slide1
Download
Skip this Video
Download Presentation
RFID

Loading in 2 Seconds...

play fullscreen
1 / 38

RFID - PowerPoint PPT Presentation


  • 88 Views
  • Uploaded on

RFID. R ADIO F REQUENCY ID ENTIFICATION. Jenna Nash MJ Ko Katie Stange Kennedy Carruthers. What is RFID?. Radio Frequency Identification A small chip or tag that reads radio waves used for identification purposes Does not have to be in line of vision

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' RFID' - barbara-blackwell


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

RFID

RADIOFREQUENCYIDENTIFICATION

Jenna Nash

MJ Ko

Katie Stange

Kennedy Carruthers

what is rfid
What is RFID?
  • Radio Frequency Identification
  • A small chip or tag that reads radio waves used for identification purposes
  • Does not have to be in line of vision
  • Can be attached to/implanted in products, animals, or even human beings
how does rfid work
How does RFID work?
  • Tags (or chips) consist of two parts:

1) Antennae

2) Processor/ storage

  • Receives signal from reader and gives a return signal with ID number
  • Reader sends number to database or server
types of rfid tags
Types of RFID tags

ACTIVE: Tag signal availability of 100ft.

HIGH signal strength

VERY LOW required signal strength from the reader

EX) Railway cars on a track

SEMI- PASSIVE: Tag signal availability only within field of reader

LOW signal strength

LOW required signal strength from the reader

PASSIVE:Tag signal availability < 10 ft.

VERY LOW signal strength

VERY HIGH signal strength required from reader

EX) Retail Checkout

** Widely used because very cheap to make

rfid technology a history
RFID Technology: A History
  • WWII (1939-1945):Germans, British, Japanese and Americans all using radar to warn of approaching enemy aircraft.
          • IFF Transponder: Identify Friend or Foe (British)
rfid technology a history1
RFID Technology: A History
  • 1970s:
    • US government uses RFID to track nuclear materials in transit.
    • US Department of Agriculture partners with research lab to develop a new passive RFID system to track cows and other livestock
rfid technology a history2
RFID Technology: A History
  • 1990s:RFID transforms into a networking technology (tags like barcodes that are linked to an online database) used to track items in supply chain
rfid today
RFID Today
  • Present: RFID technology is widely used in product tracking
      • Products can be scanned in mass quantities and tracked from manufacturer to retail to end consumer.
      • Used by many large retailers such as Wal Mart
rfid today1
RFID Today

Its Everywhere!

RFID tags in:

CREDIT CARDS

CAR & HOME KEYS

PASSPORTS

CLOTHING

PACKAGED FOODS

EVERYDAY PRODUCTS

rfid today2
RFID Today

AND NOW…..IN YOU?

  • In 1994, the FDA approved implanted RFID chips for humans
  • Used for security and automation of daily tasks
  • An extension of biometrics; in theory it is more secure than eye scans or finger prints
the controversy
The Controversy

Do the advantages of RFID tags and implanted chips, such as security and convenience, outweigh its associated risks, such as breaches in personal privacy?

advantages of rfid chips
Advantages of RFID chips

Safety and Security

  • Locate/identify missing persons
  • Monitor prisoners, people on

probation, and predators

advantages of rfid chips1
Advantages of RFID chips

Easy Access

  • Secure entry to office and residential buildings; other venues
  • Access by authorized personnel only
  • Ease security concerns
advantages of rfid chips2
Advantages of RFID chips

Medical Emergencies

  • Monitor/Id patients more efficiently
      • Alzheimer’s Disease
  • Quickly access patient medical records
      • Allergies, current medications, family history, etc.
  • Immediate contact with EMS
advantages of rfid chips3
Advantages of RFID chips

Advanced Product Tracking

  • Real- time data management
  • Dramatic benefits to manufacturing process
advantages of rfid chips4
Advantages of RFID chips

Quick Convenience

  • Express payment = more efficient check in/out
      • Grocery Store, Library, Hospital
  • Instant identification
  • Time saver

http://www.youtube.com/watch?v=-ZYY85IyDNM

risky business

Risky Business

The Downsides and Disadvantages to RFID Technology

breach of security
Breach of Security
  • Illicit use
    • Hacking/viruses
    • Frequencies can be intercepted and manipulated or counterfeited due to novelty of technology
  • Physical theft
    • Threat of physical harm associated with implanted identification information
slide26
Infiltrated RFID systems can mean
  • Identity Theft
  • Unauthorized logging of purchases
  • Tracking/tracing whereabouts of products beyond the retail environment
  • Stalking
technological limitations
Technological Limitations
  • RFID chips readable from ONLY 100ft. away
    • Useless in terms of finding lost persons
invasions of privacy
Invasions of Privacy
  • Human Implantation
    • With the widespread usage of the tags, the whereabouts of people with RFID implants may potentially be tracked
    • Non-democratic governments can gain even more power to deprive people of freedom and privacy
invasions of privacy1
Invasions of Privacy
  • Consumer products
    • “Spy Chips” : Consumer often unaware of tags embedded in products
    • Passive tag design allows for tracking to continue after the purchase has been made
    • Scanning conducted from far away without consumer knowledge
  • http://youtube.com/watch?v=tiOuZWZ1Dac
slide30
A Simple Solution?

1) STRICTLY ENFORCED GOVERNMENT REGULATION SYSTEM

2) IMPLANTED RFID OPTIONS

3) REMOVE THE SECRECY FACTOR

requirements for regulation
Requirements for Regulation
  • Authorized access to Homeland Security and other security companies
  • Special identification codes to ensure privacy protection
  • Tracking in emergency situations only
  • Enhanced security systems
optional removal
Optional Removal
  • Adults have the right to choose to have RFID chip implanted in them or not.
  • Any children implanted with RFID should have the option to remove it once they turn 18.
verichip corp privacy protection system
VeriChip Corp. Privacy Protection System
  • 16 digit identification number
  • Entered into secure database
  • Information granted to the systems are at the hands of the customer
clipped tags another way to regulate
Clipped Tagsanother way to regulate
  • RFID tag designed to improve consumer privacy protection
  • Consumers can take off a part of the RFID tag
  • Only can be read at short range
  • Still can be used for later purposes
obivision
Obivision
  • Open Business Innovation
  • RFID tags with data freely transferable
  • “Privacy Mode” after the sale
  • Business benefit while protecting consumers’ privacy

“Without changing our pattern of thought, we will not be able to solve the problems we created with our current patterns of thought”

-Albert Einstein

zombie tags
Zombie Tags
  • An RFID tag that can be deactivated
  • Once you leave the store, there is a special reader that sends a special deactivating signal to the tag
  • RFID tag "dies."
remove the secrecy factor
Remove the Secrecy Factor
  • Notification on products that contain RFID tags
      • Just like warning labels, ingredient lists, nutritional information
  • Remove the notion that RFID tags are “spy tags”
rule utilitarian decision
Advantages

Revolutionize inventory systems/ product tracking in real time

Security

Helpful in medical and safety emergencies

Promotes convenience to enhance consumer experience

Disadvantages

Privacy invasion

Unauthorized purchase logs

Human tracking

Extreme circumstances when counterfeited

Surgery to replace or remove chip

Identity theft

RULE Utilitarian decision
ad