1 / 32

Be careful, a spy is following you!

Be careful, a spy is following you!. Outline – Overview. Introduction - What is RFID ? Radio frequency spectrum How does RFID work ? Technical contraints. What is RFID ?. Radio Frequency Identification Automatic Identification procedure Barcodes Optical Character Recognition

decima
Télécharger la présentation

Be careful, a spy is following you!

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Be careful, a spy is following you!

  2. Outline – Overview • Introduction - What is RFID ? • Radio frequency spectrum • How does RFID work ? • Technical contraints

  3. What is RFID ? • Radio Frequency Identification • Automatic Identification procedure • Barcodes • Optical Character Recognition • Fingerprinting procedure • Data transmitted via radio frequency • Use of tags to identify objects • ID • Memory on board • Read / Read + Write • Applications examples… (EAS, Animal ID,…)

  4. ELF SLF ULF VLF radio frequency LF (125kHz) infrared MF electromagnetic spectrum optical spectrum VHF ultraviolet UHF (900MHz) X-ray SHF (2,4GHz - microwave) Gamma ray EHF Radio frequency spectrum • Industry Science Medical (ISM) • Low frequencies HF (13,56MHz - ISM)

  5. What does RFID look like ? • Mainly 2 components • Readers • Transponders (tags) Here are some readers......

  6. And here are some tags…

  7. Components of an RFID system • Tag • Passive, active and semi-passive • Readers

  8. Transceiver Tag Reader antenna Communication • Inductive coupling • Transformer type IC or microprocessor RFID Tag antenna

  9. Transceiver Tag Reader antenna Communication • Propagation coupling IC or microprocessor RFID Tag antenna

  10. Limitations • Collision • Tag orientation • Viruses

  11. RFID APPLICATIONS • Access control • Identifying & monitoring object • RFID & GSM integration

  12. ACCESS CONTROL • Online systems • Offline systems • RFID technology used in the public transportation • Vehicle theft prevention

  13. IDENTIFYING & MONITORING OBJECT • Animals or humans • Industry • RFID taking out the trash • Inventory maintenance

  14. RFID & GSM INTEGRATION • Transponder or reader within smart phones • Connection to GSM or other wireless network • Information stored in wireless network central database

  15. Outline – Overview • Introduction • Legal&Ethical aspects in: • USA • EUROPE • Summary

  16. Introduction • Transmission (authorized or unauthorized) of personal data • If unauthorized, it can be considered as a breach of personal privacy • Personal privacy is punishable • What’s Personal privacy?

  17. USA • Use in this country is really huge and in advance compared to other countries or nations • What is Personal Privacy in American Law? • Not so concerned as European authorities with the use of RFID and the Personal Privacy linked to it. • NO federal law about this notion! • Citizens Group intervening: CASPIAN

  18. Picture

  19. EUROPE 1 • Late about RFID technology but in advance over the USA for protecting laws • European citizens know RFID: a part of them believe in laws and others do not! 1 SOURCE : Forester Research (report published in March 2004 )

  20. EUROPE • The concept of privacy is very important in the EU • What is Personal Privacy in European Laws? • There is a really good protection of the European citizens for Private Life’s problems • The European Commission is studying the RFID case • A European Directive about Personal Privacy protects people • Another text, more complete, will be created in the course of 2006

  21. Future in Europe « From RFID to the Internet of things » • March

  22. RFID implementation process • Introduction • Findings • Summary

  23. Introduction • The research subject • Implementation process • The research aims • RFID interest • Implementation reasons • Advantages and challenges • Ethical and legal aspects • Market conductiveness Zmienic!!!!!!!!

  24. Introduction • The research methods • desk research • field research – the questionnaire • The research details • 6 companies (3 countries) • 2 small, 2 medium and 2 big • Focus-logistics • Generalization difficulties

  25. Findings • RFID benefits • RFID challenges • ROI • Launching time • Company’s reengineering • Ethical and legal aspects

  26. RFID benefits

  27. RFID primary challenges

  28. Return on Investment Expected ROI level >20% 11-20% 6-10% 1-5% Company size Small Medium Big

  29. Launching time

  30. Ethical and legal aspects

  31. Company’s reengineering

  32. Summary • Interestin RFID • Different implementation stages • Similar challenges • Similar benefits • Focus on the customers and business partners needs • Slight ethical and legal aspects

More Related