle ss sm art cards and ide ntificatio n, 2nd ed., R. Waddington, Ed.
West Sussex, England: John Wiley & Sons Ltd, 2003.
Q. Z. Sheng, X. Li, and S. Zeadally, "Enabling next-generation RFID
applications: Solutions and challenges," Co m pute r, vol. 41, pp. 21-28, Sept.
2008.
A. Juels, RFID Security and Privacy: A Research Survey, Selected Areas in
Communications, IEEE Journal. Publication Date:Feb. 2006 Volume: 24,
Issue: 2 On page(s): 381- 394
R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF
converter,” U.S. Patent 5 668 842, Sept. 16, 1997
ISO website. http://www.iso.orgl
The EPCglobal website. http://www.epcglobalinc.orgl
The RFID Journal website www.rfidjournal.com
HowStuffWorks www.howstuffworks.com
20