Radio Frequency IDentification abbreviated, as RFID is a Dedicated Short Range Communication (DSRC) technology.
RFID technologies are grouped under the more generic Automatic Identification (Auto ID) technologies.
RFID TECHNOLOGY AND ARCHITECTURE
In an RFID system, the RFID tag, which contains the tagged data of the object, generates a signal containing the respective information, which is read by the RFID reader, which then may pass this information to a processor for processing the obtained information for that particular application.
RFID tag or transponder
RFID reader or transceiver
Data processing subsystem
The transponder, or RF tag tags can be either active or passive. While the active tags have on-chip power, passive tags use the power induced by the magnetic field of the RFID reader. Thus passive tags are cheaper but it got a limitation that, it work in a limited range (RFID Frequencies: RFID systems are differentiated based on the frequency range it works. The different ranges are Low-Frequency (LF: 125 - 134.2 kHz and 140 - 148.5 kHz), High-Frequency (HF: 13.56 MHz) and Ultra-High-Frequency (UHF: 850 MHz - 950 MHz and 2.4 GHz - 2.5 GH).
RFID, Tag, transponder, Radio, Frequency, Identification
Ultra-High-Frequency RFID systems offer transmission ranges of more than 90 feet. The standards used in RFID: RFID standards mainly stressed in the following areas
Data Content - Organizing of data in the Tags
EPC standards for Tags:
Class 1: a simple, passive, read-only backscatter tag with one-time, field-programmable non-volatile memory.
Class 0: read-only tag that was programmed at the time the microchip was made
Different applications of RFID
Some other areas where passive RFID has been applied in recent past are:-Person Identification, Identification of location of a person, Animal/Pet Identification, Food Production Control, Vehicle Parking Control/Monitoring, Toxic Waste Monitoring, Valuable Objects Insurance Identification, Asset Management, Inventory tracking, Access Control etc
RFID Security:The basic privacy concerns associated with an RFID system is the ability of unauthorized tracking of anybody without consent. By placing RFID tags hidden from eyes, and using it for stealth tracking or using the unique identifiers provided by RFID for profiling and identifying consumer pattern and behavior or using hidden readers for stealth tracking and getting personal information. RSA Blocker Tags: Any reader that attempts to scan tags without the right authorization, thus confusing the reader to believe that there are many tags in its proximity.
Tidak ada komentar:
Posting Komentar