ITU-T Workshop on "Networked RFID: Systems and Services" |
Abstracts |
|
ITU-T Workshop on "Networked RFID: Systems and Services"
Geneva, 14-15 February 2006
Contact: tsbworkshops@itu.int
|
Opening Session |
Speaker: Dr Jari-Pascal Curty / Sokymat SA
Title of Presentation: RFID Tutorial
The goal of this presentation is to describe, from a general point of view,
the Radio Frequency Identification or RFID technology. Its basic structure,
types and capabilities are presented. This technology is then compared to
other existing RF communication means before showing typical applications.
Today’s market segments are: Access & Security, Industry & Logistics, Food &
Animal as well as E-Documents. The main existing standards around these RFID
applications are shortly presented as well as the coming Near-Field
Communication (NFC).
A key issue about RFID that has to be addressed is related to
multi-applications systems. The typical application is mass transportation
in a city, country or even at the international level. How can we ensure
Quality of Service and security for such a tremendous amount of data over a
given network in order to trigger the development of RFID technology in our
day-to-day lives? |
Speaker: Anthony M. Rutkowski
Title of Presentation: ITU-T Overview
RFIDs enable objects to communicate through networks, and as a result,
unleashing a vast new array of Next Generation Network ID based services.
Future object-object, and object-human communication will almost certainly
dwarf today’s human-human dialogue, and provide a vastly more varied and
ubiquitous networked environment that is limited only by our imagination.
The ultimate value of these developments, however, is directly determined by
the extent to which we can actually effect a ubiquitous global network
infrastructure that enables object communication.
The ITU-T role in facilitating object communication goes back twenty-five
years when some of the world’s experts in distributed computing at the time,
brought their seminal work to what was then the CCITT and developed the
first global hierarchical domain name system for all objects – both real and
virtual. Years ahead of its time, that system was named Object IDentifiers (OID)
and innovatively provided for name resolution, directory interoperability,
and authentication of distributed objects.
Today, as new technologies like RFID’s bring into existence exciting new
object ID based services, the work in the ITU’s RFID correspondence group
and NGN study group is scaling in scope, importance, and innovation to
provide the necessary frameworks, protocols, and service capabilities.
Leveraging early workshops of the ITU’s Strategy and Policy Unit on object
communications, a roadmap for global Networked RFID standards across mobile
and IP-enabled NGN infrastructures is emerging. At the end of that roadmap
lies an exciting, constantly evolving, and fundamentally enabling supporting
infrastructure for distributed, nomadic object ID based communications. |
Speaker: Craig K. Harmon, President & CEO, Q.E.D. Systems
Title of Presentation: ISO/IEC: The International RFID Standards of ISO and
JTC 1
Discussed within this presentation are the various ISO and JTC 1 (ISO/IEC)
Technical Committees, Subcommittees, and Working Groups who have been
addressing RFID standardization for several years. Standards exist in the
areas of Technology, Conformance, Data Structure, Network, and Application
standards. ISO/IEC JTC 1/SC 31 (Automatic identification and data capture
techniques) has assigned RFID to is Working Group 4, with close cooperation
of Working Group 3/Sub-Group 1 (RFID Conformance), and Working Group 2 (Data
Structure). These RFID technical standards include those of Low Frequency
(<135 kHz), High Frequency (13.56 MHz), and Ultra-High Frequency (433.92
MHz, 860 – 960 MHz, and 2450 MHz). Many of these standards are mature and
widely implemented.
Currently a Joint Working Group between ISO TC 122 (Packaging) and ISO TC
104 (Freight containers) is finalizing a set of five Application standards —
Supply chain applications of RFID: ISO 17363 through ISO 17367 (Freight
container, returnable transport item, transport unit, product packaging,
product and tagging). This work is being closely coordinated with ISO TC
104/SC 4/WG 2 on Electronic container seals. These efforts network supply
chain information to multiple nodes within the chain
ISO TC 204 has created a suite of RFID standards in the development and
deployment of Intelligent Transport Systems. These efforts network transport
information to multiple nodes with the system. JTC 1/SC 17 (Integrated
Circuit Cards) and JTC 1/SC 37 (Biometrics) are providing a standardized
means to identify the individual for transactional purposes.
The work of ISO/IEC JTC 1/SC 6, Telecommunications and information exchange
between systems and ISO TC 8, Ships and Marine Technology will also be
reviewed. |
Speaker: Henri Barthel, GS1
Title of Presentation: EPCglobal
The EPCglobal Network combines radio frequency identification (RFID) technology, existing
communications network infrastructure, and the Electronic Product Code™ (a number for uniquely
identifying an item) to enable accurate, cost-efficient visibility of information in the supply
chain. The end result helps organizations be more efficient, flexible, and responsive to customer
needs.
EPCglobal is an independent non-profit organisation, financed primarily through the subscriptions
of End User and Technology companies. EPCglobal is represented globally through the network of more
than 100 national GS1 organisations. EPCglobal, like GS1, does however not work in isolation.
Working relationships have been established with international standard bodies such as the
International Standard Organisation (ISO), the Internet Engineering Task Force (IETF) or the United
Nations CEFACT forum with regards to electronic data interchange standards. The EPCglobal standard
development process is driven by User requirements. The deliverables of this process are submitted
to established standard bodies such as ISO.
This presentation will introduce the EPCglobal organisation, the standard status and plans, as well
as the key drivers to implementation.
|
Speaker: Noboru Koshizuka, Associate Professor, The University of Tokyo
Title of Presentation: Ubiquitous ID Center
In 1984, we have started a ubiquitous computing research project in Japan, TRON Project (The Real-time
Operating system Nucleus). The goal of the project is to realize a computerized environment in which small
computers are embedded and cooperate with each other. Recently, with the progress of hardware technologies,
computers have been becoming much smaller. Even a full-fledged computer equipped with CPU, memory and communication
interfaces is implemented with a small single VLSI chip. In the computing everywhere environment, these small chips
are embedded into all sorts of “things.” They communicate and cooperate with each other to control our living
environment or to provide rich information services to us. The computer automatically recognizes the condition
of the real world, and conducts various information processing and operation according to the condition. As a
result, this environment will support any activities of our daily life. Since 2000, we have started a new project
“Ubiquitous ID Project” for realizing the world-wide ubiquitous computing environment on the basis of the
ultra-small computer technologies. In this talk, I would like to introduce the technologies and activities of
Ubiquitous ID Project.
|
Speaker: Reinhard Meindl, Philips Semiconductors
Title of Presentation: Experience simplicity with Near Field Communication (NFC)
Near Field Communication delivers fast, intuitive connectivity
Just as you would walk across a room full of people to have a private
conversation with someone, rather than shouting across it so that everyone
could hear, Near Field Communication (NFC) uses the same principle to link
electronic devices. It enables the user to exchange all kinds of data, in
complete security, simply by bringing two devices close together. Its
short-range interaction greatly simplifies the whole issue of
identification, as there is a lot less confusion when devices can only
‘hear’ their immediate neighbors.
The technology, in essence a contactless short-range interface technology,
will enable people to effortlessly connect digital cameras, PDAs, set-top
boxes, computers and mobile phones.
NFC is compatible with existing contactless smart card infrastructures in
line with ISO/IEC 14443A, which is Philips’ MIFARE® interface platform, and
also with Sony’s FeliCa™ smart card infrastructures card schemes. The NFC
technology enables your mobile phone or PDA to act as an electronic key to
access your home, office or car, or to pay for and act as your transport
ticket. |
Session 1: RFID - Visions and Implications |
Speaker: Lara Srivastava
Title of Presentation: Visions of Ubiquity – Things in cyberspace
For information and communication access to be truly and seamlessly embedded
in the environment surrounding us, the exponential growth of networked
devices (such as mobile phones and PCs) is required together with a paradigm
shift in computing. One early manifestation of such a shift can be found in
RFID. RFID heralds the promise of a world in which not only people and data,
but also things, could be connected to a network. Far from science fiction,
consumer products (from socks to razors) are already being equipped with
small radio transmitters to track their location and status. What does this
imply for the nature and shape of future networks? How does RFID fit into
our vision for ubiquitous communications and what are some of its most
important implications? |
Speaker: Florent Frederix – European Commission
Title of Presentation: RFID: A European Perspective
Not many new technologies have triggered so much attention from consumer
organisations and politicians around the world as these Radio Frequency
Identification Devices (RFID). The place taken by RFID in the public debate
today largely derives from the fact that this technology is moving rapidly
from the research lab to mass applications in a similar way this happened
for GSM in the 1990’s. But RFID can have policy implications for
international trade, intellectual property rights, standards, spectrum,
security, and privacy. For this reason it is imperative to understand the
technology, its full potential and possible issues. Therefore, the European
Commission has established in 2005 an inter-service RFID working group that
will address the policy challenges.
In addition the Directorate General, Information Society and Media has
embedded Radio Frequency identification technologies and its applications in
the scope of its ongoing framework research programmes. This because RFID
can be seen as a cross-cutting and enabling technology that contributes to
the important role that Information and Communication technology (ICT) plays
to promote innovation and economic growth. |
Speaker: Takeshi TANDAI, MIC JAPAN
Title of Presentation: Visions and strategy in Japan
RFID is expected to play a very important role in realization of the
Ubiquitous network society.
Particularly, RFID connected to the network is expected to be applied to
various fields such as business areas, living or social infrastructure, and
as a consequence will contribute to improving the quality of life for people
worldwide.
My presentation will include a future vision, problems to be solved,
Japanese activities (policy trends, R&D projects, etc.) and expectations for
international standardization for Ubiquitous network technology including
RFID. |
Speaker: Yael Maguire, PhD
Title of Presentation: Vision and trends in US RFID markets
NRFIDs represent both an enormous challenge and an opportunity to create the
highest density network of radio devices on the planet. This market promises
a plethora of radio devices that easily outnumbers conventional terrestrial
radio markets such as cellular telephony or wireless data and AM/FM
broadcasting. Presented here will be a brief introduction to the present and
future of NRFIDs in the US. From physical principles and regulatory
constraints, fundamental limits of RFID will be derived to guide where
trends in technology will take this market. Standards processes for NRFID
and their impact on technology development will be considered. This tour
will focus on the technology used in NRFID in supply chain management around
readers, tags and network infrastructure and then expand to potential uses
in other markets when sensor technology is integrated with identity. This
technology is on an economically feasible trajectory to create truly
ubiquitous sensory fabrics that when fed into a global network offer
unprecedented capabilities. |
Session 2: RFID Applications - A sectoral approach |
Speaker: Peter Jones, Director, Information Systems Group, Hitachi Europe
Title of Presentation: Networked RFID for Use in the Food Chain
What kind of issues in the food industry particularly in Japan and other
Asian countries are currently influencing the adoption of RFID based
technologies. What are the advantages of the networked RFID applications and
what kinds of technologies are emerging. |
Speaker: Edoardo Cottino, SIRTI SpA
Title of Presentation: RFID for telecommunication network maintenance
Telecommunication network require at least planned periodical maintenance to
minimize out-of-service risk and guarantee Service Level Agreement
satisfaction. Network elements that are subjected to maintenance actions can
be several and different according to position, dimensions, in field work
and scheduled times for periodical planned maintenance.
Thanks to the progress in the last years in terms of technologies for
geo-localization, data transmission, radio-frequency identification and
mapping applications, the current scenario enables the development of
complete solutions to support network plants management. Combining geo-referentiated
topography, GPS positioning and wireless communication networks with new
RFID standard features and performance is possible to label network elements
and collect related information from the field in a database. Moreover a
software can display network plants and characteristics supplying a user
friendly interface.
The presentation describe an innovative solution for network plants
management. The system is based on item labeling, data collection and
cartographical representation and is able to support activity management in
telecommunication network maintenance.
Finally are presented the results of field trial performed on Telecom Italia
aerial network. |
Speaker: Lani Fritts, (Savi Networks, USA)
Title of Presentation: Transport:Container (ISO/TC104)
This presentation will provide background on the issue of container security and
outline the current status of actions being taken to leverage RFID for security
in standards arena. It will then show how the standards can be leveraged to not
only increase security but lead to an ROI in the supply chain. |
Speaker: Christian Mory, Michelin
Title of Presentation: Automotive industry and RFID
For the motor industry, RFID is a great opportunity in its path to
globalization. It will also enable to reduce costs and to bring better
services to its customers.
Logistics are of course an obvious field where RFID will bring benefits. But
RFID will also be used for other applications beyond logistics.
Some uncertainties still remain, notably in term of return on investments.
In the mean time, some benefits have not been totally evaluated or even
considered.
The motor industry has its own constraints which makes RFID both difficult
to implement and ideal for new opportunities.
One of the main obstacles still faced is a leak of global harmonization in
standards and regulations. |
Speaker: Robert Gaisch (MBBS, Switzerland)
Title of Presentation: RFID solutions for e-health
Principle benefits of using RFID technologies in the medical sector. In
particular on surgical instruments |
Session 3: RFID and New Business Models |
Speaker: HyoungJun Kim, ETRI Korea
Title of Presentation: Mobile RFID services and its business impacts
RFID might be an important enabler for a wide range of new applications in
different domains, asset management, access control, product authentication,
wireless commerce and supply chain management –to mention some. As different
flavors of RFID technology network-connects more and more items, in addition
to becoming an important part of distributed business processes, it will
have an impact on local and global communication patterns and service needs.
This opens an interesting business opportunity for Telecom operators,
however, different applications of RFID have very different characteristics
and the best role for the telecom operator is not obvious. There are
important issues related to value chains and business models that make the
Telecom approach to these markets challenging. |
Speaker: Bjørn Thorstensen, Telenor R&D
Title of Presentation: RFID, applications and business models – the Telco
perspective
RFID might be an important enabler for a wide range of new applications in
different domains, asset management, access control, product authentication,
wireless commerce and supply chain management –to mention some. As different
flavors of RFID technology network-connects more and more items, in addition
to becoming an important part of distributed business processes, it will
have an impact on local and global communication patterns and service needs.
This opens an interesting business opportunity for Telecom operators,
however, different applications of RFID have very different characteristics
and the best role for the telecom operator is not obvious. There are
important issues related to value chains and business models that make the
Telecom approach to these markets challenging. |
Speaker: Alain Pfeffer, France Telecom
Title of Presentation: RFID, gateway to M2M (machine to Machine)
As incombent telecom operators search for new growth levers, M2M (machine to
machine) opens an era of new services.
RFID tag, implemented on the object, on the field, is the entry point to M2M
loop.
Therefore, France Telecom, adding to telecom traffic activity, develops new
business models within its next strategy:
- Sell and provide solutions and services (consulting, integration, hosting)
allowing new process to customers to go live and get new value from
Information and Communication Technologies,
- Implement all purpose M2M platform, allowing open and valued connectivity,
- Develop local radio engineering enabling pervasive computing
|
Speaker: Ichiro Kase, Senior VP, R&D Dept., NTT Comware Corporation
Title of Presentation: RFID's three application models: Location Identification,
Products Traceability & Personnel Tracking
This presentation discusses RFID's future possibility for new types of
applications. Three types of application models will be provided. For
positioning application model, trial project for supporting handicapped
peoples' walk in Kobe Japan will be presented. For SCM model, as an actual
example, ladies' shoes inventory management system using RFID, which has
been already introduced in Japanese major department stores, such as
Mitsukoshi, Hankyu and Takashimaya, will be presented. For presence
management model, application of RFID for tracking person in a building for
security and navigation will be presented. |
Session 4: Security Issues on RFID |
Speaker: Mr. Kyo-Il Chung, ETRI
Title of Presentation: Security issues in RFID and Sensor Network
In this talk, I will talk about the security issues in RFID technology. First, I
will start this talk by introducing what kinds of security threats are possible
in RFID environment and then introduce the current efforts how we can overcome
such security threats. In research community, development efforts of security
technology for RFID are mainly focused on the RFID tag and reader. However, the
advent of Networked RFID requires that we should consider the RFID infrastructure
such as middleware, IS and other back-end RFID infrastructure to provide security
in RFID environment.
I will also introduce the security issues in wireless sensor network. The sensor
network that is composed of sensor nodes raises security and privacy problems.
Because of the limited computation and communication power of sensor nodes,
conventional security mechanisms are hardly applied to sensor networks. So we
need to develop an efficient security schemes to make sensor network secure. We
will discuss about these mechanisms.
|
Speaker: Dr. Matthew Robshaw, France Telecom Research and Development
Title of Presentation: Authentication and privacy capabilities suitable for
RFID
In this presentation we give an overview of the state of the art of
cryptographic deployment on resource constrained devices. In particular, we
highlight promising trends in the design and deployment of cryptographic
techniques that might be suitable for the most extreme computational
environments. |
Speaker: Gildas AVOINE, EPFL, Lausanne, Switzerland
Title of Presentation: Malicious Traceability within RFID Systems
This presentation will address the security and privacy issues in Radio
Frequency Identification (RFID). The great achievement that RFID has made
today, lies essentially on the willingness to develop low cost transponders,
called tags. However, such tags have limited capabilities, bringing so many
questions with regards to RFID's potential and limitations. In this talk, we
will briefly introduce the security and privacy threats, and we will
classify and analyze them. Then we will focus on one of these threats that
is the malicious traceability. We will see how tags can be used to track
people and the existing countermeasures. Then we will describe the link
between malicious traceability and communication model. In particular, we
will show why security considerations must be kept in mind when designing a
collision-avoidance protocol. |
Session 5: Networking Architecture and ubiquitous Networks |
Speaker: Henri Barthel : EPCglobal
Title of Presentation: The EPCglobal Network Architecture
Radio Frequency Identification (RFID) is globally recognised as a technology
that has the potential to transform and to dramatically improve the way
business is conducted. In itself, RFID is just a technology enabling
efficient data capture. The business improvements will be derived from the
extraordinary changes in the access to data and the communication of
information between companies.
The EPCglobal Architecture provides a comprehensive approach to data capture
and data exchanges and is based on the three following layers:
- EPC Physical Object Exchange. The EPC physical object exchange standards
are designed to ensure that when one organisation delivers a physical object
to another organisation, the latter will be able to determine the EPC of the
physical object and interpret it properly.
- EPC Data Exchange. The EPC data exchange standards provide a means for one
organisation to share data about EPCs with another through direct
peer-to-peer interaction, and also provide access to EPCglobal Core Services
and other shared services that facilitate these exchanges.
- EPC Infrastructure. The EPCglobal Architecture Framework defines interface
standards for the major infrastructure components required to gather and
record EPC data, thus allowing organisations to build their internal systems
using interoperable components.
|
Speaker: Mallik Tatipamula & Monique Morrow / Cisco
Title of Presentation: RFID – An IP Networked Application
In this presentation, we discuss the following:
- Evolution of network - From Internet of computing devices to internet of
things
- How intelligence moving into the network?
- What is Intelligent network foundation for RFIDs
- QoS and Security considerations
- Discuss various network architectural framework for passive and active
RFIDs, including information flows for asset tracking and supply chain
examples
|
Speaker: Mr. Yong-Woon KIM, ETRI
Title of Presentation: Networked ID Applications and Standardization Issues
There are lots of identification schemes in the real world as well as the
cyber world. Some identification codes like EAN.UCC codes are applied to
physical objects for identification. Each physical object may be associated
with a logical object such as a text content, application program, mobile
executable code, or data record. Herein a relationship between physical and
logical objects should be maintained. Such a relationship makes a wide
variety of business opportunities and as results a lot of ID-based
applications and services have been exploited so far. They have been adopted
and deployed usually in various business fields. But nowadays they are
emerging toward human end-users.
The presentation will cover existing use cases of ID for both business and
customer purposes, a brief of different service requirements for those
usages, example network configurations, evolution of the network
configurations and expected standardization issues. |
Speaker: Toshihisa Kamemaru,
Mitsubishi Electric Corporation
Title of Presentation: The interferences among passive type UHF-RFID systems
in dense environment, - Analysis and Proposals
The passive type UHF-RFID tags and readers may cause serious interferences
between them, especially reader-to-reader and reader-to-tag, when their
systems are widely deployed with high density. In this presentation I will
report the results of our logical analysis on distance dependency and the
measurements of mutual interferences between the RF-ID systems of typical
RFID models. The results showed that the critical distance between readers
using the same frequency is about 10 km and the critical distance between
tags and reader is about 100 m.
Then the discussions were made on several interference avoidance methods:
- Time separation based methods: Conventional LBT Method and Improved LBT
Method. Improved LBT Method is a proposed method and it can avoid
interference when the conventional LBT cannot moderate them.
- Frequency separation method between reader-send and tag-send-back
signals: Miller Subcarrier Method and Send Send-back Channel Separation(SSCS)
Method. For Miller Subcarrier Method tags should be implemented Miller code
function, On the other hand, SSCS Method doesn’t require tags to have the
complicated factions as the Miller Subcarrier tags have, and can be applied
to all types of tags.
As the conclusion, we propose that it is effective for passive-type RFID
systems to employ the combination of Improved LBT Method and SSCS Method in
dense environment. |
Speaker: Martin Glänzer, Siemens AG
Title of Presentation: Self-Organizing Sensor & Actuator Networks
SOSAN is a Self Organizing Sensor & Actuator Network. To demonstrate such a
Network, we have built a Demonstrator. This Demonstrator has four
components.
- LPR (Local Positioning Radar) system to measure the Distance between the
Sensor notes.
- A Sensor Module to measure Sensor values. In this Demonstrator we Measure
Temperature.
- A Communication Module. Because this Demonstrator was build to demonstrate
the algorithm and not low power consumption or small size, we use a standard
812.11b WLAN card.
- A central calculation unit. We use a PC-104.
The system has following features:
- Self Organizing. There is no configuration effort. All organizing is done
decentral by the Network.
- Time synchronization
- Estimate position of the sensor notes
- Multi-Hop Geo-Routing to cover large areas
- Robot Interface
- AR (Augmented Reality) Interface
At least, we have Integrate SOFIS (Siemens Oberflächenwellen Ident System)
into the System. SOFIS is an energy autarky ID system based on surface
acoustic waves. SOFIS has the following features:
- Measure additional sensor features like temperature, pressure, strain,
torsion and gauge
- Measure objects with high velocity
- High temperature (750 degree F / 450°C)
- Identification in harsh environment
- Forgery protection
- Long range
|
Session 6: Future trends in NRFID and Ubiquitous Networks |
Speaker: Noboru Koshizuka, Associate Professor, The University of Tokyo
Title of Presentation: Ubiquitous ID Center
Ubiquitous computing and ubiquitous networks with NRFIDs are novel and innovative technologies that will be able to
make a new market. In Japan, we have already tried various new applications and services using these technologies
such as location-aware information services, food communication services, and product information tracing services.
The most important feature of these services is that they are not B2B services but B2C or C2C services. Another
point is that these services aim to increase the security and safety of our daily lives. To support these new
services, Japanese government has several plans to facilitate the national infrastructure for ubiquitous information
services using NRFID. Concretely, we have already started a national project to embed a huge number of RFIDs and
RF/IR beacons into public spaces such as national roads, resort areas, and business quarters. These tags will be
based on international open standards such as Ubiquitous ID Standard, and anyone can use these tags for their
commercial ubiquitous information services. In this talk, we show the innovative technologies related to NRFID,
novel applications and services based on these technologies, and national plans for deployment of NRFIDs all over
the Japan land. Lastly, we will clarify the importance of standardization for these future trends.
|
Speaker: Kang Lee, NIST
Title of Presentation: Integration of RFID with Smart and Wireless Sensor
Networks
Sensors are ubiquitous. Industry is fast moving toward employing networked,
digital, and wireless communications technologies for sensors. Using
wireless connectivity for sensor networks increases the flexibility in
deployment and reconfiguration and thus reduces the overall infrastructure
cost. These advantages will enable sensor networks to monitor complex
environments for applications ranging from industrial automation to
battlefield surveillance to environment monitoring to telemetry of first
responder’s health condition. RFID are going to play a key role in automated
universal identification system for accessing, securing, and tracking
assets, personnel, equipment, products throughout the supply chain.
Combining RFID devices and sensors could expand the overall functionality
and capability of the above applications. IEEE is currently developing a
suite of smart and wireless sensor standards, IEEE 1451. This set of
standards will make it easier for transducer manufacturers to develop smart
devices and to interface those devices to networks, systems, and instruments
by incorporating existing and emerging sensor and networking technologies.
We are exploring effective integration of RFID and smart and wireless sensor
networks in a standard fashion aiming to facilitate interoperability. |
Speaker: Daniel Evers, Siemens AG, Corporate Technology
Title of Presentation: RF ID and Smart Tags - Vision & Trends
RF ID technology can be divided basically into two segments: Low-cost
systems for the mass market and advanced tags for special application
scenarios, where more functionalities than pure identification are required.
Following this way, it becomes obvious that RF ID and wireless sensors are
quite similar and strongly related.
Siemens Corporate Technology is working intensively in the research field of
advanced RF ID systems. “RF ID and Smart Tags - Vision & Trends” will give
an overview over those research activities dealing with advanced
functionalities and capabilities like robustness against temperature and
mechanical stress, high reading distances, localization features or the
combination of RF ID and sensors.
Focus of the presentation will be a view on technological approaches as well
as on applications containing tags with key features like self-powering
capabilities, miniaturized form factors and tag localizing.
Examples of research projects will be shown, where those technology
approaches are already implemented. A main content of Corporate Technologies
future work in the RF ID sector will be to apply those already approved
methods within advanced “Smart Tags”. |
Speaker: Laurent Sciboz (HEVs –University of Applied Sciences)
Title of Presentation: Future trends for the applications, viewpoint based
on future technologies
Radio-equipped microchips permeating the environment, RFID tags are erasing
the barrier between bits and atoms. Information is becoming embedded in
things through powerful and invisible software applications.
For example, some applications will include tags on living beings, which are
already beginning to emerge, with tagged wristbands on patients in a
hospital. Moreover, many applications will allow wallet phones to receive
information from RFID readers. This feature can be used to get store
information, context-advertisement, cultural knowledge etc… For any of these
business models, the right solution must integrate RFID technology with
robust, efficient and innovative software applications. |
Session 7: Panel on an RFID Standardization Roadmap |
|
|
|
|