Executive Briefings
Partners

RFID Systems

The systems interface aspects of RFID are very similar to bar codes but the applications that RFID offers means that there are far more opportunities to interface RFID technologies with other real world systems to provide an apparently intelligent system because the need for human intervention for the read process is almost eliminated. RFID does offer true automation as has been demonstrated in many manufacturing applications. By reading a unique number from a tag on an item, computer applications can be built that take this automatically captured number and use it to perform some other automatic function, be it to let the item pass through a barrier, divert it on a production line or have a robot perform some function such as fitting another item. The opportunities for automation are enormous.

Applications

Photo showing an RFID system

There are currently many applications for RFID outside the simple theft protection systems mentioned earlier where bar codes would just not be a viable option. Here is a selected non-exhaustive list of some of the common existing applications and some future application developments:

  • Access control for people; there are many areas where RFID tags are carried by people to allow them to gain access to facilities or services:
    • Secure access to work place
    • Safety access to dangerous/secure equipment
    • Access to a computer or vehicle
    • Access to travel on trains/buses
    • Access to ski lifts at ski resorts or leisure facilities at theme parks etc.
  • Access control for vehicles:
    • Secure access on site
    • Road tolling
  • Manufacturing automation:
    • Control of flexible manufacturing processes by recognising items being built on a production line
    • Labeling key components for later recycling
  • Logistics and distribution:
    • Tracking parcels from shipment to end customer
    • Tracking goods from manufacture through to retail
  • Retail:
    • Supply chain management
    • Stock taking
    • Reducing loss through theft
    • Identification of goods for warranty
    • Reverse logistics
    • Product availabiility
  • Maintenance:
    • Plant & Equipment
    • Fixed assets
    • Patients
  • Product security:
    • Tamper evidence
    • Product authentication

Back to RFID Technology

 

Microsoft
Cable & Wireless
Cisco Systems
Oracle
Dell
SAP
Exel
MotorTag
Cranfield University
BRE