We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAiyana Barren
Modified about 1 year ago
© | The Resurgence of UHF RFID
© | Agenda UHF RFID past, present, future Gen2 V2 Q&A
© | EPC UHF Gen2 was Ratified in 2004… First UHF Gen2 demonstration at 2005 EPCglobal US conference –Two readers inventorying tags Transmitting simultaneously Rejecting interference –40 tags moving fast No missed tags
© | …But Adoption was Painfully Slow
© | Reason: The Industry Focused on Pallets Metro pallet testing Motorized pallet sled Changeable pallets Walmart pallet testing Dock door w/ interfering readers Pallet w/ 40 boxes of soap
© | Fast-Forward to Today
© | The UHF Tag Market is Growing 35% YoY Source: VDC Research Group
© | Item-Level Tagging Fuels the Resurgence Brand Protection Logistics/Security Customer Service Race Timing Operational Configuration Asset Management Retail Inventory Medical Inventory Laundry Management
© | UHF Passive RFID Dominates the Market UHF has outstripped and will grow at 5× the rate of HF/NFC New markets and design-ins will prefer UHF by a wide margin
© | Two Applications Fuel the Resurgence 1.Retail Apparel –On-shelf availability:> 90% –Sales uplift: 5% to 12% –Enables omnichannel fulfillment –Apparel, but also sporting goods, shoes, jewelry, fragrances, tires 2.Embedded RFID –Consumables authentication Example: Coke Freestyle –Device configuration Example: HP Envy
© | UHF RFID Transforms Retail Apparel Inventory Management Loss Prevention Point of Sale Customer Experience “We've spent the last 153 years building warehouses, we just called them stores” Peter Sachse, Chief Stores Officer, Macy’s Omnichannel Fulfillment
© | UHF RFID Enables Embedded Use Cases Freeestyle: 100+ drink dispenser Freestyle uses embedded RFID –Internal readers –Tags on cartridges Coca Cola Freestyle delights fans –Thousands deployed across the US –Expanding worldwide
© | Embedded RFID Will Become Pervasive Consumer electronics will embed UHF RFID broadly Zero-power communications = endless applications –Locked in transit –Device configuration –Sensor-enabled tags –Premise-aware security –Warranty and service history Desktops Laptops Servers Embedded Phones Netbooks Tablets Smart TVs
© | The Resurgence Will Accelerate Identify an ItemConfigure an Item Locate an Item Authenticate an Item
© | Handheld Inventory => Autonomous Locationing xArray is an overhead steered-beam reader Provides real-time item location and movement Distance (m)
© | Locationing Demonstration xArray mounted at 3.2m (10.5ft) height Tags occupy 12.2 × 13.5 m (40 × 44 ft) floor space 3264 tags; square turns green when inventoried Video is real-time
© | Manual Identification => Autonomous Authentication Today: Convenience and fraud detection/prevention –Fraud in diesel filling today is 5% of sales or $1.8Bn annually Next: Vehicle fault monitoring –RFID tag linked to CAN bus sends truck data at every stop
© | Agenda UHF RFID past, present, future Gen2 V2 Q&A
© | What is Gen2 V2? A backward-compatible extension to Gen2 V1.2.0 A joint effort between GS1 EPCglobal and ISO Addresses requirements from >100 end users –Protect consumer privacy –Use a tag for loss prevention –Store product information in a tag –Restrict access to stored information –Authenticate a tagged item as genuine All new features are optional –Bare-bones tags can coexist with full-featured tags
© | Gen2 V2 Expands Tag Access Gen2 TodayDefinition SelectSelect a population of tags InventoryInventory selected tags; get their EPCs AccessRead/write/lock tag memory; kill the tag New in Gen2 V2.0.0 In Gen2 V1.2.0 V2 EnhancementsDefinition AnticounterfeitingAuthenticate a tag as genuine SecurityModify tag information securely File ManagementCreate files and assign access privileges UntraceabilityHide tag data to protect consumer privacy Loss PreventionUse a tag for EAS
© | Anticounterfeiting: Business Need Use case today –RFID tags ensure compliance with regulations for tire use and chassis certification Future opportunity –Authenticate tags to increase confidence that certification is genuine
© | Anticounterfeiting: Gen2 V2 Solution Today Reader reads static TID bits from tag memory TID can be spoofed Today Reader reads static TID bits from tag memory TID can be spoofed End users have asked for robust anticounterfeiting –To know that a tag and its attached item are genuine –Applications include luxury goods, pharma, healthcare, tolling Sol’n: Authenticate tag using a security algorithm … V2 Tag computes its response using a stored secret key Response cannot be spoofed V2 Tag computes its response using a stored secret key Response cannot be spoofed
© | Security: Business Need Use case today –Refugee identification & transportation in Italy –RFID tags improve efficiency of refugee receiving centers Future opportunity –Store refugee data securely in RFID tag
© | Security: Gen2 V2 Solution Today User memory is write locked using access password Memory is visible Today User memory is write locked using access password Memory is visible Some applications need to store tag data securely –To prevent unauthorized persons from accessing/altering the data –Applications include ID cards, transit tickets, passports, aerospace Sol’n: Secure user memory using a security algorithm … V2 User memory has read, write, and lock access privileges Memory access is by privilege V2 User memory has read, write, and lock access privileges Memory access is by privilege
© | Files: Business Need Use case today –Track each aircraft part’s flight hours using RFID –15% less labor; 25% less maintenance time Future opportunity –Securely track aircraft parts and part sharing for passenger airlines –Requires data files with secure access privileges
© | Files: Gen2 V2 Solution Today User memory is organized as a single flat file User memory is visible Today User memory is organized as a single flat file User memory is visible Some applications need to store tag data in files –With privilege-based access for file reading/writing/locking –Applications include consumer electronics, aerospace Sol’n: A simple file system in tag’s user memory V2 User memory is partitioned into multiple files File access is by privilege V2 User memory is partitioned into multiple files File access is by privilege User Memory
© | Consumer Privacy: Business Need Privacy Concerns Have Mostly Abated Since the RFID Privacy Heyday in 2004 But Privacy Protections Remain Important Informing consumers, Metro, 2008 Washington Post cartoon, 2004
© | Consumer Privacy: Gen2 V2 Solution Today Tag memory is organized as EPC, TID, User Hide memory by killing tag Today Tag memory is organized as EPC, TID, User Hide memory by killing tag Some applications need to protect consumer privacy –Prevent unauthorized persons from reading portions of tag memory –Applications include retail, healthcare, pharma, ID cards Sol’n: User can hide/unhide portions of tag memory V2 Tag memory remains organ- ized as EPC, TID, User Hide/unhide memory regions V2 Tag memory remains organ- ized as EPC, TID, User Hide/unhide memory regions User TID EPC Hide none or all Hide none, part, or all Hide none, serial #, or all User TID EPC All visible or kill tag
© | Loss Prevention: Business Need German customs official with 1 million pair counterfeit Nike shoes By 2015, the International Chamber of Commerce expects the value of counterfeit goods globally to exceed $1.7 trillion 1 Apparel and fashion accessories still make up the largest share of counterfeit goods worldwide 1 In Italy, fake clothing & accessories were $3.4Bn in Today: More lucrative than illegal drug trade, with less penalty risk Economic Indicator: Even Cheaper Knockoffs July 31, 2010 New York Times 2 New York/New Jersey Intellectual Property Rights Conference: IP Crimes, Victims & Cases, Nov 2009 A big (and growing) problem
© | Loss Prevention: Gen2 V2 Solution Today Facility database to indicate whether item is owned, sold No tag-based EAS standard Today Facility database to indicate whether item is owned, sold No tag-based EAS standard Some applications want to use RFID to deter theft –Storing EAS data in the tag rather than in a database –Applications include retail, healthcare, oil & gas Sol’n: “store” and “sold” codes in tag memory V2 Store code tag is owned by facility and not foreign Sold code item is sold V2 Store code tag is owned by facility and not foreign Sold code item is sold User TID EPC 32-bit sold code 32-bit store code
© | Gen2 V2 Status GS1 EPCglobal ratified the protocol Oct 30, 2013 –Submitted it to ISO for standardization ISO will ratify two security algorithms in 1H14 – (PRESENT-80) – (CryptoGPS) Tags, readers, infrastructure will be available and operational in 2015
© | Agenda UHF RFID past, present, future Gen2 V2 Q&A
Alien Technology Confidential – NDA Alien Technology ® Patti Blessing Director Business Development General Manager, RFID Solutions Center.
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda Introduction Application Standard EPCglobal Network RFID Infrastructure Application Level.
RFID Policy Update 1/23/08 Dan Caprio President DC Strategies, LLC.
RFID Myths, Facts and Reality. What is RFID? Radio frequency identification or RFID Generic term for technologies that use radio waves to automatically.
The State of RFID/EPC Today: Where We Are and Where We are Going Factors That Are Affecting Adoption Across Major Markets.
RFID in the Supply Chain Primary Sources: EPC_S.pdf
Growth With Perfection o End to end Solutions o System Integration o Application Development o Consulting Tag.
Nanotechnology for preventing counterfeit … you can now fingerprint brand packs Avinash Mandale Global Chief Marketing Officer Bilcare Limited 1 Bilcare.
RFID tagging Stephanie Allen, Gina Calcaterra, Michael Gray, Rahul Nair, Sumit Pahwa, Edward Robertson MGT 6772.
Regulations, Standards and Protocols. RFID systems are Radio Systems The function of other radio systems must not be disrupted Restriction on the range.
Jörn-Marc Schmidt Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
October 05 Standards. October My own lesson in RFID standardization.
Radiofrequency Identification for movable heritage management Central International Archive of Art Objects Member of Albert Canals – General Director AICOA.
Rafrex LLC - RFID Solutions RFID System Overview Passive Tag Active Tag Notification Alarm Host Computer Tag Programmer Portable Reader Stationary Reader.
RFID and Sensor Networks for Rural Environments Alfio Grasso Deputy Director Auto-ID Lab, ADELAIDE.
IE 419/519 Wireless Networks Lecture Notes #7 Radio Frequency Identification (RFID)
EPC/RFID - Global Progress Bill McLeer EPCglobal US.
Confidential 1 Strategies for RFID Success. confidential 2 What is Driving RFID?
UNIVERSAL Presents. Creating a Secure Logistics Industry with Universal Asset Tracking System.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
The right asset. In the right place. At the right time. RFID A Zebra Perspective Marty Johnson.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID Network Infrastructure: Backgrounder IEEE LANMAN 2007.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
RFID for Logistics Elaine Cooney IUPUI. BENTONVILLE, AR. – May 1, 2007 – Wal-Mart Stores, Inc., (NYSE: WMT) continues to expand its RFID capability to.
Introduction + Route Me GPS Tracking System Route Me offers a full range of software for commercial fleet.
Role of Technology in Supply Chain Management Soma Sekhar Director, TrackIT Solutions FZ LLC RFID Supply Chain & Logistics.
Australia Visibility Provides Security Beating the problem of Fraudulent Certificates.
Created by the Community for the Community Building a RFID solution in BTS 09.
GS1 US INITIATIVES UPDATE MARCH 18, GS1 STANDARDS MAKES IT POSSIBLE 2 SAFETYSECURITY VISIBILITYEFFICIENCY COLLABORATION To apply standards to business.
IPM Asset Solutions: Where Innovation Meets Experience.
The Evolution of EPC Standards Sanjay Sarma July 12, 2005.
© 2005 LXE All rights reserved. RF-ID in Industrial Logistics Danny Mariën – LXE Belgium.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
EPC Standards EPC System elements ： EPC Coding structure The reader/ tag Protocols Savant platform The Object Numbering Service (ONS) PML server.
Advisory Group Role. ©2005 GS1 2 Making our Vision a Reality Advisory Group Role Setting the direction for Australian industry Leveraging overseas experience.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
RFID IN THE POSTAL LOGISTICS Ing. Radovan Madleňák, PhD. doc. Ing. Juraj Vaculík, PhD. University of Žilina Department of Communications.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-
#1 Privacy in pervasive computing What can technologists do? David Wagner U.C. Berkeley In collaboration with David Molnar, Andrea Soppera, Ari Juels.
Smart Card Application. Smart-card is a plastic card, the size of a standard credit card, with one or several integrated circuits (chips) capable to store.
Counterfeiting Protection & Reduction MECH 3620 Advanced Manufacturing Process By: Rafael Mendez.
HID Global Corporate Overview Natacha Jaramillo Regional Sales Manager (Latin America) September 2014 Presentation Title Slide.
Brand Protection: In the face of mounting counterfeiting, diversion & other infringements Jim Mentone | Director, Consumer Global Brand Protection.
LOGO Internet of Things UPM E.U.I.T. Diatel Xi Chen
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
© 2017 SlidePlayer.com Inc. All rights reserved.