Monday, December 25, 2006

IBM's RFID tech to combat fake pharmaceuticals

While we've long discussed both the benefits and nefarious uses of RFID but IBM's got a new purpose for wireless tags that could benefit pharmaceuticals. IBM announced that it will include RFID tags on drug packages as a way to track and verify the authenticity of a particular substance. Next thing you know our nanobot controlled interiors are going to be analyzing embedded RFID in order to decide whether harmful drug interactions will occur if fully digested and metabolized. Ah, the miracles of science.


Source:
Posted by Cyrus Farivar in Engadget

Saturday, December 16, 2006

Your secrets not so safe with RFID-enabled passports


Ever since these newfangled RFID e-passports hit the mainstream, understandable concerns have frequently surfaced regarding the security (or lack thereof) involved. The Dutch version has already been cracked, Germans can clone theirs, and Ireland's doesn't even have a protective sheath to keep its data safe from unauthorized readers; now it appears that you have one more reason to stick with the ole laminated paper version, as security researchers have released "proof-of-contact code that they say enables an attacker to read the passport number, date of birth, and passport expiration date." The flaw was unveiled by Adam Laurie -- a well-respected watchman of Bluetooth security weaknesses -- in his "Bugtraq" newsletter, but no specifics were reported regarding how evildoers could extract such precious information and subsequently steal your identity. Nevertheless, those RFID-shielding manufacturers must be licking their chops right about now, and rightfully so.



Source:
Posted by Darren Murph in Engadget

Friday, December 15, 2006

Here comes RFID Gaurdian -Is it the Nemisis of RFID ?

Having covered different facets of RFID, I found logic in covering this news also. Anyway, this blog is supposed to show anything related to RFID.

Let's face. Researchers in Amsterdam have gone ahead and created a device which would prevent RFID tags from being read and this was being done with the aim of protecting users from this technology which was posing a threat to their privacy.

Called the RFID Guardian, it is a PDA size handheld device which warns a person that when a RFID scanner is trying to read a chip by beeping. This device runs on a 550MHz XScale 32 bit processor with 64Mbytes of RAM. The next few months would be spent by the research team on debugging and preparing the device for commercial use.

Though one can question its commerical viability as questioned by an industry observer who says that since RFID is touted to be next big thing in the pervasive computing, all materials in the future will come embedded with RF identification. RFID gaurdian would keep on warning, forcing the user to turn it off to stop the incessant beeping. Well, he goes to propose another model instead - A RFID Jammer.

This device, the size of a fountain pen, could act as a shield by emitting a constant RF jamming signal capable of preventing any RFID reader within a six foot radius from reading any of your RFID data. Now there is a device worth having.

Surely, the scientist from amsterdam is also listening. Expect some surprise too.

Thursday, December 14, 2006

RFID companies still not ready for growth, says expert

The RFID market is expected to grow at a compound annual growth rate of nearly 20 percent over the next six years and several factors are coming together to ease adoption of the technology. Still, many businesses aren't ready to deal with the growth, according to an expert with the Computing Technology Industry Association (CompTIA).

Frost & Sullivan recently reported that the total North American RFID market for manufacturing and logistics is predicted to grow at a compound annual growth rate of nearly 20 percent over the next six years. Yet, about 75 percent of the technology companies responding to a CompTIA survey earlier this year said there aren't enough people trained in the field. Eighty-percent said they believe that a lack of talent will hinder RFID adoption.

David Sommer, VP of e-business and software solutions at CompTIA, who speaks often about the looming shortage of RFID-trained workers, said that many factors are converging to promote RFID growth, but companies must focus on training workers to make sure the technology will work for them.

Global standards, interoperability, and declining prices are working in favor of rapid adoption, said Sommer, who worked with more than 20 organizations to develop CompTIA's professional RFID certification program. Sommer said he does not believe that there is a "magic number" for calculating when the cost of RFID technology will be low enough to trigger widespread adoption.

"We've seen where the tag itself, the semiconductor with the antenna, has gotten down to the 10- to 17-cent level," he said during a recent interview, adding that the prices vary depending on how companies deploy the technology. "The costs are continuing to decrease to the point where they are becoming very attractive."

In 2007, consumers will begin seeing more RFID tags on individual items. They will appear on higher-end electronics and pharmaceuticals before they make it into everyday products, he said.

"You're going to see them on expensive items, things that are easily counterfeited," he said. "It will be a ways down the road before you see it on the item level on something like toothpaste. It's a question of time and economics."

Eventually, when RFID is used in personal items such as clothing, retailers are likely to use technology that allows consumers to have the tags "killed" at checkout counters.

First, companies must train or hire people who have mastered the technology. "Few people understand how to tag goods to make sure they're readable and how to configure readers in order to make sure they work," Sommer said.

He urges training for technologists deploying solutions, for solution providers, and for users. CompTIA offers an international, vendor-neutral certification program to measure technologists' ability to install, maintain, repair, and troubleshoot for hardware and software functioning. It also offers links to certified training and test-taking resources.


Source:
K.C. Jones, InformationWeek

Item level RFID - the prosperous market 2006-2016

Item level RFID is set for substantial growth over the next decade. A new study from IDTechEx forecasts and explores key markets that will apply item-level tagging, advances in technology and the mass adoption that will follow. Dr. Peter Harrop from IDTechEx summarises this study. See www.idtechex.com/item for more information.


Visit www.idtechex.com/item to learn more about IDTechEx research on Item Level RFID

Item level RFID is the tagging of the smallest taggable unit of things - the library book, apparel, jewellery, engineering parts and laundry are examples. Already profitable for most suppliers, item level tags and systems will be the world's largest RFID market by value from 2007 onwards. Item level RFID tagging will rocket from $0.16 billion in 2006 to $13 billion in 2016 for systems including tags. In 2006, 0.2 billion items will be RFID tagged in the world. In 2016, 550 billion items may be RFID tagged. Those adopting item level tagging today do so willingly and are prepared to pay for good performance as they enjoy rapid multiple paybacks.

Relatively problem free

This is in some contrast to pallet and case tagging where consumer goods companies are required by retailers to fit the tags regardless of economics. The consumer goods companies are therefore reluctant purchasers of RFID and these tag and interrogator prices are in free fall from oversupply. The RFID tag and interrogator suppliers involved typically lose money. Here we are talking about Far Field UHF tags, which work well enough on pallets, cases and air baggage under US radio regulations but are only relatively trouble free elsewhere in applications with very low reader density, shortish range and dry, non-metallic environments. That means retail apparel in the UK and Japan and books in bookshops in the Netherlands, for example. The problems elsewhere are because, as yet, few countries outside the US permit adequate UHF power levels, bandwidth and signalling protocols for RFID. By contrast, HF is the most popular frequency for item level tagging and, with well over one billion such tags delivered, it encounters few remaining technical problems. So called Near Field UHF is a promising alternative that may give lower costs when proven in high volume applications.

Unique requirements

The biggest item level potential involves uniquely coding very high volume products, such as consumer goods, postal items, apparel, books, drugs and manufactured parts. These total 5-10 trillion items a year. Item level tagging therefore involves most or all of the following features and this creates technical and business challenges and benefits that are very different from those in other applications of RFID.

  • Suitable for Electronic Product Code EPC coding/mass serialisation and open systems
  • Small
  • Made in millions to trillions yearly
  • Need to read items individually but also many at a time
  • Proximate metal and/or water
  • Potential paybacks rarely worth more than a few percent of the value of the item tagged
  • Tags need to be disposable or fitted for life
  • Unquantifiable safety and security benefits are often sought and achieved


The US Food and Drug Administration will make tagging of up to 20 billion prescription drugs a legal requirement in the US, the TREAD Act will create a tire tagging market in the US and many new high priced retail items will enjoy the excellent paybacks currently found with apparel in the UK, China and Japan. China will rapidly adopt item level tagging. Globally, healthcare supplies, tools and assets are being urgently fitted with RFID for safety, security and cost control, including theft reduction. Boeing and Airbus are progressing the tagging of aircraft parts and equipment. Over ten million test samples for blood (Europe) and milk (New Zealand), drug research and other uses have been tagged with the potential of billions yearly.

However, it is challenging to meet the most sophisticated requirements for item level tagging and to evolve appropriate technical specifications and approval procedures for, say, mission critical aircraft parts. At the other extreme it is tough to get down to the price that justifies tagging a can of soda in a supermarket or a letter. Item level tagging has therefore started with the many lucrative intermediate requirements as shown below and it is rapidly widening in scope.



Evolution of item level RFID by tag price showing earliest date of mass adoption of leading application in each price band is shown below



Source: IDTechEx


Projected value of item level RFID tag sales by application in 2016 is as follows



Source: IDTechEx

Change in technology

The technology will change. Today we have most item level tagging being HF, with smaller but significant amounts of Far Field UHF and some 2.45GHz and LF (125-135KHz) tags. Within five years Near Field UHF will become popular and in ten years a significant amount of item level RFID will be done without a silicon chip, sometimes by direct printing. The average price of just under one cent for an item level tag in 2016 will cover a range from 0.1 cent primitive ink stripes and thin film transistor circuits to $8 tags for aircraft parts to high specification and even more expensive military tags. Some tags for dangerous, expensive or mission critical items will have batteries and sensors in them and even act as Real Time Locating Systems (RTLS) on assets in hospitals, museums, art galleries etc not just in supply chains.


The table below shows that the larger potential markets for item level RFID promise a wider range of benefits. They may not be as price sensitive as is popularly believed.



* May rise to 1000 in ten years as East Asia expands
Source: IDTechEx


IDTechEx has newly researched this subject in great depth including extended visits to China. (For example, the State Monopoly Tobacco Administration sells 37.5 billion packs yearly and is keen on RFID for anticounterfeiting). IDTechEx has now produced the world's first in-depth report on item level RFID, the most lucrative and soon the largest RFID market. As befits the importance of the subject, in dwarfing all other forms of RFID, the report extends to two volumes - "Item Level RFID Volume One: Forecasts, Technology, Standards" and "Item Level RFID Volume Two: 100 Case Studies, Paybacks, Lessons Learnt". For more see www.idtechex.com/item.

Sunday, December 10, 2006

TI inks RFID smart label deal

Texas Instruments Inc announced a multi-year deal to supply its next-generation RFID silicon to smart label maker Moore Wallace.

Under the deal, TI becomes the primary supply of ultra-high frequency EP Gen 2 flexible inlays for new Moore Wallace RFID labels.

Specifically, TI's RF silicon components would be inserted into Moore Wallace's RFID thermal transfer labels, which customers can encode with RFID as well as print barcodes and text onto. The result is a label that is EPC Gen 2 ready.

Gen 2 is currently being reviewed by the International Standards Organization as the first global RFID technology standard. It is widely expected to get the green light from the ISO by early next year.

Under the deal, Moore Wallace would be able to make more than 500 million Gen 2 smart labels annually using TI silicon.

"[The deal] is unprecedented from the context of Gen 2 production readiness," said Enu Waktola, TI's EPC retail supply chain marketing manager.

Terms of the agreement were not disclosed.

This likely would be the first of many deals with RFID label markers for TI's Gen 2 inlays, said Erik Michielsen, director of RFID at ABI Research.

"This is significant in that it demonstrates how RFID solutions are ramping up for high-volume Gen 2 deployments," said Michielsen. "This is a big step for TI in that this is probably is the initial opening announcement for their Gen 2 label partners. I imagine there'll be more to come."

Waktola said the agreement with Moore Wallace was not exclusive and that TI also is working with other label makers.

It makes sense that TI struck its first Gen 2 label-making deal with Moore Wallace, one of the world's biggest makers of RFID labels, since the companies have been working together on RFID since 1998. "We are leveraging the relationship and production capabilities that we can bring together to the market," Waktola said.

While smaller silicon makers, notably Impinj, are also marketing Gen 2 inlays, Michielsen said partnerships between large companies such as TI and Moore Wallace give the RFID industry Gen 2 supply stability and clout. "It sheds a positive light on the future for Gen 2," he said.

The TI-Moore Wallace deal also points to where Gen 2 RFID product volumes are headed next year, Michielsen said.

Moore Wallace sells its RFID labels to between 30% and 40% of so-called compliance program suppliers in the US today, said Nancy Mitchell, Moore Wallace's RFID product manager. That is, companies who comply with the RFID mandates of large goods purchasers such as Wal-Mart, Target and the US Department of Defense.

Most of Moore Wallace's RFID customers are consumer goods product makers, Mitchell said. Industrial manufacturers, which include the DoD, are its next-largest group of customers, followed by pharmaceutical makers. While drug makers are fast adopting RFID, she expects this customer mix to remain unchanged for the next year or so.

TI's Waktola said she expects Gen 2 RFID hardware, such as readers and printers, to be on the market this quarter.

The new Moore Wallace smart labels are currently being sampled, with full production slated for later in the third quarter.

Mitchell said a number of consumer goods makers have already begun pilots of the labels and she expects them to convert to Gen 2 during the next two quarters.

Moore Wallace has distribution channels for the new labels in Asia, Europe and North and South America, she said.

Currently, the company would just manufacture the Gen 2 labels in North America and expects production at its plants in Asia, Europe and South America at some future point. "We've been discussing that internally but don't have any specific timelines," Mitchell said.


Source: Computer Business Review

Saturday, December 9, 2006

RFID virus created

RFID tags and the software used to track them can be used to spread potentially harmful viruses and worms, according to research presented yesterday.

In a paper entitled "Is your cat infected with a computer virus?" presented before the IEEE International Conference on Pervasive Computing, three Netherlands-based researchers show how RFID tags can carry malware and propagate via databases along the supply chain.

"The security breaches that RFID deployers dread most - RFID malware, RFID worms, and RFID viruses - are right around the corner," wrote the study's principle researcher, Melanie Rieback, an American PhD student at Vrije university in Amsterdam.

The sky is not falling, of course, and the paper's main message seems to be that RFID software should not implicitly trust the data it pulls off RFID tags. It should be subject to the same security check as any potentially untrustworthy user input.

The paper's title refers to a hypothetical scenario outlined in the paper's introduction, in which a household pet implanted with an infected RFID tag is able to spread an infection to a veterinarian's computer system, with damaging consequences.

Rieback, and fellow researchers Bruno Crispo and Andrew Tanenbaum, found they were able to execute an SQL injection attack against an Oracle database and Apache web server using 127 characters of data stored on a cheap RFID tag.

SQL injection attacks are well-known from the web applications world. Using escape characters and SQL queries, crackers are sometimes able to interface directly with a back-end database, amending or deleting data as they see fit.

In Rieback's scenario, the virus uses SQL injection to write itself to a database whenever the infected tag is scanned. In a real-world scenario, this scan could happen when a pallet of goods arrives at a store or warehouse. New tags entering the system would have the viral code written to them.

"The manipulation of less than 1 Kbits of on-tag RFID data can exploit security holes in RFID middleware, subverting its security, and perhaps even compromising the entire computer, or the entire network," she wrote.

Rieback's paper outline a few other types of attack that could work from RFID tags. Even though RFID tags are limited in the amount of data they can store, she found that buffer overflow attacks are even possible, due to looping commands permitted by the RFID spec.

The research could open intriguing new possibilities in the field of virus propagation research.

Old floppy disk viruses spread along social networks, as friends and colleagues physically swapped disks and used them on their own computers. In a similar way, mobile phone viruses that spread via Bluetooth also require physical proximity to spread, much like their biological counterparts.

Email worms also spread along social lines, but over greater distances, using their victim's address books to find targets. Network worms have tended to have simple algorithms for randomly generating IP addresses to attempt to spread to.

There are not believed to be any recorded cases of malware designed to spread along the supply chain, but the new research seems to indicate that is at least a possibility.


Source: CBR online
By Kevin Murphy

Friday, December 8, 2006

Nike + iPod Sport Kit RFID Flaw

You've no doubt seen them: those fitness buffs jogging in the neighborhood or park with their Nike shoes and the tell-tale white iPod earwires, listening to music while getting healthier. They might just be the owner of the RFID-enabled Nike / iPod Sport Kit, which lets runners monitor their efforts.

But researchers from the University of Washington think that a security flaw in the Sport Kit (which uses an active RFID tag) lets stalkers also monitor runners. They claim that someone with a scanner can track a jogger's regimen from a distance of up to 60 feet, even from a car. They could go as far as skimming RFID data and recording jogging times and even plotting routes on Google Maps for later use. [Info Shop via RFID News]

While this potential threat shouldn't be taken lightly, one thought comes to my mind. The average human being isn't going to go to such lengths. Anyone who does go to all that effort to stalk someone doesn't need to utilize the Sport Kit flaw to do so. Their sickness would prompt them into doing it by other methods. In this scenario, I think, it's the person and not the technology that's to blame. On the other hand, this flaw can be exploited by more than just stalkers, possibly encouraging borderline personalities into surveillance activities that they might not otherwise bother with.

Source : RFID Gazette
 

Monday, December 4, 2006

RFID tags used to teach English

When you see the acronym RFID (radio frequency identification) in a paper, you immediately think about how Wal-Mart and other big retailers plan to replace bar codes. But two students from Purdue University got a brilliant idea and are using this technology to teach English to non-English-speaking children. Their Merlin’s Magic Castle (MMC) software uses RFID tags technology that the students embedded in toys. For example, when a child holds a toy firetruck with an embedded tag, MMC computer screen displays "fire*ruck" and asks the child to supply the missing letter. The MMC software is currently compatible with several games including Trivia Game or Scavenger Hunt. And now the two students plan to sell licenses to big game companies.

For example, here is a picture of little kids touching a fire truck with a RFID tag and trying to find the correct answer (Credit: Purdue University).

Here is how — and why — MMC works according to "Learning with Merlin"
(Purdue University Insights, Fall/winter 2005).

Merlin’s Magic Castle runs on a computer and uses Radio Frequency Identification (RFID) technology that the students embedded in toys. When a toy is run over the computer’s scanner, the program registers that RFID, and as Merlin says the toy’s name, it also appears on the screen. "These multiple levels of stimulation (audio, video, and haptic [touch]) influence better comprehension and information retention," said project leader Alexei Czeskis, a junior double majoring in computer science and math, and minoring in Russian.

Below is a picture of Amicia Elliott and Alexei Czeskis, the two students who developed Merlin’s Magic Castle (Credit: Purdue University).




As you can guess, MMC has not been widely covered yet. Anyway, here is a link to a presentation of MMC which gives some more details (PDF format, 5 pages, 41 KB).

Merlin’s Magical Castle (MMC) is designed to be a fun way to supplement classroom education. Whether in school or at home, children can find learning exciting with this tool. A friendly wizard greets the children at the start of the computer game and gives them various options of what they can do. There is an assortment of games a player can choose from, such as: Trivia Game, Scavenger Hunt, Fill in the Blanks, Category Quest, etc.

These games involve interaction between the toys of interest and the computer, which can identify the scanned toy and give the children feedback as they play. For example, in the Trivia game, Merlin gives the player a hint about the toy that he is looking for. If the player scans the correct toy, Merlin cheers, if the toy that was brought to Merlin was incorrect, he’ll offer another hint. Category Quest, presents the player with a toy and asks them to find other toys that are similar. This game involves abstract thinking — one has to be able to identify the similarity between a dog and a cat because both have four legs.

MMC comes equipped with computer software, a scanner, and electronic tags which are embedded into appropriate objects. In the current version of MMC, tags are implanted in toys. When this toy is brought near the antenna, the tag is scanned and its identification number is sent to the computer. The computer will then identify the toy.

Now the students plan to sell licenses to their software to established companies such as the Walt Disney Company or toy manufacturers like Mattel and Hasbro. Good luck to them!


Sources: Various web sites




Sunday, December 3, 2006

India Adopts 865-867 MHz for RFID

Regulators in India recently designated 865-867 MHz as the country's UHF RFID spectrum, in line with the frequencies used by the United States and Europe.


In a move expected to kick-start RFID adoption among Indian companies, regulators in India recently designated UHF RFID spectrum in accordance with the frequencies used by Europe and the United States.

The Wireless Planning and Coordination (WPC) wing of India's Ministry of Communication assigned the 865-867 MHz UHF band for use by radio frequency identification devices. The ruling was part of a process initiated by EPCglobal India, a joint industry-government initiative that is leading the development of electronic product code to support the use of RFID.

"India has a strong export economy, so getting this spectrum was an absolute must," says Ravi Mathur, CEO of EPCglobal India, which is based in New Dehli.

Clearing the spectrum in India will enable Indian manufacturers to tag shipments of goods to meet the UHF RFID requirements of customers in Europe and the United States. Prior to the ruling, each use of the UHF spectrum for RFID required special permission from the WPC. Until now, Mathur maintains, some Indian pharmaceutical companies supplying tagged shipments to Wal-Mart have been forced to do so after the products have already arrived in in the United States, where the UHF spectrum for RFID is 902 MHz to 928 MHz. Because Wal-Mart and other retailers are requiring more of their suppliers to tag shipments of goods, Indian companies will increasingly be expected to tag their exports, as well.

Tags that comply with EPCglobal's Gen 2 standard are designed to operate between 860 MHZ to 960 MHz without degradation in performance. Thus, Indian companies will now find it much easier to encode and read tags on goods shipped, regardless of whether those goods are bound for the United States or Europe (where the UHF spectrum for RFID is is 865 MHz to 868 MHz).

Being able to use the 865-867 MHz UHF band for RFID will also be a boon to India's high-tech businesses. "The Indian software industry is in a position to be a major provider of RFID systems solutions [to the United States and Europe], but it needs to be able to test and develop RFID. In addition, chip manufacturers are also in discussions about producing RFID chips in India. With the spectrum allocated, Indian companies can work with UHF RFID without requiring special clearance," says Mathur.

EPCglobal India is also hoping to see an Indian university become one of the Auto-ID Labs—a federation of research universities that has evolved from the now-defunct Auto-ID Center and is dedicated to researching and developing new technologies and applications for revolutionizing global commerce.

India had originally considered allocating 2.4 GHz as the spectrum for UHF RFID, but EPCglobal India argued that having UHF spectrum incompatible with that used by the United States, Europe and other key markets would have seriously limited the ability of India's businesses to stay in step with RFID adoption elsewhere around the world.

"Our objective was to ensure that RFID spectrum in India would [provide] important access to the world markets," says Mathur.

EPCglobal India says its petition to the WPC faced initial opposition from both India’s military and railways, which had previously had had access to the 865-867 MHz spectrum. In its application to the authority, EPCglobal says it was supported by allocation of the UHF spectrum that had already taken place in the United States and Europe.

Source : RFID Journal

Saturday, December 2, 2006

What is RFID

Transponders (also called tags or labels) help to identify any kind of articles , for example containers used in logistic processes. The applied technology is known as RFID (Radio Frequency IDentification)  technology. A distinctive feature of this technology is, unlike the barcode label technology, that a reader decodes the data encoded in the tag. This reader generates a radio frequency field which not only serves as the power source of the tag but, at the same time, transmits the captured data - in a non-contact and non-line-of sight way. Tags can be read through non-metallic substances such as glass or plastic located between antenna and tag.

Metal has a shielding effect. Unlike barcodes the RFID technology provides the possibility of re-programming identification and/or object data on the tag whenever it is required, which means the tag can be written electronically.

A basic RFID system consists of three components: reader, antenna (connected to the reader) and a tag, attached to the object to identify.



Giving priority to the development and production of readers, scemtec supplies all-including systems consisting of data base software, readers, antennas and tags. In addition, system studies are provided by scemtec in order to support their customers in choosing the most suitable include-all system.

The reader consists of either micro processing electronics with a serial interface or a handheld terminal with integrated reader. In addition, an either internal or external antenna is required. The writing and reading ranges depend on the shape of the tag. Simple reader modules (proximity reader) have short ranges of only several centimeters, whereas those of the long-range readers are up to 2 m long. The bigger the tag is the longer are the ranges.

Tags come in various types. There are tags of different memory sizes or they are categorized as either read-only or read-write tag. Therefore, scemtec developed the so-called “multi-standard” reader, a reader, especially developed to read and write to any type of tag.

At present RFID systems usually operate at 125 kHz or 13,56 MHz in Europe. scemtec offers multi-standard readers for both frequency ranges.

Tags have numerous advantages. A summary:

  • Tags are used to identify and trace any kind of objects, for example containers Identification of the object does not require line of sight. That means, opening of the container is no longer required and it stays intact
  • The data transfer from tag to reader is not affected by dirt, ice, water , scratches etc. The tag could even be embedded in plastic
  • A variable data storage allows in-use data modifications

  • Process security is given due to the circumstance that password protected tags additionally could be encrypted in order to prevent others than the authorized readers from reading or modifying data

  • High data security because of the fact that transponder data are complete, unchanged and saved at any time

  • Certain tag types allow a simultaneous reading of several tags (anti-collision mode)
Tags provide a wide range of applications, just to mention a few:
  • Product identification

  • Process- ad production control

  • Process- and production inspection

  • Warehouse management

  • Merchandise protection

  • Merchandise tracking

  • Ticketing

  • Access control

  • Animal identification

  • Container identification

  • Sports-Timing

  • Traffic control

Source : Scemtec 

Friday, December 1, 2006

Solar Powered RFID Reader Measures Road Traffic

The portable device holds promise for deployment in areas and under conditions for which a permanent RFID installation would be too expensive or impractical.


Nov. 17, 2006—Transportation researchers at Rensselaer Polytechnic Institute and the New York State Department of Transportation (DOT) are testing a solar-powered mobile RFID interrogator that will monitor traffic flow by reading EZPass tags attached to passing cars. Motorists use the tags to pay for bridge and highway tolls wirelessly. Last week, Rensselaer began testing a single RFID reader on Jordan Road in Troy, N.Y. In the spring, they plan to hold a pilot involving six solar-powered readers.

New York State currently monitors traffic flows on certain roads via 15 permanently stationed readers, which collect data from the EZPass tags. The new solar-powered portable solution provides a method of monitoring traffic flow for situations where it's too costly or unnecessary to install a permanent RFID reader—such as on roads where construction is underway, or on those traveled heavily only for special events.

The portable RFID unit, dubbed mGate, connects to a laptop computer via a USB cable, with batteries charged by a solar panel. Operators load the unit onto a trailer hitched to a truck for transport. When deployed alongside a road, the unit’s laptop sends the encrypted tag ID, timestamp and reader location via a wireless Internet connection to the Rensellaer server.

The system will ultimately be used to calculate how long it takes traffic to move from one installed RFID reader to another. However, the current pilot is only testing read rates. Eventually, traffic data from the mGate system could be used to reroute traffic when congestion looms, or to alert motorists via signage or the Internet about slow-moving road conditions, reducing the need for employees to identify problems as they arise.

Researchers received a $3.9 million grant from the Federal Highway Administration (FHWA) to fund the program, says Jeffrey Wojtowicz, a research engineer in civil and environmental engineering at Rensselaer.

Source : RFID Journal

Groundbreaking FDA Approval of RFID Technology

Its another Groundbreaking FDA Approval of RFID Technology
The U.S. Food and Drug Administration has approved the marketing of another RFID-based technology for use in healthcare: the SurgiChip, whose goal is to "prevent wrong-site, wrong-procedure and wrong-patient surgery." An RFID chip, encoded with surgery information such as patient identification, date, procedure, and assigned surgeon, is stored until the day of surgery, when it is affixed to the patient's body with adhesive and only removed once the surgery begins. At numerous points in the process, the chip-encoded information is scanned and verified by the patient, an error-checking technique that balances technological automation with the patient's own expectation of treatment. Illinois-based label and printer maker Zebra Technologies is providing the RFID hardware for the system.

Despite numerous high-profile stories of this FDA approval, the product appears to be in only the earliest stages of marketing; the surgichip.com website includes a mere three pages of product and company information.

Read the article at FDA.gov
Source : RFID Update