ECE1770 - PowerPoint PPT Presentation

About This Presentation
Title:

ECE1770

Description:

... is a means of identifying a person or object using a radio frequency transmission ... Retail (Consumer Goods) Walmart, Metro. Defence US DoD suppliers ... – PowerPoint PPT presentation

Number of Views:21
Avg rating:3.0/5.0
Slides: 19
Provided by: Charli100
Category:
Tags: ece1770

less

Transcript and Presenter's Notes

Title: ECE1770


1
ECE1770
RFID Middleware
Eric Yu Feb.12th.2007
2
Agenda
  • Introduction
  • Application
  • Standard
  • EPCglobal Network
  • RFID Infrastructure
  • Application Level Events
  • RFID Middleware Function
  • Challenge

3
A Basic Definition
  • Radio Frequency Identification (RFID)
  • An automatic identification technology that
    relies on radio waves to encode and decode
    information on a microchip or other storage
    device. RFID allows computer systems to capture
    data stored on a special tag without direct
    contact or line of sight acquisition
  • In general terms,RFID (Radio Frequency
    Identification )is a means of identifying a
    person or object using a radio frequency
    transmission

4
Business and Technical Driven
  • Technology Driven
  • Ubiquitous computing system
  • Business Driven
  • RFID technology is used today in many
    applications, Organizations in Retail, Defense,
    Transportation, Healthcare and other industries
    are increasingly employing RFID technology to
    bring new efficiencies to supply chains, track
    assets, ensure product quality and consumer
    safety, protect the integrity of their brands,
    promote security and more

5
Applications
  • Transit Systems Cashless transit fares
  • Airlines Baggage, asset management
  • Logistics Ships, trucks, trains
  • Parcels Fedex, UPS, DHL (2004)
  • Retail (Consumer Goods) Walmart, Metro
  • Defence US DoD suppliers
  • Healthcare Pharmaceuticals, patient tracking
  • Agriculture Live stock tracking, perishables
  • Lifestyle Amusement Parks, Speedpass(Esso)
  • Security Personnel, Assets

6
How RFID works
7
EPCglobal
  • Joint venture of Uniform Code Council (UCC) and
    EAN International
  • Over 100 end-user and technology provider
    companies
  • Public support from Metro, Wal-Mart, TESCO, US
    Dept of Defence
  • Sets standards for
  • Electronic Product Code
  • Passive RFID Systems
  • Software Interfaces
  • Worldwide EPC network servicesEPCglobal is the
    standard for supply chain RFID
  • EPCglobal provides a migration path from existing
    industry practice
  • EPCglobal is supported by major supply chain
    partners
  • Standards rapidly becoming available but still a
    lot to do

8
The Elements of EPCglobal
9
EPC Infrastructure
10
EPC Infrastructure
  • Middleware allows companies to process relatively
    unstructured tag data taken from many RFID
    readers
  • Direct it to the appropriate information systems.
  • It is able to perform many different operations
  • Monitor the RFID reader devices
  • Manage false reads
  • Cache data
  • Filter Data
  • Query an Object Naming Service (ONS).

11
EPC Infrastructure
12
EPC Infrastructure
13
RFID Middleware Structure
  • Tag Data Standard / Air Interface
  • Designed to process the streams of tag or sensor
    data
  • Accommodates different reader vendors
  • ALE (Application Level Events)
  • Application interface to filter, aggregate,
    reduce the volume of data prior to sending events
    to the back end business application
  • Standardizes interfaces between readers, ONS,
    XML, and Enterprise Applications
  • EPCIS (EPC Information Services)
  • Recording and exchange of business-level EPC data
    (PML)
  • Describe how the EPC information can be stored
    and accessed via the Network

14
ALE (Application Level Events)
  • Provides a means for clients to specify, in a
    high-level, declarative way, what EPC data they
    are interested in.
  • Provides a standardized format for reporting
    accumulated, filtered EPC data that is largely
    independent of where the EPC data originated or
    how it was processed.
  • Abstracts the sources of EPC data (e.g., Readers,
    Barcode scanners) into higher-level notions
    of"location", thus hiding from clients the
    details of exactly what physical Readers were
    used to gather EPC data from a particular
    location

15
ALE Security
  • Identification and Authentication
  • The ALE service provider must identify the
    clients and authenticate to prevent illegal
    clients access the service.
  • Data Transport Protection
  • In order to protect the data transported between
    ALE service provider and clients the ALE. service
    provider build the security functions for the
    integrity, confidentiality, freshness and so on.
  • Service Access Control
  • Unauthorized users may try to access the ALE
    service (e.g., stored tag data ALE service
    configuration, reader management, middleware
    resource management, notification report
    accepter) and it brings the untrusted and
    confused e-business application systems.

16
RFID Middleware Function
  • Reader Management
  • support various means to deploy, monitor and
    issue commands to readers via a general
    interface.
  • Data Management
  • filter and summarize operation data
  • Application Integration
  • deliver the tag reads to back-end system
  • Rule and exception processing
  • provides the environment that users set the
    rules in order to generate the business dependant
    semantic events based on the tag reads.

17
RFID Middleware Function
  • Process Management
  • Not just routes RFID data to enterprise
    applications but also actually orchestrates
    end-to-end processes that touch multiple
    applications or legacy systems.
  • Share of data with partners and other
    applications
  • provide the ways to share the information about
    individual tagged object and related business
    descriptions with the trading partners and other
    applications
  • Real Time
  • Managing data through real time collection and
    process real-time execution and controlling.

18
Challenge
  • Security
  • High-Value Data
  • Generic Protocols and Facilities
  • Back-End Databases
  • Scalability
  • Lots of Source Code
Write a Comment
User Comments (0)
About PowerShow.com