Wednesday, September 4, 2019
Radio Frequency Identification (RFID) Essay examples -- Information Te
RFID stands for Radio Frequency Identification. RFID is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object (Wikipedia.com, 2012). RFID is a type of identification system devices that stored data, identification or location of the products. The RFID tag can be put onto an object and used to track and manage inventory, assets, people, etc. For example, it can be put into cars, computer equipment, books, mobile phones, etc. RFID can be used in a variety of applications such as access the management when there is need to access the office. They need to put their identification card that has their details to make sure they pass the security check. It is more to make sure that only authorized people can enter the premises. The tracking of good can also been done with RFID when the company wants to shipping their product somewhere far away and there are tags on the delivery of goods that enable them to track them whenever the goods being taken to. RFID can also track persons and animals as there are tags that can be put into their bodies or accessories. The police often used them to track bad people or when doing the undercover to protect the officer on duty. Tool collection is the often things that you can see closely related to RFID that we people used in our daily life. The ââ¬Å"Touch n Goâ⬠is the perfect example of RFID. RFID is also being used in the machine readable travel documents, which is the machine that reads the passport to confirm the identity of the person before they been given permission to go in and out from one country to another. In airport, RFID is also being used in the baggage tracking logistics where each one of the baggage... ...nline] available from (20 April 2012) Thesmartsense.com (2011) VingCardââ¬â¢s ââ¬ËSignature RFIDââ¬â¢ [online] available from (20 April 2012) Citeseerx.ist.psu.edu (2005) David Molnar, David Wagner - A Scalable, Delegatable Pseudonym Protocol Enabling Owner Transfer of RFID Tags [online] available from (22 April 2012) Autoidlabs.org (2007) Konidala, Divyan, Kim & Kwangjo - RFID Reader Mutual Authentication Scheme Utilizing Tags [online] available from (22 April 2012) Itlaw.wikia.com (2012) Guidelines for Securing Radio Frequency Identification (RFID) Systems [online] available from (22 April 2012) Radio Frequency Identification (RFID) Essay examples -- Information Te RFID stands for Radio Frequency Identification. RFID is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object (Wikipedia.com, 2012). RFID is a type of identification system devices that stored data, identification or location of the products. The RFID tag can be put onto an object and used to track and manage inventory, assets, people, etc. For example, it can be put into cars, computer equipment, books, mobile phones, etc. RFID can be used in a variety of applications such as access the management when there is need to access the office. They need to put their identification card that has their details to make sure they pass the security check. It is more to make sure that only authorized people can enter the premises. The tracking of good can also been done with RFID when the company wants to shipping their product somewhere far away and there are tags on the delivery of goods that enable them to track them whenever the goods being taken to. RFID can also track persons and animals as there are tags that can be put into their bodies or accessories. The police often used them to track bad people or when doing the undercover to protect the officer on duty. Tool collection is the often things that you can see closely related to RFID that we people used in our daily life. The ââ¬Å"Touch n Goâ⬠is the perfect example of RFID. RFID is also being used in the machine readable travel documents, which is the machine that reads the passport to confirm the identity of the person before they been given permission to go in and out from one country to another. In airport, RFID is also being used in the baggage tracking logistics where each one of the baggage... ...nline] available from (20 April 2012) Thesmartsense.com (2011) VingCardââ¬â¢s ââ¬ËSignature RFIDââ¬â¢ [online] available from (20 April 2012) Citeseerx.ist.psu.edu (2005) David Molnar, David Wagner - A Scalable, Delegatable Pseudonym Protocol Enabling Owner Transfer of RFID Tags [online] available from (22 April 2012) Autoidlabs.org (2007) Konidala, Divyan, Kim & Kwangjo - RFID Reader Mutual Authentication Scheme Utilizing Tags [online] available from (22 April 2012) Itlaw.wikia.com (2012) Guidelines for Securing Radio Frequency Identification (RFID) Systems [online] available from (22 April 2012)
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.