The RFID technology uses radio waves to identify, trace & track and authenticate individual objects as they move between physical locations. There are different methods for identifying objects with RFID, the most common is by storing a unique number (e.g. EPCglobal) that identifies a product and related
rmation. RFID devices and software must be supported by an architecture that enables the collection and distribution of location-based
rmation in real time as proposed by Verisign.
The RFID system consists of tags and readers. A tag contains a chip and an antenna that stores the
rmation for object identification. RFID tags can be attached to pallets, cases, or individual items. The tag transmits
rmation to the reader, and the reader converts the incoming radio waves into a form that can be read by a computer system. RFID tags can be active (with a battery) or passive (powered by the signal strength emitted by the reader).
RFID has become indispensable for a wide range of automated data collection and identification applications.
The most common application of RFID technology today is for tracking goods in the supply chain and product authentication. Another common application is for security - RFID is used to control building access and network security, and also for payment systems that let customers pay for items without using cash.
As technological progress in RFID lead to an even higher level of data transmission in addition to predicted lower cost - RFID technology will become ubiquitous within the supply chain industry and other industries, increasing overall efficiencies and dramatically improving the return on investment (ROI).
For more information about RFID technology, news, reports, FAQs and in-depth education, please visit RFIDJournal or Wikipedia
RFID in the Box
NFC & Contactless Payments