RFID Project Report
RFID Project Report
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING JODHPUR INSTITUTE OF ENGINEERING AND TECHNOLOGY NH-65, MOGRA, PALI ROAD, JODHPUR-342002 (2009-2010)
CERTIFICATE
This is to certify that the following students Chhavi Gupta (8EC25) Divya Kapoor (8EC29) Kamal (8EC44)
have successfully completed the project titled RFID BASED ATTENDANCE SYSTEM towards the partial fulfillment of the degree of Bachelor of Technology in Electronics and Communication Engineering of the Rajasthan Technical University during academic year 20092010.
..
..
Internal Examiner
External Examiner
CONTENTS
1. Introduction 2. History of RFID 3. Block Diagram 4. What is RFID? 5. Frequencies of RFID 6. How does RFID work? 7. Components of RFID 8. Schematic of RFID based attendance system 9. RFID reader and MCU working 10. About MCU AT89S52 11. Applications of RFID 12. Advantages of RFID over Bar coding 13. RFID reader Collision and EPC network 14. Transponders for RFID and Tag collision 15. Disadvantages of RFID 16. Conclusion 17. Applications of RFID 18. Issues in implementation of RFID technology 19. Initiatives in India on RFID 20. VB code 21. References 22. Datasheets
4 6 7 8 12 13 14 19 20 23 24 25 26 28 29 31 32 35 36 37 42 43
INTRODUCTION
Due to the easy availability of almost all information on the internet these days, students are less and less motivated to come to the lecture rooms than ever before. Professors and instructors have to come up with ways to ensure a healthy participation from the students, and make sure that the classic student professor interactive relationship is kept intact. This in the some cases may be in simple forms like roll call, while in more interesting cases, can be formats like quizzes, extra credit in class, etc. These things can however be very time-consuming. Valuable in-class time that could have otherwise been used for lectures need to be dedicated to attendance taking. In addition to all this, the attendances are entered manually and therefore are error prone. Now, theres a technology that can solve all this and MORE. Using Passive RFID, the task of taking a classroom attendance becomes just a single click of the mouse. Because of wal-marts initiatives in the RFID domain, it is now possible to obtain very cheap RFID tags and create University/departmental ID cards with them. Antennas are placed in the classroom and can be activated with the click of a mouse. Once, this is done, the antennas will read all the RFID tags in the room and will report this information to a attendance server. This information can also be displayed to the students instantly. Since this data can be made seamlessly available to all interested level, it can be used to better serve the students.
Radio frequency identification (RFID) is more widely used to facilitate common day-today activities due to new developments in processing, wider reading ranges, and larger memory capacities, making it a key contributor to the growth of the radio technology industry. RFID is almost indispensable when it comes to tasks that include automated data capture and identification applications, where a contact less identification is possible through RF signals. Many large corporations are interested in research and development within the field of RFID due to potential growth in various RFID applications. The people management system is an application where masses data need to be collected and managed in a short duration. RFID is an automated data collection technology in which radio communication for data transfer across two entities: a reader and a tag. The tag has two sections: one for radio communication and other for data storage. The tags are broadly classified into 3 categories namely active, passive and semi passive. The active tags have an internal power source e.g. a battery, which limits the life time. A passive tag doesnt have a power source and obtain the energy from the magnetic field of the reader. These types of tags are smaller, cheaper and can be used for long time. The scope of the paper is limited to passive tags. The functionality of RFID Passive tags is very simple. When a tag comes in the vicinity of the reader, it detects the radio signals generated by the reader and start to transmit the data stored in the memory. The radio signal generated by the reader offers the power needed to function and the synchronization data for communication
4
between two entities. RFID has emerged as a key technology for automatic data collection and has been adapted for various applications. Radio Frequency Identification (RFID) is evolving as a major technology enabler for identifying and tracking goods and assets around the world. It can help hospitals locate expensive equipment more quickly to improve patient care, pharmaceutical companies to reduce counterfeiting and logistics providers to improve the management of moveable assets. It also promises to enable new efficiencies in the supply chain by tracking goods from the point of manufacture through to the retail point of sale (POS). As a result of the potential benefits of RFID: The automotive industry has been using closed-loop RFID systems to track and control major assemblies within a production plant for 30 odd years. Many of the worlds major retailers have mandated RFID tagging for pallets and cases shipped into their distribution centres to provide better visibility. There are moves in the defence and aerospace industry to mandate the use of RFID to improve supply chain visibility and ensure the authenticity of parts. Regulatory bodies in the US are moving to the use of ePedigrees based on RFID to prevent counterfeiting of prescription drugs. Hospitals are using RFID for patient identification and moveable asset tracking. RFID tags are being used to track the movement of farm animals to assist with tracking issues when major animal diseases strike.
HISTORY OF RFID
In 1946 Leon Theremin invented an espionage tool for the Soviet Union which retransmitted incident radio waves with audio information. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator, which modulated the reflected radio frequency. Even though this device was a passive covert listening device, not an identification tag, it has been attributed as a predecessor to RFID technology. The technology used in RFID has been around since the early 1920s according to one source (although the same source states that RFID systems have been around just since the late 1960s). Mario Cardullo's in 1973 was the first true ancestor of modern RFID; a passive radio transponder with memory. The initial device was passive, powered by the interrogating signal, and was demonstrated in 1971 to the New York Port Authority and other potential users and consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission medium. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates, surveillance) and medical (identification, patient history).
Door Lock
8051 Tx Rx
PORT 2
DATA PIN
RFID TAG
WHAT IS RFID?
Radio Frequency means radio waves are used as carrier for transmission of data over wireless medium. Radio Frequency Identification (RFID) is a system that facilitates the tracking of objects, primarily for inventory tracking, via a three part technology comprised of a reader, a transceiver with decoder and a transponder (RF tag).
The reader emits a radio signal that activates the tag and reads and writes data to it. As products are shipped, received or stored, the information (encoded on a bar code like tag) can be read and received by the reader, which is attached to a computer.
RFID has been integrated into the EPC global network and uses the EPC (Electronic Product Code). The EPC is a unique number that identifies a specific item in the supply chain. The EPC is stored on a RFID tag , which combines a silicon chip and a reader.
Once the EPC is retrieved from the tag, it can be associated with dynamic data such as the origin of an item or the date of its production. The development of RFID was spurred by the need to enhance tracking and access applications in the 1980s in manufacturing and other hostile environments. This non contact means of gathering and tracking information proved to be resilient. RFID is now an established part of specific business processes in a variety of markets.
LF tags operate at 125 KHz, are relatively expensive, and have a low read range (less than 0.5 meters).
RFID readers or receivers are composed of a radio frequency module, a control unit and an antenna to interrogate electronic tags via radio frequency (RF) communication. Many also include an interface that communicates with an application (such as the librarys circulation system).
Readers can be hand-held or mounted in strategic locations so as to ensure they are able to read the tags as the tags pass through an interrogation zone. The interrogation zone is the area within which a reader can read the tag. The size of the interrogation zone varies depending on the type of tag and the power of the reader. Passive tags, with shorter read ranges, tend to operate within a smaller interrogation zone.
RFID READER
It consists of a RFID reader IC which is used to read tag. A coil is used to generate magnetic field which powers up RFID tag. It uses one of its pin to transmit data serially to microcontroller. The microcontroller then cross examines it with IDs present in its database. If it is a valid ID then microcontroller allows access to a person. If it is not a valid ID then microcontroller sounds alarm.
10
POWER SUPPLY
By the use of 4 IN4007 diodes the ac voltage is rectified to DC voltage. Using a 7805 regulator IC 5V is regenerated which is used as a power source for 8051c and rfid reader.
11
FREQUENCIES OF RFID
RFID deployments tend to use unlicensed frequencies for their obvious cost benefits. There are four commonly used frequencies: Low frequency (LF) 125/134.2 KHz. High frequency (HF) 13.56 MHz. Ultra high frequency (UHF) (including 869 and 915 MHz). Microwave (at 2450 MHz, a band familiar to ISPs). A tag's read range performance is usually considered the primary gauge of its suitability for a particular application. It is important to remember that not all applications require maximum range. Tags in the LF-HF band have a range of 1 to 18 inches, while passive UHF tags can reach up to 20 feet, and microwave tags can reach 1 to 6 feet. The ranges greatly depend upon the surface on which the tag is mounted.
12
Shown below is a typical RFID system. In every RFID system the transponder Tags contain information. This information can be as little as a single binary bit , or be a large array of bits representing such things as an identity code, personal medical information, or literally any type of information that can be stored in digital binary format.
Shown is a RFID transceiver that communicates with a passive Tag. Passive tags have no power source of their own and instead derive power from the incident electromagnetic field. Commonly the heart of each tag is a microchip. When the Tag enters the generated RF field it is able to draw enough power from the field to access its internal memory and transmit its stored information. When the transponder Tag draws power in this way the resultant interaction of the RF fields causes the voltage at the transceiver antenna to drop in value. This effect is utilized by the Tag to communicate its information to the reader. The Tag is able to control the amount of power drawn from the field and by doing so it can modulate the voltage sensed at the Transceiver according to the bit pattern it wishes to transmit.
13
COMPONENTS OF RFID
A basic RFID system consists of three components:
An antenna or coil A transceiver (with decoder) A transponder (RF tag) electronically programmed with unique information
1.
ANTENNA
The antenna emits radio signals to activate the tag and read and write data to it. Antennas are the conduits between the tag and the transceiver, which controls the system's data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built into a door frame to receive tag data from persons or things passing through the door, or mounted on an interstate tollbooth to monitor traffic passing by on a freeway. The electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continually. If constant interrogation is not required, a sensor device can activate the field. Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a. interrogator), which can be configured either as a handheld or a fixed-mount device. The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing.
14
2.
TAGS (Transponders)
An RFID tag is comprised of a microchip containing identifying information and an antenna that transmits this data wirelessly to a reader. At its most basic, the chip will contain a serialized identifier, or license plate number, that uniquely identifies that item, similar to the way many bar codes are used today. A key difference, however is that RFID tags have a higher data capacity than their bar code counterparts. This increases the options for the type of information that can be encoded on the tag, including the manufacturer, batch or lot number, weight, ownership, destination and history (such as the temperature range to which an item has been exposed). In fact, an unlimited list of other types of information can be stored on RFID tags, depending on application needs. An RFID tag can be placed on individual items, cases or pallets for identification purposes, as well as on fixed assets such as trailers, containers, totes, etc. Tags come in a variety of types, with a variety of capabilities. Key variables include: "Read-only" versus "read-write" There are three options in terms of how data can be encoded on tags: (1) Read-only tags contain data such as a serialized tracking number, which is pre-written onto them by the tag manufacturer or distributor. These are generally the least expensive tags because they cannot have any additional information included as they move throughout the supply chain. Any updates to that information would have to be maintained in the application software that tracks SKU movement and activity. (2) "Write once" tags enable a user to write data to the tag one time in production or distribution processes. Again, this may include a serial number, but perhaps other data such as a lot or batch number. (3) Full "read-write" tags allow new data to be written to the tag as neededand even written over the original data. Examples for the latter capability might include the time and date of ownership transfer or updating the repair history of a fixed asset. While these are the most costly of the three tag types and are not practical for tracking inexpensive items, future standards for electronic product codes (EPC) appear to be headed in this direction.
RFID TAG
15
Data capacity The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as much as several thousand bits on the high end. Of course, the greater the storage capacity, the higher the price per tag.
Form factor The tag and antenna structure can come in a variety of physical form factors and can either be self-contained or embedded as part of a traditional label structure (i.e., the tag is inside what looks like a regular bar code labelthis is termed a 'Smart Label') companies must choose the appropriate form factors for the tag very carefully and should expect to use multiple form factors to suit the tagging needs of different physical products and units of measure. For example, a pallet may have an RFID tag fitted only to an area of protected placement on the pallet itself. On the other hand, cartons on the pallet have RFID tags inside bar code labels that also provide operators human-readable information and a back-up should the tag fail or pass through non RFID-capable supply chain links.
Passive versus active Passive tags have no battery and "broadcast" their data only when energized by a reader. That means they must be actively polled to send information. "Active" tags are capable of broadcasting their data using their own battery power. In general, this means that the read ranges are much greater for active tags than they are for passive tagsperhaps a read range of 100 feet or more, versus 15 feet or less for most passive tags. The extra capability and read ranges of active tags, however, come with a cost; they are several times more expensive than passive tags. Today, active tags are much more likely to be used for high-value items or fixed assets such as trailers, where the cost is minimal compared to item value, and very long read ranges are required. Most traditional supply chain applications, such as the RFID-based tracking and compliance programs emerging in the consumer goods retail chain, will use the less expensive passive tags.
16
Frequencies Like all wireless communications, there are a variety of frequencies or spectra through which RFID tags can communicate with readers. Again, there are trade-offs among cost, performance and application requirements. For instance, low-frequency tags are cheaper than ultra high-frequency (UHF) tags, use less power and are better able to penetrate non-metallic substances. They are ideal for scanning objects with high water content, such as fruit, at close range. UHF frequencies typically offer better range and can transfer data faster. But they use more power and are less likely to pass through some materials. UHF tags are typically best suited for use with or near wood, paper, cardboard or clothing products. Compared to lowfrequency tags, UHF tags might be better for scanning boxes of goods as they pass through a bay door into a warehouse. While the tag requirements for compliance mandates may be narrowly defined, it is likely that a variety of tag types will be required to solve specific operational issues. You will want to work with a company that is very knowledgeable in tag and reader technology to appropriately identify the right mix of RFID technology for your environment and applications.
EPC Tags EPC refers to "electronic product code," an emerging specification for RFID tags, readers and business applications first developed at the Auto-ID Center at the Massachusetts Institute of Technology. This organization has provided significant intellectual leadership toward the use and application of RFID technology. EPC represents a specific approach to item identification, including an emerging standard for the tags themselves, including both the data content of the tag and open wireless communication protocols. In a sense, the EPC movement is combining the data standards embodied in certain bar code specifications, such as the UPC or UCC-128 bar code standards, with the wireless data communication standards that have been developed by ANSI and other groups.
17
3.
RF Transceiver:
The RF transceiver is the source of the RF energy used to activate and power the passive RFID tags. The RF transceiver may be enclosed in the same cabinet as the reader or it may be a separate piece of equipment. When provided as a separate piece of equipment, the transceiver is commonly referred to as an RF module. The RF transceiver controls and modulates the radio frequencies that the antenna transmits and receives. The transceiver filters and amplifies the backscatter signal from a passive RFID tag.
18
19
An RFID module typically contains a transmitter and receiver, a control unit and a coupling element (antenna). The reader has three main functions: energizing, demodulating and decoding. Information is sent to and read from RFID tags by a reader using radio waves. Passive RFID tags have no internal power supply. The minute electrical current induced in the antenna by the incoming radio frequency signal (125 KHZ) provides just enough power for the CMOS integrated circuit in the tag to power up and transmit a response. Most passive tags signal by backscattering (Backscatter is the reflection of waves, particles, or signals back to the direction they came from) the carrier wave from the reader, as shown in figure.
Passive tags have practical read distances ranging from about 10 cm (4 in.) Data collected from tags (10 bytes) is then passed through communication Interfaces (cable or wireless) to host computer systems in the same manner that data scanned from bar code labels is captured and passed to computer systems for interpretation, storage, and action.
20
MICROCONTROLLER WORKING
HAND SHAKING
On power-up reader sends an activation string to the microcontroller. After receiving the activation string microcontroller sends an encoded string to the reader which is provided by the vendor. The string is of 16 bytes. The encoded string is re364__ _ acknwlge Reader responds with an acknowledgement string 24 bytes long, indicating the microcontroller that it is ready to read.
ID EXTRACTION
Whenever RFID card is in the vicinity (4 in.) of a reader it will extract the ID and serially transfer (10 byte) it to the microcontroller. Microcontroller will save it in its RAM and wait for 3 seconds. This waiting time avert the microcontroller from reading the same ID twice. Microcontroller than starts comparing (byte by byte) the received ID with the IDs stored in its ROM.
TAGGING
After ID authentication microcontroller will map 10 byte card ID on a 2 byte tag# so that it can efficiently utilize the transmission time. Transmission time at 9600 baud rate of 10 bytes: T= (1/9600)*80=8.33 msec 2 bytes: T= (1/9600)*16=1.6 msec So it means we are saving more than 80% of the transmission time by using tagging technique In multi node environment transmission time is directly related with the system performance. More the transmission time higher will be the probability of data collision and vice versa Like RFID cards, tag numbers are also unique. In microcontrollers ROM these IDs are saved in a 12 byte fashion as illustrated in fig.
21
TRANSMISSION
Before forwarding tag# microcontroller append one byte of node ID before tag#. This node ID is used to pinpoint the card location. Microcontroller than serially transmits 3 byte of data (containing 1 byte of node ID and 2 bytes of tag#) and wait for the acknowledgement from the server. The waiting time of every node is unique because waiting time is dependent upon its node ID. This is done to avoid data collision between nodes. If microcontroller doesnt receive acknowledgement from the server it will retransmit the node ID and tag# and again wait for the acknowledgement. The re-transmit limit of every node is 3 Whenever we push a button on dummy node it transmit a fixed fake node ID and tag#
22
The AT89S52 is a low-power, high-performance CMOS 8-bit microcomputer with 8K bytes of downloadable Flash programmable and erasable read only memory and 2K bytes of EEPROM. The device is manufactured using Atmels high-density non volatile memory technology and is compatible with the industry-standard 80C51 instruction set and pin out. The on-chip downloadable Flash allows the program memory to be reprogrammed in-system through an SPI serial interface or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with downloadable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcomputer which provides a highly-flexible and cost-effective solution to many embedded control applications.
The AT89S52 provides the following standard features: 8K bytes of downloadable Flash, 2K
bytes of EEPROM, 256 bytes of RAM, 32 I/O lines, programmable watchdog timer, two data pointers, three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S8252 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset. The downloadable Flash can be changed a single byte at a time and is accessible through the SPI serial interface. Holding RESET active forces the SPI bus into a serial programming interfaces and allows the program memory to be written to or read from unless Lock Bit 2 has been activated.
23
APPLICATIONS OF RFID
Automatic Vehicle identification Inventory Management Work-in-Process Container/ Yard Management Document/ Jewellery tracking Patient Monitoring
24
25
Reader collision occurs in RFID systems when the coverage area of one RFID reader overlaps with that of another reader.
This causes two different problems: Signal interference: The RF fields of two or more readers may overlap and interfere. This can be solved by having the readers programmed to read at fractionally different times. Multiple reads of the same tag: The problem here is that the same tag is read one time by each of the overlapping readers. The only solution is to program the RFID system to make sure that a given tag (with its unique ID number) is read only once in a session.
26
27
Tag collision
Tag collision in RFID systems happens when multiple tags are energized by the RFID tag reader simultaneously, and reflect their respective signals back to the reader at the same time. This problem is often seen whenever a large volume of tags must be read together in the same RF field. The reader is unable to differentiate these signals; tag collision confuses the reader.
28
DISADVANTAGES OF RFID
Dead areas and orientation problems - RFID works similar to the way a cell phone or wireless network does. Just like these technologies, there may be certain areas that have weaker signals or interference. In addition, poor read rates are sometimes a problem when the tag is rotated into an orientation that does not align well with the reader. These issues can usually be minimized by properly implementing multiple readers and using tags with multiple axis antennas. Security concerns - Because RFID is not a line of sight technology like bar coding, new security problems could develop. For example, a competitor could set up a high gain directional antenna to scan tags in trucks going to a warehouse. From the data received, this competitor could determine flow rates of various products. Additionally, when RFID is used for high security operations such as payment methods, fraud is always a possibility. Ghost tags - In rare cases, if multiple tags are read at the same time the reader will sometimes read a tag that does not exist. Therefore, some type of read verification, such as a CRC, should be implemented in either the tag, the reader or the data read from the tag. Proximity issues - Tags cannot be read well when placed on metal or liquid objects or when these objects are between the reader and the tag. Nearly any object that is between the reader and the tag reduces the distance the tag can be read from. Dead areas and orientation problems - RFID works similar to the way a cell phone or wireless network does. Just like these technologies, there may be certain areas that have weaker signals or interference. In addition, poor read rates are sometimes a problem when the tag is rotated into an orientation that does not align well with the reader. These issues can usually be minimized by properly implementing multiple readers and using tags with multiple axis antennas. Security concerns - Because RFID is not a line of sight technology like bar coding, new security problems could develop. For example, a competitor could set up a high gain directional antenna to scan tags in trucks going to a warehouse. From the data received, this competitor could determine flow rates of various products. Additionally, when RFID is used for high security operations such as payment methods, fraud is always a possibility.
29
Ghost tags - In rare cases, if multiple tags are read at the same time the reader will sometimes read a tag that does not exist. Therefore, some type of read verification, such as a CRC, should be implemented in either the tag, the reader or the data read from the tag. Proximity issues - Tags cannot be read well when placed on metal or liquid objects or when these objects are between the reader and the tag. Nearly any object that is between the reader and the tag reduces the distance the tag can be read from.
30
CONCLUSION
All in all, we consider this project to be a success. While we were not able to discern the method to translate ones actual ID number into an RFID tag, we were still able to wirelessly extract the code and process it for meaningful use. It was a particularly rewarding experience; especially since we had a large amount of uncertainty going into the project; mostly due to the fact that we were dealing with cards which were manufactured to largely unknown specifications. Through much research and testing, we were able to develop a system which not only met our preliminary goals, but even met some of our more ambitious goals, such as remote administration for adding codes to the code database. Through many of the stages of our design, there were two websites in particular which provided the neccessary information for us to figure out the best way to proceed. These were the Microchip microID 125 KHz Reference Guide (especially their 125 KHz reader reference design), and Jonathan Westhues's website about Prox cards.
LEARNING OUTCOMES:
Understanding the hardware detail of a 8051 Microcontroller Microcontroller programming RFID Technology RFID based Attendance System
31
APPLICATIONS OF RFID
Passports RFID Tags are being used in passports issued by many countries, including Malaysia, New Zealand, Belgium, The Netherlands, Norway, Ireland, Japan, Pakistan, Germany, Portugal, Poland, The United Kingdom, Australia and the United States. Standards for RFID passports are determined by the International Civil Aviation Organization (ICAO), and are contained in ICAO Document 9303, Part 1, Volumes 1 and 2 (6th edition, 2006). ICAO refers to the ISO 14443 RFID chips in e-passports as "contactless integrated circuits". ICAO standards provide for e-passports to be identifiable by a standard epassport logo on the front cover.
Product Tracking High-frequency RFID or HFID/HighFID Tags are used in library book or bookstore tracking, jewelry tracking, pallet tracking, building access control, airline baggage tracking, and apparel and pharmaceutical items tracking. Highfrequency Tags are widely used in identification badges, replacing earlier magnetic stripe cards. These badges need only be held within a certain distance of the reader to authenticate the holder. The American Express Blue credit card now includes a HighFID Tag. In Feb 2008, Emirates airline started a trial of RFID baggage tracing at London and Dubai airports.
Transportation & Logistics Logistics & Transportation is a major area of implementation for RFID technology. For example, Yard Management, Shipping & Freight and Distribution Centers are some areas where RFID tracking technology is used. Transportation companies around the world value RFID technology due to its impact on the business value and efficiency.
Animal Identification Implantable RFID Tags or transponders can be used for animal identification. The transponders are more well-known as Passive RFID technology, or simply "Chips" on animals.
32
Inventory Systems An advanced automatic identification technology such as the Auto-ID system based on the Radio Frequency Identification (RFID) technology has significant value for inventory systems. Notably, the technology provides an accurate knowledge of the current inventory. In an academic study performed at Wal-Mart, RFID reduced Out-of-Stocks by 30 percent for products selling between 0.1 and 15 units a day. Other benefits of using RFID include the reduction of labor costs, the simplification of business processes, and the reduction of inventory inaccuracies.
Libraries Among the many uses of RFID technologies is its deployment in libraries. This technology has slowly begun to replace the traditional barcodes on library items (books, CDs, DVDs, etc.). The RFID Tag can contain identifying information, such as a book's title or material type, without having to be pointed to a separate database (but this is rare in North America). The information is read by an RFID reader, which replaces the standard barcode reader commonly found at a library's circulation desk. The RFID Tag found on library materials typically measures 50 mm X 50 mm in North America and 50 mm x 75 mm in Europe. It may replace or be added to the barcode, offering a different means of inventory management by the staff and self service by the borrowers. It can also act as a security device, taking the place of the more traditional electromagnetic security strip. And not only the books, but also the membership cards could be fitted with an RFID Tag.
Human Implants Implantable RFID chips designed for animal tagging are now being used in humans. An early experiment with RFID implants was conducted by British professor of cybernetics Kevin Warwick, who implanted a chip in his arm in 1998. Night clubs in Barcelona, Spain and in Rotterdam, The Netherlands, use an implantable chip to identify their VIP customers, who in turn use it to pay for drinks.
33
Schools & Universities School authorities in the Japanese city of Osaka are now chipping children's clothing, back packs, and student IDs in a primary school. A school in Doncaster, England is piloting a monitoring system designed to keep tabs on pupils by tracking radio chips in their uniforms. St Charles Sixth Form College in West London, England, started September, 2008, is using an RFID card system to check in and out of the main gate, to both track attendance and prevent unauthorized entrance.
Museums RFID technologies are now also implemented in end-user applications in museums. An example is the custom-designed application "eXsport" at the Exploratorium, a science museum in San Francisco, California. A visitor entering the museum receives an RF Tag that can be carried on a card or necklace. The eXspot system enables the visitor to receive information about the exhibit and take photos to be collected at the giftshop. Later they can visit their personal Web page on which specific information such as visit dates, the visited exhibits and the taken photographs can be viewed.
Social Retailing When customers enter a dressing room, the mirror reflects their image and also images of the apparel item being worn by celebrities on an interactive display. A webcam also projects an image of the consumer wearing the item on the website for everyone to see. This creates an interaction between the consumers inside the store and their social network outside the store. The technology in this system is an RFID interrogator antenna in the dressing room and Electronic Product Code RFID Tags on the apparel item.
Lap Scoring Passive and Active RFID systems are used in off-road events such as Enduro and Hare and Hounds racing. Riders have a transponder on their person, normally on their arm. When they complete a lap they swipe or touch the receiver which is connected to a computer and log their lap time. The Casimo Group Ltd sells such a system.
34
Security Concerns A primary RFID security concern is the illicit tracking of RFID Tags. Tags which are worldreadable pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defense's recent adoption of RFID Tags for supply chain management. More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID Tags in consumer products.
Privacy The use of RFID technology has engendered considerable controversy and even product boycotts by consumer privacy advocates. Katherine Albrecht and Liz McIntyre, co-founders of CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering),are two prominent critics of the technology who refer to RFID Tags as "spychips". The two main privacy concerns regarding RFID are: Since the owner of an item will not necessarily be aware of the presence of an RFID Tag and the Tag can be read at a distance without the knowledge of the individual, it becomes possible to gather sensitive data about an individual without consent. If a tagged item is paid for by credit card or in conjunction with use of a loyalty card, then it would be possible to indirectly deduce the identity of the purchaser by reading the globally unique ID of that item (contained in the RFID Tag). Most concerns revolve around the fact that RFID Tags affixed to products remain functional even after the products have been purchased and taken home and thus can be used for surveillance and other purposes unrelated to their supply chain inventory functions.
35
Infosys Technologies: RFID consulting on logistics player in the RFID space. TCS: Tied up with Hyderabad University to produce RFID tagged mark sheets & degrees to deter use of fake degree. Delhi Metro: The underground subway or metro system implements RFID ticket coins.
Future Scope
The world will be very different once readers and RFID Tags are everywhere. In an RFIDenhanced future, the benefits would accrue not just to businesses, but also to consumers. Once various limitations like lack of a global standard, security concerns, the cost factor, etc. are overcome and this technology is fully implemented, it can transform the way we live our lives. It has the potential of revolutionizing the way we travel, the way we open the locks of our homes, the way we purchase goods, the way we do business and much more.
36
VB Code
FORM 1
37
FORM 2
Code Dim Kamal As String Dim Chhavi As String Dim valu1 As String Dim valu2 As String Dim ReadData As String Dim data As String
38
Private Sub Command3_Click() Unload Me End Sub Private Sub Form_Load() Form1.Caption = "App1" With MSComm1 .Handshaking = 2 - comRTS .RThreshold = 1 .RTSEnable = True .Settings = "9600,n,8,1" .SThreshold = 1 .PortOpen = True valu1 = 0 valu2 = 0 End With End Sub Private Sub Command1_Click() Timer1 = True Timer2 = True Timer3 = True End Sub Private Sub Form_Unload(Cancel As Integer) MSComm1.PortOpen = False End Sub
Private Sub Timer1_Timer() Text1.Text = Clear ReadData = Me.MSComm1.Input Text1.Text = ReadData End Sub
Private Sub Timer2_Timer() If Text1.Text = "14519266 Text2.Text = "Kamal" valu1 = valu1 + 1 Text3.Text = valu1 Timer2 = False 39
" Then
Dim i As Integer Do Until i = 10 i=i+1 ReadData = "A" Text1.Text = ReadData Me.MSComm1.Output = Text1.Text Loop End If End Sub Private Sub Timer3_Timer() If Text1.Text = "14505095 Text2.Text = "Chhavi" valu2 = valu2 + 1 Text3.Text = valu2 Timer3 = False Dim i As Integer Do Until i = 10 i=i+1 ReadData = "A" Text1.Text = ReadData Me.MSComm1.Output = Text1.Text Loop End If End Sub Private Sub Timer4_Timer() lb2.Caption = Time$ lb1.Caption = Date$ End Sub Private Sub Timer5_Timer() If lb2.Caption = "08:00:00" Then Timer1 = True Timer2 = True Timer3 = True End If End Sub Private Sub Timer6_Timer() If Text1.Text = "14519266 If Timer2 = False Then Dim i As Integer Do Until i = 10 i=i+1 ReadData = "B" Text1.Text = ReadData Me.MSComm1.Output = Text1.Text 40
" Then
" Then
Loop End If End If End Sub Private Sub Timer7_Timer() If Text1.Text = "14505095 If Timer3 = False Then Dim i As Integer Do Until i = 10 i=i+1 ReadData = "B" Text1.Text = ReadData Me.MSComm1.Output = Text1.Text Loop End If End If End Sub
" Then
41
REFERENCES
1. Department of Electrical and Electronic Engineering at the University of Stellenbosch. www.slellenboschuniversity.org 2. Swati Patil Smt. Sharchchandrika Suresh Patil Institute of Technology, Jalgaon . 3. www.rfidcentre.co.uk 4. www.scribd.com 5. www.8051projects.com 6. www.whereisdoc.com 7. www.cornelluniversity/finalyear projects/rfid.aspx 8. Texas A&M Engineeringhttp://engineer.tamu.edu/research/magazine/2006/robots/
PAPERS 1. Dr. Jeremy Landt Shrouds of Time: The history of RFID, White Paper, AIM Inc. http://www.transcore.com/pdf/AIM%20shrouds_of_time.pdf 2. Fisher, Jill A. and Monahan, Torin. Tracking the Social Dimensions of RFID Systems in Schools. http://torinmonahan.com/papers/Fisher_Monahan_RFID_IJMI.pdf
42
DATASHEETS
43
44
45
46
47
48
49
50
51
52
53