Business Report

Read Complete Research Material

BUSINESS REPORT

Business report on RFID Wristband Technology for Tracking Children



Table of Content

Introduction1

Discussion1

Radio Frequency Identification (RFID) Technology2

Components of RFID4

RFID Tags4

RFID Readers5

RFID Antennas5

RFID based Object Localization5

Active RFID based Localization system5

Passive RFID based Localization system5

Hybrid RFID based localization system5

RFID advantages6

Standardization8

RFID applications8

Retail, Inventory Management, and Supply Chain9

Access Control and Physical Security10

Human Identification10

Cashless Payment at Point of Sale10

Medical Industry11

Sports Industry11

Automation: The Ultimate Driver of RFID Growth12

Security and Privacy in RFID Infrastructures12

RFID for Tracking and Monitoring Children15

Conclusion16

Business report on RFID Wristband Technology for Tracking Children

Introduction

RFID technology stem from the Second World War and developed since the early '60s as a branch of the military for civilian radio frequency identification friend or foe, but its spread has occurred mainly from the 90s onwards. The procedure for automatic recognition (Auto ID) has subsequently developed in other sectors: industrial, automotive, medical, e-Government (see passports, identity cards, etc.), commerce (e-money as transport tickets, etc.) Other examples include the purchase and distribution of logistics services to industrial, manufacturing, engineering, home automation. RFID technology is considered for its potential application to a technology of general purpose (such as electricity, the wheel) and has a high level of the pervasiveness, that once you find an application in a chain, and application the benefits quickly propagate upstream and downstream (Henrici 2004, 219).

With RFID, thanks to the development of information technology and the Internet, one can create a network of objects and large-scale adoption in many applications in the coming decades. The possible interconnection of the data obtained in one large global network has given rise to the expression of the things the Internet.

Currently, the most widespread technology for the identification of objects is that of the bar code. However, they have some disadvantages, such as a limited amount of data can be stored and the impossibility of being reprogrammed. The improvement was devised the origin of RFID technology, where silicon chips could transfer stored data to the reader without physical contact, equivalently infrared readers used to read bar codes (Floerkemeier 2004, 188).

Discussion

The first known application of RFID was the "friend or foe" identification system used in fighter planes in World War II (Samba, Lefebvre and Lefebvre 2006, p. 281). After a few decades, RFID technology gains the attention because of its inherent capability of being used as a replacement for bar codes in supply chain and inventory management. Nowadays, because of its low cost and ease of use, RFID technology has become widespread, including in point of sale applications, product tracking in supply chain management, automated fare collection in public transportation , animal tracking to child supervision, healthcare applications (Samba, Lefebvre and Lefebvre 2006, p. 281).

The expansion of RFID technology is limited because it gives rise to serious security and privacy concerns, such as eavesdropping, cloning, impersonations, and tracking of end users (Streit, Bock, Pirk and Tautz 2003, p. 169). Since a reader and a tag communicate via a wireless radio communication channels, their interactions are susceptible to eavesdropping and/or manipulation (Streit, Bock, Pirk and Tautz 2003, ...
Related Ads