Download presentation
Presentation is loading. Please wait.
Published bySheila Campbell Modified over 9 years ago
1
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
2
What is an RFID Tag? Uses Privacy Concerns Positives and Negatives
3
What Is An RFID Tag? Radio-Frequency Identification Automatic Identification method that relies on storing and remotely retrieving data using devices called RFID tags or transponders. The RFID tag is an object that can be applied to or put into a product, animal, or person for the purpose of identification using radio waves.
4
What Is An RFID Tag? Most RFID tags contain at least two parts. One is an integrated circuit for storing and processing information, modulating and demodulating a (RF) signal and can also be used for other specialized functions. The second is an antenna for receiving and transmitting the signal. Two types of tags: Passive and Active pic
6
World War II Plane Uses – Before RFID *Possible Origination
7
EPC RFID tag used at Wal-Mart Uses – Inventory
8
Electronic Toll Collector Uses – Toll Collection
9
Security RFID Tag Uses – Security *Usually found inside video game, dvd and compact disc cases
10
Implanted RFID Chip Uses – Tracking *Believe It Or Not, Some Celebrities and Federal Agents have RFID chips implanted in their body
11
Privacy How would you like it if, for instance, one day you realized your underwear was reporting on your whereabouts? — California State Senator Debra Bowen, at a 2003 hearing You never really can tell where an RFID tag is because it can put inside of something and not visible to the eye. Most concerns revolve around the fact that RFID tags affixed to products remain functional even after the products have been purchased and taken home and thus can be used for surveillance and other purposes unrelated to their supply chain inventory functions.
12
Pros Cons Inventory Keeping Is Much Easier Privacy Use of Radio Controlled Information Reduces Job Opportunities Possible Cancer Risks
13
Conclusion What RFIDs Are Process Uses Privacy More Cons than Pros
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.