Radio-frequency identification (RFID) is a technology that uses radio waves to transfer data from an electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of identifying and tracking the object. Some RFID tags can be read from several meters away and beyond the line of sight of the reader. The application of bulk reading enables an almost-parallel reading of tags.
The tag's information is stored electronically. The RFID tag includes a small RF transmitter and receiver. An RFID reader transmits an encoded radio signal to interrogate the tag. The tag receives the message and responds with its identification information. Many RFID tags do not use a battery. Instead, the tag uses the radio energy transmitted by the reader as its energy source. The RFID system design includes a method of discriminating several tags that might be within the range of the RFID reader.
A number of organizations have set standards for RFID, including the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC), ASTM International, the DASH7 Alliance and EPCglobal. (Refer to Regulation and standardization below.) There are also several specific industries that have set guidelines. These industries include the Financial Services Technology Consortium (FSTC) which has set a standard for tracking IT Assets with RFID, the Computer Technology Industry Association CompTIA which has set a standard for certifying RFID engineers, and the International Airlines Transport Association IATA which has set tagging guidelines for luggage in airports.
RFID can be used in many applications. A tag can be affixed to any object and used to track and manage inventory, assets, people, etc. For example, it can be affixed to cars, computer equipment, books, mobile phones, etc. The Healthcare industry has used RFID to reduce counting, looking for things and auditing items. Many financial institutions use RFID to track key assets and automate compliance. Also with recent advances in social media RFID is being used to tie the physical world with the virtual world. RFID in Social Media first came to light in 2010 with Facebook's annual conference.[1]
RFID is a superior and more efficient way of identifying objects than manual system or use of bar code systems that have been in use since the 1970s. Furthermore, passive RFID tags (those without a battery) can be read if passed within close enough proximity to an RFID reader. It is not necessary to "show" the tag to the reader device, as with a bar code. In other words it does not require line of sight to "see" an RFID tag, the tag can be read inside a case, carton, box or other container, and unlike barcodes RFID tags can be read hundreds at a time. Bar codes can only be read one at a time.
In 2011, the cost of passive tags started at US$0.05 each and special tags, meant to be mounted on metal or withstand gamma sterilization, can go up to US$5. Active tags for tracking containers, medical assets, or monitoring environmental conditions in data centers all start at US$50 and can go up over US$100 each. Battery Assisted Passive (BAP) tags are in the US$3–10 range and also have sensor capability like temperature and humidity.
A radio-frequency identification system involves hardware known as interrogators or readers and tags, also known as labels, as well as RFID software or RFID middleware.
RFID tags can be either passive, active or battery assisted passive. Passive RFID does not use a battery, while an active has an on-board battery that always broadcasts or beacons its signal. A battery assisted passive (BAP) has a small battery on board that is activated when in the presence of a RFID reader.
Most RFID tags contain at least two parts: one is an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, and other specialized functions; the other is an antenna for receiving and transmitting the signal.
Depending on mobility, RFID readers are classified into two different types: fixed RFID and mobile RFID. If the reader reads tags in a stationary position, it is called fixed RFID. These fixed readers are set up specific interrogation zones and create a "bubble" of RF energy that can be tightly controlled if the physics is well engineered. This allows a very definitive reading area for when tags go in and out of the interrogation zone. On the other hand, if the reader is mobile when the reader reads tags, it is called mobile RFID. Mobile readers include hand helds, carts and vehicle mounted RFID readers from manufacturers such as Motorola, Intermec, Impinj, Sirit, etc.
In 1945 Léon Theremin invented an espionage tool for the Soviet Union which retransmitted incident radio waves with audio information. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator, which modulated the reflected radio frequency. Even though this device was a covert listening device, not an identification tag, it is considered to be a predecessor of RFID technology, because it was likewise passive, being energized and activated by waves from an outside source.[2]
Similar technology, such as the IFF transponder developed in the United Kingdom, was routinely used by the allies in World War II to identify aircraft as friend or foe. Transponders are still used by most powered aircraft to this day. Another early work exploring RFID is the landmark 1948 paper by Harry Stockman, titled "Communication by Means of Reflected Power" (Proceedings of the IRE, pp 1196–1204, October 1948). Stockman predicted that "... considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored."
Mario Cardullo's device, patented on January 23, 1973, was the first true ancestor of modern RFID, as it was a passive radio transponder with memory.[3] The initial device was passive, powered by the interrogating signal, and was demonstrated in 1971 to the New York Port Authority and other potential users and consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission media. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates, surveillance) and medical (identification, patient history).[4]
An early demonstration of reflected power (modulated backscatter) RFID tags, both passive and semi-passive, was performed by Steven Depp, Alfred Koelle, and Robert Freyman at the Los Alamos National Laboratory in 1973.[5] The portable system operated at 915 MHz and used 12-bit tags. This technique is used by the majority of today's UHFID and microwave RFID tags.[6]
The first patent to be associated with the abbreviation RFID was granted to Charles Walton in 1983.[7]
The largest deployment of active RFID is the US Department of Defense use of Savi[8] active tags on every one of its more than a million shipping containers that travel outside of the continental United States. The largest passive RFID deployment is the enterprise-wide deployment performed by Wal*Mart which instrumented over 2800 retail stores with over 25,000 reader systems, however the exact number is considered 'corporate confidential'.
RFIDs are easy to conceal or incorporate in other items. For example, in 2009 researchers at Bristol University successfully glued RFID micro-transponders to live ants in order to study their behavior.[9] This trend towards increasingly miniaturized RFIDs is likely to continue as technology advances.
Hitachi holds the record for the smallest RFID chip, at 0.05mm × 0.05mm. This is 1/64th the size of the previous record holder, the mu-chip.[10] Manufacture is enabled by using the silicon-on-insulator (SOI) process. These dust-sized chips can store 38-digit numbers using 128-bit Read Only Memory (ROM).[11] A major challenge is the attachment of the antennas, thus limiting read range to only millimeters.
Potential alternatives to the radio frequencies (0.125–0.1342, 0.140–0.1485, 13.56, and 840–960 MHz) used are seen in optical RFID (or OPID) at 333 THz (900 nm), 380 THz (788 nm), 750 THz (400 nm).[12] The awkward antennas of RFID can be replaced with photovoltaic components and IR-LEDs on the ICs.
In 2010 three key factors drove a significant increase in RFID usage: decreased cost of equipment and tags, increased performance to a reliability of 99.9% and a stable international standard around UHF passive RFID. The adoption of these standards were driven by EPCglobal, a joint venture between GS1 and GS1 US, which were responsible for driving global adoption of the barcode in the 1970s and 1980s. The EPCglobal Network was developed by the Auto-ID Center, an academic research project headquartered at the Massachusetts Institute of Technology (MIT) with labs at five leading research universities around the globe: Cambridge, Adelaide, Keio, Shanghai, Fudan, St. Gallen.[13] At RFID Journal Live 2010 in Orlando, Airbus detailed 16 active projects, IBM and—most recently added to the team—CSC. The two other areas of significant use are financial services for IT asset tracking and healthcare. RFID is becoming increasingly prevalent as the price of the technology decreases.
Since summer 2009, two credit card companies have been working with Dallas, Texas-based DeviceFidelity to develop specialized microSD cards. When inserted into a mobile phone, the microSD card can be both a passive tag and an RFID reader.[14] After inserting the microSD, a user's phone can be linked to bank accounts and used in mobile payment.
Dairy Queen in conjunction with Vivotech has also begun using RFIDs on mobile phones as part of their new loyalty and rewards program.[15] Patrons can ask to receive an RFID tag to place on their phone. After activation, the phone can receive promotions and coupons, which can be read by ViVOtech's specialized NFC devices.
Similarly, 7-Eleven has been working alongside MasterCard to promote a new touch-free payment system. Those joining the trial are given a complimentary Nokia 3220 cell phone – after activation, it can be used as an RFID-capable MasterCard credit card at any of 7-Eleven's worldwide chains.[16]
Nokia's 2008 device, the 6212, has RFID capabilities also. Credit card information can be stored, and bank accounts can be directly accessed using the enabled handset. The phone, if used as a vector for mobile payment, has added security in that users would be required to enter a passcode or PIN before payment is authorized.[17]
RFID combined with mobile computing and Web technologies provide a way for organizations to identify and manage their assets. It was initially introduced to major retail by Craig Patterson, Knoxville, TN . Mobile computers, with integrated RFID readers, can now deliver a complete set of tools that eliminate paperwork, give proof of identification and attendance. This approach eliminates manual data entry.
Web based management tools allow organizations to monitor their assets and make management decisions from anywhere in the world. Web based applications now mean that third parties, such as manufacturers and contractors can be granted access to update asset data, including for example, inspection history and transfer documentation online ensuring that the end user always has accurate, real-time data. Organizations are already using RFID tags combined with a mobile asset management solution to record and monitor the location of their assets, their current status, and whether they have been maintained.
RFID is being adopted for item-level retail uses. Aside from efficiency and product availability gains, the system offers a superior form of electronic article surveillance (EAS), and a superior self checkout process for consumers. The first commercial, public item-level RFID retail system installation is believed to be in May 2005 by Freedom Shopping, Inc. in North Carolina, USA.
2009 witnessed the beginning of wide-scale asset tracking with passive RFID. Wells Fargo and Bank of America made announcements that they would track every item in their data centers using passive RFID. Most of the leading banks have since followed suit. The Financial Services Technology Consortium (FSTC) set a technical standard for tagging IT assets[18] and other industries have used that standard as a guideline. For instance the US State Department is now tagging IT assets with passive RFID using the ISO/IEC 18000-6 standard.[19]
An advanced automatic identification technology such as the Auto-ID Labs system based on the Radio Frequency Identification (RFID) technology has significant value for inventory systems. Notably, the technology provides an accurate knowledge of the current inventory. In an academic study[20] performed at Wal-Mart, RFID reduced Out-of-Stocks by 30 percent for products selling between 0.1 and 15 units a day. Other benefits of using RFID include the reduction of labor costs, the simplification of business processes, and the reduction of inventory inaccuracies.
In 2004, Boeing integrated the use of RFID technology to help reduce maintenance and inventory costs on the Boeing 787 Dreamliner. With the high costs of aircraft parts, RFID technology allowed Boeing to keep track of inventory despite the unique sizes, shapes and environmental concerns. During the first six months after integration, the company was able to save $29,000 in labor.[21]
In 2007, Recall Corporation integrated the use of RFID to help organizations track and audit their records, to support compliance with regulations such as the Sarbanes-Oxley Act and HIPAA.[22]
RFID use in product tracking applications begins with plant-based production processes, and then extends into post-sales configuration management policies for large buyers.
In 2005, the Wynn Casino, Las Vegas, began placing individual RFID tags on high value chips. These tags allowed casinos the ability to detect counterfeit chips, track betting habits of individual players, speed up chip tallies, and determine counting mistakes of dealers. In 2010, the Bellagio casino was robbed of $1.5 million in chips. The RFID tags of these chips were immediately invalidated, thus making the cash value of these chips $0.[23]
RFID can also be used for supply chain management in the fashion industry. The RFID label is attached at the garment at production, can be read/traced througout the entire supply chain and is removed at the point of sale (POS).
By 2011 there are more than 100 passive RFID tags that are meant to be specifically mounted on metal. Members of the financial service industry, including Wells Fargo, Bank of America, Morgan Stanley, Citigroup, Fidelity and others, are purported to have tagged more than one million assets.
At the same time new integrated circuits (ICs) were introduced by Alien, Impinj and NXP (formerly Philips) which proved much better performance and use of the IT asset tracking application increased. The largest adopter to date appear to be Bank of America and Wells Fargo – each with more than 100,000 assets across more than a dozen data centers.[24] Some RFID specialists have engineered RFID Software specifically for optimizing RFID performance and scalability.
Manufacturers of products sold through retailers promote their products by offering discounts for a limited period on products sold to retailers with the expectation that the retailers will pass on the savings to their customers. However, retailers typically engage in forward buying, purchasing more product during the discount period than they intend to sell during the promotion period. Some retailers engage in a form of arbitrage, reselling discounted product to other retailers, a practice known as diverting. To combat this practice, manufacturers are exploring the use of RFID tags on promoted merchandise so that they can track exactly which product has sold through the supply chain at fully discounted prices.[33]
When customers enter a dressing room, the mirror reflects their image and also images of the apparel item being worn by celebrities on an interactive display. A webcam also projects an image of the consumer wearing the item on the website for everyone to see. This creates an interaction between the consumers inside the store and their social network outside the store. The technology in this system is an RFID interrogator antenna in the dressing room and Electronic Product Code RFID tags on the apparel item.[34]
With security of cars being a major concern in many countries, some countries are using RFID technology for vehicle registration and enforcement.[38][39] RFID can help detect and retrieve stolen cars.[40][41]
The first RFID passports ("E-passport") were issued by Malaysia in 1998. In addition to information also contained on the visual data page of the passport, Malaysian e-passports record the travel history (time, date, and place) of entries and exits from the country.
Other countries that insert RFID in passports include Norway (2005),[42] Japan (March 1, 2006), most EU countries (around 2006) including Spain, Ireland and the UK, Australia, Hong Kong and the United States (2007), Serbia (July 2008), Republic of Korea (August 2008), Taiwan (December 2008), Albania (January 2009), The Philippines (August 2009), Republic of Macedonia (2010).
Standards for RFID passports are determined by the International Civil Aviation Organization (ICAO), and are contained in ICAO Document 9303, Part 1, Volumes 1 and 2 (6th edition, 2006). ICAO refers to the ISO/IEC 14443 RFID chips in e-passports as "contactless integrated circuits". ICAO standards provide for e-passports to be identifiable by a standard e-passport logo on the front cover.
In 2006, RFID tags were included in new US passports. The US produced 10 million passports in 2005, and it has been estimated that 13 million will be produced in 2006. The chips inlays produced by Smartrac will store the same information that is printed within the passport and will also include a digital picture of the owner.[43] The US State Department initially stated the chips could only be read from a distance of 10 cm (4 in), but after widespread criticism and a clear demonstration that special equipment can read the test passports from 10 meters (33 ft) away, the passports were designed to incorporate a thin metal lining to make it more difficult for unauthorized readers to "skim" information when the passport is closed. The department will also implement Basic Access Control (BAC), which functions as a Personal Identification Number (PIN) in the form of characters printed on the passport data page. Before a passport's tag can be read, this PIN must be entered into an RFID reader. The BAC also enables the encryption of any communication between the chip and interrogator.[44]
Security expert Bruce Schneier has suggested that a mugger operating near an airport could target victims who have arrived from wealthy countries, or a terrorist could design an improvised explosive device which functioned when approached by persons from a particular country if passengers did not put their cards in an area close to their body (high liquid and saline content) or in a foil-lined wallet.
Some other European Union countries are also planning to add fingerprints and other biometric data, while some have already done so.[45]
Governments use RFID applications for traffic management, while automotive companies use various RFID tracking solutions for product management. Many of these solutions may work together in the future, though privacy regulations prevent many initiatives from moving forward at the same pace that technology allows.
Some bike lockers are operated with RFID cards assigned to individual users. A prepaid card is required to open or enter a facility or locker and is used to track and charge based on how long the bike is parked.
The Zipcar car-sharing service uses RFID cards for locking and unlocking cars and for member identification.[46]
Following a successful pilot, Housing & Development Board (HDB) Singapore called two tenders in 2006 to implement RFID to replace the paper Season Parking Ticket (SPT). The successful tenders have distributed RFID tags to SPT holders since March 2007.[47]
RFID tags for animals represent one of the oldest uses of RFID technology. Originally meant for large ranches and rough terrain, since the outbreak of mad-cow disease, RFID has become crucial in animal identification management.
An implantable variety of RFID tags or transponders can also be used for animal identification. The transponders are more well-known as passive RFID technology, or simply "chips" on animals.[57]
The Canadian Cattle Identification Agency began using RFID tags as a replacement for barcode tags. The tags are required to identify a bovine's herd of origin and this is used for tracing when a packing plant condemns a carcass. Currently CCIA tags are used in Wisconsin and by US farmers on a voluntary basis. The USDA is currently developing its own program.
Implantable RFID chips designed for animal tagging are now being used in humans. An early experiment with RFID implants was conducted by British professor of cybernetics Kevin Warwick, who implanted a chip in his arm in 1998. In 2004 Conrad Chase offered implanted chips in his night clubs in Barcelona[58] and Rotterdam to identify their VIP customers, who in turn use it to pay for drinks.
In 2004, the Mexican Attorney General's office implanted 18 of its staff members with the Verichip to control access to a secure data room.[59]
Security experts have warned against using RFID for authenticating people due to the risk of identity theft. For instance, a man-in-the-middle attack would make it possible for an attacker to steal the identity of a person in real-time. Due to the resource constraints of RFIDs, it is virtually impossible to protect against such attack models as this would require complex distance-binding protocols.[60][61][62][63]
Privacy advocates have protested against implantable RFID chips, warning of potential abuse and denouncing these types of RFID devices as "spychips", and that use by governments could lead to an increased loss of civil liberties and would lend itself too easily to abuse. One such case of this abuse would be in the microchip's dual use as a tracking device. Such concerns were justified in the United States, when the FBI program COINTELPRO was revealed to have tracked the activities of high profile political activist and dissident figures. There is also the possibility that the chip's information will be available to those other than governments, such as private business, thus giving employers highly personal information about employees. In addition, privacy advocates state that the information contained in this chip could easily be stolen, so that storing anything private in it would be to risk identity theft.
According to the US Food and Drug Administration (FDA), implantation of an RFID chip poses potential medical downsides. Electrical hazards, MRI incompatibility, adverse tissue reaction, and migration of the implanted transponder are just a few of the potential risks associated with the Verichip ID implant device, according to an October 12, 2004 letter issued by the FDA.[64]
It has been argued that RFID chipping of sex offenders in the US could be politically feasible, and allowable under the U.S. Constitution.[65]
Adoption of RFID in the medical industry has been widespread and very effective. Hospitals are among the first users to combine both active and passive RFID technology. Many successful deployments in the healthcare industry have been cited where active technology tracks high-value, or frequently moved items, where passive technology tracks smaller, lower cost items that only need room-level identification.
In July 2004, the US Food and Drug Administration issued a ruling that essentially begins a final review process that will determine whether hospitals can use RFID systems to identify patients and/or permit relevant hospital staff to access medical records. Since then, a number of U.S. hospitals have begun implanting patients with RFID tags and using RFID systems, usually for workflow and inventory management.[71] There is some evidence, as well, that nurses and other hospital staff may be subjected to increased surveillance of their activities or to labor intensification as a result of the implementation of RFID systems in hospitals.[72] The use of RFID to prevent mixups between sperm and ova in IVF clinics is also being considered.[73]
In October 2004, the FDA approved USA's first RFID chips that can be implanted in humans. The 134 kHz RFID chips, from VeriChip Corp. can incorporate personal medical information and could save lives and limit injuries from errors in medical treatments, according to the company. The FDA approval was disclosed during a conference call with investors. Shortly after the approval, authors and anti-RFID activists Katherine Albrecht and Liz McIntyre discovered an FDA Warning Letter that spelled out serious health risks associated with the VeriChip. According to the FDA, these include "adverse tissue reaction", "migration of the implanted transponder", "failure of implanted transponder", "electrical hazards" and "magnetic resonance imaging [MRI] incompatibility."
St. Clair Hospital in Pittsburgh has deployed an RFID and barcode based bedside medication verification system that improves patient safety by reducing medication errors. Nurses use a PDA equipped with a portable RFID reader and barcode scanner to check patient ID and medications before administering any drugs, including drugs delivered through IV pumps.[74]
To combat home health fraud, the Centers for Medicare & Medicaid Services recently announced heightened scrutiny of the home health care industry. In March, 2009, Elite Medical Supply, a durable medical equipment supplier in New York were one of the first to sign on to combat Medical fraud. They selected CYBRA's EdgeMagic RFID and Bar Code Software to rollout the process.[75]
Among the many uses of RFID technology is its deployment in libraries. This technology has slowly begun to replace the traditional barcodes on library items (books, CDs, DVDs, etc.). The RFID tag can contain identifying information, such as a book's title or material type, without having to be pointed to a separate database (but this is rare in North America). The information is read by an RFID reader, which replaces the standard barcode reader commonly found at a library's circulation desk. The RFID tag found on library materials typically measures 50×50 mm in North America and 50×75 mm in Europe. It may replace or be added to the barcode, offering a different means of inventory management by the staff and self service by the borrowers. It can also act as a security device, taking the place of the more traditional electromagnetic security strip.[76]
While there is some debate as to when and where RFID in libraries first began, it was first proposed in the late 1990s as a technology that would enhance workflow in the library setting. Singapore was certainly one of the first to introduce RFID in libraries and Rockefeller University in New York may have been the first academic library in the United States to use this technology, whereas Farmington Community Library in Michigan may have been the first public institution, both of which began using RFID in 1999. In Europe, the first public library to use RFID was the one in Hoogezand-Sappemeer, Netherlands in 2001, where borrowers were given an option. To their surprise, 70% used the RFID option and quickly adapted, including elderly people.
Worldwide, in absolute numbers, RFID is used most in the United States, followed by the United Kingdom and Japan. It is estimated that over 30 million library items worldwide now contain RFID tags, including some in the Vatican Library in Rome.[77] At the time of 2010, the largest RFID implementation in academic library is the University of Hong Kong Libraries which have over 1.20 million library items contain RFID tags;[78] whereas the largest implementation for public institution has been installed in Seattle Public Library in the United States.
RFID has many library applications that can be highly beneficial, particularly for circulation staff. Since RFID tags can be read through an item, there is no need to open a book cover or DVD case to scan an item. This could reduce repetitive-motion injuries. Where the books have a barcode on the outside, there is still the advantage that borrowers can scan an entire pile of books in one go, instead of one at a time. Since RFID tags can also be read while an item is in motion, using RFID readers to check-in returned items while on a conveyor belt reduces staff time. But, as with barcode, this can all be done by the borrowers themselves, meaning they might never again need the assistance of staff. Next to these readers with a fixed location there are also portable ones (for librarians, but in the future possibly also for borrowers, possibly even their own general-purpose readers). With these, inventories could be done on a whole shelf of materials within seconds, without a book ever having to be taken off the shelf.[79] In Umeå, Sweden, RFID is being used to assist visually impaired people in borrowing audiobooks.[80] In Malaysia, Smart Shelves are used to pinpoint the exact location of books in Multimedia University Library, Cyberjaya.[81] In the Netherlands, handheld readers are being introduced for this purpose.
The Dutch Union of Public Libraries ('Vereniging van Openbare Bibliotheken') is working on the concept of an interactive 'context library', where borrowers get a reader/headphones-set, which leads them to the desired section of the library (using triangulation methods, rather like GPS) and which they can use to read information from books on the shelves with the desired level of detail (e.g. a section read out loud), coming from the book's tag itself or a database elsewhere, and get tips on alternatives, based on the borrowers' preferences, thus creating a more personalised version of the library. This may also lead them to sections of the library they might not otherwise visit. Borrowers could also use the system to exchange experiences (such as grading books). This is already done by children in the virtual realm at mijnstempel.nl, but the same could be done in physical form. Borrowers can grade the book at the return desk.
However, as of 2008 this technology remains too costly for many smaller libraries, and the conversion period has been estimated at 11 months for an average-size library. A 2004 Dutch estimate was that a library which lends 100,000 books per year should plan on a cost of €50,000 (borrow- and return-stations: 12,500 each, detection porches 10,000 each; tags 0.36 each). RFID taking a large burden off staff could also mean that fewer staff will be needed, resulting in some of them getting fired,[77] but that has so far not happened in North America where recent surveys have not returned a single library that cut staff because of adding RFID. In fact, library budgets are being reduced for personnel and increased for infrastructure, making it necessary for libraries to add automation to compensate for the reduced staff size. Also, the tasks that RFID takes over are largely not the primary tasks of librarians. A finding in the Netherlands is that borrowers are pleased with the fact that staff are now more available for answering questions.
A concern surrounding RFID in libraries that has received considerable publicity is the issue of privacy. Because RFID tags can—depending on the RFID transmitter & reader—be scanned and read from up to 100 metres (330 ft) (eg Smart Label RFID's), and because RFID uses an assortment of frequencies (both depending on the type of tag, though), there is some concern over whether sensitive information could be collected from an unwilling source. However, library RFID tags do not contain any patron information,[82] and the tags used in the majority of libraries use a frequency only readable from approximately 10 feet (3.0 m).[76] Also, libraries have always had to keep records of who has borrowed what, so in that sense there is nothing new. However, many libraries destroy these records once an item has been returned. RFID would complicate or nullify this respect of readers' privacy. Further, another non-library agency could potentially record the RFID tags of every person leaving the library without the library administrator's knowledge or consent. One simple option is to let the book transmit a code that has meaning only in conjunction with the library's database. Another step further is to give the book a new code every time it is returned. And if in the future readers become ubiquitous (and possibly networked), then stolen books could be traced even outside the library. Tag removal could be made difficult if the tags are so small that they fit invisibly inside a (random) page, possibly put there by the publisher.
RFID technologies are now also implemented in end-user applications in museums. An example was the custom-designed temporary research application, "eXspot," at the Exploratorium, a science museum in San Francisco, California. A visitor entering the museum received an RF Tag that could be carried as a card. The eXspot system enabled the visitor to receive information about specific exhibits. Aside from the exhibit information, the visitor could take photographs of themselves at the exhibit. It was also intended to allow the visitor to take data for later analysis. The collected information could be retrieved at home from a "personalized" website keyed to the RFID tag.[83]
School authorities in the Japanese city of Osaka are now chipping children's clothing, back packs, and student IDs in a primary school.[84] A school in Doncaster, England is piloting a monitoring system designed to keep tabs on pupils by tracking radio chips in their uniforms.[85] St Charles Sixth Form College in west London, England, started September, 2008, is using an RFID card system to check in and out of the main gate, to both track attendance and prevent unauthorized entrance. Similarly, Whitcliffe Mount School in Cleckheaton, England uses RFID to track pupils and staff in and out of the building via a specially designed card. In the Philippines, some schools already use RFID in IDs for borrowing books and also gates in those particular schools have RFID ID scanners for buying items at a school shop and canteen, library and also to sign in and sign out for student and teacher's attendance.
Many forms of RFID race timing have been in use for timing races of different types since the early 1990s. The practice began with pigeon racing, introduced by a company called deister electronic Gmbh of Barsinghausen, Germany. It is used for registering race start and end timings for animals or individuals in large running races or multi-sport races where it is impossible to get accurate stopwatch readings for every entrant.
In the race, the racers wear passive or active tags that are read by antennae placed alongside the track or on mats across the track. UHF based tags instead of low or high frequency last-generation tags provide accurate readings with specially designed antennas. Rush error, lap count errors and accidents at start time are avoided since anyone can start and finish any time without being in a batch mode.
Passive and active RFID systems are used in off-road events such as Orienteering, Enduro and Hare and Hounds racing. Riders have a transponder on their person, normally on their arm. When they complete a lap they swipe or touch the receiver which is connected to a computer and log their lap time. The Casimo Group Ltd sells such a system, as does Sweden's SportIdent and Japan's Micro Talk Systems Corp. which sells the J-Chip system shown in the photo left.
RFID is being adapted by many recruitment agencies which have a PET (Physical Endurance Test) as their qualifying procedure especially in cases where the candidate volumes may run into millions (Indian Railway Recruitment Cells, Police and Power sector).
A number of ski resorts, particularly in Scandinavia, the French Alps and in the Spanish and French Pyrenees, have adopted RFID tags to provide skiers hands-free access to ski lifts. Skiers do not have to take their passes out of their pockets. Early on skiers were forced to use systems that required nearly contact - bending over to touch the turnstyles. These systems were based on high frequency (HF) at 13.56 megahertz. While effective at tracking the skiers they were difficult to use and expensive to deploy. However the bulk of ski areas in Europe, from Verbier to Chamonix use these systems.
The Vail Resorts in Colorado introduced Ultra High Frequency (UHF) RFID equipped season passes in 2009. In 2010, Vail announced that it would incorporate data from the season pass holders into a game like program skiers could opt-into called EpicMix. The system collects data and displays – vertical feet skied, number of runs taken, lifts used, etc – and all the information will be available to the user online where they can compete with other skiers and earn virtual badges. They are calling this new system EpicMix.[86][87][88] In 2011 they announced that they would expand the EpicMix program to every skier at all seven of their mountains. This will allow skiers to re-use a day pass multiple times, eliminating paper tickets and waste associated with them. Vail also announced they will deploy a photographer that will take free pictures for social media sites like Facebook or Twitter and upload to the EpicMix site, all for free with an EpicMix account. Vail is using UHF readers from Sirit and RFID Software from ODIN technologies as the operating system on the readers and to monitor and manage the RFID network.
RFID can be used in a variety of applications,[89][90]such as:
RFID tags are often a complement, but not a substitute, for UPC or EAN barcodes. They may not ever completely replace barcodes, due in part to their higher cost and the advantage of multiple data sources on the same object. Also, unlike RFID labels, barcodes can be generated and distributed electronically, e.g. via e-mail or mobile phone, for printing and/or display by the recipient. An example is airline boarding passes. The new EPC, along with several other schemes, is widely available at reasonable cost.
The storage of data associated with tracking items will require many terabytes. Filtering and categorizing RFID data is needed to create useful information. It is likely that goods will be tracked by the pallet using RFID tags, and at package level with Universal Product Code (UPC) or EAN from unique barcodes.
The unique identity is a mandatory requirement for RFID tags, despite special choice of the numbering scheme. RFID tag data capacity is large enough that each individual tag will have a unique code, while current bar codes are limited to a single type code for a particular product. The uniqueness of RFID tags means that a product may be tracked as it moves from location to location, finally ending up in the consumer's hands. This may help to combat theft and other forms of product loss. The tracing of products is an important feature that gets well supported with RFID tags containing a unique identity of the tag and also the serial number of the object. This may help companies to cope with quality deficiencies and resulting recall campaigns, but also contributes to concern about tracking and profiling of consumers after the sale.
It has also been proposed to use RFID for POS store checkout to replace the cashier with an automatic system which needs no barcode scanning. In the past this was not possible due to the higher cost of tags and existing POS process technologies. However, Industry Standard, a couture shop and recording studio in Ohio has successfully implemented a POS procedure that allows faster transaction throughput.[92]
An FDA-nominated task force concluded, after studying the various technologies currently commercially available, which of those technologies could meet the pedigree requirements. Amongst all technologies studied including bar coding, RFID seemed to be the most promising and the committee felt that the pedigree requirement could be met by easily leveraging something that is readily available.
Active RFID tags also have the potential to function as low-cost remote sensors that broadcast telemetry back to a base station. Applications of tagometry data could include sensing of road conditions by implanted beacons, weather reports, and noise level monitoring.[93]
Passive RFID tags can also report sensor data. For example, the Wireless Identification and Sensing Platform is a passive tag that reports temperature, acceleration and capacitance to commercial Gen2 RFID readers.
It is possible that active or semi-passive RFID tags used with or in place of barcodes could broadcast a signal to an in-store receiver to determine whether the RFID tag (product) is in the store.
Wal-Mart and the United States Department of Defense have published requirements that their vendors place RFID tags on all shipments to improve supply chain management. Due to the size of these two organizations, their RFID mandates impact thousands of companies worldwide. The deadlines have been extended several times because many vendors face significant difficulties implementing RFID systems. In practice, the successful read rates currently run only 80%, due to radio wave attenuation caused by the products and packaging. In time it is expected that even small companies will be able to place RFID tags on their outbound shipments.
In January 2005, Wal-Mart required its top 100 suppliers to apply RFID labels to all shipments. To meet this requirement, vendors use RFID printer/encoders to label cases and pallets that require EPC tags for Wal-Mart. These smart labels are produced by embedding RFID inlays inside the label material, and then printing bar code and other visible information on the surface of the label.
In October 2005 the University of Arkansas' Information Technology Research Institute released a report on its preliminary study of the impact of RFID on reducing retail out-of-stocks and concluded that RFID reduced OOS by 21% over non-RFID based stores.[94]
Two years later the Wall Street Journal published an article titled "Wal-Mart's Radio-Tracked Inventory Hits Static." The articles stated that the RFID plan set forth by Wal-Mart was "showing signs of fizzling" due to a lack of progress by Wal-Mart executives to introduce the technology to its stores and to the non-existent incentives for suppliers.
In October 2007 Wal-Mart announced new focus areas for its RFID implementation:
Another Wal-Mart division, Sam's Club, has also moved in this direction. It sent letters dated Jan. 7, 2008 to its suppliers, stating that by Jan. 31, 2008, every full single-item pallet shipped to its distribution center in DeSoto, Texas, or directly to one of its stores served by that DC, must bear an EPC Gen 2 RFID tag. Suppliers failing to comply will be charged a service fee.[95]
However, in January 2009 Sam's Club drastically lowered the penalty for failure to tag pallets from $2 a pallet to just 12 cents a pallet. The 12 cents a pallet is what Wal-Mart estimated it would cost Sam's to do the tagging itself. Sam's also announced that pallet-level tagging is expected to be introduced throughout the entire chain in 2010 while the deadline for tagging individual items was "under review."
In February 2009 Procter & Gamble stated it was ending its promotional program with Wal-Mart after Procter & Gamble "validated" benefits of the RFID program in merchandising and promotional displays. This implied Wal-Mart was not acting on the information to improve store execution.[96]
The DoD requirements for RFID tags on packages is prescribed in the Defense Federal Acquisition Regulations Supplements (DFARS) 252.211-7006.[97] Positioning of the tag needs to be completed in accordance with the clause and definitions in MIL STD 129 and as of 1 March 2007, EPC Global tags must comply with EPCglobal Class 1 Generation 2 specification.[98]
There is no global public body that governs the frequencies used for RFID. In principle, every country can set its own rules for this. The main bodies governing frequency allocation for RFID are:
Low-frequency (LF: 125–134.2 kHz and 140–148.5 kHz) (LowFID) tags and high-frequency (HF: 13.56 MHz) (HighFID) tags can be used globally without a license. Ultra-high-frequency (UHF: 868–928 MHz) (Ultra-HighFID or UHFID) tags cannot be used globally as there is no single global standard. In North America, UHF can be used unlicensed for 902–928& MHz (±13 MHz from the 915 MHz center frequency), but restrictions exist for transmission power. In Europe, RFID and other low-power radio applications are regulated by ETSI recommendations EN 300 220 and EN 302 208, and ERO recommendation 70 03, allowing RFID operation with somewhat complex band restrictions from 865–868 MHz. Readers are required to monitor a channel before transmitting ("Listen Before Talk"); this requirement has led to some restrictions on performance, the resolution of which is a subject of current research. The North American UHF standard is not accepted in France as it interferes with its military bands. For China and Japan, there is no regulation for the use of UHF. Each application for UHF in these countries needs a site license, which needs to be applied for at the local authorities, and can be revoked. For Australia and New Zealand, 918–926 MHz are unlicensed, but restrictions exist for transmission power.
These frequencies are known as the ISM bands (Industrial Scientific and Medical bands). The return signal of the tag may still cause interference for other radio users.
standards that have been made regarding RFID technology include:
In order to ensure global interoperability of products several organizations have setup additional standards for RFID testing. These standards include conformance, performance and interoperability tests.
Groups concerned with standardization are:
EPC Gen2 is short for EPCglobal UHF Class 1 Generation 2.
EPCglobal (a joint venture between GS1 and GS1 US) is working on international standards for the use of mostly passive RFID and the EPC in the identification of many items in the supply chain for companies worldwide.
One of the missions of EPCglobal was to simplify the Babel of protocols prevalent in the RFID world in the 1990s. Two tag air interfaces (the protocol for exchanging information between a tag and a reader) were defined (but not ratified) by EPCglobal prior to 2003. These protocols, commonly known as Class 0 and Class 1, saw significant commercial implementation in 2002–2005.
In 2004 the Hardware Action Group created a new protocol, the Class 1 Generation 2 interface, which addressed a number of problems that had been experienced with Class 0 and Class 1 tags. The EPC Gen2 standard was approved in December 2004. This was approved after a contention from Intermec that the standard may infringe a number of their RFID-related patents. It was decided that the standard itself does not infringe their patents, making the standard royalty free.[101] The EPC Gen2 standard was adopted with minor modifications as ISO 18000-6C in 2006.[102]
The lowest cost of Gen2 EPC inlay was offered by the now-defunct company SmartCode, at a price of $0.05 apiece in volumes of 100 million or more.[103] Nevertheless, further conversion (including additional label stock or encapsulation processing/insertion and freight costs to a given facility or DC) and of the inlays into usable RFID labels and the design of current Gen 2 protocol standard will increase the total end-cost, especially with the added security feature extensions for RFID Supply Chain item-level tagging.
Each tag generating a message each time when passing a reader may be a desired outcome. However, event filtering is required to reduce this data inflow to a meaningful depiction of moving goods passing a threshold. Various concepts have been designed, mainly offered as middleware performing the filtering from noisy and redundant raw data to significant processed data.
The frequencies used for RFID in the USA are currently incompatible with those of Europe or Japan. Furthermore, no emerging standard has yet become as universal as the barcode.[104] To address international trade concerns, it is necessary to use a tag that is operational within all of the international frequency domains.
A primary RFID security concern is the illicit tracking of RFID tags. Tags, which are world-readable, pose a risk to both personal location privacy and corporate/military security. Such concerns have been raised with respect to the United States Department of Defense's recent adoption of RFID tags for supply chain management.[105] More generally, privacy organizations have expressed concerns in the context of ongoing efforts to embed electronic product code (EPC) RFID tags in consumer products.EPCglobal Network, by design, is also susceptible to denial-of-service attacks. Using similar mechanism with DNS in resolving EPC data requests, the ONS Root servers become vulnerable to DoS attacks. Any organization planning to embark on EPCglobal Network may cringe upon discovering that the EPCglobal Network infrastructure inherits security weaknesses similar to DNS's.[106]
A second class of defense uses cryptography to prevent tag cloning. Some tags use a form of "rolling code" scheme, wherein the tag identifier information changes after each scan, thus reducing the usefulness of observed responses. More sophisticated devices engage in Challenge-response authentications where the tag interacts with the reader. In these protocols, secret tag information is never sent over the insecure communication channel between tag and reader. Rather, the reader issues a challenge to the tag, which responds with a result computed using a cryptographic circuit keyed with some secret value. Such protocols may be based on symmetric or public key cryptography. Cryptographically-enabled tags typically have dramatically higher cost and power requirements than simpler equivalents, and as a result, deployment of these tags is much more limited. This cost/power limitation has led some manufacturers to implement cryptographic tags using substantially weakened, or proprietary encryption schemes, which do not necessarily resist sophisticated attack.
Still other cryptographic protocols attempt to achieve privacy against unauthorized readers, though these protocols are largely in the research stage. One major challenge in securing RFID tags is a shortage of computational resources within the tag. Standard cryptographic techniques require more resources than are available in most low cost RFID devices. RSA Security has patented a prototype device that locally jams RFID signals by interrupting a standard collision avoidance protocol, allowing the user to prevent identification if desired.[107] Various policy measures have also been proposed, such as marking RFID-tagged objects with an industry standard label. RFID security has been an active research field for the past decade, with more than 400 scientific papers published since 2002.
Ars Technica reported in March 2006 an RFID buffer overflow bug that could infect airport terminal RFID databases for baggage, and also passport databases to obtain confidential information on the passport holder.[108]
In an effort to make passports more secure, several countries have implemented RFID in passports. However, the encryption on UK chips was broken in under 48 hours.[109] Since that incident, further efforts have allowed researchers to clone passport data while the passport is being mailed to its owner. Where a criminal used to need to secretly open and then reseal the envelope, now it can be done without detection, adding some degree of insecurity to the passport system.[110]
In an effort to prevent the passive “skimming” of RFID-enabled cards or passports, the U.S. General Services Administration (GSA) issued a set of test procedures for evaluating electromagnetically opaque sleeves.[111] For shielding products to be in compliance with FIPS-201 guidelines, they must meet or exceed this published standard. Shielding products currently evaluated as FIPS-201 compliant are listed on the website of the U.S. CIO’s FIPS-201 Evaluation Program.[112] The United States government requires that when new ID cards are issued, they must be delivered with an approved shielding sleeve or holder.[113]
There are contradicting opinions as to whether aluminum can prevent reading of RFID chips. Some people claim that aluminum shielding, essentially creating a Faraday cage, does work.[114] Others claim that simply wrapping an RFID card in aluminum foil only makes transmission more difficult and is not completely effective at preventing it.[115]
Shielding effectiveness depends on the frequency being used. Low-frequency LowFID tags, like those used in implantable devices for humans and pets, are relatively resistant to shielding, though thick metal foil will prevent most reads. High frequency HighFID tags (13.56 MHz—smart cards and access badges) are sensitive to shielding and are difficult to read when within a few centimetres of a metal surface. UHF Ultra-HighFID tags (pallets and cartons) are difficult to read when placed within a few millimetres of a metal surface, although their read range is actually increased when they are spaced 2–4 cm from a metal surface due to positive reinforcement of the reflected wave and the incident wave at the tag. UHFID tags can be successfully shielded from most reads by being placed within an anti-static plastic bag.
Currently, RFID tags are created by gluing an integrated circuit (IC) to an inlay. This poses a problem as vibration and high temperatures will loosen the connection. If the IC loses connection with the inlay, the RFID tag will no longer transmit. A new design was filed for patent[116] (currently pending approval) where the IC is soldered to a circuit board and the circuit board is then soldered to the inlay. This process replaces the adhesive with solder which is much more durable and temperature resistant.
"How would you like it if, for instance, one day you realized your underwear was reporting on your whereabouts?" |
—California State Senator Debra Bowen, at a 2003 hearing[117] |
The use of RFID technology has engendered considerable controversy and even product boycotts by consumer privacy advocates. Consumer privacy experts Katherine Albrecht and Liz McIntyre are two prominent critics of the technology. The two main privacy concerns regarding RFID are:
Most concerns revolve around the fact that RFID tags affixed to products remain functional even after the products have been purchased and taken home and thus can be used for surveillance and other purposes unrelated to their supply chain inventory functions.[118]
The RFID Network proved these fears to be unfounded in the premier episode of their syndicated cable TV series[119] by having RF engineers show how RFID technology really works. RF engineers drove an RFID-enabled van around a building and tried to take an inventory of items inside. They also explored if a passive RFID tag can be tracked from satellite.
The concerns raised by the above may be addressed in part by use of the Clipped Tag. The Clipped Tag is an RFID tag designed to increase consumer privacy. The Clipped Tag has been suggested by IBM researchers Paul Moskowitz and Guenter Karjoth. After the point of sale, a consumer may tear off a portion of the tag. This allows the transformation of a long-range tag into a proximity tag that still may be read, but only at short range – less than a few inches or centimeters. The modification of the tag may be confirmed visually. The tag may still be used later for returns, recalls, or recycling.
However, read range is both a function of the reader and the tag itself. Improvements in technology may increase read ranges for tags. Having readers very close to the tags makes short range tags readable. Generally, the read range of a tag is limited to the distance from the reader over which the tag can draw enough energy from the reader field to power the tag. Tags may be read at longer ranges than they are designed for by increasing reader power. The limit on read distance then becomes the signal-to-noise ratio of the signal reflected from the tag back to the reader. Researchers at two security conferences have demonstrated that passive Ultra-HighFID tags normally read at ranges of up to 30 feet, can be read at ranges of 50 to 69 feet using suitable equipment.[120][121]
In January 2004 privacy advocates from CASPIAN and the German privacy group FoeBuD were invited to the METRO Future Store in Germany, where an RFID pilot project was implemented. It was uncovered by accident that METRO "Payback" customer loyalty cards contained RFID tags with customer IDs, a fact that was disclosed neither to customers receiving the cards, nor to this group of privacy advocates. This happened despite assurances by METRO that no customer identification data was tracked and all RFID usage was clearly disclosed.[122]
During the UN World Summit on the Information Society (WSIS) between the 16th to 18 November 2005, founder of the free software movement, Richard Stallman, protested the use of RFID security cards. During the first meeting, it was agreed that future meetings would no longer use RFID cards, and upon finding out this assurance was broken, he covered his card with aluminum foil, and would only uncover it at the security stations. This protest caused the security personnel considerable concern, with some not allowing him to leave a conference room in which he had been the main speaker, and the prevention of him entering another conference room, where he was due to speak.[123]
In 2004–2005 the Federal Trade Commission Staff conducted a workshop and review of RFID privacy concerns and issued a report recommending best practices.[124]
RFID was one of the main topics of 2006 Chaos Communication Congress (organized by the Chaos Computer Club in Berlin) and triggered a big press debate. Topics included: electronic passports, Mifare cryptography and the tickets for the FIFA World Cup 2006. Talks showed how the first real world mass application of RFID technology at the 2006 FIFA Soccer World Cup worked. Group monochrom staged a special 'Hack RFID' song.[125]
Zeitgeist The Movie presented RFID chips as a negative technology, theorizing that they will one day be used to track the world population and keep them under control.
The Food and Drug Administration in the US has approved the use of RFID chips in humans.[126] Some business establishments give customers the option of using an RFID-based tab to pay for service, such as the Baja Beach nightclub in Barcelona.[127] This has provoked concerns into privacy of individuals as they can potentially be tracked wherever they go by an identifier unique to them. There are concerns this could lead to abuse by an authoritarian government or lead to removal of freedoms.[128]
On July 22, 2006, Reuters reported that two hackers, Newitz and Westhues, at a conference in New York City showed that they could clone the RFID signal from a human implanted RFID chip, showing that the chip is not hack-proof as was previously claimed.[129]
Surgery, even on a small scale, comes with its risks. The RFID chip implantation is no exception. According to David B. Smith, the author of "Using Radio Frequency Identification (RFID) Technology in Humans in the United States for Total Control,"[130] Smith gives the examples of health risks such as "…adverse tissues reaction migration of implanted transponder, compromised information security, failure of implanted transponder, failure of insertion, failure of electronic scanner, electromagnetic interference electrical hazards, magnetic resonance imaging incompatibility, and needle stick" (38). Such risks exist for anyone undergoing an implantation procedure.
With the rise of technology, some individuals have grown to fear the loss of rights due to RFID human implantation.
By early 2007, Chris Paget of San Francisco, California, showed that RFID information can be pulled from individuals by using only $250 worth of equipment. This supports the claim that with the information captured, it would be relatively simple to make counterfeit passports.[131]
According to ZDNet, critics believe that this technology will lead to tracking individuals every movement and will be an invasion of privacy. Some conceptualize a future where every movement is tracked by the government.[132] In the book SpyChips: How Major Corporations and Government Plan to Track Your Every Move with RFID by Katherine Albrecht and Liz McIntyre, one is encouraged to "imagine a world of no privacy. Where your every purchase is monitored and recorded in a database and your every belonging is numbered. Where someone many states away or perhaps in another country has a record of everything you have ever bought. What's more, they can be tracked and monitored remotely".[133]
According to an RSA laboratories FAQ, RFID tags can be destroyed by a standard microwave oven;[134] however some types of RFID tags, particularly those constructed to radiate using large metallic antennas (in particular RF tags and EPC tags), may catch fire if subjected to this process for too long (as would any metallic item inside a microwave oven). This simple method cannot safely be used to deactivate RFID features in electronic devices, or those implanted in living tissue, because of the risk of damage to the "host". However the time required is extremely short (a second or two of radiation) and the method works in many other non-electronic and inanimate items, long before thermal buildup (fire) problems become of concern.
|