Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas

Slides:



Advertisements
Similar presentations
HomeProfile Consolidated Cybernetics Co. Pvt. Ltd. 25, New Damu Nagar Puliakulam Road, Coimbatore Ph: , Fax:
Advertisements

Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Lesson Title: Tag Threats, Risks, and Mitigation Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Beyond the Barcode RFIDs Radio Frequency Identification.
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
SHERA USHER RFID in Humans. Brief History of RFID RFID can be traced back to WWII Sir Robert Alexander Watson-Watt developed the first active.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
Lesson Title: Electromagnetics and Antenna Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Singulation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
SOP Standard Operating Procedure This workforce solution was funded by a grant awarded under the President’s Community-Based Job Training Grants as implemented.
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
HIPAA PRIVACY AND SECURITY AWARENESS.
Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Lesson Title: Fast Fourier Transform Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Cruise Planning and Cruising Course Chapter 9 The Formalities of Cruising in Foreign Waters United States Power Squadrons ® Instructors and Students Please.
MIXNET for Radio Frequency Identification Jaanus Uudmae, Harshitha Sunkara, Dale R. Thompson, Sean Bruce, and Jayamadhuri.
Federal Agencies + Travel = Quality Control Travel and Tourism Management.
Interrelativity.com The Practicalities, Perils and Promise of RFID Joe McCarthy Connector in Chief Interrelativity, Inc 26 April 2005.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: RFID Stakeholders Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Applications of Rfid (radio frequency identification) © 2015 albert-learning.com APPLICATIONS OF RFID (RADIO FREQUENCY IDENTIFICATION)
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
RFID Research Center at the University of Arkansas “Examining the Business Value of RFID” Note: this document is copyrighted ( 2008) and confidential;
Lesson Title: Types of RFID Tags Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Cut Saturation for p-cycle Design Khalid Al-Snaie Electronics Dept., College of Technology Riyadh, Saudi Arabia Dale R. Thompson* Department of Computer.
Lesson Title: Guidelines for Securing RFID Systems Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: EPCglobal Gen2 Tag Finite State Machine Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas.
Introduction to RFID Technology By: Vahid Bagher Poor 1.
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
May 12, 2015 National BILT meeting1 National Business and Industry Leadership Team (BILT) Meeting for Networking and Convergence Technology May 12, 2015.
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Lesson Title: FCC Rules for ISM Band Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Leader Interviews Name, PhD Title, Organization University This project is funded by the National Science Foundation (NSF) under award numbers ANT
Informatics Technologies for Patient Safety Presented by Moira Jean Healey.
CGMPs BT 202 Biotechnology Techniques II. Food and Drug Administration Established under 1906 Pure Food and Drugs Act to prevent sale of unacceptable.
Lesson Title: ThingNet Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Animal Identification Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Preparedness Edition $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 “BUG-OUT.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Lesson Title: RFID Nominal Read Range in Far Field Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
How to Customize your Pet Health ID Card?. What Is Pet Health ID Cards Pet Health ID Cards are extremely helpful and ensure that you have the important.
Molecules & Fuel Cell Technology
Presented by: BeeLinda L. Temple CPhT
Training Arkansas Computing Teachers (TACT)
Discussion and Conclusion
Federal Agencies + Travel = Quality Control
Written by: Jennifer Doherty, Cornelia Harris, Laurel Hartley
Lesson Title: Reader Architecture and Antenna Configurations
Title of Poster Site Visit 2017 Introduction Results
People Who Did the Study Universities they are affiliated with
Title of session For Event Plus Presenters 12/5/2018.
Copyright © 2008 by Dale R. Thompson Dale R. Thompson
Career and Technical Education
Title of Poster Site Visit 2018 Introduction Results
ONTARIO COUNCIL FOR TECHNOLOGY EDUCATION
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
Project Title: I. Research Overview and Outcome
Lesson Title: Regulations Affecting RFID
Presentation transcript:

Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material is based upon work supported by the National Science Foundation under Grant No. DUE Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). Copyright © 2008, 2009 by Dale R. Thompson

RFID application categories 2

Item management Railroad Supply chain Inventory control Equipment control 3

Physical access control Automobile on toll roads Automobile Building access Garage access 4

Travel documents E-Passports – Oct – HF – ISO DHS Peoples Access Security Services (PASS) card – Low-cost alternative to passports to meet the requirements of the Western Hemisphere Travel Initiative (WHTI) – U.S. citizens, as well as for Mexicans and Canadians – UHF 5

Finance & banking American Express Mastercard Visa 6

Cross Country Race 7

VeriChip Human implantable RFID tag operating at about 134 KHz because at these frequencies the RF can penetrate mud, blood, and water About the size of uncooked grain of rice Oct. 22, 2002 – US Food and Drug Administration ruled VeriChip not regulated device Oct – FDA ruled serial number in VeriChip could be linked to healthcare information Healthcare applications – Implanted medical device identification – Emergency access to patient-supplied health information – Portable medical records access including insurance information – In-hospital patient identification – Medical facility connectivity via patient – Disease/treatment management of at-risk populations (such as vaccination history) 8

Animal tracking 9

Pet Identification 10

Product counterfeiting countermeasure Pharmaceutical 11

Contact Information Dale R. Thompson, Ph.D., P.E. Associate Professor Computer Science and Computer Engineering Dept. JBHT – CSCE University of Arkansas Fayetteville, Arkansas Phone: +1 (479) FAX: +1 (479) WWW:

Copyright Notice, Acknowledgment, and Liability Release Copyright Notice – This material is Copyright © 2008, 2009 by Dale R. Thompson. It may be freely redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder. Acknowledgment – These materials were developed through a grant from the National Science Foundation at the University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas. Liability Release – The curriculum activities and lessons have been designed to be safe and engaging learning experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices. 13