Download presentation
Presentation is loading. Please wait.
Published byMalcolm Rogers Modified over 9 years ago
1
RFID Jenna Nash MJ Ko Katie Stange Kennedy Carruthers RADIO FREQUENCY IDENTIFICATION
2
What is RFID? Radio Frequency Identification A small chip or tag that reads radio waves used for identification purposes Does not have to be in line of vision Can be attached to/implanted in products, animals, or even human beings
3
How does RFID work? Tags (or chips) consist of two parts: 1) Antennae 1) Antennae 2) Processor/ storage Receives signal from reader and gives a return signal with ID number Reader sends number to database or server
5
Types of RFID tags ACTIVE: Tag signal availability of 100ft. HIGH signal strength HIGH signal strength VERY LOW required signal strength from the reader VERY LOW required signal strength from the reader EX) Railway cars on a track EX) Railway cars on a track SEMI- PASSIVE: Tag signal availability only within field of reader LOW signal strength LOW signal strength LOW required signal strength from the reader LOW required signal strength from the reader PASSIVE: Tag signal availability < 10 ft. VERY LOW signal strength VERY LOW signal strength VERY HIGH signal strength required from reader VERY HIGH signal strength required from reader EX) Retail Checkout EX) Retail Checkout ** Widely used because very cheap to make
12
RFID Technology: A History WWII (1939-1945): Germans, British, Japanese and Americans all using radar to warn of approaching enemy aircraft. IFF Transponder: Identify Friend or Foe (British)
13
RFID Technology: A History 1970s: US government uses RFID to track nuclear materials in transit. US Department of Agriculture partners with research lab to develop a new passive RFID system to track cows and other livestock
14
RFID Technology: A History 1990s: RFID transforms into a networking technology (tags like barcodes that are linked to an online database) used to track items in supply chain
15
RFID Today Present: RFID technology is widely used in product tracking Products can be scanned in mass quantities and tracked from manufacturer to retail to end consumer. Used by many large retailers such as Wal Mart
16
RFID Today Its Everywhere! RFID tags in: CREDIT CARDS CAR & HOME KEYS PASSPORTSCLOTHING PACKAGED FOODS EVERYDAY PRODUCTS
17
RFID Today AND NOW…..IN YOU? In 1994, the FDA approved implanted RFID chips for humans Used for security and automation of daily tasks An extension of biometrics; in theory it is more secure than eye scans or finger prints
18
The Controversy Do the advantages of RFID tags and implanted chips, such as security and convenience, outweigh its associated risks, such as breaches in personal privacy ?
19
Advantages of RFID chips Safety and Security Locate/identify missing persons Monitor prisoners, people on probation, and predators
20
Advantages of RFID chips Easy Access Secure entry to office and residential buildings; other venues Access by authorized personnel only Ease security concerns
21
Advantages of RFID chips Medical Emergencies Monitor/Id patients more efficiently Alzheimer’s Disease Quickly access patient medical records Allergies, current medications, family history, etc. Immediate contact with EMS
22
Advantages of RFID chips Advanced Product Tracking Real- time data management Dramatic benefits to manufacturing process
23
Advantages of RFID chips Quick Convenience Express payment = more efficient check in/out Grocery Store, Library, Hospital Instant identification Time saver http://www.youtube.com/watch?v=-ZYY85IyDNM
24
Risky Business The Downsides and Disadvantages to RFID Technology
25
Breach of Security Illicit use Hacking/viruses Frequencies can be intercepted and manipulated or counterfeited due to novelty of technology Physical theft Threat of physical harm associated with implanted identification information
26
Infiltrated RFID systems can mean Identity Theft Unauthorized logging of purchases Tracking/tracing whereabouts of products beyond the retail environment Stalking
27
Technological Limitations RFID chips readable from ONLY 100ft. away Useless in terms of finding lost persons
28
Invasions of Privacy Human Implantation With the widespread usage of the tags, the whereabouts of people with RFID implants may potentially be tracked Non-democratic governments can gain even more power to deprive people of freedom and privacy
29
Invasions of Privacy Consumer products “ Spy Chips” : Consumer often unaware of tags embedded in products Passive tag design allows for tracking to continue after the purchase has been made Scanning conducted from far away without consumer knowledge http://youtube.com/watch?v=tiOuZWZ1Dac http://youtube.com/watch?v=tiOuZWZ1Dac
30
A Simple Solution? A Simple Solution? 1) STRICTLY ENFORCED GOVERNMENT REGULATION SYSTEM 1) STRICTLY ENFORCED GOVERNMENT REGULATION SYSTEM 2) IMPLANTED RFID OPTIONS 3) REMOVE THE SECRECY FACTOR
31
Requirements for Regulation Requirements for Regulation Authorized access to Homeland Security and other security companies Special identification codes to ensure privacy protection Tracking in emergency situations only Enhanced security systems
32
Optional Removal Adults have the right to choose to have RFID chip implanted in them or not. Any children implanted with RFID should have the option to remove it once they turn 18.
33
VeriChip Corp. Privacy Protection System 16 digit identification number Entered into secure database Information granted to the systems are at the hands of the customer
34
Clipped Tags another way to regulate RFID tag designed to improve consumer privacy protection Consumers can take off a part of the RFID tag Only can be read at short range Still can be used for later purposes
35
Obivision Open Business Innovation RFID tags with data freely transferable “Privacy Mode” after the sale Business benefit while protecting consumers’ privacy “Without changing our pattern of thought, we will not be able to solve the problems we created with our current patterns of thought” -Albert Einstein
36
Zombie Tags An RFID tag that can be deactivated Once you leave the store, there is a special reader that sends a special deactivating signal to the tag RFID tag "dies."
37
Remove the Secrecy Factor Notification on products that contain RFID tags Just like warning labels, ingredient lists, nutritional information Remove the notion that RFID tags are “spy tags”
38
RULE Utilitarian decision Advantages Revolutionize inventory systems/ product tracking in real time Security Helpful in medical and safety emergencies Promotes convenience to enhance consumer experience Disadvantages Privacy invasion Unauthorized purchase logs Human tracking Extreme circumstances when counterfeited Surgery to replace or remove chip Identity theft
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.