Resources
Identity Use Cases & Scenarios.
FIDIS Deliverables.
Identity of Identity.
Interoperability.
Profiling.
Forensic Implications.
HighTechID.
D3.1: Overview on IMS.
D3.2: A study on PKI and biometrics.
D3.3: Study on Mobile Identity Management.
D3.5: Workshop on ID-Documents.
D3.6: Study on ID Documents.
D3.7: A Structured Collection on RFID Literature.
D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
D3.10: Biometrics in identity management.
D3.11: Report on the Maintenance of the IMS Database.
D3.15: Report on the Maintenance of the ISM Database.
D3.17: Identity Management Systems – recent developments.
D12.1: Integrated Workshop on Emerging AmI Technologies.
D12.2: Study on Emerging AmI Technologies.
D12.3: A Holistic Privacy Framework for RFID Applications.
D12.4: Integrated Workshop on Emerging AmI.
D12.5: Use cases and scenarios of emerging technologies.
D12.6: A Study on ICT Implants.
D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
D12.10: Normality Mining: Results from a Tracking Study.
Privacy and legal-social content.
Mobility and Identity.
Other.
IDIS Journal.
FIDIS Interactive.
Press & Events.
In-House Journal.
Booklets
Identity in a Networked World.
Identity R/Evolution.
D3.7 A Structured Collection on Information and Literature on Technological and Usability Aspects of Radio Frequency Identification (RFID)
RFID tags are essentially radio transponders, i.e. they can receive and transmit using radio waves. Whilst all RFID tags at the basic level are used to store and transmit data, the variations in RFID tags are mainly due to their specific application. The application may dictate that the tag has to be readable over a certain range, and that will in turn dictate the technology just to transmit data and the amount of data it can store. These factors have a further bearing on the form factor (i.e. shape and size) of the tags themselves. Typically the most decisive element of the tag is the aerial – greater reading range will generally require an aerial with a larger surface area. With applications such as smart cards, a large flat area exists which can house a suitable aerial. However, in other applications such as RFID tags used for medical identification, the size is of importance and as such the useable range is limited. In some cases this is a desirable feature which helps in increase the security of the device.
In case readers cannot receive the signals of tags e.g. placed on various products on a palette, repeater tags can be used. These tags simply act as a kind of proxy. They are powered with a battery and are able to receive and resend signals from other tags. Using repeater tags shielding can be circumvented and weak signals of tags in farer distances can be amplified.
|
|
|
Denis Royer | 8 / 46 |