Information And Technology

Read Complete Research Material

INFORMATION AND TECHNOLOGY

Information and Technology

Information and Technology

Introduction

This paper intends to discuss the significance of radio frequency identification tags in today's modern age. Radio frequency identification (RFID) technology has been toward a mature stage. Many industries build the RFID technology into the production process. The RFID technologies can support the firms in the supply chains to share information and increase the achieved transparency of process control and complete traceability records. The purpose of this paper is to make the reader aware about the importance of RFID from the viewpoint of efficiency and quality of organizations, their products and services.

Radio Frequency Identification

Data transmitted using a portable Radio Frequency Identification (RFID) tag may be used to uniquely identify an object, its location, or its characteristics, for instance, its color, shape, size, etc. An object containing an RFID tag can be used to identify or locate an individual associated with the object. Currently, there is no standardized means to indicate how information contained in an RFID tag should be protected during proper use. As such, there is a need for indicating a level of protection to be afforded the information contained in an RFID tag associated with a physical object in possession of an individual, to effectively specify the intended and proper use and handling of the information contained in the RFID tag without compromising the privacy of the individual (Rangaswamy & Sandhya, 2011 Pp. 99-105).

Further, in yet another aspect, the invention provides a process for deploying computing infrastructure includes integrating computer-readable code into a computing system, wherein the code in combination with the computing system is capable of performing a process for communicating a privacy policy associated with data and information. The process includes defining in an identification tag one or more attributes referencing characteristics of a physical object, the one or more attributes includes a first identifier assigned to the physical object for uniquely identifying the physical object and a second identifier created for uniquely identifying a privacy policy that indicates to a recipient a level of protection to be afforded data and information transmitted by the identification tag coupled to the physical object, associating the second identifier created with the first identifier assigned to the physical object, each of the first unique identifier and the second unique identifier being coupled to the identification tag, responsive to detection of a communication signal from a receptor, transmitting to the receptor the first identifier and the second identifier, the second identifier includes an accept-reject provision for the privacy policy for controlling dissemination and usage of the data and information stored on the identification tag, wherein based on a response received from a recipient to the accept-reject provision for the privacy policy, the data and information is either transmitted or not transmitted to the recipient, and signing the one or more attributes for cryptographically binding the second identifier to said first identifier (Dobkin, 2008 Pp. 100-125).

In an embodiment, the transmitting step further includes first ascertaining whether the recipient has accepted the accept-reject ...
Related Ads