ITU Home Page International Telecommunication Union Français | Español 
Print Version 
ITU Home Page
Home : ITU-T Home : Workshops and Seminars : Networked RFID
 ITU-T Workshop on "Networked RFID: Systems and Services"
ITU-T Workshop on "Networked RFID: Systems and Services"
Geneva, 14-15 February 2006


Opening Session
Speaker: Dr Jari-Pascal Curty / Sokymat SA 
Title of Presentation: RFID Tutorial

The goal of this presentation is to describe, from a general point of view, the Radio Frequency Identification or RFID technology. Its basic structure, types and capabilities are presented. This technology is then compared to other existing RF communication means before showing typical applications. Today’s market segments are: Access & Security, Industry & Logistics, Food & Animal as well as E-Documents. The main existing standards around these RFID applications are shortly presented as well as the coming Near-Field Communication (NFC).
A key issue about RFID that has to be addressed is related to multi-applications systems. The typical application is mass transportation in a city, country or even at the international level. How can we ensure Quality of Service and security for such a tremendous amount of data over a given network in order to trigger the development of RFID technology in our day-to-day lives?
Speaker: Anthony M. Rutkowski 
Title of Presentation: ITU-T Overview

RFIDs enable objects to communicate through networks, and as a result, unleashing a vast new array of Next Generation Network ID based services. Future object-object, and object-human communication will almost certainly dwarf today’s human-human dialogue, and provide a vastly more varied and ubiquitous networked environment that is limited only by our imagination. The ultimate value of these developments, however, is directly determined by the extent to which we can actually effect a ubiquitous global network infrastructure that enables object communication.

The ITU-T role in facilitating object communication goes back twenty-five years when some of the world’s experts in distributed computing at the time, brought their seminal work to what was then the CCITT and developed the first global hierarchical domain name system for all objects – both real and virtual. Years ahead of its time, that system was named Object IDentifiers (OID) and innovatively provided for name resolution, directory interoperability, and authentication of distributed objects.

Today, as new technologies like RFID’s bring into existence exciting new object ID based services, the work in the ITU’s RFID correspondence group and NGN study group is scaling in scope, importance, and innovation to provide the necessary frameworks, protocols, and service capabilities. Leveraging early workshops of the ITU’s Strategy and Policy Unit on object communications, a roadmap for global Networked RFID standards across mobile and IP-enabled NGN infrastructures is emerging. At the end of that roadmap lies an exciting, constantly evolving, and fundamentally enabling supporting infrastructure for distributed, nomadic object ID based communications.
Speaker: Craig K. Harmon, President & CEO, Q.E.D. Systems 
Title of Presentation: ISO/IEC: The International RFID Standards of ISO and JTC 1

Discussed within this presentation are the various ISO and JTC 1 (ISO/IEC) Technical Committees, Subcommittees, and Working Groups who have been addressing RFID standardization for several years. Standards exist in the areas of Technology, Conformance, Data Structure, Network, and Application standards. ISO/IEC JTC 1/SC 31 (Automatic identification and data capture techniques) has assigned RFID to is Working Group 4, with close cooperation of Working Group 3/Sub-Group 1 (RFID Conformance), and Working Group 2 (Data Structure). These RFID technical standards include those of Low Frequency (<135 kHz), High Frequency (13.56 MHz), and Ultra-High Frequency (433.92 MHz, 860 – 960 MHz, and 2450 MHz). Many of these standards are mature and widely implemented.

Currently a Joint Working Group between ISO TC 122 (Packaging) and ISO TC 104 (Freight containers) is finalizing a set of five Application standards — Supply chain applications of RFID: ISO 17363 through ISO 17367 (Freight container, returnable transport item, transport unit, product packaging, product and tagging). This work is being closely coordinated with ISO TC 104/SC 4/WG 2 on Electronic container seals. These efforts network supply chain information to multiple nodes within the chain

ISO TC 204 has created a suite of RFID standards in the development and deployment of Intelligent Transport Systems. These efforts network transport information to multiple nodes with the system. JTC 1/SC 17 (Integrated Circuit Cards) and JTC 1/SC 37 (Biometrics) are providing a standardized means to identify the individual for transactional purposes.

The work of ISO/IEC JTC 1/SC 6, Telecommunications and information exchange between systems and ISO TC 8, Ships and Marine Technology will also be reviewed.
Speaker: Henri Barthel, GS1 
Title of Presentation: EPCglobal

The EPCglobal Network combines radio frequency identification (RFID) technology, existing communications network infrastructure, and the Electronic Product Code™ (a number for uniquely identifying an item) to enable accurate, cost-efficient visibility of information in the supply chain. The end result helps organizations be more efficient, flexible, and responsive to customer needs.

EPCglobal is an independent non-profit organisation, financed primarily through the subscriptions of End User and Technology companies. EPCglobal is represented globally through the network of more than 100 national GS1 organisations. EPCglobal, like GS1, does however not work in isolation. Working relationships have been established with international standard bodies such as the International Standard Organisation (ISO), the Internet Engineering Task Force (IETF) or the United Nations CEFACT forum with regards to electronic data interchange standards. The EPCglobal standard development process is driven by User requirements. The deliverables of this process are submitted to established standard bodies such as ISO.

This presentation will introduce the EPCglobal organisation, the standard status and plans, as well as the key drivers to implementation.
Speaker: Noboru Koshizuka, Associate Professor, The University of Tokyo 
Title of Presentation: Ubiquitous ID Center

In 1984, we have started a ubiquitous computing research project in Japan, TRON Project (The Real-time Operating system Nucleus). The goal of the project is to realize a computerized environment in which small computers are embedded and cooperate with each other. Recently, with the progress of hardware technologies, computers have been becoming much smaller. Even a full-fledged computer equipped with CPU, memory and communication interfaces is implemented with a small single VLSI chip. In the computing everywhere environment, these small chips are embedded into all sorts of “things.” They communicate and cooperate with each other to control our living environment or to provide rich information services to us. The computer automatically recognizes the condition of the real world, and conducts various information processing and operation according to the condition. As a result, this environment will support any activities of our daily life. Since 2000, we have started a new project “Ubiquitous ID Project” for realizing the world-wide ubiquitous computing environment on the basis of the ultra-small computer technologies. In this talk, I would like to introduce the technologies and activities of Ubiquitous ID Project.
Speaker: Reinhard Meindl, Philips Semiconductors 
Title of Presentation: Experience simplicity with Near Field Communication (NFC)

Near Field Communication delivers fast, intuitive connectivity

Just as you would walk across a room full of people to have a private conversation with someone, rather than shouting across it so that everyone could hear, Near Field Communication (NFC) uses the same principle to link electronic devices. It enables the user to exchange all kinds of data, in complete security, simply by bringing two devices close together. Its short-range interaction greatly simplifies the whole issue of identification, as there is a lot less confusion when devices can only ‘hear’ their immediate neighbors.

The technology, in essence a contactless short-range interface technology, will enable people to effortlessly connect digital cameras, PDAs, set-top boxes, computers and mobile phones.

NFC is compatible with existing contactless smart card infrastructures in line with ISO/IEC 14443A, which is Philips’ MIFARE® interface platform, and also with Sony’s FeliCa™ smart card infrastructures card schemes. The NFC technology enables your mobile phone or PDA to act as an electronic key to access your home, office or car, or to pay for and act as your transport ticket.
Session 1: RFID - Visions and Implications
Speaker: Lara Srivastava 
Title of Presentation: Visions of Ubiquity – Things in cyberspace

For information and communication access to be truly and seamlessly embedded in the environment surrounding us, the exponential growth of networked devices (such as mobile phones and PCs) is required together with a paradigm shift in computing. One early manifestation of such a shift can be found in RFID. RFID heralds the promise of a world in which not only people and data, but also things, could be connected to a network. Far from science fiction, consumer products (from socks to razors) are already being equipped with small radio transmitters to track their location and status. What does this imply for the nature and shape of future networks? How does RFID fit into our vision for ubiquitous communications and what are some of its most important implications?
Speaker: Florent Frederix – European Commission 
Title of Presentation: RFID: A European Perspective

Not many new technologies have triggered so much attention from consumer organisations and politicians around the world as these Radio Frequency Identification Devices (RFID). The place taken by RFID in the public debate today largely derives from the fact that this technology is moving rapidly from the research lab to mass applications in a similar way this happened for GSM in the 1990’s. But RFID can have policy implications for international trade, intellectual property rights, standards, spectrum, security, and privacy. For this reason it is imperative to understand the technology, its full potential and possible issues. Therefore, the European Commission has established in 2005 an inter-service RFID working group that will address the policy challenges.

In addition the Directorate General, Information Society and Media has embedded Radio Frequency identification technologies and its applications in the scope of its ongoing framework research programmes. This because RFID can be seen as a cross-cutting and enabling technology that contributes to the important role that Information and Communication technology (ICT) plays to promote innovation and economic growth.
Speaker: Takeshi TANDAI, MIC JAPAN 
Title of Presentation: Visions and strategy in Japan

RFID is expected to play a very important role in realization of the Ubiquitous network society.
Particularly, RFID connected to the network is expected to be applied to various fields such as business areas, living or social infrastructure, and as a consequence will contribute to improving the quality of life for people worldwide.
My presentation will include a future vision, problems to be solved, Japanese activities (policy trends, R&D projects, etc.) and expectations for international standardization for Ubiquitous network technology including RFID.
Speaker: Yael Maguire, PhD 
Title of Presentation: Vision and trends in US RFID markets

NRFIDs represent both an enormous challenge and an opportunity to create the highest density network of radio devices on the planet. This market promises a plethora of radio devices that easily outnumbers conventional terrestrial radio markets such as cellular telephony or wireless data and AM/FM broadcasting. Presented here will be a brief introduction to the present and future of NRFIDs in the US. From physical principles and regulatory constraints, fundamental limits of RFID will be derived to guide where trends in technology will take this market. Standards processes for NRFID and their impact on technology development will be considered. This tour will focus on the technology used in NRFID in supply chain management around readers, tags and network infrastructure and then expand to potential uses in other markets when sensor technology is integrated with identity. This technology is on an economically feasible trajectory to create truly ubiquitous sensory fabrics that when fed into a global network offer unprecedented capabilities.
Session 2: RFID Applications - A sectoral approach
Speaker: Peter Jones, Director, Information Systems Group, Hitachi Europe 
Title of Presentation: Networked RFID for Use in the Food Chain

What kind of issues in the food industry particularly in Japan and other Asian countries are currently influencing the adoption of RFID based technologies. What are the advantages of the networked RFID applications and what kinds of technologies are emerging.
Speaker: Edoardo Cottino, SIRTI SpA 
Title of Presentation: RFID for telecommunication network maintenance

Telecommunication network require at least planned periodical maintenance to minimize out-of-service risk and guarantee Service Level Agreement satisfaction. Network elements that are subjected to maintenance actions can be several and different according to position, dimensions, in field work and scheduled times for periodical planned maintenance.

Thanks to the progress in the last years in terms of technologies for geo-localization, data transmission, radio-frequency identification and mapping applications, the current scenario enables the development of complete solutions to support network plants management. Combining geo-referentiated topography, GPS positioning and wireless communication networks with new RFID standard features and performance is possible to label network elements and collect related information from the field in a database. Moreover a software can display network plants and characteristics supplying a user friendly interface.

The presentation describe an innovative solution for network plants management. The system is based on item labeling, data collection and cartographical representation and is able to support activity management in telecommunication network maintenance.

Finally are presented the results of field trial performed on Telecom Italia aerial network.
Speaker: Lani Fritts, (Savi Networks, USA) 
Title of Presentation: Transport:Container (ISO/TC104)

This presentation will provide background on the issue of container security and outline the current status of actions being taken to leverage RFID for security in standards arena. It will then show how the standards can be leveraged to not only increase security but lead to an ROI in the supply chain.
Speaker: Christian Mory, Michelin 
Title of Presentation: Automotive industry and RFID

For the motor industry, RFID is a great opportunity in its path to globalization. It will also enable to reduce costs and to bring better services to its customers.

Logistics are of course an obvious field where RFID will bring benefits. But RFID will also be used for other applications beyond logistics.

Some uncertainties still remain, notably in term of return on investments. In the mean time, some benefits have not been totally evaluated or even considered.

The motor industry has its own constraints which makes RFID both difficult to implement and ideal for new opportunities.

One of the main obstacles still faced is a leak of global harmonization in standards and regulations.
Speaker: Robert Gaisch (MBBS, Switzerland) 
Title of Presentation: RFID solutions for e-health

Principle benefits of using RFID technologies in the medical sector. In particular on surgical instruments
Session 3: RFID and New Business Models
Speaker: HyoungJun Kim, ETRI Korea 
Title of Presentation: Mobile RFID services and its business impacts

RFID might be an important enabler for a wide range of new applications in different domains, asset management, access control, product authentication, wireless commerce and supply chain management –to mention some. As different flavors of RFID technology network-connects more and more items, in addition to becoming an important part of distributed business processes, it will have an impact on local and global communication patterns and service needs. This opens an interesting business opportunity for Telecom operators, however, different applications of RFID have very different characteristics and the best role for the telecom operator is not obvious. There are important issues related to value chains and business models that make the Telecom approach to these markets challenging.
Speaker: Bjørn Thorstensen, Telenor R&D 
Title of Presentation: RFID, applications and business models – the Telco perspective

RFID might be an important enabler for a wide range of new applications in different domains, asset management, access control, product authentication, wireless commerce and supply chain management –to mention some. As different flavors of RFID technology network-connects more and more items, in addition to becoming an important part of distributed business processes, it will have an impact on local and global communication patterns and service needs. This opens an interesting business opportunity for Telecom operators, however, different applications of RFID have very different characteristics and the best role for the telecom operator is not obvious. There are important issues related to value chains and business models that make the Telecom approach to these markets challenging.
Speaker: Alain Pfeffer, France Telecom 
Title of Presentation: RFID, gateway to M2M (machine to Machine)

As incombent telecom operators search for new growth levers, M2M (machine to machine) opens an era of new services.

RFID tag, implemented on the object, on the field, is the entry point to M2M loop.

Therefore, France Telecom, adding to telecom traffic activity, develops new business models within its next strategy:
  • Sell and provide solutions and services (consulting, integration, hosting) allowing new process to customers to go live and get new value from Information and Communication Technologies,
  • Implement all purpose M2M platform, allowing open and valued connectivity,
  • Develop local radio engineering enabling pervasive computing
Speaker: Ichiro Kase, Senior VP, R&D Dept., NTT Comware Corporation 
Title of Presentation: RFID's three application models: Location Identification, Products Traceability & Personnel Tracking

This presentation discusses RFID's future possibility for new types of applications. Three types of application models will be provided. For positioning application model, trial project for supporting handicapped peoples' walk in Kobe Japan will be presented. For SCM model, as an actual example, ladies' shoes inventory management system using RFID, which has been already introduced in Japanese major department stores, such as Mitsukoshi, Hankyu and Takashimaya, will be presented. For presence management model, application of RFID for tracking person in a building for security and navigation will be presented.
Session 4: Security Issues on RFID
Speaker: Mr. Kyo-Il Chung, ETRI 
Title of Presentation: Security issues in RFID and Sensor Network

In this talk, I will talk about the security issues in RFID technology. First, I will start this talk by introducing what kinds of security threats are possible in RFID environment and then introduce the current efforts how we can overcome such security threats. In research community, development efforts of security technology for RFID are mainly focused on the RFID tag and reader. However, the advent of Networked RFID requires that we should consider the RFID infrastructure such as middleware, IS and other back-end RFID infrastructure to provide security in RFID environment.

I will also introduce the security issues in wireless sensor network. The sensor network that is composed of sensor nodes raises security and privacy problems. Because of the limited computation and communication power of sensor nodes, conventional security mechanisms are hardly applied to sensor networks. So we need to develop an efficient security schemes to make sensor network secure. We will discuss about these mechanisms.
Speaker: Dr. Matthew Robshaw, France Telecom Research and Development 
Title of Presentation: Authentication and privacy capabilities suitable for RFID

In this presentation we give an overview of the state of the art of cryptographic deployment on resource constrained devices. In particular, we highlight promising trends in the design and deployment of cryptographic techniques that might be suitable for the most extreme computational environments.
Speaker: Gildas AVOINE, EPFL, Lausanne, Switzerland 
Title of Presentation: Malicious Traceability within RFID Systems

This presentation will address the security and privacy issues in Radio Frequency Identification (RFID). The great achievement that RFID has made today, lies essentially on the willingness to develop low cost transponders, called tags. However, such tags have limited capabilities, bringing so many questions with regards to RFID's potential and limitations. In this talk, we will briefly introduce the security and privacy threats, and we will classify and analyze them. Then we will focus on one of these threats that is the malicious traceability. We will see how tags can be used to track people and the existing countermeasures. Then we will describe the link between malicious traceability and communication model. In particular, we will show why security considerations must be kept in mind when designing a collision-avoidance protocol.
Session 5: Networking Architecture and ubiquitous Networks
Speaker: Henri Barthel : EPCglobal 
Title of Presentation: The EPCglobal Network Architecture

Radio Frequency Identification (RFID) is globally recognised as a technology that has the potential to transform and to dramatically improve the way business is conducted. In itself, RFID is just a technology enabling efficient data capture. The business improvements will be derived from the extraordinary changes in the access to data and the communication of information between companies.

The EPCglobal Architecture provides a comprehensive approach to data capture and data exchanges and is based on the three following layers:
  • EPC Physical Object Exchange. The EPC physical object exchange standards are designed to ensure that when one organisation delivers a physical object to another organisation, the latter will be able to determine the EPC of the physical object and interpret it properly.
  • EPC Data Exchange. The EPC data exchange standards provide a means for one organisation to share data about EPCs with another through direct peer-to-peer interaction, and also provide access to EPCglobal Core Services and other shared services that facilitate these exchanges.
  • EPC Infrastructure. The EPCglobal Architecture Framework defines interface standards for the major infrastructure components required to gather and record EPC data, thus allowing organisations to build their internal systems using interoperable components.
Speaker: Mallik Tatipamula & Monique Morrow / Cisco 
Title of Presentation: RFID – An IP Networked Application

In this presentation, we discuss the following:
  1. Evolution of network - From Internet of computing devices to internet of things
  2. How intelligence moving into the network?
  3. What is Intelligent network foundation for RFIDs
  4. QoS and Security considerations
  5. Discuss various network architectural framework for passive and active RFIDs, including information flows for asset tracking and supply chain examples
Speaker: Mr. Yong-Woon KIM, ETRI 
Title of Presentation: Networked ID Applications and Standardization Issues

There are lots of identification schemes in the real world as well as the cyber world. Some identification codes like EAN.UCC codes are applied to physical objects for identification. Each physical object may be associated with a logical object such as a text content, application program, mobile executable code, or data record. Herein a relationship between physical and logical objects should be maintained. Such a relationship makes a wide variety of business opportunities and as results a lot of ID-based applications and services have been exploited so far. They have been adopted and deployed usually in various business fields. But nowadays they are emerging toward human end-users.

The presentation will cover existing use cases of ID for both business and customer purposes, a brief of different service requirements for those usages, example network configurations, evolution of the network configurations and expected standardization issues.
Speaker: Toshihisa Kamemaru, Mitsubishi Electric Corporation 
Title of Presentation: The interferences among passive type UHF-RFID systems in dense environment, - Analysis and Proposals

The passive type UHF-RFID tags and readers may cause serious interferences between them, especially reader-to-reader and reader-to-tag, when their systems are widely deployed with high density. In this presentation I will report the results of our logical analysis on distance dependency and the measurements of mutual interferences between the RF-ID systems of typical RFID models. The results showed that the critical distance between readers using the same frequency is about 10 km and the critical distance between tags and reader is about 100 m.

Then the discussions were made on several interference avoidance methods:
  1. Time separation based methods: Conventional LBT Method and Improved LBT Method. Improved LBT Method is a proposed method and it can avoid interference when the conventional LBT cannot moderate them.
  2. Frequency separation method between reader-send and tag-send-back signals: Miller Subcarrier Method and Send Send-back Channel Separation(SSCS) Method. For Miller Subcarrier Method tags should be implemented Miller code function, On the other hand, SSCS Method doesn’t require tags to have the complicated factions as the Miller Subcarrier tags have, and can be applied to all types of tags.

As the conclusion, we propose that it is effective for passive-type RFID systems to employ the combination of Improved LBT Method and SSCS Method in dense environment.
Speaker: Martin Glänzer, Siemens AG 
Title of Presentation: Self-Organizing Sensor & Actuator Networks

SOSAN is a Self Organizing Sensor & Actuator Network. To demonstrate such a Network, we have built a Demonstrator. This Demonstrator has four components.
  • LPR (Local Positioning Radar) system to measure the Distance between the Sensor notes.
  • A Sensor Module to measure Sensor values. In this Demonstrator we Measure Temperature.
  • A Communication Module. Because this Demonstrator was build to demonstrate the algorithm and not low power consumption or small size, we use a standard 812.11b WLAN card.
  • A central calculation unit. We use a PC-104.

The system has following features:
  • Self Organizing. There is no configuration effort. All organizing is done decentral by the Network.
  • Time synchronization
  • Estimate position of the sensor notes
  • Multi-Hop Geo-Routing to cover large areas
  • Robot Interface
  • AR (Augmented Reality) Interface

At least, we have Integrate SOFIS (Siemens Oberflächenwellen Ident System) into the System. SOFIS is an energy autarky ID system based on surface acoustic waves. SOFIS has the following features:
  • Measure additional sensor features like temperature, pressure, strain, torsion and gauge
  • Measure objects with high velocity
  • High temperature (750 degree F / 450°C)
  • Identification in harsh environment
  • Forgery protection
  • Long range
Session 6: Future trends in NRFID and Ubiquitous Networks
Speaker: Noboru Koshizuka, Associate Professor, The University of Tokyo 
Title of Presentation: Ubiquitous ID Center

Ubiquitous computing and ubiquitous networks with NRFIDs are novel and innovative technologies that will be able to make a new market. In Japan, we have already tried various new applications and services using these technologies such as location-aware information services, food communication services, and product information tracing services. The most important feature of these services is that they are not B2B services but B2C or C2C services. Another point is that these services aim to increase the security and safety of our daily lives. To support these new services, Japanese government has several plans to facilitate the national infrastructure for ubiquitous information services using NRFID. Concretely, we have already started a national project to embed a huge number of RFIDs and RF/IR beacons into public spaces such as national roads, resort areas, and business quarters. These tags will be based on international open standards such as Ubiquitous ID Standard, and anyone can use these tags for their commercial ubiquitous information services. In this talk, we show the innovative technologies related to NRFID, novel applications and services based on these technologies, and national plans for deployment of NRFIDs all over the Japan land. Lastly, we will clarify the importance of standardization for these future trends.
Speaker: Kang Lee, NIST 
Title of Presentation: Integration of RFID with Smart and Wireless Sensor Networks

Sensors are ubiquitous. Industry is fast moving toward employing networked, digital, and wireless communications technologies for sensors. Using wireless connectivity for sensor networks increases the flexibility in deployment and reconfiguration and thus reduces the overall infrastructure cost. These advantages will enable sensor networks to monitor complex environments for applications ranging from industrial automation to battlefield surveillance to environment monitoring to telemetry of first responder’s health condition. RFID are going to play a key role in automated universal identification system for accessing, securing, and tracking assets, personnel, equipment, products throughout the supply chain. Combining RFID devices and sensors could expand the overall functionality and capability of the above applications. IEEE is currently developing a suite of smart and wireless sensor standards, IEEE 1451. This set of standards will make it easier for transducer manufacturers to develop smart devices and to interface those devices to networks, systems, and instruments by incorporating existing and emerging sensor and networking technologies. We are exploring effective integration of RFID and smart and wireless sensor networks in a standard fashion aiming to facilitate interoperability.
Speaker: Daniel Evers, Siemens AG, Corporate Technology 
Title of Presentation: RF ID and Smart Tags - Vision & Trends

RF ID technology can be divided basically into two segments: Low-cost systems for the mass market and advanced tags for special application scenarios, where more functionalities than pure identification are required. Following this way, it becomes obvious that RF ID and wireless sensors are quite similar and strongly related.
Siemens Corporate Technology is working intensively in the research field of advanced RF ID systems. “RF ID and Smart Tags - Vision & Trends” will give an overview over those research activities dealing with advanced functionalities and capabilities like robustness against temperature and mechanical stress, high reading distances, localization features or the combination of RF ID and sensors.
Focus of the presentation will be a view on technological approaches as well as on applications containing tags with key features like self-powering capabilities, miniaturized form factors and tag localizing.
Examples of research projects will be shown, where those technology approaches are already implemented. A main content of Corporate Technologies future work in the RF ID sector will be to apply those already approved methods within advanced “Smart Tags”.
Speaker: Laurent Sciboz (HEVs –University of Applied Sciences) 
Title of Presentation: Future trends for the applications, viewpoint based on future technologies

Radio-equipped microchips permeating the environment, RFID tags are erasing the barrier between bits and atoms. Information is becoming embedded in things through powerful and invisible software applications.
For example, some applications will include tags on living beings, which are already beginning to emerge, with tagged wristbands on patients in a hospital. Moreover, many applications will allow wallet phones to receive information from RFID readers. This feature can be used to get store information, context-advertisement, cultural knowledge etc… For any of these business models, the right solution must integrate RFID technology with robust, efficient and innovative software applications.
Session 7: Panel on an RFID Standardization Roadmap


Top -  Feedback -  Contact Us -  Copyright © ITU 2007 All Rights Reserved
Contact for this page : TSB EDH
Updated : 2006-11-22