RFID Tags Information
Image credit: Silicon Angle; Easi-Card; Mobile Mag
RFID tags are small, electronic devices which are used to wirelessly identify and track physical articles through its radio frequency interaction with RFID readers. Each tag consists of at least an integrated circuit and an antenna.
RFID Tag Operation
RFID tags are used to label various assets with a unique electronic signature which can be encoded and read by other RFID equipment. This information is stored on non-volatile memory. Tags are frequently provided an Electronic Product Code, a 96-bit string of data which identifies the tag's protocol, the organization which manages the tag, asset identification, and tag serial number. Readers register the EPC of the tag and ensure its accuracy through the use of an error correcting code algorithm. The EPC is an ambitious attempt to provide every item in the world with a unique code to track it in global database.
Video credit: Explania
These tags can be routinely scanned to determine the accompanying specimen's location, as well as other information such as name, ownership, transaction account, or environment. RFID tags do not need to be within the line of sight of an RFID reader, and can be placed well within the package or object as long as any RF signals remain unhindered. RFID tags can be implemented in hostile environments, and RFID readers can usually scan several hundred tags at once if supplied with anti-collision technology.
RFID tags are virtually limitless in application, which is somewhat alarming due to the ability for chips to become corrupted or used to invade privacy. As such, many RFIDs support encryption. RFID tags are also assigned an operational identity to prevent the tag from being misused.
Read-only tags have a factory-programmed serial number which cannot be altered, and therefore cannot be misread or corrupted. A complementary internal database can be used to add supplemental information to the serial number.
Read/write tags can have the inherited information rewritten or altered by a system user and chip reader. This information is stored in the memory of the tag chip.
Write-once tags can be assigned an identity by a system user only once, but it can be read many times.
Active vs. Passive Tags
RFID tags contain, at minimum, two components: an antenna to collect and radiate an RF signal; and an integrated circuit which stores and processes the tag identity, modulates the corresponding RF signal, and collects power from electromagnetic waves for passive RFID chips. Passive chips are not linked to a battery, instead relying upon the ability of the antenna to perceive enough electrons from the radio frequency to charge the circuit and return its own radio frequency. Passive chips can be very small, cheap to produce, and do not need to be routinely replaced or maintained. However, the energy needed to initially charge the circuit must be threefold the energy that is needed to maintain communication. Relatedly, the range of a passive RFID tag is less than several feet, with can be both a design benefit (such as in credit cards) or drawback (such as in warehouse inventory).
Image credit: Intech Open
Active RFIDs incorporate a battery which powers the circuit continuously. Some RFIDs transmit the ID signal periodically (active), while others wait for a reader to interrogate the tag before radiating its signal (semi-active). While an active RFID will eventually need battery replacement, the overall levels of interference and radiation are lower than in a passive RFID. Active RFIDs can also provide a range of several hundred feet.
The frequencies at which the reader and tag communicate are represented in the table below. Low and high frequency tags utilize the magnetic field to transfer power by induction, and this signal is well-defined but rather weak. Ultra-high and microwave frequency RFID tags use the electric field for power transfer by propagation, which has excellent range, but the reading for some tags is more ambiguous.
|Band||Range||Data speed||Common uses|
|120—159 kHz (low frequency)||10 cm||Low||Animal identification; factory data collection; auto keys|
|13.56 MHz (high frequency)||10 cm—1 m||Low to moderate||Smart cards; shelf inventories; transactions|
|433 MHz (ultra-high frequency)||1—100 m||Moderate||Defense applications; tracking pallets|
Eurasia: 865—868 MHz (ultra-high frequency)
North America: 902—928 MHz (ultra-high frequency)
|1—12 m||Moderate to high||Inventory; hard-to-read RFID applications|
|2450—6800 MHz (microwave)||1—2 m||High||802.11 WLAN, Bluetooth standards|
|3.1—10 GHz (microwave)||>200 m||High||Road toll accounts|
RFID tags pertaining to low and high frequencies are usually passive or semi-active tags. These tags are less than one full wavelength away from the RFID reader and must modulate the wave produced by the reader into a return signal. This is done by oscillating the electrical load of the tag between low and high values, which results a change measureable by an RFID reader. At ultra-high and microwave frequencies, the tag is more than a full wavelength away from the reader, and with assistance from the integrated battery it can backscatter or transmit a response on a related frequency.
Image credit: Enigmatic Consulting
Occasionally, multiple tags will be perceived by an individual RFID reader, potentially overloading the reader and making it impossible to decipher a tags' individual identity. This is called tag collision. There are two ways in which readers isolate the identity of tags. Some readers utilize a slotted ALOHA relay to randomly delay each tag's response, while other readers attempt to discover each RFID tag's underlying binary code by seeking random permutations from the sample set. Both systems have drawbacks, so bulk reading is not recommended for precise inventory control. Conversely, to prevent two or more RFID readers from scanning the same chip simultaneously, frequency hopping is used. This is where the RFID readers alternate between frequencies within its bandwidth so as to limit the chances of the same tag being interrogated twice.
It is much easier for RFID infrastructure to operate in a closed system, that is, a system where items tagged with RFID never change ownership. The complete history of the RFID tag is stored within an internal database which does not need to adhere to regulated RFID standards; it is also less likely to be corrupted.
Images credits: RFID Network; RFID Library
A significant reason for the current prevalence of RFID tags and the expected increase in their utility is their exceptionally small footprint. When passive tags are employed correctly they can be nearly impossible to recognize visually. The smallest RFID tags ever created were passive tags affixed to ants to study colony behavior. They are often incorporated into merchandise in a process known as electronic article surveillance, where the RFID tag must be overwritten at the point-of-purchase to prevent an alarm at the store exit from sounding. Even active tags, which must include a battery, are usually no larger than a matchbook and are used in many shipping and cargo applications. Furthermore, RFID tags are exceptionally cheap, with most passive tags costing less than $1 USD each, and active tags costing just a few times more, where the initial expense is usually worth the investment.
RFID Tag Standards
Since each country may allocate different frequencies for RFID, the bands utilized are different around the world. As such, RFID tagging is rarely compatible with international equipment, and local and regional legislation may apply when utilizing RFID. However, the accompanying list of industrial standards are widely-accepted and should be considered, and an even more impressive expanse of standards is available through the IHS Global service store.
RFID Tag Applications
It would be impossible to name every application in which RFID has become useful. However, the following examples provide a good representation of the capabilities of RFID tags.
As a payment alternative, RFID tags can be linked to credit or bank accounts and can be scanned by an RFID reader. The transaction is complete once a private, preset PIN has been entered. These types of RFID tags are common in cell phones, key chains, poker chips, and even within credit cards themselves.
For asset tracking. Factories, warehouses, cargo operations, and delivery services regularly implement RFID tags to distribute and track cargo accurately and instantaneously. Large businesses and corporations may also tag important IT devices and electronics for quick locating. Manufacturers may keep track of assets far along the supply chain to analyze efficiency.
Tags are regularly incorporated in merchandise to help retailers maintain an accurate inventory, as well as speed up the locating of particular items. It has been speculated that RFID chips may one day replace barcodes since hundreds of tags can read read at once.
RFID tags are frequently inserted into ID badges and electronic keys. This allows selective access to locked doors and areas without the need to exchange or keep track of mechanical keys.
RFID tags are occasionally affixed to humans. It is a common practice on oil rigs to tag important personnel so they can be found quickly in the event of an emergency.
Within passports, RFID tags allow the passport to be read digitally and the individual is assessed against a database to determine entry.
RFID tags are frequently placed in cars so drivers do not have to come to a stop to pay a toll. Similar measures have been used for buses and trains.
Animal identification is a common usage of RFID tags. They are used to identify livestock, as well as assist in locating of missing pets.
Hospitals have considering using tags to offer an immediate electronic history of the patient without the need for an accompanying physical record.
Many races (foot, automotive, etc.) use tags to provide an exact readout of race times.