Radio-frequency identification
Radio Frequency IDentification (RFID) is a method of remotely storing and retrieving data using devices called RFID tags or transponders. An RFID tag is a small object, such as an adhesive sticker, that can be attached to or incorporated into a product. RFID tags contain antennas to enable them to receive and respond to radio-frequency queries from an RFID transceiver.
History of RFID tags
Some people think that the first known device may have been invented by Léon Theremin as an espionage tool for the Russian Government in 1945. This is not quite the case: Theremin's device was a passive covert listening device, and not an identification tag. The technology used in RFID has actually been around since the early 1920's. [1]
A much more related technology, the IFF transponder, went into operation in 1939 [2], and was routinely used by the British in World War II to identify airplanes as friend or foe.
Another early work exploring RFID is the landmark 1948 paper by Harry Stockman, entitled "Communication by Means of Reflected Power" (Proceedings of the IRE, pp1196-1204, October 1948). Stockman predicted that "...considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored." It required thirty years of advances in many different fields before RFID became a reality.
Types of RFID tags
RFID tags can be either active or passive.
Passive RFID tags do not have their own power supply. The minute electrical current induced in the antenna by the incoming radio frequency scan provides enough power for the tag to send a response. Due to power and cost concerns, the response of a passive RFID tag is brief — typically just an ID number (GUID). Lack of an on-board power supply means that the device can be quite small: commercially available products exist that can be embedded under the skin. As of 2005, the smallest such devices commercially available measured 0.4 mm × 0.4 mm, which is thinner than a sheet of paper; such devices are practically invisible. Passive tags have practical read ranges that vary from about 10 mm up to about 6 metres.
Active RFID tags, on the other hand, must have a power source, and may have longer ranges and larger memories than passive tags, as well as the ability to store additional information sent by the transceiver. At present, the smallest active tags are about the size of a coin. Many active tags have practical ranges of tens of metres, and a battery life of up to several years.
As passive tags are much cheaper to manufacture and do not depend on a battery, the vast majority of RFID tags in existence are of the passive variety. As of 2004, tags cost from US$0.40. The aim is to produce tags for less than US$0.05 to make widespread RFID tagging commercially viable. However, chip manufacturers' supply of integrated circuits is not sufficient and demand is too low for prices to come down soon. Analysts from independent research companies like Gartner and Forrester Research agree that a price level of less than $0.10 is only achievable in 6–8 years, a potential hurdle to widespread passive RFID adoption. However, using some new manufacturing techniques can lower the price of RFID at a fast pace.
While the cost advantages of passive tags over active tags are significant, other factors including accuracy and reliability make the use of active tags very common today.
There are four different kinds of tags commonly in use. They are categorized by their radio frequency: low frequency tags (between 125 to 134 kHz), high frequency tags (13.56 MHz), UHF tags (868 to 956 MHz), and microwave tags (2.45 GHz). UHF tags cannot be used globally as there aren't any global regulations for their usage.
There are some transponder devices and contactless chip cards which deliver a similar function.
The RFID system
An RFID system may consist of several components: tags, tag readers, tag programming stations, circulation readers, sorting equipment, and tag inventory wands. Security can be handled in two ways. Security gates can query the ILS (Integrated Logic System) to determine its security status or the tag may contain a security bit which would be turned on and off by circulation or self-check reader stations.
The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, color, date of purchase, etc. The use of RFID in tracking and access applications first appeared during the 1980s. RFID quickly gained attention because of its ability to track moving objects. As the technology is refined, more pervasive—and invasive—uses for RFID tags are in the works.
In a typical RFID system, individual objects are equipped with a small, inexpensive tag. The tag contains a transponder with a digital memory chip that is given a unique electronic product code. The interrogator, an antenna packaged with a transceiver and decoder, emits a signal activating the RFID tag so it can read and write data to it. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing.
Take the example of books in a library. Security gates can detect whether or not a book has been properly checked out of the library. When users return items, the security bit is re-set and the item record in the ILS is automatically updated. In some RFID solutions a return receipt can be generated. At this point, materials can be roughly sorted into bins by the return equipment. Inventory wands provide a finer detail of sorting. This tool can be used to put books into shelf-ready order.
Free RFID software packages and demos can be downloaded from http://www.rfid.ac/download.php?list.4
Current usage
Low-frequency RFID tags are commonly used for animal identification, beer keg tracking, and automobile key-and-lock, anti-theft systems. Pets are often embedded with small chips so that they may be returned to their owners if lost. In the United States, two RFID frequencies are used: 125 kHz (the original standard) and 134.5 kHz (the international standard).
High-frequency RFID tags are used in library book or bookstore tracking, pallet tracking, building access control, airline baggage tracking, and apparel item tracking. High-frequency tags are widely used in identification badges, replacing earlier magnetic stripe cards. These badges need only be held within a certain distance of the reader to authenticate the holder.
The American Express Blue credit card now includes a high-frequency RFID tag, a feature American Express calls ExpressPay[3].
UHF RFID tags are commonly used commercially in pallet and container tracking, and truck and trailer tracking in shipping yards.
Microwave RFID tags are used in long range access control for vehicles.
Some toll booths, such as California's FasTrak, Illinois' I-Pass system, the Philippines South Luzon Expressway E-Pass, and Maryland's E-Z pass system, use RFID tags for electronic toll collection. The tags are read as vehicles pass; the information is used to debit the toll from a prepaid account. The system helps to speed traffic through toll plazas.
Sensors such as seismic sensors may be read using RFID transceivers, greatly simplifying remote data collection.
In January 2003, Michelin announced that it has begun testing RFID transponders embedded into tires. After a testing period that is expected to last 18 months, the manufacturer will offer RFID-enabled tires to car-makers. Their primary purpose is tire-tracking in compliance with the United States Transportation, Recall, Enhancement, Accountability and Documentation Act (TREAD Act).
Cards embedded with RFID chips are widely used as electronic cash, e.g. Octopus Card in Hong Kong and the Netherlands and United Kingdom (In the form of the London Underground Oyster Card) to pay fares in mass transit systems and/or retails.
Starting from the 2004 model year, a "Smart Key" option is available to the Toyota Prius and some Lexus models. The key fob uses an active RFID circuit which allow the car to acknowledge the key's presence within 3 feet of the sensor. The driver can open the doors and start the car while the key remains in a purse or pocket.
In August 2004, the Ohio Department of Rehabilitation and Correction (ODRH) approved a $415,000 contract to trial the tracking technology with Alanco Technologies. Inmates will wear "wristwatch-sized" transmitters that can detect if prisoners have been trying to remove them and send an alert to prison computers. This project is not the first such rollout of tracking chips in US prisons. Facilities in Michigan, California and Illinois already employ the technology.
Implantable RFID "chips", originally designed for animal tagging are being used and contemplated for humans as well. Applied Digital Solutions proposes their chip's "unique under-the-skin format" as a solution to identity fraud, secure building access, computer access, storage of medical records, anti-kidnapping initiatives and a variety of law-enforcement applications. Combined with sensors to monitor body functions, the Digital Angel device could provide monitoring for patients. The Baja Beach Club [4] in Barcelona, Spain uses an implantable Verichip to identify their VIP customers, who in turn use it to pay for drinks [5]. The Mexico City police department has implanted approximately 170 of their police officers with the Verichip, to allow access to police databases and possibly track them in case of kidnapping.
Amal Graafstra, a Washington state native and business owner, had a RFID chip implanted in his left hand in early 2005. The chip was 12 mm long by 2 mm in diameter and has a basic read range of two inches (50 mm). The implant procedure was conducted by a cosmetic surgeon, although the name of the doctor was not released. When asked what he planned to do with the implant Graafstra responded: "because I’m writing my own software and soldering up my own stuff, pretty much anything I want. Well, more accurately, anything I have the time and inspiration to do. Ultimately though, I think true keyless access will require an implantable chip with a very strong encryption system; right now I’m only looking at this type of thing in a personal context."1
Potential uses
RFID tags are often envisioned as a replacement for UPC or EAN bar-codes, having a number of important advantages over the older bar-code technology. They may not ever completely replace barcodes, due in part to their relatively higher cost. For some lower cost items the ability of each tag to be unique may be considered to be overkill, though it would have some benefits such as the facilitation of taking inventory.
It must also be recognised that the storage of data associated with tracking goods down to item level will run into many terabytes. It is much more likely that goods will be tracked at pallet level using RFID tags, and at item level with product unique rather than item unique barcodes.
RFID codes are long enough that every RFID tag may have a unique code, while current UPC codes are limited to a single code for all instances of a particular product. The uniqueness of RFID tags means that a product may be individually tracked as it moves from location to location, finally ending up in the consumer's hands. This may help companies to combat theft and other forms of product loss. It has also been proposed to use RFID for point-of-sale store checkout to replace the cashier with an automatic system which needs no barcode scanning. However this is not likely to be possible without a significant reduction in the cost of current tags. There is some research taking place into ink that can be used as an RFID tag, which would significantly reduce costs. However, this is some years from reaching fruition.
Gen 2
An organization called EPCglobal is working on an international standard for the use of RFID and the Electronic Product Code (EPC) in the identification of any item in the supply chain for companies in any industry, anywhere in the world. The organization's board of governors includes representatives from EAN International, Uniform Code Council, The Gillette Company, Procter & Gamble, Wal-Mart, Hewlett-Packard, Johnson & Johnson, Checkpoint Systems and Auto-ID Labs. Some RFID systems use alternative standards based on the ISO-classification 18000-6.
The EPCglobal gen 2 standard was approved in December 2004, and is likely to form the backbone of RFID tag standards moving forward. This was approved after a contention from Intermec that the standard may infringe a number of their RFID related patents. It was decided that the standard itself did not infringe their patents, but it may be necessary to pay royalties to Intermec if the tag was to be read in a particular manner. EPC Gen2 is short for EPCglobal UHF Generation 2.
Patient identification
In July 2004, the Food and Drug Administration issued a ruling that essentially begins a final review process that will determine whether hospitals can use RFID systems to identify patients and/or permit relevant hospital staff to access medical records. The use of RFID to prevent mixups between sperm and ova in IVF clinics is also being considered [6].
Also, the FDA recently approved the country's first RFID chips that can be implanted in humans. The 134.2 kHz RFID chips, from VeriChip Corp., a subsidiary of Applied Digital Solutions Inc., can incorporate personal medical information and could save lives and limit injuries from errors in medical treatments, according to the company. The FDA approval was disclosed during a conference call with investors.
Some in-home uses, such as allowing a refrigerator to track the expiration dates of the food it contains, have also been proposed, but few have moved beyond the prototype stage.
Traffic
Another proposed application is the use of RFID as intelligent traffic signals on the road (Road Beacon System or RBS) [7].
Regulation and standardization
There is no global public body that governs the frequencies used for RFID. In principle, every country can set its own rules for this. The main bodies governing frequency allocation for RFID are:
- USA: FCC (Federal Communications Commission)
- Canada: DOC (Department of Communication)
- Europe: ERO, CEPT, ETSI, and national administrations (note that the national administrations must ratify the usage of a specific frequency before it can be used in that country)
- Japan: MPHPT (Ministry of Public Management, Home Affairs, Post and Telecommunication)
- China: Ministry of Information Industry
- Australia: Australian Communication Authority
- New Zealand: Ministry of Economic Development
Low-frequency (LF: 125 - 134 kHz and 140 - 148.5 kHz) and high-frequency (HF: 13.56 MHz) RFID tags can be used globally without a license. Ultra-high-frequency (UHF: 868 MHz-928 MHz) cannot be used globally as there isn't one single global standard. In North America, UHF can be used unlicensed for 908 - 928 MHz, but restrictions exist for transmission power. In Europe, UHF is under consideration for 865.6 - 867.6 MHz. Its usage is currently unlicensed for 869.40 - 869.65 MHz only, but restrictions exist for transmission power. The North American UHF standard is not accepted in France as it interferes with its military bands. For China and Japan, there is no regulation for the use of UHF. Each application for UHF in these countries needs a site license, which needs to be applied for at the local authorities, and can be revoked. For Australia and New Zealand, 918 - 926 MHz are unlicensed, but restrictions exist for transmission power.
Additional regulations exist regarding health and environmental issues. For example, in Europe, the Waste Electrical and Electronic Equipment regulation does not allow for RFID tags to be thrown away. This means that RFID tags in cardboard boxes must be removed before disposing of them. Health regulations exist as well; see EMF (Electromagnetic field).
Some standards that have been made regarding RFID technology include:
- ISO 10536
- ISO 14443
- ISO 15693
- ISO 18000
- EPCglobal - this is the standard that is most likely going to form the basis of a Worldwide standard.
Security
RSA Security has a prototype device that locally jams RFID signals, allowing the user to prevent identification if desired. [8]
Controversy
- How would you like it if, for instance, one day you realized your underwear was reporting on your whereabouts?
- — California Senator Debra Bowen, at a 2003 hearing [9]
The use of RFID technology has engendered considerable controversy and even product boycotts. The four main privacy concerns regarding RFID are:
- The purchaser of an item will not necessarily be aware of the presence of the tag or be able to remove it;
- The tag can be read at a distance without the knowledge of the individual;
- If a tagged item is paid for by credit card or in conjunction with use of a loyalty card, then it would be possible to tie the unique ID of that item to the identity of the purchaser; and
- The EPCglobal system of tags create, or are proposed to create, globally unique serial numbers for all products, even though this creates privacy problems and is completely unnecessary for most applications.
Most concerns revolve around the fact that RFID tags affixed to products remain functional even after the products have been purchased and taken home, and thus can be used for surveillance and other nefarious purposes unrelated to their supply chain inventory functions. Although RFID tags are only officially intended for short-distance use, they can be interrogated from greater distances by anyone with a high-gain antenna, potentially allowing the contents of a house to be scanned at a distance. Even short range scanning is a concern if all the items detected are logged in a database every time a person passes a reader, or if it is done for nefarious reasons (e.g., a mugger using a hand-held scanner to obtain an instant assessment of the wealth of potential victims). With permanent RFID serial numbers, an item leaks unexpected information about a person even after disposal; for example, items that are resold or given away can enable mapping of a person's social network.
Another privacy issue is due to RFID's support for a singulation (anti-collision) protocol. This is the means by which a reader enumerates all the tags responding to it without them mutually interfering. The structure of the most common version of this protocol is such that all but the last bit of each tag's serial number can be deduced by passively eavesdropping on just the reader's part of the protocol. Because of this, whenever RFID tags are near to readers, the distance at which a tag's signal can be eavesdropped is irrelevant; what counts is the distance at which the much more powerful reader can be received. Just how far this can be depends on the type of the reader, but in the extreme case some readers have a maximum power output (4 W) that could be received from tens of kilometres away.
The potential for privacy violations with RFID was demonstrated by its use in a pilot program by the Gillette Company, which conducted a "smart shelf" test at a Tesco in Cambridge. They automatically photographed shoppers taking RFID-tagged safety razors off the shelf, to see if the technology could be used to deter shoplifting. [10]
In another study, uncovered by the Chicago Sun-Times, shelves in a Wal-Mart in Broken Arrow, Oklahoma, were equipped with hidden electronics to track the Max Factor Lipfinity lipstick containers stacked on them. Webcam images of the shelves were viewed 750 miles away by Procter & Gamble researchers in Cincinnati, Ohio, who could tell when lipsticks were removed from the shelves and could even watch consumers in action.
In January 2004 a group of privacy advocates was invited to METRO Future Store in Germany, where an RFID pilot project was implemented. It was uncovered by accident that METRO "Payback" customer loyalty cards contained RFID tags with customer IDs, a fact that was disclosed neither to customers receiving the cards, nor to this group of privacy advocates. This happened despite assurances by METRO that no customer identification data was tracked and all RFID usage was clearly disclosed. [11]
The controversy was furthered by the accidental exposure of a proposed Auto-ID consortium public relations campaign that was designed to "neutralize opposition" and get consumers to "resign themselves to the inevitability of it" whilst merely pretending to address their concerns. [12]
The standard proposed by EPCglobal includes privacy-related guidelines for the use of RFID-based EPC. These guidelines [13] include the requirement to give consumers clear notice of the presence of EPC and to inform them of the choice that they have to discard, disable or remove EPC tags. These guidelines are non-binding, and only partly meet the joint position statement of 46 multi-national consumer rights and privacy groups.
In 2004, Lukas Grunwald released a computer program RFDump which with suitable hardware allows reading and reprogramming the metadata contained in an RFID tag, although not the unchangeable serial number built into each tag. He said consumers could use this program to protect themselves, although it would also have significant malicious uses.
There are applications instead where using RFID technology inversely as usual generates no concerns about privacy. This is the case of the Road Beacon System (RBS) [14] where the user is the only one who is using the reader collecting RFID information embedded under the road. This information can be stored in a "black box" but it is only avalilable for him/her, and is not travelling over networks, mobile phones or the Internet.
Passports
A number of countries have proposed to implant RFID devices in new passports [15], to facilitate efficient machine reading of biometric data. Security expert Bruce Schneier said of these proposals: "It's a clear threat to both privacy and personal safety. Quite simply, it's a bad idea." The RFID-enabled passport uniquely identifies its holder, and in the proposal currently under consideration, will also include a variety of other personal information. This could greatly simplify some of the abuses of RFID technology, and expand them to include abuses based on machine reading of data such as a person's nationality. For example, a mugger operating near an airport could target victims who have arrived from wealthy countries, or a terrorist could design a bomb which functioned when approached by persons from a particular country.
The US State Department initially rejected these concerns on the grounds that they believed the chips could only be read from a distance of 10 cm (4 in), but in the face of 2,400 critical comments from security professionals, and a clear demonstration that special equipment can read the test passports from 30 feet (10 m) away, as of May 2005 the proposal is being reviewed. [16]
Driver's Licenses
The US state of Virginia has considered putting RFID tags into driver's licenses in order to make lookups faster for police officers and other government officials. The Virginia General Assembly also hopes that by including the tags fake identity documents would become much harder to obtain. The proposal was first introduced in the "Driver's License Modernization Act" of 2002, which lapsed without vote, but as of 2004 the concept is still under consideration by a committee.
The idea was prompted by the fact that several of the September 11 hijackers held fake Virginia driver's licenses. However the American Civil Liberties Union has claimed that in addition to being a risk to privacy and liberty, the proposal in fact would not have hindered the hijackers, since all their false documents were valid, officially issued documents obtained for a false identity. That is, the current weakness in the system is not inspecting documents in the field, but verifying identities before issuing documents.
Under the proposal, no information would be stored on the tag other than a number corresponding to the holder's information in a database, only accessible by authorized personnel. Also, to deter identity thieves one would simply need to wrap one's drivers' license in aluminium foil. [17], [18]
The Mark of The Beast?
There has been discussion within the Christian community that RFID tagging could represent the mark of the beast mentioned in the Book of Revelation. Such speculation is not taken seriously by all members of the faith. [19] [20] [21] [22]
See also
- Harland Machine Systems harland-rfid.com
- SmartCode Corp. RFID
- Sony FeliCa
References
- Bhattacharya, Shaoni; 2005. "Electronic tags for eggs, sperm and embryos" at New Scientist.com, referenced 2 April 2005
- Roger Smith: RFID: A Brief Technology Analysis, CTO Network Library, 2005.
External links
Industry associations
- RFID Asia — RFID Community in Asia
- RFID Tribe — The World's RFID Collaboration Forum
- EPCglobal Inc. — Organization that oversees standards for the EPCglobal Network
- Association for Automatic Identification and Mobility (AIM) — Trade association of providers of components, networks, systems, and services that manage the collection and integration of data with information management systems. Members include service providers of RFID technology.
- RadioActive Software Foundation — An open source software foundation dedicated to producing free and open RFID and supply chain related software.
- Colorado RFID Alliance - CORFIDA — a non-profit organization founded by people who are passionate about the RFID industry and experienced in developing and growing professional associations.
Industry Journals and Blogs
- RFID Weblog — Implementation and Application of RFID
- RFIDetail — RFIDetail comprehensive RFID News blog
- Japan blog — blog from Japan about wallet phones etc.
- RFID collaboration portal — On-line collaboration for rfid enthusiasts. Chat, free downloads, PM's and more.
- ManningRF — RFID news feed, FAQs and primers, plus lists of consultants and developers.
- RFID Journal — Timely news & features covering RFID (radio frequency identification) technology.
- RFID Tutorial — Includes information on Technology, Architecture, Standards, Security and Comparisions with other technologies.
- RFID Journal LIVE — RFID Journal's annual industry conference.
- IDTechEx — RFID analysis and commentary.
- RFID Today — A blog exploring the impact of radio frequency identification (RFID) on our daily lives.
- The Future Is Here: A Beginner's Guide to RFID —, an RFID Gazette essay. (June 2004)
- RFID Talk — RFID Industry Discussion Forum
- Surpriv: RFID Surveillance and Privacy blog — The Surpriv blog is for discussions of RFID-related surveillance and privacy issue
- RFIDbuzz
- RFIDbuzz Wiki
- RFID Tribe — The World's RFID Collaboration Forum
- RFID Solutions by Pulse — RFID Solutions by Pulse in the Netherlands
- RFID Times — RFID articles
- RFID: A Smart Tag Primer
- Informed Consent: Ethical Considerations of RFID
- RFID tags in finance from the AICPA Journal of Accountancy
- Integrating RFID Into Your Packaging
- Integrating RFID with UID
- RFID Nexus — RFID news site headlines, links and book references
- i-mode Felica report
- report on mobile payments in Japan
News
- RFIDPortal — Various interesting RFID news stories (Submitted by users)
- RFIDetail — RFIDetail comprehensive RFID News
- RFIDinsights — RFID news from Information Week.
- RFID News — news updated daily.
- RFID News — weblog and monthly e-magazine covering the RFID Industry
- RFID Gazette — providing daily RFID-related news
- RFID Log — industry news service on RFID innovation, implementation and legal processes
- RFID Update — The RFID Industry Daily
- RFID and Contactless Technology News — free resource for breaking news and research on the use of contactless and radio frequency identification technologies.
- RFID Tags in Dollar Bills Explode in Microwave
- MoreRFID — RFID information website, including latest news, articles, vendors, products, and FAQs
- Using RFID — Industry-focused RFID daily news (free subscription), with news, briefs, feature articles, book reviews, and research facilities
- RFID Sector Blog — Pointers to what's happening in RFID
Opposition News
- ZombieWire's consumer report
- Privacy International
- Stop RFID — an activist site specializing in privacy & RFID
- Information on, and opinions against, RFID
- RFID Consumer's report
- EFF position on RFID
- EPIC's work on RFID
- Graduate Cryptographers Unlock Code of 'Thiefproof' Car Key by John Schwartz, New York Times
- Grad students work on RFID security
- Privacy rights organizations' pages
- Chip Index
- Why the future doesn't need us
- Hope Is a Lousy Defense
- C.A.S.P.I.A.N against RFID
- Privacilla