• Title/Summary/Keyword: RFID

Search Result 3,746, Processing Time 0.031 seconds

Promotion Strategy of Item Level RFID by Demand Analysis (Item Level RFID 수요분석을 통한 활성화전략)

  • Park, Yong-Jae;Rim, Myung-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.837-840
    • /
    • 2009
  • In recent years, Item Level RFID market, attaching RFID instead of barcodes to individual units for item rather than box and pallet units, is expected to expand both domestically and internationally in the future. In this study, by analyzing the demand for Item Level RFID services which apply RFID to the individual units, we would like to come by strategies that promote and develop RFID industry. This study consists of the following contents. First, we analyzed trends in domestic and overseas markets of Item Level RFID. Second, we surveyed the RFID demanding companies and analyzed Item Level RFID promising service sector, the expected leading field of market, the leading field of dissemination, and the obstacles of its introduction. Finally, on the basis of the results of the empirical study, we presented the strategies to promote Item Level RFID.

  • PDF

A Study on Secure Matrix-based RFID Authentication Protocol (행렬기반 RFID 인증 프로토콜에 대한 연구)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.83-90
    • /
    • 2006
  • Recently, the security for RFID/USN environment is divided into network security and RFID security. The authentication protocol design for RFID security is studied to protect user privacy in RFID system. However, the study of efficient authentication protocol for RFID system is not satisfy a security for low-cost RFID tag and user privacy. Therefore, this paper proposes a secure matrix-based RFID authentication protocol that decrease communication overhead and computation. In result, the Matrix-based RFID authentication protocol is an effective authentication protocol compare with HB and $HB^+$ in traffic analysis attack and trace location attack.

  • PDF

Case Study for RFID Applications from Business Model Perspective (RFID 응용 사례 연구 : 비즈니스 모델 관점)

  • Joung, Seok-In;Kim, Dae Shik
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.1
    • /
    • pp.197-216
    • /
    • 2013
  • Despite the vast potential opportunities of RFID technology in various industrial applications, deployment of RFID applications is rather limited to meet a large industrial demand in Korea. We conducted in-depth case study to organize the RFID applications in business model framework in order to provide practical insights for the development of innovative RFID applications. Throughout extensive searching for RFID applications in literature, web, news, and policy reports, we first classified passive RFID applications, mobile RFID applications, and active RFID applications. Value creation and implementation issues are compared and analyzed for each of RFID applications using Afuah and Tucci business model. This study can contribute in establishing future development of RFID technology, competitive business strategy, and government policy to stimulate Korea RFID industry.

An Interactive Learning using Wearable Wireless RFID Glove (무선 RFID 장갑을 이용한 인터랙티브 학습)

  • Jung, Kyung-Kwon;Hyun, Kyo-Hwan;Lee, Hyun-Kwan;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.721-724
    • /
    • 2007
  • Radio Frequency IDentification (RFID) is increasingly popular technology with many application. The majority of applications of RFID deployed in supply-chain management. In this paper, we present a wireless RFID glove in interactive learning method. Objects tagged with a small passive RFID tag, can be sensed at short ranges by using wireless RFID glove. We describe the wireless RFID glove prototype, and present some interactive learning programs and games.

  • PDF

Development of an Reader Framework for Transparency in RFID Reader (RFID 리더 투명성 지원을 위한 리더 프레임워크 개발)

  • Baek, Sun-Jae;Moon, Mi-Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.404-412
    • /
    • 2011
  • More recently, variety RFID (Radio Frequency Identification) readers are produced by RFID equipment manufactures. Although a transmission standard instituted by EPCglobal is proposed for data transmission between the RFID readers and tags, other RFID reader protocols and the communication connection methods are be in use in other RFID companies. To replace or add the RFID readers of an RFID system, the developers should make changes to the core of the application and/or middleware. In this paper, we propose an RFID reader framework which can manage RFID readers without having to make changes the code of the application in environment with the growing number of heterogeneous RFID readers.This framework that sits on the layer between the RFID readers and the applications provides transparency to the RFID readers. Additionally, it can be used for monitoring the state and the property of all connected RFID, and for recording the RFID tag event logs and system logs. By using this framework, heterogeneous readers can be replaced and added without writing additional code in the applications. Consequently the readers can be easily managed and controlled by the RFID system administrator.

A Simulation Model for the Creation of RFID Business Events (RFID 비즈니스 이벤트의 생성을 위한 시뮬레이션 모델)

  • Ryu, Wooseok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2609-2614
    • /
    • 2013
  • Adoption of RFID has become widespread including logistics, drug supply-chain, and healthcare. To adopt RFID, we need to evaluate performance and feasibility of RFID S/W such as EPC Information Service (EPCIS), which demands a variety of test datasets of RFID business events. This paper proposes a novel method for creating RFID business events dataset by means of the simulation of RFID infrastructure. Proposed model provides a flexible representation capability since this is based on well-known petri-net. In addition, it can also be useful when determining adoption of RFID as it supports simulation of RFID environment.

2-Level Business Process Family Model for RFID-enabled Applications (RFID 애플리케이션을 위한 2-레벨 비즈니스 프로세스 패밀리 모델)

  • Moon, Mikyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.422-425
    • /
    • 2009
  • RFID (Radio Frequency IDentificaiton)는 태그, 레이블, 카드 등에 저장된 데이터를 무선 주파수를 이용하여 리더에서 자동 인식하는 기술이다. RFID 애플리케이션은 RFID 태그의 실시간 정보를 기반으로 하는 업무 프로세스를 의미하는 것으로, RFID 정보를 이용하기 위해서는 기존의 비즈니스 프로세스가 변형되어져야 한다. RFID 미들웨어로부터 발생하는 저수준의 RFID 이벤트를 다양한 정보 서버들을 참조하여 고수준의 이벤트로 변환시키기 위한 일련의 활동(activity)들을 대부분의 RFID 애플리케이션에서 공통으로 수행하기 때문에 이러한 활동들을 재사용 될 수 있는 핵심자산으로 만들어놓을 필요가 있다. 본 논문에서는 다양한 유형의 RFID 애플리케이션에 재사용될 수 있는 RFID 관련 활동들을 RFID 제네릭 (generic) 활동으로 구분하고 이를 이용하여 2-레벨의 비즈니스 프로세스 패밀리 모델 (Business Process Family Model: BPFM)을 구축하는 방법을 제시한다. 상위 레벨의 RFID 제네릭 액티비티들은 두번에 걸쳐 가변치가 결정될 수 있는 가변점을 가지게 된다. 하위 레벨을 구성하는 도메인 활동들은 그 자체의 가변속성 뿐만 아니라 활동의 흐름에서 나타나는 다양한 형태의 가변요소들을 표현하게 된다. 이러한 2-레벨 BPFM을 이용함으로써 RFID 시스템 도입 시 처리해야 하는 활동들의 개발 양을 현저히 줄일 수 있다.

  • PDF

Analysis of RFID Standard Patent Data for RFID Technology Trends (RFID 표준특허 데이터 분석을 통한 RFID 기술 동향)

  • Rho, Seungmin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.2
    • /
    • pp.185-190
    • /
    • 2014
  • RFID technology as a typical convergence technology combines RFID communication, mobile communication and network infrastructure, and information processing technology. As it enables users to communicate with the surroundings, RFID technology is now recognized to serve as the basis technology for the ubiquitous information society where users can get the needed information anytime and anywhere. Through lots of efforts for the early technology development and standardization activities on RFID technology, Korea has been leading technology standardization as well as technology initiatives. Thus in this paper, we discuss the RFID technology trend by analyzing RFID standard patent data which is declared in international organization for standardization (ISO, IEC, ITU). Especially, we analyzed 906 standard patents data that declared in International organization for standardization (SO, ISO/IEC JTC1, ITU-T) on June 2013.

A method for various RFID reader processing based on Ontology (온톨로지 기반 다양한 RFID 리더 처리 방법)

  • No, Young-sik;Byun, Ji-Yoong;Yang, Moon-seok;Cha, Ji-Yun;Byun, Yung-cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.579-582
    • /
    • 2008
  • Since there are a lot of researches regarding RFID nowadays, the idea of RFID Middleware has great popular appeal to improve the efficiency of most use the data from RFID Readers. Even though, there are many RFID Middleware products and solutions in the developing processing, there are unsatisfied researches to manage RFID equipments effectively. In this paper, highly recommends a solution to support various RFID Readers from ALE-complient RFID Middleware in an efficient path of constructing Middleware Connection Information and data protocol form various RFID Readers as an ontology metadata. Therefore, not only reuses of RFID Reader Ontology, but also, by adding the ontology regarding additional RFID Reader and protocol data as a Middleware in a near future, it is able to extend to be treated easily.

  • PDF

A Survey of RFID Deployment and Security Issues

  • Grover, Amit;Berghel, Hal
    • Journal of Information Processing Systems
    • /
    • v.7 no.4
    • /
    • pp.561-580
    • /
    • 2011
  • This paper describes different aspects of a typical RFID implementation. Section 1 provides a brief overview of the concept of Automatic Identification and compares the use of different technologies while Section 2 describes the basic components of a typical RFID system. Section 3 and Section 4 deal with the detailed specifications of RFID transponders and RFID interrogators respectively. Section 5 highlights different RFID standards and protocols and Section 6 enumerates the wide variety of applications where RFID systems are known to have made a positive improvement. Section 7 deals with privacy issues concerning the use of RFIDs and Section 8 describes common RFID system vulnerabilities. Section 9 covers a variety of RFID security issues, followed by a detailed listing of countermeasures and precautions in Section 10.