Team 7 Technical Presentation

Slides:



Advertisements
Similar presentations
SMUCSE 7349 RFID Security. SMUCSE 7349 Current Applications Logistics –Military supply logistics Gulf War I: Double orders to ensure arrival Gulf War.
Advertisements

RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
RFID – Lessons Learned July 22, 2004 Russ Brown. Agenda vRFID Basics vRFID Vision vRFID Upside vRFID Concerns vRFID Lessons Learned vRFID Future State.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
ITEC 810 Overview of Micropayment Technology
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
J.J. Faxon Andy Vu Dustin Beck Jessica Bentz Mandi Ellis
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
Inventory Control in Stores Dec05-09 Team: Jeff Benson Frederick Brown Christopher Reed Brian Wagner Date: December 6, 2005 Client: ISU Senior Design Program.
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
Deichman RFiD The invisible link from book to information system.
RFID Technology in Healthcare Presenters: Lauren Gunn and Connor Zale.
ELG 4135 Electronics ΙΙΙ Project Professor: Riadh Habash TA: Mohamad Eid TA: Peng He.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Wireless Technology Wireless devices transmit information via Electromagnetic waves Early wireless devices –Radios – often called wireless in.
Applied Communications Technology n.a.shulver, March 2012 updated March 2013 RFID identification 1.What is RFID? 2.Some examples 3.How does it work? 4.Industrial.
RFID TECHNOLOGY By: Sunil Patel Anat Krikunets Ge Qu Priya Pathmanathan.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
مدیریت تولید پیشرفته جلسه پنجم : Introduction: CIM, RFID
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
- 1 - RFID Security and Privacy: A Research Survey Ari Juels RSA Laboratories IEEE Journal on Selected Areas in Communication (J-SAC) in 2006 Taesung Kim.
45 nm transistor 45nm =.045um (microns)= 450 Angstroms.
RFID Radio Frequency Identification By Lakshmi VS Pranav Pandit.
RFID TECHNOLOGY IN BABARIA INSTITUTE OF TECHNNOLOGY (BIT):an OVERVIEW BY BINAL H JOSHI LIBRARIAN BABARIA INSTITUTE OF TECHNOLOGY VADODARA.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Radio Frequency Identification
Team 7 Trevor Emerick| Lauren Poole| Jazmine Gaymon| Bingyang Wu Sponsored by ArcelorMittal Dr. Nihar R. Mahapatra Cliff Barnett Smart Gate Security Final.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
TAG CAR Karthick Singaram Arun Magesh. Problem Statement In Bangalore during the recent survey average of 2000 vehicle per day is violating traffic rules.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Technology Lecture for week 5 Dhruba Sen
Umm… What does this anagram mean ???. N EAR F IELD C OMMUNICATION (NFC)
I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
LIBRARY AUTOMATION USING RFID LIBRARY AUTOMATION USING RFID Presented by; Joju Mohan -67 Ninitha Xavier -68 Priyanka C.P -69 Rahul K.Raj -70.
ABSTRACT Near Field Communication (NFC) is based on a short- range wireless connectivity, designed for intuitive, simple and safe interaction between.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
RADIO FREQUENCY IDENTIFICATION (RFID) FOR LIBRARIES
English for Advance Learners I
Designing a Production Plan
Radio Frequency Identification (RFID)
Rhetorical SITUATION We are at a convention for Canadian retailers, transportation brokers and yard management companies. I am a representative from.
Radio Frequency IDentification
RFID & applications گردآوری: بیتا تدین
Radio Frequency Identification and Near Field Communication
N-Guard: a Solution to Secure Access to NFC tags
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Radio Frequency Identification
Automatic Identification and Data Collection Technology
- Dylan Leintz - Dr. Davies
Mobile Computing Lecture Materials By Bintang Eka Putera.
RFID used for real-time tracking Physics 490 seminar 4/15/2019
Presentation transcript:

Team 7 Technical Presentation RFID Technology Bingyang

Team Members Trevor Emerick Lauren Poole Bingyang Wu Jazmine Gaymon Sponsor Cliff Barnett Facilitator Nihar Mahapatra Bingyang

What is an RFID? Radio-Frequency Identification Small electronic devices Small chip Antenna Up to 2,000 bytes of data The overall use of RFID is increasing as it becomes cheaper to implement Bingyang http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=1

What is NFC ? Near Field Communication Specialized subset within RFID Branch of High Frequency RFID Operates at the 13.56 MHz range Ability to be a reader and tag Peer-to-peer connections Typically used for cellular devices Bingyang http://blog.atlasrfidstore.com/rfid-vs-nfc

How does it work? Three Components Scanning Antenna/ Reader (Current to EM. Waves) A Transponder/ Tag (EM. Waves to Current) Transceiver + Decoder (EPC) These work together to create an RFID System Bingyang http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=2 http://www.impinj.com/resources/about-rfid/how-do-rfid-systems-work/

How does it work? Bingyang

System Design - Scanning Antenna First part of the overall reading device Obtains the tag value from the object it is attached to or implanted in Vary in size depending on application and placement Provides the RFID tag with power to operate Lauren

System Design (Cont.) - Transceiver Second part of the overall reading device Responsible for decoding the read RFID tag Verifying whether it is a valid Receives the broadcasted information from the transponder Lauren

System Design (Cont.) - Tags Made of a microchip and antenna that communicates with the reader Active Tags Have own power source Provide faster reading Further range of detection Shorter life Span Lauren

System Design - Tags (Cont.) Passive Tags Do not require batteries Longer life span (virtually unlimited) Field Programmable Value can be programmed into the chip and changed as needed Lauren

System Design - Tags (Cont.) Cards are similar in size to a credit card Includes credit cards, company identification cards, Enhanced Licenses, or gate access cards Useful where other barcodes are not Doesn’t need to be on the objects surface ~100 ms or less read time Can read multiple tags at a time

System Design - Tags (Cont.) Lauren

Applications Credit Cards Toll Roads (I-Pass/E-ZPass) Access Control Hotels Inventory Tracking & Security Jazmine

Credit Cards “Smart Card” On the go Versatile One Device Reads Multiple Cards Accepts Many Carriers Jazmine

Toll Roads FasTrak Smoother Traffic Flow Cheaper for the business - less operators Improved fuel efficiency No stopping No starting from a stopped position and getting back up to the traveling speed Jazmine https://www.thetollroads.com/assets/objects/207/6_15_06_LeCG_Toll_Road_Study.pdf

Access Control Typically seen around campus Possible Requirements Buildings Parking Lots Possible Requirements Valid Credentials - Major, Department, Job Status Time of the day - Business Hours/Nights Jazmine

Hotels & Upscale Apartments Reprogrammable Harder to lose Less Maintenance Trace lock activity Customer Experience Jazmine

Inventory Tracking & Security Prevent over or under stocking Tagging High Risk items with RFID tags Security - Prevent Thefts RF Tag - Simpler, All the same Libraries, Stores, etc Quality Control Able to locate items with a short shelf life “remotely” or at a further distance RFID - Complex Trevor https://www.nibusinessinfo.co.uk/content/using-rfid-inventory-control-stock-security-and-quality-management

RFID Companies HID Matrix Systems Used widely on campus from readers for gated lots, and doors to rfid tags that come with university vehicles. Matrix Systems Produces card readers and the servers that manage these devices Trevor

Shortcomings of RFID Technology Standards are not well set Implemented using different manufactures that use their own RFID technology and processes i.e. ExxonMobil’s SpeedPass can only be used at ExxonMobil, If a fast food restaurant wants to use it, they would have to purchase it from Speedway Trevor

Shortcomings of RFID Technology Not well protected, can be skimmed very easily by unauthorized personnel High-gain antennas can read these tags from further away Concern for consumers Ability to be jammed by energy from WiFi or mobile devices at the right frequency (Interference) Trevor

Questions? Trevor