rfid types

Upload: yogesh-doravari

Post on 04-Apr-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 RFID Types

    1/16

    RFID/Wireless SystemApplicationHome Work-1

    [Pick the date]

    Oklahoma State University

    Rajesh Kumar Velu &Yogesh Doravari

  • 7/29/2019 RFID Types

    2/16

    Question-1

    PRODUCT USED FOR THE EXPERIMENT:

    Barcode for this cell was studied at Wal-Mart for the following various factors:

    1. Occlusions2. Angle of view3. Distance (Range)

    1. OCCLUSIONWhen the first and the last line of the barcode is covered and read by the scanner, it reads

    the barcode perfectly. When other parts of the barcode are covered the scanner fails to

    read it. The pictures explain the above observation made with a greater clarity.

  • 7/29/2019 RFID Types

    3/16

    FIG. Doesnt read on covering the first two lines

    FIG. Fails when the center of the barcode is covered

    FIG. Reads when the first line of the barcode is covered

  • 7/29/2019 RFID Types

    4/16

    2. ANGLE OF VIEW:The barcode was placed in different angles and using the scanner it was scanned and we

    got the following observation:

    1. When the barcode is kept at 90 degrees it couldnt scan.2. The barcode was read at all angles where the light could focus the entire barcode.3. When the light was inclined and a portion of the barcode wasnt scanned it didnt

    read otherwise at all inclined positions in the space the scanner could read.

    FIG. At 90 degree the scanner couldnt read

  • 7/29/2019 RFID Types

    5/16

    FIG. Scans at all other angle in the space

    FIG. When the barcode is kept at an angle tilted to the scanner and doesnt cover the

    entire barcode it fails to read(multiple red lines indicating it couldnt read)

  • 7/29/2019 RFID Types

    6/16

    3. RANGE :The maximum distance upto which the scanner was able to read the barcode was found

    out to be approximately 40 cm.

    FIG. Maximum distance at which the barcode was scanned

    ENCODING OF THE IDENTITY OF AN OBJECT IN THE BARCODE:

    A barcode is made up of white and black lines Each and every number under the barcode is defined by four lines. Four lines vary in thickness. Thinnest line is given as 1 and so on. (the thickest as 4) Each bar code starts and ends with 101. There are two sets of code manufacturer code and product code which is separated by a

    set of 3 lines called as guard bars.

    This was the observation we made during our experiment on how the information on the barcode

    is encoded

  • 7/29/2019 RFID Types

    7/16

    Question 3: Perform patent (Google/patents and freepatentonline are appropriate locations)

    search to identify 3 biometric and 3 non-biometric AIT patents. For each patent you have

    identified, please do the following

    Three Biometric AIT Patents with their details:

    1. Title: Biometric identification of individuals by use of subcutaneous vein patternsInventor: David Oswald Clayden

    Original Assignee: British Technology Group Ltd.

    Issue date: Jul 28, 1998

    Patent number: 5787185

    Fig.1 is a perspective view of apparatus suitable for scanning vein pattern.

    How the AIT works: An individual whose identity is to be verified is positioned by gripping to

    a reference handle. An optional side stop (5) against which the side of the hand abuts provides an

    additional constraint. Lights (7, 9, 11, and 13) are provided from four different directions to

    provide an infra-red-rich emission spectrum. A video camera (15) is positioned above the hand

    and produces a raster-scan image of the back of the hand. The image taken of the hand is

    transferred to a frame store where the first signal processing step begins. The amplitude of each

    pixel is weighted to enhance the local contrast and sent for comparison with a pre-stored image

    of the person's hand.

    http://www.google.com/search?tbo=p&tbm=pts&hl=en&q=ininventor:%22David+Oswald+Clayden%22http://www.google.com/search?tbo=p&tbm=pts&hl=en&q=inassignee:%22British+Technology+Group+Ltd.%22http://www.google.com/search?tbo=p&tbm=pts&hl=en&q=inassignee:%22British+Technology+Group+Ltd.%22http://www.google.com/search?tbo=p&tbm=pts&hl=en&q=ininventor:%22David+Oswald+Clayden%22
  • 7/29/2019 RFID Types

    8/16

    Merits:

    1. Helps determine the location of arteries and veins in the human body and can show any

    variance in position from a previous reading; this can help understand the condition of the arteryor vein

    2. Helps in criminal prosecution of an individual based on a previous image of the person body

    part.

    De-merits:

    1. Difficulty in locating the presence of blood vessels on the body due to body hair, non-planar

    surface and bad lighting.

    Example of Application: We found this particular biometric amusing owing to its

    application by the CIA/FBI in the sentencing of Khalid Sheikh Mohammed an Al-Qaeda

    terrorist for the murder of Wall street journalist Daniel Pearl

    2. Title: Improved race timing systemInventor: Daniel Howell

    Original Assignee: Chronotrack Systems, LLC

    Issue date: May 28, 2010

    Patent number: EP2435989 A1 (EPEuropean Patent)

    14. RFID Antenna16. A Timing Tag

    12. Controller

    18. Remote Server

    How the AIT works: An electronic timing system for timing of athletic events

    comprising: a radio-frequency identification antenna; a portable timing controller having

    one or more radio-frequency identification readers, a touch-panel computer electrically

    http://en.wikipedia.org/wiki/Khalid_Sheikh_Mohammedhttp://www.google.com/search?tbo=p&tbm=pts&hl=en&q=ininventor:%22Daniel+Howell%22http://www.google.com/search?tbo=p&tbm=pts&hl=en&q=inassignee:%22Chronotrack+Systems,+LLC%22http://www.google.com/search?tbo=p&tbm=pts&hl=en&q=inassignee:%22Chronotrack+Systems,+LLC%22http://www.google.com/search?tbo=p&tbm=pts&hl=en&q=ininventor:%22Daniel+Howell%22http://en.wikipedia.org/wiki/Khalid_Sheikh_Mohammed
  • 7/29/2019 RFID Types

    9/16

    coupled to said one or more readers to manage data coming into said one or more readers,

    first input/output means for exchanging data with said radio-frequency identification

    antenna, and second input/output means for exchanging data with a remote server; and a

    radio-frequency identification timing tag that is configured for attachment to an athlete,

    said timing tag and said antenna having means for wirelessly communicating data

    between one another.

    Example of Application: We found a true story on how this invention came into being , a

    story about a how a father witnessed his son in an off road motor-cycling accident. This is

    technology collecting information from a drivers helmet via a bar code.

    Merits:

    Now days this technology is used to calculate the drivers lap times and can show a difference

    between two drivers up to a 400th

    of a second in difference. The accuracy stands at 99.8% and

    does not interfere with EMI from external sources as the driver crosses the RFID antenna.

    De merits:

    Distances less than 400th

    of a second cannot be calculated accurately without a certain margin of

    error and this can increase as the time between two drivers decrease

    3. Title: Iris Imaging and Iris based IdentificationInventor: Abramovich, Gil (Niskayuna, NY, US)

    Perera, Ambalangoda Gurunnanselage Amitha (Clifton Park, NY, US)

    Tait, Robert William (Niskayuna, NY, US)

    Wheeler, Frederick Wilson (Niskayuna, NY, US)

    Original Assignee: General Electric Company (Schenectady, NY, US)

    Issue date: 10/01/2009

    Patent number: 20090245594

  • 7/29/2019 RFID Types

    10/16

    How the AIT works: The iris of an individual is illuminated with the help of electromagnetic

    radiation that is chosen based on the color of the iris. The illumination from the spectrum chosen

    details information from iris and this can be used to identify a specific person of interest.

    Merits:

    1. This technology is widely used in industries where security of information is of utmostimportance.

    2. The Patterns of the iris are apparently stable throughout life and do not change meaningthat the results stay the same.

    3. The time required to ID a person is generally less than a secondDe merits:

    1. The iris scanned would have difficulty in reading the iris if the distance is more than 1 meter

    2. Partially closed eyes cannot be read

    3. The illumination should not be visible or bright light

    Three Non-Biometric AIT Patents with their details:

    1. Title : High temperature RFID tagInventor:Nicholson, Mark (Scotts Valley, CA)

    Monahan, Brian (Santa Cruz, CA)

    Issue Date: 10/26/1999

    Assignee: Escort Memory Systems (Scotts Valley, CA)

    Patent Number: 5973599

    How the AIT Works: A high temperature RFID tag is described which has a survival

    temperature in the range of approximately -40 C. to 300 C. and an operating temperature of

    approximately -20 C. to 200 C. The RFID tag comprises a housing comprising a first thermally

    resistant material and having a base and a top, and a circuit board substrate comprising a second

    thermally resistant material which is encapsulated within the housing.

  • 7/29/2019 RFID Types

    11/16

    The system typically contains of one or more RFID transponders or tags (Fig.10) . Fig.12 is an

    antenna used to communicate with at least one of the tags and Fig. 14 is a controller used to for

    managing the communication interface. The host system Fig.16 interfaces with the controller

    (14) and directs the interrogation of the tags (10) disposed on or embedded in the product carriers

    (11) and any following action via parallel or serial or bus communication (18).

    Merits:

    1. It has a wide range of application that include Vehicle parts and toxic waste dumptracking

    2. The setup cost involved is very cheap

    Demerits:

    1. Owing to the high temperatures these RFIDs are made to work under their longevity islow

    Application:

    1. Toxic waste disposal trucks

    2. Inventory management for laboratory and medical equipment

  • 7/29/2019 RFID Types

    12/16

    2.Title: GPS receiver

    Inventor: Matsumoto, Kazumi (Shiojiri, JP)

    Terashima, Maho (Matsumoto, JP)

    Issue date: 1/19/2010

    Awardee: Seiko Epson Corporation (Tokyo, JP)Patent Number: 7649494

    How the AIT Works: A GPS receiver which performs correlation processing by using replicas

    of C/A (Clear and Acquisition or Coarse and Access) codes generated in the GPS receiver after a

    GPS signal received from a GPS satellite is subjected to accumulating processing, wherein in the

    accumulating processing, a plurality of signals for integrating in the GPS receiver by predicting

    modulation of the GPS signal by a navigation message are integrated with the received GPS

    signal, and results of the integration are accumulatively added. GPS works on triangulating the

    co-ordinates of the object across a plane.

    Merits of the GPS:

    1. The system employed is a robust one meaning there no sensitive instruments in thisdevice

    2. The accuracy provided by a GPS device is very high with a margin of error of about 1foot to 1.5 feet on average.

    Demerits:

    1. It susceptible to RF jams and interferences.

    2. Obstacles like buildings and trees can deflect the signal, causing your position on the GPS

    screen to be off by as much as 100 feet

    Although a very common RFID used in daily life, we found this patent very helpful in

    understanding how the GPS works in greater detail

  • 7/29/2019 RFID Types

    13/16

    3.Title: System and method for detecting emplacement of improvised explosive devices

    Inventor: Steadman, Robert L. (Mansfield, MA, US)

    Fitzgerald, James (Westford, MA, US)

    Original Assignee: Textron Systems Corporation (Wilmington, MA, US)

    Award Date: 10/04/2011

    Patent Number: 8031068

    How the AIT works: An explosive device detection system includes sensors and base station

    that detect and report on suspected Improvised Explosive Devices (IED) or landmine

    emplacement activity within a geographic area. When disposed within a geographic area, each

    sensor forms part of a wireless communications network which allows communication amongneighboring sensors. As a sensor detects activity in its proximity, such as activity that indicates

    emplacement of an IED, the sensor transmits a reporting signal through the network to the base

    station.

    The neighboring sensors receive and transmit the reporting signal in a sequential manner towardthe base station. Because the reporting signal takes multiple hops toward the base station, the

    sensors do not require large amounts of power to transmit the signal. Furthermore, the detection

    system allows detection of IED emplacement within the geographic area as the activity occurs.

    As a result, the base station can direct mobile response units to take immediate responsive action

    to prevent detonation of the IED's.

    An indication of how the display would look if an IED was detected,

  • 7/29/2019 RFID Types

    14/16

    Merits of this RFID:

    1. Power consumed to run the device is extremely low2. The representation provided by these devices tends to be very lucid amid a 3D terrain as

    can be seen above

    Demerits:

    1. There is always a possibility that the signal can be disrupted by electromagnetic waves

  • 7/29/2019 RFID Types

    15/16

    Question 4:

    Implementing RFIDs in Guns:

    Off late we have witnessed school massacres made by guns not owned by the accused but in

    many cases from their parents or friends or stolen from their owners. Looking at this one solutionthat would cross our mind would be to implement an RFID in a gun that would link it to the user.

    This would mean that only when the user holds the gun would the trigger activate and even if the

    gun were to be close to the owner it still wouldnt unlock.

    The diagram below contains the circuit diagram of this RFID along with an explanation of how it

    works:

    Working Principle and Design of Product:

    Here we have a passive a RFID linked to the user in the form of a ring or watch. A unique

    number is embedded in this RFID. The gun is fixed with an RFID reader that can identify the

    unique number from the user once this has been done the command for approval or denial is sent

    to the micro controller as can be seen from the figure.

    The objective of the micro controller is to either signal the solenoid to remain stationary

    or to move releasing the trigger from its locked position based on the verification obtained.

    The circuit diagram appears to be very simple to implement and is also very cheap. We would

    estimate that the total cost should not be more than 50 USD. The RFID would work on a

    frequency of about 10-15 MHz

  • 7/29/2019 RFID Types

    16/16

    Addressing the relevant concern:

    Once the above idea is implemented, the user of a gun can be certain that his gun cannot be used

    without him holding the trigger. So even if the user was for example 15 cm away from his gun

    the antenna is designed to not be able to verify the ID of that person unless he holds the handle of

    the gun and if someone were to steal your gun and aim it at you the trigger would just not pull.

    One of the main advantages of this technology is the time it takes to verify the user and release

    the trigger from the locked position. This should not take more than a quarter of a second.

    So if you decided to shoot when you are ready, the gun would be ready too.

    We strongly believe that implementing this would definitely decrease gun related deaths in the

    U.S drastically as can be seen from the Newtown massacre where the suspect used his mothers

    guns for the rampage.