RFID (Radio-frequency identification) Technology

RFID INTRODUCTION:
.

RFID stands for Radio Frequency Identification, a technology with its roots in World War II. Today, Ultra-High Frequency (UHF) RFID is emerging as a premier technology for automating the
identification and tracking of commodities and collecting valuable information on their whereabouts, contents, physical state and more. Organizations in Retail, Defense, Transportation, Healthcare and other industries are increasingly employing RFID technology to bring new efficiencies to supply chains, track assets, ensure product quality and consumer safety, protect the integrity of their brands, promote security and more.
Intelligence at the Network Edge

Among the most compelling aspects of RFID is its ability to extend intelligence to the edge of enterprise networks. RFID allows for individual items to have a unique identifier and can identify many items at once. Hence RFID can collect large volumes of actionable data each second from immense numbers of RFID-tagged items as they move across conveyors, through dock doors and even off of store shelves. As part of a network, RFID systems enable the first step towards integrating that valuable information into enterprise systems and processes where it can be analyzed and used to trigger decisions and actions.


How RFID Works:

A RFID system has several components including chips, tags, readers and antennas. In its simplest form, a small silicon chip is attached to a small flexible antenna to create a tag. The chip is used to record and store information. When a tag is to be read, the reader (which also uses an antenna) sends it a radio signal. The tag absorbs some of the RF energy from the reader signal and reflects it back as a return signal delivering information from the tag's memory.


RFID Range:

UHF RFID systems communicate using frequencies around 900MHz with a maximum read range of 10 meters (approximately 30 feet) under ideal conditions. This makes UHF RFID a promising solution for reading pallets and cartons off of conveyors or in portals from a distance. But this capability does not in any way preclude UHF from near field and near contact applications as UHF systems can be easily

tailored to meet lower range requirements. This can be accomplished by reducing power at the reader, reducing the size of the reader antenna, and/or reducing the size of the tag antenna.


RFID Tags:


RFID tags are designed and produced in a variety of shapes and sizes, dependent on application requirements. As UHF RFID has a large maximum read range to begin with, using extremely small tags for such applications as near field item level tracking (where tags may reside under bottles caps or behind product labels, for example) is promising. Applications such as pallet or case level tracking Of commodities on conveyors or passing through portals, and read from a distance, typically require larger tags.

RFID Readers:
.
RFID readers are generally composed of a computer and a radio. The computer manages communications with the network, allowing tag data to be communicated to enterprise software applications such as ERP systems. The radio controls communication with the tag, typically using a language dictated by a published protocol such as the EPC Class 1 specification. This particular protocol, one of several in use, is the most common language used by tags in supply chain applications.


Advanced RFID Readers:

Advanced readers differ from basic readers in three dimensions: remote management, reader coordination and optimal read range. First, advanced readers provide for remote management on the company network. Second, advanced readers have sophisticated mechanisms to provide for the coordination of readers when many units are used in the same environment. These mechanisms help avoid interference and provide for coordinated operations. Finally, more advanced readers have advanced receiver designs that provide for the best possible read range.
Access control system operation
When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted.
The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room but Bob does not. Alice either gives Bob her credential or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input.

 

 

RFID SOLUTIONS

By
GAO RFID Inc. Canada
One of World’s Largest Manufacturer of RFID Systems

.

DMS Pvt Ltd Pakistan, being Business Partners of GAO RFID Inc. Canada, feel proud to offer RFID Solutions as per your organization’s needs. GAO RFID offers one of the world's largest selections of RFID readers, tags and solutions.

Through intense R & D efforts and partnering with its sister companies, particularly GAO Research Inc., GAO RFID offers a complete range of RFID software including embedded software running on RFID readers, embedded software running on microprocessors and middleware and application software for PCs, servers, mobile devices and cloud computing.

GAO RFID has served over 700 customers in over 40 countries. Our customers range from SME’s to Fortune 500 companies to educational and government agencies. This experience enables our team of experienced Comp TIA RFIDTM certified professionals to understand your business's requirements and deliver the correct RFID solution in order to maximize your ROI and ensure expandability as your business and requirements grow.

GAO RFID Inc. is a member of GAO Group of Companies, headquartered in Toronto, Canada with a global presence. The company prides itself for the high quality and good value of its products and services, as well as timely support.

Solutions
.

  • RFID for Access Control
  • RFID for Asset Tracking
  • RFID and Bar Code
  • RFID for Building Management
  • RFID for Construction
  • RFID for Data Centers
  • RFID for Event Management
  • RFID for Field Service
  • RFID for Fleet Maintenance
  • RFID for Healthcare
  • RFID for Industrial Laundry
  • RFID for Returnable Transit Items
  • RFID for Industrial Painting
  • RFID for Library Management
  • RFID for Livestock
  • RFID for Manufacturing
  • RFID for Marinas
  • RFID for Oil & Gas Industry
  • RFID for Parking Control
  • RFID for People Tracking
  • RFID for Railway
  • RFID for Retail
  • RFID for Supply Chain
  • RFID for Utilities
  • RFID for Waste Management


 

 

Access Control System

 

Most organizations today require a performing and efficient access control system. There are many reasons for having such a system and these include:

1) Enhanced security to limit access to restricted areas,

2) Tracking employee activity,

3) Improve loss prevention  

4) Compliance to higher internal or government regulated security measures post 9-11 to name just a few.

There are major deficiencies in the legacy solutions that use the traditional access control systems. Barcodes, magnetic stripes, and proximity readers all rely on the user to either make contact or place the badge very close to the reader. In addition, bar codes can only be read one at a time and the respective embedded information cannot be updated. Such limitations can be cumbersome and time consuming.           

An RFID access control system can provide an easy and efficient solution. RFID badges can be read from much further distances than other traditional technologies and the embedded electronic information for each badge can be over-written repeatedly. The increased reading distance thus enables other tracking technologies like surveillance cameras to be activated in conjunction with an employee being in their vicinity. Furthermore, multiple RFID badges can be read all at the same time.

Information about employee access, attendance, and duties performed, can be easily and efficiently monitored and stored in a database. Access information can also be tied to a Windows Active Directory or LDAP for user authentication and therefore be synchronized to an authorized access scheme..

 

 

  • Locate Ware software - Access Control System


Model# 617001 (Locate Ware Access Control Software)
              

Overview – RFID Access Control Software System
.

GAO RFID Access Control Software System is an integrated access control software package that is suitable for different types of RFID access control applications. With RFID hardware and an everyday PC, the system is able to handle personnel and vehicle access control for an entire building.

Features – RFID Access Control Software System
.

  • 24 hour Unmanned Operation

Once the system is set up and configured, no additional user input is required. Access will be
 Automatically granted to those who present a valid registered RFID tag at an access point.

  • Remote Management through Web Interface

The system can be managed remotely through a Web interface. Tags and tag holders can be added, edited, and removed by the responsible staff at the head office without them having to travel to the site.
Applies to Both Personnel and Vehicle Access Control  Access to the front door, laundry room, parking lot and any other type of access point can be Controlled simultaneously in the same system.
 

 

  • Compatible with Various RFID Hardware

Passive LF, HF and UHF and semi-passive and active technologies can all be flexibly used together in the same system. A typical application is to use HF short range card tags for personnel access and UHF long range windshield tags for vehicle access.

  • Real-Time Map View

Through the software interface, the user is able to create a map for the site and monitor the activities at different access points on the desktop in real time.

  • Group Management

Tag holders can be divided into different groups. The user can specify access points each group can access, as well as different time restrictions for access.

  • Customizable Reporting

Activities are stored in the database and reports can be generated by specifying different criteria such as dates, group names, access points and tag holder names.