We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMaria Holt
Modified over 5 years ago
RFID in China for CERP Wenfeng Wang RFID research officer, senior engineer China Electronic Standardization Institute Science honesty faith service
Copyright © 2007 CESI http://www.cesi.ac.cn A RFID system
Copyright © 2007 CESI http://www.cesi.ac.cn Freqency band Typical frequencydistance Coupling manner Typical applications LF Below 135kHz1cm~2cm Magnetic or electric field Animal management Automobile key Access control HF 13.56MHz1cm~1m Magnetic field Personal identification Intelligence traffic Baggage management Access control Dangerous material management UHF 433MHz 860MHz~960MHz China : 840-845MHz and 920-925MHz >10m Electromagn etic wave Container Pallet, box Access control Item MW 2.45GHz>10m Electromagn etic wave ETC Item RFID system classification
Copyright © 2007 CESI http://www.cesi.ac.cn Industry chain RFID technology involves information, material, equipment and many other high-tech field. RFID technology involves information, material, equipment and many other high-tech field. A RFID application system covers frequency band, tag, reader, item identifier, security and privacy. A RFID application system covers frequency band, tag, reader, item identifier, security and privacy. RFID industry includes: RFID industry includes: Chip Design -> Antenna and Tag -> Reader -> Middleware -> Integration -> Users Chip Design -> Antenna and Tag -> Reader -> Middleware -> Integration -> Users
Copyright © 2007 CESI http://www.cesi.ac.cn Applications in China The second personal identification cards Transport cards Dangerous chemical vases tag Post parcel sorting The special Olympic athletes and staff The 29th summer Olympic Game ticket Miner identification and tracking
Copyright © 2007 CESI http://www.cesi.ac.cn RFID standardization MII working group Founded in October,2005 Founded in October,2005 Total 91 members from industry, university, institute Total 91 members from industry, university, institute Seven sub group: product, protocol, data format, security and privacy, application, IPR, general Seven sub group: product, protocol, data format, security and privacy, application, IPR, general Secretariat is in CESI. Secretariat is in CESI.
Copyright © 2007 CESI http://www.cesi.ac.cn RFID development trend Passive RFID is becoming the main technology. Low cost 13.56MHz, 860MHz~960MHz 10m distance Item identification Active RFID still has its advantages … Long distance >100m 433MHz, 2.45GHz, ISM Container, locating RTLS is developing … Personal locating and tracking Container locating
Copyright © 2007 CESI http://www.cesi.ac.cn Identification issues Internet of things The ID stored in the RFID tag refers to an data access address (IP + data pointer). The ID stored in the RFID tag refers to an data access address (IP + data pointer). Every item needs a unique identifier. Every item needs a unique identifier. Every company may need a IP. Every company may need a IP. Every sensor needs a IP in a sensor network. Every sensor needs a IP in a sensor network. Unique identifiers, IP What number system do we need to design ? What number system do we need to design ? EPC, OID, NID, IPV6 ? EPC, OID, NID, IPV6 ? Who governs the distribution of ID and IP? Who governs the distribution of ID and IP? UN, ISO/IEC JTC1, ITU? UN, ISO/IEC JTC1, ITU?
Copyright © 2007 CESI http://www.cesi.ac.cn What should we do next? With the internet of things Unique identifiers Unique identifiers Network architecture Network architecture Security and privacy Security and privacy Sensor network Sensor network With the active RFID RTLS RTLS
Thank you very much
Update. Components - tags, readers and antennas - staff stations - self checkout stations - inventory wand - return chute - sortation equipment - EAS.
Alien Technology® Patti Blessing Director Business Development
World Class Standards Footer text (edit in View : Header and Footer) Security paradigms and RFID RFID03_03 Scott W CADZOW C3L.
1 RFID and Telecommunication Services 25th May 2004 DATA BASE forum Sigurd Bolt Sørensen, Bolt Consult Vice - Chairman ETSI-ERM-TG34
Rue du Rhône 114- CH-1204 Geneva - T: F: Near field communication (NFC) Ecma/TC32-TG19/2005/013.
Smart Tracking: Usage of IPv6 in RFID System for Global Mobility
1 1st China RFID Benchmarking Test Forum & MOU Signing Ceremony Johnson Yim.
Introduction to TAGSYS Dr Charles Boyer General Manager Were not just in RFID, we are RFID!
Mobile RFID Service and Its Security in Korea 17 Nov Keon Woo Kim.
PROF. MAULIK PATEL CED, GPERI Mobile Computing Gujarat Power Engineering and Research Institute 1 Prepared By: Prof. Maulik Patel Mobile Technologies.
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Technology RFID stands for radio frequency identification. This technology allows transmission of data between a transponder and a reader on a contactless.
RFID Technologies Master seminar : Tangible User Interfaces Bruno Dumas – DIVA Group University of Fribourg
October 05 Standards. October My own lesson in RFID standardization.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
© 2019 SlidePlayer.com Inc. All rights reserved.