58 resultados para Chipless RFID tag


Relevância:

20.00% 20.00%

Publicador:

Resumo:

There is growing interest in Discovery Services for locating RFID and supply chain data between companies globally, to obtain product lifecycle information for individual objects. Discovery Services are heralded as a means to find serial-level data from previously unknown parties, however more realistically they provide a means to reduce the communications load on the information services, the network and the requesting client application. Attempts to design a standardised Discovery Service will not succeed unless security is considered in every aspect of the design. In this paper we clearly show that security cannot be bolted-on in the form of access control, although this is also required. The basic communication model of the Discovery Service critically affects who shares what data with whom, and what level of trust is required between the interacting parties. © 2009 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Passive Radio Frequency Identification (RFID) has revolutionized the way in which products are identified. This paper considers the effect of metals on the performance of RFID at ultra high frequency (UHF). The paper establishes read patterns in space, highlighting the interference of RF waves due to three different metals, one ferrous and the other two non ferrous, when placed behind a transponder. The effect of thickness of the metal plate is also examined. Different metals have been found to have different interference effects although there are some similarities in their read patterns related to their material properties. Also experiments have been carried out to identify and establish various methods of improving this performance. Finally, differences between performance-measuring parameters, namely attenuating transmitted power and calculating read rate at a fixed attenuation are established and possible reasons of these observations are presented. © 2007 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Automated Identification and in particular, Radio Frequency Identification (RFID) promises to assist with the automation of mass customised production processes. RFID has long been used to gather a history or trace of part movements, but the use of it as an integral part of the control process is yet to be fully exploited. Such use places stringent demands on the quality of the sensor data and the method used to interpret that data. in particular, this paper focuses on the issue of correctly identifying, tracking and dealing with aggregated objects with the use of RFID. The presented approach is evaluated in the context of a laboratory manufacturing system that produces customised gift boxes. Copyright © 2005 IFAC.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID is a technology that enables the automated capture of observations of uniquely identified physical objects as they move through supply chains. Discovery Services provide links to repositories that have traceability information about specific physical objects. Each supply chain party publishes records to a Discovery Service to create such links and also specifies access control policies to restrict who has visibility of link information, since it is commercially sensitive and could reveal inventory levels, flow patterns, trading relationships, etc. The requirement of being able to share information on a need-to-know basis, e.g. within the specific chain of custody of an individual object, poses a particular challenge for authorization and access control, because in many supply chain situations the information owner might not have sufficient knowledge about all the companies who should be authorized to view the information, because the path taken by an individual physical object only emerges over time, rather than being fully pre-determined at the time of manufacture. This led us to consider novel approaches to delegate trust and to control access to information. This paper presents an assessment of visibility restriction mechanisms for Discovery Services capable of handling emergent object paths. We compare three approaches: enumerated access control (EAC), chain-of-communication tokens (CCT), and chain-of-trust assertions (CTA). A cost model was developed to estimate the additional cost of restricting visibility in a baseline traceability system and the estimates were used to compare the approaches and to discuss the trade-offs. © 2012 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A second harmonic suppression scheme allowing RoF links to support communications and passive UHF RFID is reviewed. Using RoF distributed antenna system techniques, the coverage and location accuracy of passive UHF RFID are significantly improved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Radio Frequency Identification (RFID) technology allows automatic data capture from tagged objects moving in a supply chain. This data can be very useful if it is used to answer traceability queries, however it is distributed across many different repositories, owned by different companies. © 2012 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Pharma(ceuticals) industry is at a cross-roads. There are growing concerns that illegitimate products are penetrating the supply chain. There are proposals in many countries to apply RFID and other traceability technologies to solve this problem. However there are several trade-offs and one of the most crucial is between data visibility and confidentiality. In this paper, we use the TrakChain assessment framework tools to study the US Pharma supply chain and to compare candidate solutions to achieve traceability data security: Point-of-Dispense Authentication, Network-based electronic Pedigree, and Document-based electronic Pedigree. We also propose extensions to a supply chain authorization language that is able to capture expressive data sharing conditions considered necessary by the industry's trading partners. © 2013 IEEE.