RFID射频识别原理外文翻译文献
- 格式:doc
- 大小:56.00 KB
- 文档页数:11
射频识别RFID中英文对照外文翻译文献中英文对照外文翻译Shrouds of TimeThe history of RFIDIntroductionMany things are hidden in the shrouds of time. The task of tracing history and genealogy is arduous and challenging, but, ultimately, rewarding. Our past can open doors to our future. Whether we realize it or not, RFID (radio frequency identification) is an integral part of our life. RFID increases productivity and convenience. RFID is used for hundreds, if not thousands, of applications such as preventing theft of automobiles, collecting tolls without stopping, managing traffic, gaining entrance to buildings, automating parking, controlling access of vehicles to gated communities, corporate campuses and airports, dispensing goods, providing ski lift access, tracking library books, buying hamburgers, and the growing opportunity to track a wealth of assets in supply chain management.One can trace the ancestry of RFID back to the beginning of time. Science and religion agree that in the first few moments of creation there was electromagnetic energy. "And God said, 'Let there be light,' and there was light" (Genesis 1). Before light, everything was formless and empty. Before anything else, there was electromagnetic energy.Scientific thinking summarizes the universe was created in an instant with a Big Bang. Scientists deduce all the four fundamental forces - gravity, electromagnetism, and the strong and weak nuclear forces - were unified. The first form in the universe was electromagnetic energy. During the first fewseconds or so of the universe, protons, neutrons and electrons began formation when photons (the quantum element of electromagnetic energy) collided converting energy into mass. The electromagnetic remnant of the Big Bang survives today as a background microwave hiss.Why is this important, you might wonder? This energy is the source of RFID. It would take more than 14 billion years or so before we came along, discovered how toharness electromagnetic energy in the radio region, and to apply this knowledge to the development of RFID.The Chinese were probably the first to observe and use magnetic fields in the form of lodestones in the first century BC. Scientific understanding progressed very slowly after that until about the 1600s. From the 1600s to 1800s was an explosion of observational knowledge of electricity, magnetism and optics accompanied by a growing base of mathematically related observations. And, one of the early and well known pioneers of electricity in the 18th Century was Benjamin Franklin.The 1800s marked the beginning of the fundamental understanding of electromagnetic energy. Michael Faraday, a noted English experimentalist, proposed in 1846 that both light and radio waves are part of electromagnetic energy. In 1864, James Clerk Maxwell, a Scottish physicist, published his theory on electromagnetic fields and concluded that electric and magnetic energy travel in transverse waves that propagate at a speed equal to that of light. Soon after in 1887, Heinrich Rudolf Hertz, German physicist, confirmed Maxwell's electromagnetic theory and produced and studied electromagnetic waves (radio waves), which he showed are long transverse waves that travel at the speed of light and can be reflected, refracted, and polarizedlike light. Hertz is credited as the first to transmit and receive radio waves, and his demonstrations were followed quickly by Aleksandr Popov in Russia.In 1896, Guglielmo Marconi demonstrated the successful transmission of radiotelegraphy across the Atlantic, and the world would never be the same. The radio waves of Hertz, Popov and Marconi were made by spark gap which were suited for telegraphy or dots and dashes.20th CenturyIn 1906, Ernst F. W. Alexanderson demonstrated the first continuous wave (CW) radio generation and transmission of radio signals. This achievement signals the beginning of modern radio communication, where all aspects of radio waves are controlled.In the early 20th century, approximately 1922, was considered the birth of radar. The work in radar during World War II was as significant a technical development as the Manhattan Project at Los Alamos Scientific Laboratory, and was critical to the success of the Allies. Radar sends out radio waves for detecting andlocating an object by the reflection of the radio waves. This reflection can determine the position and speed of an object. Radar's significance was quicklyunderstood by the military, so many of the early developments were shrouded in secrecy.Since RFID is the combination of radio broadcast technology and radar, it is not unexpected that the convergence of these two radio disciplines and the thoughts of RFID occurred on the heels of the development of radar.Genesis of an IdeaThere is an old adage that success has many fathers but failure is an orphan. The development of technology is messy. The potential for an infinite number of things is present, yet the broader human choices determine how technology evolves. There's no clear, text book perfect, or logical progression, and often developments ahead of their time are not recognized until later, if ever. So it was with the development of RFID.An early, if not the first, work exploring RFID is the landmark paper by Harry Stockman, "Communication by Means of Reflected Power", Proceedings of the IRE, pp1196-1204, October 1948. Stockman stated then that "Evidently, considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored."Thirty years would pass before Harry's vision would begin to reach fruition. Other developments were needed: the transistor, the integrated circuit, the microprocessor, development of communication networks, changes in ways of doing business. No small task. Like many things, timing is everything, and the success of RFID would have to wait a while.A lot has happened in the 53 years since Harry Stockman's work. The 1950s were an era of exploration of RFID techniques following technical developments in radio and radar in the 1930s and 1940s. Several technologies related to RFID were being explored such as the long-range transponder systems of "identification, friend or foe" (IFF) for aircraft. Developments of the 1950s include such works as F. L. Vernon's, "Application of the mic rowave homodyne", and D.B. Harris’, "Radio transmission systems with modulatable passive responder". The wheels of RFID development were turning.The 1960's through the 1980s: RFID Becomes RealityThe 1960s were the prelude to the RFID explosion of the 1970s. R. F. Harrington studied the electromagnetic theory related to RFID in his papers "Field measurements using active scatterers" and "Theory of loaded scatterers" in 1963-1964. Inventorswere busy with RFID related inventions such as Robert Richardson's "Remotely activated radio frequency powered devices" in 1963, Otto Rittenback's "Communication by radar beams" in 1969, J. H. V ogelman's "Passive data transmission techniques utilizing radar beams" in 1968 and J. P. Vinding's "Interrogator-responder identification system" in 1967.Commercial activities were beginning in the 1960s. Sensormatic and Checkpoint were founded in the late 1960s. These companies, with others such as Knogo, developed electronic article surveillance (EAS) equipment to counter theft. These types of systems are often use ‘1-bit’ tags –only the presence or absence of a tag could be detected, but the tags could be made inexpensively and provided effective anti-theft measures. These types of systems used either microwave or inductive technology. EAS is arguably the first and most widespread commercial use of RFID.In the 1970s developers, inventors, companies, academic institutions, and government laboratories were actively working on RFID, and notable advances were being realized at research laboratories and academic institutions such as Los Alamos Scientific Laboratory, Northwestern University, and the Microwave Institute Foundation in Sweden among others. An early and important development was the Los Alamos work that was presented by Alfred Koelle, Steven Depp and Robert Freyman"Short-range radio-telemetry for electronic identification using modulated backscatter" in 1975.Large companies were also developing RFID technology, such as Raytheon's "Raytag" in 1973. RCA and Fairchild were active in their pursuits with Richard Klensch of RCA developing an "Electronic identification system" in 1975 and F. Sterzer of RCA developing an "Electronic license plate for motor vehicles" in 1977. Thomas Meyers and Ashley Leigh of Fairchild also developed a "Passive encoding microwave transponder" in 1978.The Port Authority of New York and New Jersey were also testing systems built by General Electric, Westinghouse, Philips and Glenayre. Results were favorable, but the first commercially successful transportation application of RFID, electronic toll collection, was not yet ready for prime time.The 1970's were characterized primarily by developmental work. Intended applications were for animal tracking, vehicle tracking, and factory automation. Examples of animal tagging efforts were the microwave systems at Los Alamos and the inductive systems in Europe. Interest in animal tagging was high in Europe. AlfaLaval, Nedap, and others were developing RFID systems.Transportation efforts included work at Los Alamos and by the International Bridge Turnpike and Tunnel Association (IBTTA) and the United States Federal Highway Administration. The latter two sponsored a conference in 1973 which concluded there was no national interest in developing a standard for electronic vehicle identification. This is an important decision since it would permit a variety of systems to develop, which was good, because RFID technology was in its infancy.About this time new companies began to surface, such asIdentronix, a spin-off from the Los Alamos Scientific Laboratory, and others of the Los Alamos team, myself being one of them, founded Amtech (later acquired by Intermec and recently sold to TransCore) in the 80s. By now, the number of companies, individuals and institutions working on RFID began to multiply. A positive sign. The potential for RFID was becoming obvious.The 1980s became the decade for full implementation of RFID technology, though interests developed somewhat differently in various parts of the world. The greatest interests in the United States were for transportation, personnel access, and to a lesser extent, for animals. In Europe, the greatest interests were for short-range systems for animals, industrial and business applications, though toll roads in Italy, France, Spain, Portugal, and Norway were equipped with RFID.In the Americas, the Association of American Railroads and the Container Handling Cooperative Program were active with RFID initiatives. Tests of RFID for collecting tolls had been going on for many years, and the first commercial application began in Europe in 1987 in Norway and was followed quickly in the United States by the Dallas North Turnpike in 1989. Also during this time, the Port Authority of New York and New Jersey began commercial operation of RFID for buses going through the Lincoln Tunnel. RFID was finding a home with electronic toll collection, and new players were arriving daily.The 1990'sThe 1990's were a significant decade for RFID since it saw the wide scale deployment of electronic toll collection in the United States. Important deployments included several innovations in electronic tolling. The world's first open highway electronic tolling system opened in Oklahoma in 1991, where vehicles couldpass toll collection points at highway speeds, unimpeded by a toll plaza or barriers and with video cameras for enforcement. The world's first combined toll collection and trafficmanagement system was installed in the Houston area by the Harris County T oll Road Authority in 1992. Also a first was the system installed on the Kansas turnpike using a system based on the Title 21 standard with readers that could also operate with the tags of their neighbor to the south, Oklahoma. The Georgia 400 would follow, upgrading their equipment with readers that could communicate with the new Title 21 tags as well as the existing tags. In fact, these two installations were the first to implement a multi-protocol capability in electronic toll collection applications.In the Northeastern United States, seven regional toll agencies formed the E-Z Pass Interagency Group (IAG) in 1990 to develop a regionally compatible electronic toll collection system. This system is the model for using a single tag and single billing account per vehicle to access highways of several toll authorities.Interest was also keen for RFID applications in Europe during the 1990s. Both Microwave and inductive technologies were finding use for toll collection, access control and a wide variety of other applications in commerce.A new effort underway was the development of the Texas Instruments (TI) TIRIS system, used in many automobiles for control of the starting of the vehicle engine. The Tiris system (and others such as from Mikron - now a part of Philips) developed new applications for dispensing fuel, gaming chips, ski passes, vehicle access, and many other applications.Additional companies in Europe were becoming active in the RFID race as well with developments including Microdesign, CGA,Alcatel, Bosch and the Philips spin-offs of Combitech, Baumer and Tagmaster. A pan-European standard was needed for tolling applications in Europe, and many of these companies (and others) were at work on the CEN standard for electronic tolling.Tolling and rail applications were also appearing in many countries including Australia, China, Hong Kong, Philippines, Argentina, Brazil, Mexico, Canada, Japan, Malaysia, Singapore, Thailand, South Korea, South Africa, and Europe.With the success of electronic toll collection, other advancements followed such as the first multiple use of tags across different business segments. Now, a single tag (with dual or single billing accounts) could be used for electronic toll collection, parking lot access and fare collection, gated community access, and campus access. In the Dallas - Ft. Worth metroplex, a world's first was achieved when a single TollTag? on a vehicle could be used to pay tolls on the North Dallas Tollway, for access and parking payment at the Dallas/Ft. Worth International Airport (one of the world'sbusiest airports), the nearby Love Field, and several downtown parking garages, as well as access to gated communities and business campuses.Research and development didn't slow down during the 1990s since new technological developments would expand the functionality of RFID. For the first time, useful microwave Schottky diodes were fabricated on a regular CMOS integrated circuit. This development permitted the construction of microwave RFID tags that contained only a single integrated circuit, a capability previously limited to inductively-coupled RFID transponders. Companies active in this pursuit were IBM (the technology later acquired by Intermec) Micron, and Single ChipSystems (SCS).With the growing interest of RFID into the item management work and the opportunity for RFID to work along side bar code, it becomes difficult in the later part of this decade to count the number of companies who enter the marketplace. Many have come and gone, many are still here, many have merged, and there are many new players ... it seems almost daily!Back to the future: The 21st CenturyExciting times await those of us committed to the pursuit of advancements in RFID. Its impact is lauded regularly in mainstream media, with the use of RFID slated to become even more ubiquitous. The growing interest in telematics and mobile commerce will bring RFID even closer to the consumer. Recently, the Federal Communications Commission (FCC) allocated spectrum in the 5.9 GHz band for a vast expansion of intelligent transportation systems with many new applications and services proposed. But, the equipment required to accommodate these new applications and services will necessitate more RFID advancements.As we create our future, and it is bright, let us remember, "Nothing great was ever achieved without enthusiasm" (Ralph Waldo Emerson). We have a great many developments to look forward to, history continues to teach us that.时间护罩RFID的历史介绍许多东西都藏在整流罩的时间,追踪历史和过去的任务是艰巨而富有挑战性的,但是最终都会得到奖励。
R F I D基本原理的英文文献翻译毕业设计(论文)外文资料翻译系别:电子信息系专业:通信工程班级: B090310姓名:陈少雄学号: B09031002外文出处:网络资源附件: 1.原文; 2. 译文2013年03月20日RFID Basic PrincipleWhat is the RFID?RFID is the abbreviation for Radio Frequency Identification, called electronics label .What is the RFID technology?RFID recognition is a non-contact automatic identification technology, rf signal through its automatic target recognition and access to relevant data, identify work without manual intervention, it can work in various environments. RFID technology can identify high-speed moving objects and can identify multiple tags, the operation is fast and convenient.Accenture laboratory's chief scientist sir alex ferguson feels RFID is a breakthrough technology: "first, can identify a very specific objects, rather like the code that can identify class objects; second, the use of rf, can read data through external materials, and bar code must rely on laser to read information; third, can also read on to multiple objects, and bar code can only read one by one. In addition, store of information is also very big."What is the basic component of RFID?The most basic RFID system consists of three parts:Tag:Tag consists of components and chips, each Tag has only electronic coding, adhere to the object for identifiering target;Reader:read (sometimes also can write) label information equipment,it canbe designed for portable or fixed;Antenna: Transmit radio frequency signals between in the label and reader.The basic principle of RFID technology is what?The basic principle of RFID technology is not complex: Label into the field, Receive radio frequency signals from reader collision, with all the energy stored in a chip of the product information ( passive tag, there is no source label or labels ),Or actively to send a frequency signals( active tag and to label or labels ); to read information and understanding of the decoder after the central information systems to carry out the relevant data processing.What makes retailers so highly RFID?Sanford Bernstein cristiano, according to analysts estimate the retailing company, by adopting the RFID, wal-mart can save $8.35 billion each year, mostly because of the purchase of artificial view does not need to save the cost of labor code. Although some analysts think $8 billion in the digital too optimistic, but undoubtedly, RFID help solve the problem: the two biggest retail commodities and loss (broken by theft and supply chain was unsettled and loss of products),now a wal-mart, stealing a loss is almost 20 billion dollars, if a legitimate business turnover can achieve this number, can in American 1,000 enterprise's list of top first 694. Research organizations estimate, This rfid technology can help to reduce the level of 25% reduction and stock. The typical application of RFID technology is what?Logistics and supply managementManufacturing and assemblyAirline baggage handlingMail/express parcelA document tracking/library managementAnimal identity tagsMovementAccess control/electronic ticketsAutomatic charge. RoadRFID automatic recognition term explanationmicro wave: wavelength of 0.1-100 centimeters or frequency in 1-100GHZ electromagnetic wave.radiation frequency: usually microwave.electronic tags: stored data object code identification tag, also calledrf CARDS.passive tags: without power and internal by receiving microwave energy work.active tags: by internal batteries work labels.microwave antenna: used for launching and receive a signal.read device: Used to read the labels in electronic data.programming device: for electronic data written to the label or labels for thestored data.beam bracketing: refers to the antenna beam range of microwave irradiation range launch power.tag capacity: The label of programming can be written in the number of digits or logical.A - Biz -utomatic identification technology application case frameASN - senior freight noticeBIS - commercial information systemDA - shipment notificationEAN --European articles coding EPCTM - electronic productsONS - objects name resolution servicesPML - entity markup languageUCC - unity coding committeeUML - unified modeling languageSystem composition and working principleThe most basic RFID system consists of three parts:Tag:Tag consists of components and chips, each Tag has only electronic coding, adhere to the object for identifiering target;Reader:read (sometimes also can write) label information equipment,it canbe designed for portable or fixed;Antenna: Transmit radio frequency signals between in the label and reader.Some systems have readers RS232 or RS485 interface with external computer (upper computer system) connection, and exchange data.The system of basic workflow is: reader through the antenna send certain frequencies of rf signals, when the rf card to enter the antenna working area induced current, rf cards gain energy to be activated, rf cards will own coding information through the card built-in transmitting antenna send out, System receiving aerial from rf card from the carrier signal, the antenna of a regulator to the reader, the reader to receive a signal and demodulates and decodes to the system to deal with therelevant ; the main system based on logic, determine the legality of smart cards, in different settings make the appropriate treatment and control signals control and direction of movement. in the coupling between inductors and electromagnetic way (), communication process (FDX, HDX, SEQ)、From rf card to the reader of data transmission of the load method (modulation, reverse scattering, high time harmonics) and frequency, from the contact method transmission a fundamental difference, but all the reader in principle, and the decision of the design structures are very similar. all the reader is a simple matter of high frequency and control unit two basic module. high frequency interface includes both transmitters and receivers, its functions include: to produce high-frequency transmit power to start and provide rf card energy. To launch signal used to send data to rf CARDS, Receive and demodulation of high frequency signals from rf CARDS. Different rfid system with some difference frequency interface design, the system frequency inductive coupling interface diagram shown.Readers of the control unit features include: communicate with the application software, Application software and to execute the order of radio frequencies ;control and communication from the principle of the lord - (); signal of the decoding. to some specific systems are the collision, the algorithm to rf card reader, and to the transfer of data encryption and decryption, as well as on radio frequencies and the reader's authentication for an additional function.The rfid system is a key and distance of the parameters. At present, the price of long-distance rfid system is very expensive, thus to improve their reading for distance of the method is very important. Influence factors of distance and RF card reader, including antenna working frequency of RF output power, reader's reception sensitivity, RF card power, antenna and the resonant circuit Q value, antenna, RF card reader and the direction of the coupling, and RF card itself of energy and send information energy etc. Most of the system of writing is read and write different, read the distance is about 40% to 80%.Theory analysisRFID technology USES radio-frequency mode in the reader and rf card no contact between the bidirectional data transmission, in order to achieve target recognition and data exchange. And the tradition of code, magnetic and IC card, compared with non-contact, rf card reading speed, wear, not by environmental impact, long life, easy to use and has the characteristics of anti-collision function, can handle more CARDS. Abroad, rfid technology has been widely used in industrial automation, commercial automation, transportation control, etc.RFID基本原理什么是RFID?RFID是Radio Frequency Identification的缩写,即射频识别,俗称电子标签。
无线射频识别技术外文翻译参考文献(文档含中英文对照即英文原文和中文翻译)翻译:当前无线射频识别技术应用略述摘要无线射频识别技术可以自动识别多目标并以非接触式方式移动目标。
越来越多的零售商、银行、交通管理系统、展览及物流供应商将这项新技术应用于他们的产品和服务。
因此,这给RFID技术的研究带来了机遇和挑战。
本文简单介绍了RFID系统的组成、原理及RFID技术的特点。
本文比较了RFID 与传统条码,然后提供了一个简短的关于目前RFID应用情况的调查报告。
关键词:无线射频识别技术应用物流一、简介无线射频识别(RFID)是一种识别技术。
与RFID技术的前身——条码技术相比,RFID技术具有很多的优点。
但由于其成本高,RFID技术至今未能广泛应用到各行各业。
RFID技术因其无需视线扫描而具有无可比拟的先进性,它能够降低劳动力水平,提高知名度并改善库存管理。
RFID技术的普及提供了一项人或物体定位及追踪的解决方案。
RFID定位与跟踪系统根据独特的识别标签、阅读器与物体标签间射频通信的信号强度确定物体的空间位置,主要适用于室内,而GPS系统是不适合应用于室内的。
RFID技术是一项基于“无线电频率”的非接触式的自动识别技术,自动识别静态或动态的人和对象。
RFID标签是一个特殊的微芯片,植入商品中,可以跟踪和管理物理对象,是物流管理信息化和跟踪信息化的重要手段。
RFID的系统组成部分包括:(1)标签(应答器):对象植入待确定。
(2)阅读器:可以读或读/写,按结构和技术。
正如图1-1,RFID的工作原理图1-1 RFID的工作原理二、目前RFID技术的研究重点由于RFID技术日趋成熟且RFID标签价格下降,RFID越来越受到工业界和学术界的关注。
通过在物品上贴射频标签,我们就可以跟踪和管理这些对象。
这项技术会逐渐取代目前的广泛采用的条码系统。
(一)RFID标签与条码条码技术广泛采用于商品和对象的识别。
我们能够在超市的任何包装产品上找到条码。
中英文资料外文翻译Internet of Things1.the definition of connotationThe English name of the Internet of Things The Internet of Things, referred to as: the IOT.Internet of Things through the pass, radio frequency identification technology, global positioning system technology, real-time acquisition of any monitoring, connectivity, interactive objects or processes, collecting their sound, light, heat, electricity, mechanics, chemistry, biology, the location of a variety of the information you need network access through a variety of possible things and things, objects and people in the Pan-link intelligent perception of items and processes, identification and management. The Internet of Things IntelliSense recognition technology and pervasive computing, ubiquitous network integration application, known as the third wave of the world's information industry development following the computer, the Internet. Not so much the Internet of Things is a network, as Internet of Things services and applications, Internet of Things is also seen as Internet application development. Therefore, the application of innovation is the core of the development of Internet of Things, and 2.0 of the user experience as the core innovation is the soul of Things.2.The meaning of "material"Where the "objects" to meet the following conditions can be included in the scope of the "Internet of Things":1. Receiver have the appropriate information;2. Have a data transmission path;3. Have a certain storage capabilities;4. To have the CPU;5.To have the operating system;6. Have specialized applications;7. Have a data transmitter;8. Follow the communication protocol of Things;9. World Network, a unique number that can be identified.3. "Chinese style" as defined inInternet of Things (Internet of Things) refers to is the ubiquitous (Ubiquitous) terminal equipment (Devices) and facilities (Facilities), including with the "inner intelligence" sensors, mobile terminals, industrial systems, floor control system, the family of Intelligentfacilities, video surveillance systems, and external can "(Enabled), such as RFID, a variety of assets (the Assets), personal and vehicle carrying the wireless terminal" intelligent objects or animals "or" smart dust "(the Mote), through a variety of wireless and / or cable over long distances and / or short-range communication networks to achieve interoperability (M2M), application integration (the Grand Integration), and based on cloud computing, SaaS operation mode, in internal network (intranet), private network (extranet), and / or the Internet (Internet) environment, the use of appropriate information security mechanisms to provide a safe, controlled and even personalized real-time online monitoring, retrospective positioning, alarm linkage, command and control plan management, remote control, security, remote repair and maintenance, online upgrades, statistical reporting, decision support, the leadership of the desktop (showcase of the Cockpit Dashboard) management and service functions, "Everything," "efficient, energy saving, security environmental protection, "" possession, control, Camp integration [1].4.EU definitionIn September 2009, the Internet of Things and enterprise environments held in Beijing, China-EU Seminar on the European Commission and Social Media Division RFID Division is responsible for Dr. Lorent Ferderix, given the EU's definition of things: the Internet of Things is a dynamic global network infrastructure, it has a standards-based and interoperable communication protocols, self-organizing capabilities, including physical and virtual "objects" of identity, physical attributes, virtual features and smart interface and seamless integration of information networks .Internet of Things Internet and media, the Internet and business Internet one, constitute the future of the Internet.5.changeThe Internet of Things (Internet of Things) the word universally recognized at home and abroad Ashton, Professor of the MIT Auto-ID Center in 1999 first proposed to study RFID. The report of the same name released in 2005, the International Telecommunication Union (ITU), the definition and scope of the Internet of Things has been a change in the coverage of a larger expansion, no longer refers only to the Internet of Things based on RFID technology.Since August 2009, Premier Wen Jiabao put forward the "Experience China" Internet of Things was officially listed as a national one of the five emerging strategic industries, to write the "Government Work Report" Internet of Things in China has been the great concern of the society as a whole degree of concern is unparalleled in the United States, European Union, as well as other countries.The concept of Internet of Things is not so much a foreign concept, as it has been the concept of a "Made in China", his coverage of the times, has gone beyond the scope of the 1999 Ashton professor and the 2005 ITU report referred to, Internet of Things has been labeled a "Chinese style" label.6.BackgroundThe concept of Internet of Things in 1999. Internet-based, RFID technology and EPC standards, on the basis of the computer Internet, the use of radio frequency identification technology, wireless data communication technology, a global items of information to real-time sharing of the physical Internet "Internet of things" (referred to as the Internet of Things) , which is also the basis of the first round of the China Internet of Things boom set off in 2003.The sensor network is built up based on sensing technology network. Chinese Academy of Sciences in 1999 on the start sensor network research and has made some achievements in scientific research, the establishment of applicable sensor network.1999, held in the United States, mobile computing and networking International Conference, "The sensor network is a development opportunity facing humanity in the next century. In 2003, the United States, "Technology Review" proposed sensor network technology will be future changes ten people's lives first.November 17, 2005, the WSIS held in Tunis (WSIS), the International TelecommunicationUnion released ITU Internet Report 2005: Internet of Things ", citing the concept of the" Internet of things ". The report pointed out that the ubiquitous "Internet of Things" communication era is approaching, all the objects in the world, from tires to toothbrushes, from housing to the tissue via the Internet, take the initiative to be exchanged. Radio Frequency Identification (RFID), sensor technology, nanotechnology, intelligent embedded technology will be more widely used.According to the description of the ITU, the era of things, a short-range mobile transceivers embedded in a variety of daily necessities, human beings in the world of information and communication will receive a new communication dimension, from any time communication between people of the place of connection extended to the communication connection between persons and things and things and things. The Internet of Things concept of the rise, largely due to the International Telecommunication Union (ITU), the title of Internet of Things 2005 annual Internet Report. However, the ITU report the lack of a clear definition of Things.Domestic Internet of Things is also there is no single standard definition, but the Internet of Things In essence, the Internet of Things is a polymer application of modern information technology to a certain stage of development and technological upgrading of various sensing technology modern network technology and artificial intelligence and automation technology aggregation and integration of applications, so that the human and material wisdom of dialogue to create a world of wisdom. Because the development of the Internet of Things technology, involving almost all aspects of IT, innovative application and development of a polymer, systematic, and therefore be called revolutionary innovation of information industry. Summed up the nature of the Internet of Things is mainly reflected in three aspects: First, the Internet features that need to be networked objects must be able to achieve the interoperability of the Internet; identification and communication features, that is included in the Internet of Things "objects" must to have the functions of automatic identification and physical objects communication (M2M); intelligent features, the network system should have automated, self-feedback and intelligent control features January 28, 2009, Obama became the President of the United States, held with U.S. business leaders a "round table", as one of the only two representatives, IBM CEO Sam Palmisano for the first time that "the wisdom of the Earth" this concept, it is recommended that the new government to invest in a new generation of intelligent infrastructure.February 24, 2009 news, IBM Greater China CEO money crowd called "Smarter Planet"strategy announced in the forum 2009IBM.This concept was put forth, that is the great concern of the United States from all walks of life, and even analysts believe that IBM's vision is very likely to rise to U.S. national strategy, and caused a sensation in the world. IBM believes that the industry, the next phase of the mission is to make full use of the new generation of IT technology in all walks of life among specifically, is the embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water supply systems dams, oil and gas pipelines and other objects, and is generally connected to the formation of Things.Strategy conference, IBM, and implant the concept of "wisdom" in the implementation of the infrastructure, strong, not only in the short term to stimulate the economy, promote employment, and in a short period of time for China to build a mature wisdom infrastructure platform.IBM "Smarter Planet" strategy will set off again after the wave of Internet technology industrial revolution. Former IBM CEO Lou Gerstner has raised an important point of view, every 15 years, a revolution in computing model. This judgment is the same as Moore's Law accurately call it a "15-year cycle Law". Before and after 1965, changes to the mainframe as a symbol, 1980 marked by the popularization of personal computers, 1995, the Internet revolution. Each such technological change are caused by the enterprise, industry and even the national competitive landscape of major upheaval and change. To a certain extent in the Internet revolution is ripening by the "information superhighway" strategy. 1990s, the Clinton administration plan for 20 years, $ 200 billion to -4000 billion, construction of the U.S. National Information Infrastructure, to create a huge economic and social benefits.Today, the "Smarter Planet" strategy by many Americans that there are many similarities with the "information superhighway", the same they revive the economy, a key strategy for competitive advantage. The strategy can be set off, not only for the United States, such as the Internet revolution was the wave of technological and economic concern, more attention from the world."Internet of Things prospects are very bright, it will dramatically change our current way of life." Demonstration director of the Center of Nanjing University of Aeronautics and Astronautics, National Electrical and Electronic Zhao Guoan said. Industry experts said that the Internet of things to our life personification of the things became a kind of human.Goods (goods) in the world of physical objects associated with each other "exchange", without the need for human intervention.The Internet of Things using radio frequency identification (RFID) technology, to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet. It can be said that the Internet of Things depict the world is full of intelligent. In the world of Internet of Things, material objects connected to the dragnet.The second session, held at Peking University in November 2008, China Mobile Government Seminar "Knowledge Society and Innovation 2.0", the experts made the mobile technology, the Internet of Things technology led to the development of economic and social form, innovative forms of change, and promote the The next generation of innovation for the knowledge society as the core of user experience (innovative 2.0) the formation of innovation and development of the form to pay more attention to the user to focus on people-oriented. Research institutions is expected to 10 years, the Internet of Things may be mass adoption of this technology will develop into one of thousands of yuan-scale high-tech market, the industry than the Internet 30 times.It is learned that the things industry chain can be broken down into the identity, perception, processing and information transfer, four links, each link of the key technologies for the wireless transmission network of RFID, sensors, smart chip and telecom operators. EPOSS in the "Internet of Things in 2020" report, an analysis predicted that the future development of the Internet of Things will go through four stages, 2010, RFID is widely used in the field of logistics, retail and pharmaceutical objects interconnect 2010 to 2015, 2015 ~ In 2020, the object into the semi-intelligent, intelligent objects into 2020.As the vanguard of the Internet of Things, RFID has become the most concerned about the technology market. The data show that the global RFID market size in 2008 from $ 4.93 billion in 2007 rose to $ 5.29 billion, this figure covers all aspects of the RFID market, including tags, readers and other infrastructure, software and services. RFID card and card-related infrastructure will account for 57.3 percent of the market, reaching $ 3.03 billion. Application from financial and security industries will drive the market growth of RFID cards. Analysys International forecasts, the Chinese RFID market size in 2009 will reach 5.0 billion, a CAGR of 33%, in which the electronic tag is more than 3.8 billion yuan, the reader close to 700 million yuan, software and services market to reach 500 million yuan pattern.MEMS is the abbreviation of the micro-electromechanical systems, MEMS technology is built on the basis of micro / nano, the market prospect is broad. The main advantage of the MEMS sensoris the small size, large-scale mass production cost reduction, mainly used in two major areas of automotive and consumer electronics. Under ICInsight the latest report is expected in 2007-2012, global sales of semiconductor sensors and actuators based on MEMS will reach 19 percent compound annual growth rate (CAGR), compared with $ 4.1 billion in 2007 to five years will achieve $ 9.7 billion in annual sales.7.PrincipleInternet of Things is on the basis of the computer Internet, RFID, wireless data communications technology, to construct a cover everything in the world's "Internet of Things". In this network, the goods (products) to each other "exchange", without the need for human intervention. Its essence is the use of radio frequency identification (RFID) technology to achieve the interconnection and sharing of the automatic identification of goods (products) and information through the computer Internet.The Internet of Things is a very important technology is radio frequency identification (RFID) technology. RFID is radio frequency identification (Radio Frequency Identification) technology abbreviation, is an automatic identification technology in the 1990s began to rise, the more advanced a non-contact identification technology. The development of RFID technology based on a simple RFID system, combined with existing network technology, database technology, middleware technology, to build a one composed by a large number of networked readers and numerous mobile label, much larger than the Internet of Things trend.RFID, It is able to let items "speak" a technique. In the "Internet of Things" concept, RFID tags are stored in the specification and interoperability information collected automatically by wireless data communications network to a central information system, to achieve the identification of goods (products), and then through the open computer network for information exchange and sharing, items "transparent" management.The information technology revolution in the Internet of Things is referred to as IT mobile Pan of a specific application. Internet of Things through IntelliSense, identification technology and pervasive computing, ubiquitous network convergence applications, breaking the conventional thinking before, human beings can achieve ubiquitous computing and network connectivity [3]. The traditional thinking has been the separation of physical infrastructure and IT infrastructure: on the one hand, airports, roads, buildings, while on the other hand, the data center, PC, broadband. In theera of the "Internet of Things", reinforced concrete, cable with the chip, broadband integration into a unified infrastructure, in this sense, the infrastructure is more like a new site of the Earth, the world really works it, which including economic management, production operation, social and even personal life. "Internet of Things" makes it much more refined and dynamic management of production and life, to manage the future of the city to achieve the status of "wisdom" to improve resource utilization and productivity levels, and improve the relationship between man and nature. 8.Agency1, institution-buildingAs the first national Internet of Things industry community organizations - the application of professional Committee of China Electronic Chamber of Things technology products (referred to as: "objects of the IPCC"), the Ministry of Civil Affairs in June 2010, preliminary approved by the Ministry of August being reported that the Ministry of Civil Affairs for final approval.2, the main taskServe as a bridge between business and government to assist the Government of the industry guidance, coordination, consultation and services to help members to reflect the business requirements to the Government; coordinate the relationship between enterprises to strengthen technical cooperation, product distribution, the elimination of vicious competition ; supervision of members the correct implementation of national laws and regulations, to regulate the industry; member of information communication technology products, cooperation, resource sharing, capital operation, and promote the application of Internet of Things technologies and products, and promote the Internet of Things industrial scale , co-development.9.ConstructionInternet of Things in the practical application to carry out requires the involvement of all walks of life, and need the guidance of the national government as well as related regulations and policies to assist the launching of the Internet of Things has the scale, broad participation, management, technical, and material properties, etc. other features, the technical problem is the most crucial issues of Things billion Bo logistics consulting, Internet of Things technology is an integrated technology, a system not yet which company has overall responsibility for network planning and construction of the entire system, theoretical studies have commenced in all walks of life and the practical application is limited to within the industry. The key is on the planning and design andresearch and development of the Internet of Things research in the field of RFID, sensors, embedded software, and transmission of data calculation. In general, to carry out the steps of the Internet of things mainly as follows:(1) identified the object attributes, properties, including static and dynamic properties of the static property can be stored directly in the label, the dynamic properties need to start with sensors to detect real-time;(2) the need to identify the equipment to complete the reading of object attributes, and information into a data format suitable for network transmission;(3) the object of information transmitted over the network to the information processing center (processing center may be distributed, such as home computers or mobile phones, may also be centralized, such as China Mobile IDC) by the processing center to complete the object communication calculation.10.key areasInternet of Things 4 key areas:(1) RFID;(2) sensor network;(3) The M2M;(4) integration of the two.11.TrendIndustry experts believe that the Internet of things on the one hand can improve economic efficiency and significant cost savings; the other hand, can provide technical impetus to global economic recovery. Currently, the United States, the European Union are all invested heavily in-depth study to explore the Internet of Things. The country is also highly concerned about the emphasis of Things, Industry and Information Technology Ministry in conjunction with the relevant departments are conducting research in a new generation of IT to the formation of policies and measures to support the development of a new generation of IT.China Mobile CEO Wang Jianzhou has repeatedly mentioned the Internet of Things will become the focus of future development of China Mobile. He will be invited to Taiwan to produce RFID, sensors and bar code manufacturers and China Mobile. According to him, the use of the Internet of Things technology, Shanghai Mobile has a number of industrial customers tailor the datacollection, transmission, processing and business management in one set of wireless application solutions. The latest data show that Shanghai Mobile has more than 100,000 chips mounted on a taxi, bus, various forms of matter networking applications in all walks of prowess, to ensure the orderly operation of the city. During the Shanghai World Expo, "the bus services through" will be fully applied to the Shanghai public transport system, the smooth flow traffic to the most advanced technology to protect Expo area; for logistics transportation management, e-logistics ", will provide users with real-time accurate information of Cargo, vehicle tracking and positioning, the transport path selection, logistics network design and optimization services greatly enhance the comprehensive competitiveness of logistics enterprises.In addition, the popularization of the "Internet of Things" for the number of animals, plants and machinery, sensors and RFID tags of items and related interface devices will greatly exceed the number of mobile phones. The promotion of the Internet of Things will become a drive to promote economic development for the industry to open up a potential development opportunities. According to the current demand on the Internet of Things, in recent years, billions of sensors and electronic tags, which will greatly promote the production of IT components, while increasing the number of job opportunities.According to reports, it is necessary to truly build an effective Internet of things, there are two important factors. First, the scale, only with the scale to make the items of intelligence play a role. For example, a city of one million vehicles, if we only 10000 vehicles installed on the smart system, it is impossible to form an intelligent transportation system; two mobility items are usually not static, but in the state of the movement , we must maintain the items in the state of motion, and even high-speed motion state can at any time for dialogue.FORRESTER of the authority of the U.S. advisory body predicted that 2020, the world of business of the Internet of Things, compared with the business of interpersonal communication, will reach 30 to 1, so the "Internet of Things" is known to be the next one trillion communications services.Internet of Things heat wave Why is rapidly growing in China? Internet of Things in China rapid rise thanks to the several advantages of our country in terms of things.In the early 1999 launched the Internet of Things core sensor network technology research, R & D level in the world; the second, sensor network field in the world, China is the standard one ofthe dominant country, the patent owner; third China is one of the countries to achieve a complete industrial chain of Things; Fourth, China's wireless communications network and broadband coverage provides a solid infrastructure to support the development of the Internet of Things; Fifth, China has become the world's first the three major economies, with strong economic strength to support the development of the Internet of Things.12.MythThe current understanding of the Internet of things there are a lot of misunderstanding, which is also a direct impact on our understanding of Things on the development of the logistics industry, it is necessary first to distinguish errors, clarify our thinking.One sensor networks or RFID network equivalent of Things. The fact that sensor technology, or RFID technology, or are simply one of the information collection technology. In addition to the sensor technology and RFID technology, GPS, video recognition, infrared, laser, scanning can be achieved automatically identify physical objects to communicate technical information collection technology can become the Internet of Things. Sensor networks or RFID network is just an application of Things, but not all of Things.Second, the Internet of Things as a myriad of unlimited extension of the Internet of Things as a completely open for all things, all of the interconnections, all shared Internet platform.In fact, the Internet of Things is not simple infinite extension of the global sharing of the Internet. Even if the Internet is also not only refers to we typically think of the international sharing computer network, Internet, WAN and LAN. Internet of Things can be both an extension of our usual sense of the Internet to the matter; LAN, professional can also be based on real needs and industrial applications. The reality is not necessary and can not make all the items networking; no need to make professional, LAN must be connected to the global Internet sharing platform. Of things in the future the Internet will be very different from the professional network of similar smart logistics, smart transportation, smart grid; the intelligence community and other local area network is the largest use of space.Ter, that the ubiquitous network of the Internet of Things Internet of Things, and therefore the Internet of Things is a castle in the air, is difficult to achieve the technology. In fact the Internet of things are real, many of the primary Internet of Things applications already for our services. The Internet of Things concept is introduced in many real-world applications based on polymericintegrated innovation, pre-existing network with the Internet of Things, intelligent, automated system, summarized and upgrading it upgraded from a higher perspective our knowledge.Four of Things as a basket, and everything installed inside; based on self-awareness, and only be able to interact, communication products as the Internet of Things applications. For example, just embedded some of the sensors, to become the so-called Internet of Things appliances; products labeled with RFID tags, became the Internet of Things applications.esThings widely used throughout the intelligent transportation, environmental protection, government, public safety, peace at home, smart fire, industrial monitoring, environmental monitoring, elderly care, personal health, floriculture, water monitoring, food traceability, enemy detection and intelligence collection and other fields.International Telecommunication Union in 2005, a report has portrayed the picture of the era of the "Internet of Things": car when the driver operational errors will automatically alarm; briefcase will remind the owner forgot something; clothes will "tell" washing machine color and water temperature requirements. Billion Bo logistics consulting vivid introduction of Things in the logistics field, for example, a logistics company, application of Things truck, when loading overweight, the car will automatically tell you overloaded and overload how many, but the space remaining , the severity of goods with how to tell you; when handling staff unloading a cargo packaging may be shouting "throw you hurt me", or "My dear, you do not get too barbaric, you can?"; when the driver and others gossip, trucks will pretend boss's voice roaring "stupid, the grid!Internet of things to make full use of a new generation of IT technology in all walks of life among, specifically, is embedded sensors and equipment to the power grid, railways, bridges, tunnels, highways, buildings, water systems, dams, oil and gas pipelines, etc.kinds of objects, and then "Internet of Things" with the existing Internet to integrate and realize the integration of human society and the physical system, which in this integrated network, there is the ability to super-powerful central computer cluster, integrated network staff implementation of real-time management and control of the machinery, equipment and infrastructure, on this basis, the human can be more refined and dynamic management of production and life, to achieve the status of the "wisdom", to improve resource utilization and productivity levels, and improve human the relationship between the natural.。
无线射频识别技术外文翻译参考文献无线射频识别技术外文翻译参考文献(文档含中英文对照即英文原文和中文翻译)翻译:当前无线射频识别技术应用略述摘要无线射频识别技术可以自动识别多目标并以非接触式方式移动目标。
越来越多的零售商、银行、交通管理系统、展览及物流供应商将这项新技术应用于他们的产品和服务。
因此,这给RFID技术的研究带来了机遇和挑战。
本文简单介绍了RFID系统的组成、原理及RFID技术的特点。
本文比较了RFID 与传统条码,然后提供了一个简短的关于目前RFID 应用情况的调查报告。
关键词:无线射频识别技术应用物流一、简介无线射频识别(RFID )是一种识别技术。
与RFID 技术的前身——条码技术相比,RFID 技术具有很多的优点。
但由于其成本高,RFID 技术至今未能广泛应用到各行各业。
RFID 技术因其无需视线扫描而具有无可比拟的先进性,它能够降低劳动力水平,提高知名度并改善库存管理。
RFID 技术的普及提供了一项人或物体定位及追踪的解决方案。
RFID 定位与跟踪系统根据独特的识别标签、阅读器与物体标签间射频通信的信号强度确定物体的空间位置,主要适用于室内,而GPS 系统是不适合应用于室内的。
RFID 技术是一项基于“无线电频率”的非接触式的自动识别技术,自动识别静态或动态的人和对象。
RFID 标签是一个特殊的微芯片,植入商品中,可以跟踪和管理物理对象,是物流管理信息化和跟踪信息化的重要手段。
RFID 的系统组成部分包括:(1)标签(应答器):对象植入待确定。
(2)阅读器:可以读或读/写,按结构和技术。
正如图1-1,RFID 的工作原理图1-1 RFID 的工作原理与计算机通讯阅读器电磁波(操作指令和新的数据)标签发出的ID代码和数据二、目前RFID技术的研究重点由于RFID技术日趋成熟且RFID标签价格下降,RFID越来越受到工业界和学术界的关注。
通过在物品上贴射频标签,我们就可以跟踪和管理这些对象。
中英文对照外文翻译Shrouds of TimeThe history of RFIDIntroductionMany things are hidden in the shrouds of time. The task of tracing history and genealogy is arduous and challenging, but, ultimately, rewarding. Our past can open doors to our future. Whether we realize it or not, RFID (radio frequency identification) is an integral part of our life. RFID increases productivity and convenience. RFID is used for hundreds, if not thousands, of applications such as preventing theft of automobiles, collecting tolls without stopping, managing traffic, gaining entrance to buildings, automating parking, controlling access of vehicles to gated communities, corporate campuses and airports, dispensing goods, providing ski lift access, tracking library books, buying hamburgers, and the growing opportunity to track a wealth of assets in supply chain management.One can trace the ancestry of RFID back to the beginning of time. Science and religion agree that in the first few moments of creation there was electromagnetic energy. "And God said, 'Let there be light,' and there was light" (Genesis 1). Before light, everything was formless and empty. Before anything else, there was electromagnetic energy.Scientific thinking summarizes the universe was created in an instant with a Big Bang. Scientists deduce all the four fundamental forces - gravity, electromagnetism, and the strong and weak nuclear forces - were unified. The first form in the universe was electromagnetic energy. During the first few seconds or so of the universe, protons, neutrons and electrons began formation when photons (the quantum element of electromagnetic energy) collided converting energy into mass. The electromagnetic remnant of the Big Bang survives today as a background microwave hiss.Why is this important, you might wonder? This energy is the source of RFID. It would take more than 14 billion years or so before we came along, discovered how toharness electromagnetic energy in the radio region, and to apply this knowledge to the development of RFID.The Chinese were probably the first to observe and use magnetic fields in the form of lodestones in the first century BC. Scientific understanding progressed very slowly after that until about the 1600s. From the 1600s to 1800s was an explosion of observational knowledge of electricity, magnetism and optics accompanied by a growing base of mathematically related observations. And, one of the early and well known pioneers of electricity in the 18th Century was Benjamin Franklin.The 1800s marked the beginning of the fundamental understanding of electromagnetic energy. Michael Faraday, a noted English experimentalist, proposed in 1846 that both light and radio waves are part of electromagnetic energy. In 1864, James Clerk Maxwell, a Scottish physicist, published his theory on electromagnetic fields and concluded that electric and magnetic energy travel in transverse waves that propagate at a speed equal to that of light. Soon after in 1887, Heinrich Rudolf Hertz, German physicist, confirmed Maxwell's electromagnetic theory and produced and studied electromagnetic waves (radio waves), which he showed are long transverse waves that travel at the speed of light and can be reflected, refracted, and polarized like light. Hertz is credited as the first to transmit and receive radio waves, and his demonstrations were followed quickly by Aleksandr Popov in Russia.In 1896, Guglielmo Marconi demonstrated the successful transmission of radiotelegraphy across the Atlantic, and the world would never be the same. The radio waves of Hertz, Popov and Marconi were made by spark gap which were suited for telegraphy or dots and dashes.20th CenturyIn 1906, Ernst F. W. Alexanderson demonstrated the first continuous wave (CW) radio generation and transmission of radio signals. This achievement signals the beginning of modern radio communication, where all aspects of radio waves are controlled.In the early 20th century, approximately 1922, was considered the birth of radar. The work in radar during World War II was as significant a technical development as the Manhattan Project at Los Alamos Scientific Laboratory, and was critical to the success of the Allies. Radar sends out radio waves for detecting andlocating an object by the reflection of the radio waves. This reflection can determine the position and speed of an object. Radar's significance was quicklyunderstood by the military, so many of the early developments were shrouded in secrecy.Since RFID is the combination of radio broadcast technology and radar, it is not unexpected that the convergence of these two radio disciplines and the thoughts of RFID occurred on the heels of the development of radar.Genesis of an IdeaThere is an old adage that success has many fathers but failure is an orphan. The development of technology is messy. The potential for an infinite number of things is present, yet the broader human choices determine how technology evolves. There's no clear, text book perfect, or logical progression, and often developments ahead of their time are not recognized until later, if ever. So it was with the development of RFID.An early, if not the first, work exploring RFID is the landmark paper by Harry Stockman, "Communication by Means of Reflected Power", Proceedings of the IRE, pp1196-1204, October 1948. Stockman stated then that "Evidently, considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored."Thirty years would pass before Harry's vision would begin to reach fruition. Other developments were needed: the transistor, the integrated circuit, the microprocessor, development of communication networks, changes in ways of doing business. No small task. Like many things, timing is everything, and the success of RFID would have to wait a while.A lot has happened in the 53 years since Harry Stockman's work. The 1950s were an era of exploration of RFID techniques following technical developments in radio and radar in the 1930s and 1940s. Several technologies related to RFID were being explored such as the long-range transponder systems of "identification, friend or foe" (IFF) for aircraft. Developments of the 1950s include such works as F. L. Vernon's, "Application of the mic rowave homodyne", and D.B. Harris’, "Radio transmission systems with modulatable passive responder". The wheels of RFID development were turning.The 1960's through the 1980s: RFID Becomes RealityThe 1960s were the prelude to the RFID explosion of the 1970s. R. F. Harrington studied the electromagnetic theory related to RFID in his papers "Field measurements using active scatterers" and "Theory of loaded scatterers" in 1963-1964. Inventorswere busy with RFID related inventions such as Robert Richardson's "Remotely activated radio frequency powered devices" in 1963, Otto Rittenback's "Communication by radar beams" in 1969, J. H. V ogelman's "Passive data transmission techniques utilizing radar beams" in 1968 and J. P. Vinding's "Interrogator-responder identification system" in 1967.Commercial activities were beginning in the 1960s. Sensormatic and Checkpoint were founded in the late 1960s. These companies, with others such as Knogo, developed electronic article surveillance (EAS) equipment to counter theft. These types of systems are often use ‘1-bit’ tags –only the presence or absence of a tag could be detected, but the tags could be made inexpensively and provided effective anti-theft measures. These types of systems used either microwave or inductive technology. EAS is arguably the first and most widespread commercial use of RFID.In the 1970s developers, inventors, companies, academic institutions, and government laboratories were actively working on RFID, and notable advances were being realized at research laboratories and academic institutions such as Los Alamos Scientific Laboratory, Northwestern University, and the Microwave Institute Foundation in Sweden among others. An early and important development was the Los Alamos work that was presented by Alfred Koelle, Steven Depp and Robert Freyman "Short-range radio-telemetry for electronic identification using modulated backscatter" in 1975.Large companies were also developing RFID technology, such as Raytheon's "Raytag" in 1973. RCA and Fairchild were active in their pursuits with Richard Klensch of RCA developing an "Electronic identification system" in 1975 and F. Sterzer of RCA developing an "Electronic license plate for motor vehicles" in 1977. Thomas Meyers and Ashley Leigh of Fairchild also developed a "Passive encoding microwave transponder" in 1978.The Port Authority of New York and New Jersey were also testing systems built by General Electric, Westinghouse, Philips and Glenayre. Results were favorable, but the first commercially successful transportation application of RFID, electronic toll collection, was not yet ready for prime time.The 1970's were characterized primarily by developmental work. Intended applications were for animal tracking, vehicle tracking, and factory automation. Examples of animal tagging efforts were the microwave systems at Los Alamos and the inductive systems in Europe. Interest in animal tagging was high in Europe. AlfaLaval, Nedap, and others were developing RFID systems.Transportation efforts included work at Los Alamos and by the International Bridge Turnpike and Tunnel Association (IBTTA) and the United States Federal Highway Administration. The latter two sponsored a conference in 1973 which concluded there was no national interest in developing a standard for electronic vehicle identification. This is an important decision since it would permit a variety of systems to develop, which was good, because RFID technology was in its infancy.About this time new companies began to surface, such as Identronix, a spin-off from the Los Alamos Scientific Laboratory, and others of the Los Alamos team, myself being one of them, founded Amtech (later acquired by Intermec and recently sold to TransCore) in the 80s. By now, the number of companies, individuals and institutions working on RFID began to multiply. A positive sign. The potential for RFID was becoming obvious.The 1980s became the decade for full implementation of RFID technology, though interests developed somewhat differently in various parts of the world. The greatest interests in the United States were for transportation, personnel access, and to a lesser extent, for animals. In Europe, the greatest interests were for short-range systems for animals, industrial and business applications, though toll roads in Italy, France, Spain, Portugal, and Norway were equipped with RFID.In the Americas, the Association of American Railroads and the Container Handling Cooperative Program were active with RFID initiatives. Tests of RFID for collecting tolls had been going on for many years, and the first commercial application began in Europe in 1987 in Norway and was followed quickly in the United States by the Dallas North Turnpike in 1989. Also during this time, the Port Authority of New York and New Jersey began commercial operation of RFID for buses going through the Lincoln Tunnel. RFID was finding a home with electronic toll collection, and new players were arriving daily.The 1990'sThe 1990's were a significant decade for RFID since it saw the wide scale deployment of electronic toll collection in the United States. Important deployments included several innovations in electronic tolling. The world's first open highway electronic tolling system opened in Oklahoma in 1991, where vehicles could pass toll collection points at highway speeds, unimpeded by a toll plaza or barriers and with video cameras for enforcement. The world's first combined toll collection and trafficmanagement system was installed in the Houston area by the Harris County Toll Road Authority in 1992. Also a first was the system installed on the Kansas turnpike using a system based on the Title 21 standard with readers that could also operate with the tags of their neighbor to the south, Oklahoma. The Georgia 400 would follow, upgrading their equipment with readers that could communicate with the new Title 21 tags as well as the existing tags. In fact, these two installations were the first to implement a multi-protocol capability in electronic toll collection applications.In the Northeastern United States, seven regional toll agencies formed the E-Z Pass Interagency Group (IAG) in 1990 to develop a regionally compatible electronic toll collection system. This system is the model for using a single tag and single billing account per vehicle to access highways of several toll authorities.Interest was also keen for RFID applications in Europe during the 1990s. Both Microwave and inductive technologies were finding use for toll collection, access control and a wide variety of other applications in commerce.A new effort underway was the development of the Texas Instruments (TI) TIRIS system, used in many automobiles for control of the starting of the vehicle engine. The Tiris system (and others such as from Mikron - now a part of Philips) developed new applications for dispensing fuel, gaming chips, ski passes, vehicle access, and many other applications.Additional companies in Europe were becoming active in the RFID race as well with developments including Microdesign, CGA, Alcatel, Bosch and the Philips spin-offs of Combitech, Baumer and Tagmaster. A pan-European standard was needed for tolling applications in Europe, and many of these companies (and others) were at work on the CEN standard for electronic tolling.Tolling and rail applications were also appearing in many countries including Australia, China, Hong Kong, Philippines, Argentina, Brazil, Mexico, Canada, Japan, Malaysia, Singapore, Thailand, South Korea, South Africa, and Europe.With the success of electronic toll collection, other advancements followed such as the first multiple use of tags across different business segments. Now, a single tag (with dual or single billing accounts) could be used for electronic toll collection, parking lot access and fare collection, gated community access, and campus access. In the Dallas - Ft. Worth metroplex, a world's first was achieved when a single TollTag® on a vehicle could be used to pay tolls on the North Dallas Tollway, for access and parking payment at the Dallas/Ft. Worth International Airport (one of the world'sbusiest airports), the nearby Love Field, and several downtown parking garages, as well as access to gated communities and business campuses.Research and development didn't slow down during the 1990s since new technological developments would expand the functionality of RFID. For the first time, useful microwave Schottky diodes were fabricated on a regular CMOS integrated circuit. This development permitted the construction of microwave RFID tags that contained only a single integrated circuit, a capability previously limited to inductively-coupled RFID transponders. Companies active in this pursuit were IBM (the technology later acquired by Intermec) Micron, and Single Chip Systems (SCS).With the growing interest of RFID into the item management work and the opportunity for RFID to work along side bar code, it becomes difficult in the later part of this decade to count the number of companies who enter the marketplace. Many have come and gone, many are still here, many have merged, and there are many new players ... it seems almost daily!Back to the future: The 21st CenturyExciting times await those of us committed to the pursuit of advancements in RFID. Its impact is lauded regularly in mainstream media, with the use of RFID slated to become even more ubiquitous. The growing interest in telematics and mobile commerce will bring RFID even closer to the consumer. Recently, the Federal Communications Commission (FCC) allocated spectrum in the 5.9 GHz band for a vast expansion of intelligent transportation systems with many new applications and services proposed. But, the equipment required to accommodate these new applications and services will necessitate more RFID advancements.As we create our future, and it is bright, let us remember, "Nothing great was ever achieved without enthusiasm" (Ralph Waldo Emerson). We have a great many developments to look forward to, history continues to teach us that.时间护罩RFID的历史介绍许多东西都藏在整流罩的时间,追踪历史和过去的任务是艰巨而富有挑战性的,但是最终都会得到奖励。
Radio Frequency Identification Overview IntroductionWith the development of Internet technology, Internet-based expansion and extension form a new generation of network technology that is of things.The so-called Internet of Things, also known as sensor networks, the English name is "Internet of Things" referred to (IOT).Internet of Things is a computer based on the use of radio frequency identification technology, wireless communication technology, infrared sensors, global positioning systems, laser scanners and other information sensing device, according to the agreed protocol to connect to any goods and the Internet, exchange of information and communication, in order to achieve intelligent identification, location tracking, monitoring and management of a network.SummaryInternet of Things technology is the most critical of RFID technology.RFID is the abbreviation of Radio Frequency Identification. It is a non-contact automatic identification technology, RF signal through the automatic target recognition and access to relevant data, without human intervention, it can work in a variety of environments.First RFID components and working principleRadio frequency identification system consists of electronic tags, reader, antenna composition.Tag: the coupling components and chips, each tag has a unique electronic code, attached to the object on the target object.Reader: Also known as the read set, can be read without contact and identification tag in the preservation of electronic data, so as to achieve automatic ten-fold purpose of the object, there are two kinds of hand-held or fixed, usually with a computer reader connected to the read tag information is transmitted to the computer for further processing.antenna :Tag and reader antennas in the RF signal to pass between antenna.Second RFID applicationsRadio frequency identification technology with its unique advantages, gradually been widely used in industrial automation, business automation and transport control management.In China, due to radio frequency identification technology started late, RFID is not very wide applicated, in the following areas:(1) automatic vehicle identification, as early as 1995, the North American rail system used radio frequency identification technology ATIS standard.(2) fees and intelligent traffic on the highway, the car can be equipped with automatic radio frequency identification tags, no parking fee, which greatly improve the speed and efficiency.(3) cargo tracking, management and monitoring, Australia and the UK airport used radio frequency identification technology in baggage management, which greatly improve the efficiency of sorting andreduced the error rate.(4) radio card applications in China, mainly used in RF card public transport, subways, schools, social security and so on. China RF card application largest project is the second generation citizen ID card.(5) in the production line automation and process control, the German company BMW car assembly line to ensure the accuracy of the position to complete the assembly task, the radio frequency identification system used in automobile assembly line.Third Development problems faced by RFID technology (1) privacy issuesIn RFID systems, tags could be embedded in anything in advance, such as people's daily life items, but because the items (such as clothing) of the owner, not necessarily aware of the article pre-embedded in an electronic tag and its own may not be controlled by scanning, positioning and tracking, which is bound to make the issue of personal privacy have been violated.Therefore, how to ensure the label material with the inviolability of personal privacy become a radio frequency identification technology as well as things to promote the key issues.(2) standardsChina made no introduction of RFID standards, the rapid development of the domestic RFID industry in China is not in accordance with the standard, causing confusion in product standards, greatly reduces the international competitiveness(3) security issuesCurrent Things security issues face the industry including the tag information of illegal changes to the label's illegal to track effectively the identity of pretending and deception.(4) market demandSome things look very convenient service, but in both cases, whether people have an incentive to use these new services yet to be questionable. Fourth RFID TrendsAs RFID technology continues to promote the development and application of the popularity of radio frequency identification technology and other aspects of performance will have improved greatly, the cost will be gradually reduced, can foresee the future development of RFID technology will have the following trends:(1) label product diversification.(2) system network.(3) a better system compatibility(4) integration with other industries.Therefore, we have reasons to believe that RFID is enormous potential for industrial development, whichwill be the future development of a new growth point. RFID technology will be inextricably linked with people's daily lives.。
附录A 外文翻译-原文部分Based on the RFID Digital warehouse managementsystem1.Design and implementationRFID Radio frequency identification technology to its non-contact, repeatable, easy to use, fast scanning, and error-handling fast, large data capacity, long life and other advantages in logistics industry more and more attention. This paper introduced in warehouse management information system RFID technology, first in, first out of the goods, electronic location management, process monitoring and management, with a view to resolving the barcode of the inadequate, resulting in a digital and information technology, enhance warehouse management information system on the basis of the maximum benefit.Currently, most domestic logistics center using bar code scanning technology as a carrier of the goods in the warehouse management logistics and information flow synchronization, but with the increasing requirements of enterprise Information ization, bar code technology, storage capacity cannot be changed because of information such as small, easy to read information is not shortcoming has been unable to meet the requirements. RFID(Radio Frequency Identification)radio frequency identification technology to its non-contact, repeatable, easy to use, fast scanning, and error-handling fast, large data capacity, long life and other advantages in logistics industry more and more attention. This paper introduced in warehouse management information system RFID technology, first in, first out of the goods, electronic location management, process monitoring and management, with a view to resolving the barcode of the inadequate, resulting in a digital and information technology, enhance warehouse management information system on the basis of the maximum benefit.2. System function and structure designBased on the RFID Digital warehouse is introduced in an existing warehouse management RFID Technology, the accuracy of the information and process automation requirements are very high, need to meet the various sectors of the job of the warehouse to automated data collection and ensure data warehouse management of all aspects of data entry speed and accuracy to ensure timely and accurate inventory of real data, reasonable maintain control and warehouse inventory.System is composed of both hardware and software module, the main idea is implemented in the warehouse management information system of a barcode and RFID Combine. Pallet put RFID electronic tags, the use of RFID electronic label-Cho repeated use, large data capacity, without manual Interventional advantages, to increase the level of automation and achieve entire deposit taking based on pallets; Goods posted a-dimensional bar code, using a barcode costs significantly lower than RFID Advantages of RFID to cut costs, save zero takes based on the goods and cargo tracking. A barcode and RFID combined. Precise control of not only can I get information on the warehouse data can also lower system costs.Based on the RFID Ninghua County warehouse management system architecture, decided that the system should at least have the following hardware device:①Main control system. Includes the master computer, the/into the mouth of the RFID reader, group pun RFID reader. Master computer via cable or wireless networkand out/into the mouth of the RFID reader, group pun RFID reader and connected servers.②Server. Servers connected through a wireless network with the master machine and forklifts to connect.③Car and automobile Tablet automotive Tablet installed on forklift truck navigation subsystems for location navigation. In-car navigation systems with the server over the wireless network connection.④Handheld units. Including one-dimensional bar code scanner and mobile RFID reader. A barcode scanner for the goods barcode reading, via cable(or wireless)network connection to the host computer. Mobile RFID reader used to read pallet RFID tag information for inventory counting.⑤Warehouse facilities. Automated warehouse, containing bearing the RFID electronic label pallets, ring the pickup lines, Stacker and WinCC monitoring system, on a cargo pallet that can automate/off the shelf.Based on the RFID Digital warehouse management systems functionality of traditional warehouse management system implementation and expansion, including the following features:Management, electronic storage location management, warehouse management, cargo, and so on.①Storage management. For storage, operation, completed documents in the entry, modify, delete, allocation of storage location automatically, manually assigned, assigned instructions send job location documents.②The library management. And storage management are similar. Goods out of the library operations can complete a library entry, modify, delete documents, library location is automatically assigned, manually assigned, assigned instructions send job location documents.③Electronic location map management. Mainly used to display cosmetic box with raised decoration and warehouse storage condition and location of the Visual location of adjustment operations, including area inventory location information displayed at an appropriate time, goods(pallets)inventory address query, adjustment, and so on.④Cargo tray. Achieving location in/out tray in group operations. This warehouse management information system to support a whole pallets into, out of the warehouse, so into/out of the library job requires to achieve storage group disk group disk function modules, split out of operation. Tray from the main group disk function module enables read and write RFID tag information(primarily one-dimensional bar code information), pallet goods increase/reduction, group undo functions.⑤Queries and reports. Warehouse administrator by querying the database inventory in inventory and report on system status, manage documents and goods, location status. Including: adjust the single location query, a library, into a single query.⑥Basic data maintenance. In the present system of goods, people, forklifts and other information to view, add, delete, and modify operations to facilitate other data used in the function.3.System design workflowSystem workflows include storage process, a process in and inventory management processes.(1)Into the process. Library jobs main steps are as follows:①When storage, warehouse management manual entry into electronic documents generated documents.②Library personnel on the master machine to select the current documents detail the implementation of storage storage operations, complete storage location assignment and build into the operating instructions. Sent over the wireless network to the server.③Car receives the server broadcast into the operating instructions, to a group to group of goods the Agency disks.④Group completed, forklift doing pallet put into sorting the pallet storage ), Under car Tablet I location map determines the location address of the second.⑤WINCC Managers running WINCC System of storage and selection on the pallet is placed in the specified location (Stacker run automatically) 。
外文翻译译文标题:射频识别(RFID)趋势的调查报告原文标题:A Survey Paper on Radio Frequency Identification (RFID) Trends学院:机械与动力工程学院班级:机制本13--3班姓名:hezijie学号:321304010315指导老师:lidajie图1:无源RFID标签([维基RFID],图2:一个简单的RFID系统库。
应用程序检索后台数据。
在许多情况下,阅读器都配有应用程序。
例如超市的电子标签,因为它们更常见,然而如果标。
当阅读器扫描条码时,应用程序使用派生标识符查找当前价格。
此外,后端也提供合格产品的折扣信息。
如果数量低于[Haehnel04]是关于映射和本地化的另一篇论文。
对比其他文件,它使用的是相对于右方机器人45度的位于左方德的有两个天线的机器人,而且机器人(阅读器)是移动的。
通过比较天线所接收的信号强度,可以按照蒙特卡洛定位算法来估计标签的位置。
这表明在一个高度动态的环境下标签连接到移动的物体是可能的。
此外这还表明,此法也可用于获得机器人的坐标以判断其环境是否可用。
[信息周刊]和[Radar Golf]实际应用了RFID定位。
将RFID标签纳入一个高尔夫球。
由活动球员携带阅读器,这个阅读器可以通过液晶显示屏或音频反馈来显示球的位置,它的检测范围为30 - 100英尺。
遗憾的是这种用来定位球的方法是专业的。
这部分对追踪标记的对象进行了一个简介。
随着RFID标签的普及,这些机制可能成为我们寻找物品时的第二性质,也许可以用以跟踪我们的孩子等。
6.新的生产方法本节将讨论生产RFID标签的新途径。
目前标准生产的标签成本在7.5和15美分之间。
而项目级标签的生产成本更高。
一个调查报告说,理想标签的成本不到一分钱。
目前在生产中是将低成本的硅晶片放到外部天线。
生产的最大部分是芯片天线的附件。
即使拥有先进的方法,如[Subramanian05]报道的有选择放置和流体自身组装,成本仍然较高。
文献信息:文献标题:The New Retail Experience and Its Unaddressed Privacy Concerns: How RFID and Mobile Location Analytics are Collecting Customer Information(新零售体验及其未解决的隐私问题:无线射频识别和移动位置分析是如何收集客户信息的)国外作者:Ava Farshidi文献出处:《Journal of Law, Technology and the Internet》,2016,7:15-38 字数统计:英文2574单词,13291字符;中文4313汉字外文文献:The New Retail Experience and Its Unaddressed Privacy Concerns: How RFID and Mobile Location Analytics areCollecting Customer InformationINTRODUCTIONAmericans love to shop. Shoppers can shop in any platform, at any time, and anywhere to get just about anything they want. The fashion industry has been at the forefront of customizing the customer experience, and the emergence of omnichannel has shown the significance of connecting brick and mortar stores with digital means of shopping through the Internet and mobile apps. The result of increased technology to facilitate the shopping experience requires the collection of data. Where there is collection of data, there are privacy concerns to be addressed. Pam Dixon, the executive director of the World Privacy Forum, has remarked that the media has focused on companies’ tracking through Internet browsers, but the public is, for the most part, unaware of how brick and mortar stores are tracking them. She comments, “This is an entire business model that has sprung up that I think maybe three people in the entire country know about outside the industry.” Some of the technology thatfashion retailers are now using is so foreign to legal regulators that the privacy implications have not yet been clearly confronted. Throughout the shopping evolution we have gone from brick and mortar to online to eStore—the latest shift in the shopping experience merging technology and the brick and mortar space.I.BACKGROUND1.Brick and Mortar Stores Prior to the Wave of Online ShoppingThe biggest concern customers had in brick and mortar stores prior to the emergence of online shopping was when making their purchase at the point-of-sale. When a customer swipes a credit card at a reader to make a purchase, the machine reads the magnetic strip holding the customer’s personal information. The ease of fraudsters acquiring credit card data was most apparent to consumers in the wake of two major retailers being hacked. In November 2013, Target revealed that up to 110 million customers were affected by malware found from their point-of-sale devices giving unauthorized access to payment card data. Weeks later, Neiman Marcus acknowledged that 1.1 million of its customers were also affected by malicious software. While data breaches are unfortunately common, the amount of damage done in these instances was unique because of the large number of people that were affected by these breaches.2. eCommerce and Mobile AppsWhen customers go on any webpage, they are traced by tiny files and programs called “cookies.” There are two types of cookies: first-party and third-party. First-party cookies are collected by the direct website that the user is browsing on. Third-party cookies track a customer’s movement throughout all sites affiliated with the track company, and the company can collect information about the person to create a profile on the customer. Third-party cookies are usually the greater privacy concern. Once the cookies pick up the data, the data is used in algorithms that can help further connect the personal information that is collected with probable behavior data such as income, geographic location, and education. This information can not only help them further personalize ads, correspondence, and offers, but it also can puttogether independently anonymous information to identify an panies like Amazon use this data as a recommendation mechanism by monitoring everything that their customers do transactionally and even noting information on the purchases that are not actually made. Even though the consumer is providing a great amount of information, they are getting more accurate recommendations from Amazon.3.eStoresa.RFIDBeginning around 2012, retail stores began incorporating radio frequency identification (“RFID”) tags into their products. RFID is used to replace bar codes to help in inventory management. RFID tags are small electronic devices used to receive and transmit information from radio frequencies. Using this technology makes the distribution of products and materials more beneficial by keeping track of inventory and limiting costs, which serves as a mutual benefit to consumers as well as businesses. Beyond attaching to individual garments, RFID tags can be attached to materials used for shipping that can help let a manufacturer know where the products are until they reach the retailer. A benefit to RFID tags is that they are reusable and can be removed from the garment at checkout, which is cost effective for retailers. By providing accurate information on the availability of inventory and how to avoid stock-outs, RFID technology elevates the modern day shopper’s experience that expects to find what they want when they want it. The technology takes some of the responsibility away from the employees so they can better assist customers. Additionally, it assists retailers and manufacturers to better serve their retail spaces by looking at shopping patterns to make their supply chain more efficient. It seems to bea win for both the consumer and the manufacturer.b.Customer TrackingTechnology used inside stores is not only tracking the goods, it is tracking every movement people inside and outside of the store are making. These technologies generally use the Wi-Fi on a mobile device to connect to a customer, but sometimes the customer does not even have to connect to the store’s server to be tracked. One of the most commonly used trackers is Euclid Analytics (“Euclid”). Euclid has beendescribed as the “Google Analytics for the real world” and detects foot traffic within retail locations. Euclid connects to shoppers’ smartphones through Wi-Fi or Bluetooth technology and collects the mobile device’s media access control (“MAC”) addresses. MAC addresses are unique to each phone, and each address is stored to the Euclid server. Customers have the option to opt- out of the data collection on their phones and retailers using the technology are contractually and legally obligated to make shoppers aware of the use of this technology in their stores. In fact, Euclid provides retailers with a recommended sign to use in their retail space. The information collected about a consumer, known as Mobile Location Analytics, tells the retailer how long a customer is in each part of the store and where they choose to browse. Not only does that allow a retailer to strategize what products are more popular, it also allows the retailer to predict when the store will be busiest and how to use its sales staff more efficiently. Additionally, Euclid can track the number of people that walk by a store window and how long they stand in front of the window before making the decision to go inside or continue walking. This information is beneficial to a retailer to be able to adjust its window display to be more enticing to more customers.II.THERE IS VERY LITTLE REGULATION CONCERNING THE COLLECTION OF DATA IN RETAIL STORES.The amount of data that is collected by eStores sparks privacy concerns for consumers. Traditionally, privacy law has been thought of as four major torts: (i) unreasonable intrusion upon the seclusion of another; (ii) appropriation of the other’s name or likeness; (iii) unreasonable publicity given to the other’s private life; or (iv) publicity that unreasonably places the other in a false light before the public. However, privacy rights are protected by state law, and not all states recognize all four torts. Out of the four torts, intrusion upon the seclusion of others embodies the concerns with the information collected by retail technologies. Intrusion upon seclusion is an intrusion into a person’s private matters that are not of public concern, and this intrusion must be considered highly offensive by the reasonable person to be actionable.A major privacy concern with the gathering of customer information by retailers is that they are collecting highly sensitive person information known as personal identifiable information (“PII”). The United States Department of Labor defines PII as “any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.” This information can be isolated to identify an individual, such as a name, address, social security number, or phone number, or it can be a combination of elements that help to isolate a person among a group, such as gender, race, and geographic location. Unauthorized access to this information is known as a breach of security and risks the harm of releasing PII. Laws relating to PII are implemented in each state. While many are the same, some are stricter than others. California was the first to enact a data breach notification law in 2002, which required retailers to notify customers if there was a data breach that jeopardized their PII. A delay or lack of disclosure would lead to criminal investigation. Almost all states now have some sort of notification law in place.The Federal Trade Commission (“FTC”) is permitted to regulate unfair methods of competition and unfair and deceptive acts in commerce. The FTC has explained its approach to data security is based on a reasonableness standard. The FTC set out four major guidelines for companies to follow in their collection of data: (i) knowing what information they have and who has access to it; (ii) limiting the collection and retention of information to what is necessary; (iii) using secure methods to protect the information; and (iv) disposing information when it is no longer necessary. Very few cases have been litigated with the FTC over data security and unfair practices. Currently, Wyndham Hotels & Resorts, LLC is litigating in the Third Circuit over the FTC’s ability to bring an unfairness claim for data security. The outcome of that decision could impact how data security is regulated in the United States as well as potentially leading to more FTC enforcement than before. To handle possible information leaks, the FTC has guides for businesses to help protect customer information and avoid security breaches and identity theft. Additionally, under the Fair Credit Reporting Act, businesses that accept credit or debit cards are required totruncate or eliminate all but the last five digits of the card number on the customer’s receipt at the point-of-sale.III.ESTORES SHOULD DEVELOP SELF-REGULATORY SCHEMES TO ADDRESS PRIV ACY CONCERNS WITH THE CUSTOMER DATA THAT IS COLLECTEDLawmakers are discussing the changes happening in the retail space. Senator Charles Schumer has called retailer tracking of buyers “intrusive and unsettling.” While the FTC regulates deceptive or unfair conduct that companies engage in, the FTC has yet to bring any enforcement actions against a fashion company for tracking. Without any regulatory or legal precedent it is difficult to determine if companies are crossing the line with the collection of this data. This poses two major questions: (i) Does the definition of PII need to be expanded? and (ii) Are customers ready to accept the technological capabilities of these shopping enhancing services?The California courts have used a wider interpretation of PII, but it seems that PII may need to be expanded to less specific information that can still be used to identify people. Data collection, particularly by mobile location analytics systems, are allowed in these practices because they are not collecting what has been defined as traditional PII. Non-PII can be pieced together with other information to personalize the information and connect it to a particular individual. A new approach to PII has been explained as information that has a good possibility of future identification.Even though some customers have heightened awareness around the information that is collected about them, customers have also become accustomed to having a highly personalized shopping experience and expect these types of services from their retailers. Some customers are willing to give up their personal information for the perks that companies will give them, even if they are unaware of how the information is being collected. Consumers are willing to trade their personal information if it means they will be rewarded with exclusive perks and coupons. A Seattle based company developed a mobile app that gave customers cash and gift cards in exchange for information about where the customer was in a store. The app has gained asignificant following despite selling customer’s gender, age, and income to store owners, online retailers, and app developers. There is a hard balance between what customers want in their shopping experience and what they are willing to give up to get these benefits. However, customers should not feel hopeless with the growing world of technology and data collection. In fact, customers do have tools to prevent or allow information to be collected about them.California’s privacy-related laws are the broadest and most robust, but they have an overall theme of providing as much information as possible to the people whose privacy is being impacted. The key to harmonizing the tension between customers and retailers is transparency, which is what California laws seem to be emphasizing. The more information that is made available to consumers, the more comfortable they will feel because it is no longer a hidden secret. There are a great number of people who are unaware of this information, and a leak of their information can feel like a violation of their rights. However, providing disclaimers that can be easily understood in a direct and non-intimidating manner will help to develop a trusting relationship between retailers and customers. Relationships between retailers and customers are just like any other type of relationship: to be sustained they must be built on trust.The reality is that data collection is not going to slow down, but customers need to have the ability to control their data. Customers can turn off Wi-Fi and Bluetooth services to prevent mobile location analytics from working, but this is impractical because consumers are likely to forget. However, companies participating in the Code allow customers to opt-out of their services by registering online. This seems like the more practical solution for customers to protect themselves with one opt-out rather than voluntarily adjusting their phone setting every time they are in a retail space. The importance of clear opt-out procedures is apparent in the consent order between Nomi Technologies, a mobile location analytics tracker, and the FTC. Nomi recently settled with the FTC over investigation that Nomi was not properly allowing opt-out mechanisms for in-store collection of data, even though Nomi had a clear opt-out mechanism on their website. This stresses the importance of complying with opt-out procedures. Additionally, there is some push to allow the collection of data but to useit in an aggregate way. Rather than pinpointing individual patterns, looking at a group of people to indicate a trend can be more beneficial to a company’s strategy and simultaneously protect the identities of the customers they are monitoring.CONCLUSIONThe evolution of the eStore is a shopping experience that customers should be eager to embrace. If retailers want to run the most efficient business based on the data they collect about their customers, they must always put the customer first by prioritizing the customer’s right to know what data is being collected. Shoppers will continue to make purchases in brick and mortar stores even as they become eStores, but transparency will help cultivate and maintain the type of relationship that will be most mutually beneficial for both parties.中文译文:新零售体验及其未解决的隐私问题:无线射频识别和移动位置分析是如何收集客户信息的引言美国人喜欢购物。
RFID技术外文翻译文献(文档含中英文对照即英文原文和中文翻译)原文:Current RFID TechnologyThis section describes out of which parts RFID tags consist of, how they work in principle, and what types of tags do exist. It focuses on how tags are powered and what frequency ranges is used. The section concludes by covering a few important standards.RFID transponders (tags) consist in general of: Micro chip, Antenna, Case, Battery (for active tags only)The size of the chip depends mostly on the Antenna. Its size and form is dependent on the frequency the tag is using. The size of a tag alsodepends on its area of use. It can range from less than a millimeter for implants to the size of a book in container logistic. In addition to the micro chip, some tags also have rewritable memory attached where the tag can store updates between reading cycles or new data like serial numbers.A RFID tag is shown in figure 1. The antenna is clearly visible. As said before the antenna has the largest impact of the size of the tag. The microchip is visible in the center of the tag, and since this is a passive tag it does not have an internal power sourceIn principle an RFID tag works as follows: the reading unit generates an electro-magnetic field which induces a current into the tag's antenna. The current is used to power the chip. In passive tags the current also charges a condenser which assures uninterrupted power for the chip. In active tags a battery replaces the condenser. The difference between active and passive tags is explained shortly. Once activated the tag receives commands from the reading unit and replies by sending its serial number or the requested information. In general the tag does not have enough energy to create its own electro-magnetic field, instead it uses back scattering to modulate (reflect/absorb) the field sent by the reading unit. Because most fluids absorb electro-magnetic fields and most metal reflect those fields the reading of tags in presence of those materials is complicated.During a reading cycle, the reader has to continuously power the tag. The created field is called continuous wave, and because the strength of the field decreases with the square of the distance the readers have to use a rather large power. That field overpowers any response a tag could give, so therefore tags reply on side-channels which are located directly below and above the frequency of the continuous wave.1. Energy SourcesWe distinguish 3 types of RFID tags in relation to power or energy: Passive, Semi-passive, Active Passive tags do not have an internal power source, and they therefore rely on the power induced by the reader. This means that the reader has to keep up its field until the transaction is completed. Because of the lack of a battery, these tags are the smallest and cheapest tags available; however it also restricts its reading range to a range between 2mm and a few meters. As an added benefit those tags are also suitable to be produced by printing. Furthermore their lifespan is unlimited since they do not depend on an internal power source.The second type of tags is semi-passive tags. Those tags have an internal power source that keeps the micro chip powered at all times. There are many advantages: Because the chip is always powered it can respond faster tore quests, therefore increasing the number of tags that can be queried per second which is important to some applications. Furthermore, since the antenna is not required for collecting power it canbe optimized for back scattering and therefore increasing the reading range. And last but not least, since the tag does not use any energy from the field the back scattered signal is stronger, increasing the range even further. Because of the last two reasons, a semi-active tag has usually a range larger than a passive tag.The third type of tags is active tags. Like semi-active tags they contain an internal power source but they use the energy supplied for both, to power the micro chip and to generate a signal on the antenna. Active tags that send signals without being queried are called beacons. An active tag's range can be tens of meters, making it ideal for locating objects or serving as landmark points. The lifetime is up to 5 years.2. Frequency BandsRFID tags fall into three regions in respect to frequency: Low frequency (LF, 30- 500kHz), High frequency (HF.10-15MHz), Ultra high frequency (UHF, 850- 950MHz, 2.4-2.5GHz, 5.8GHz)Low frequency tags are cheaper than any of the higher frequency tags. They are fast enough for most applications, however for larger amounts of data the time a tag has to stay in a readers range will increase. Another advantage is that low frequency tags are least affected by the presence of fluids or metal. The disadvantage of such tags is their short reading range. The most common frequencies used for low frequency tags are 125-134.2 kHz and 140-148.5 kHz.High frequency tags have higher transmission rates and ranges but also cost more than LF tags. Smart tags are the most common member of this group and they work at 13.56MHz. UHF tags have the highest range of all tags. It ranges from 3-6 meters for passive tags and 30+ meters for active tags. In addition the transmission rate is also very high, which allows to read a single tag in a very short time. This feature is important where tagged entities are moving with a high speed and remain only for a short time in a readers range. UHF tags are also more expensive than any other tag and are severely affected by fluids and metal. Those properties make UHF mostly useful in automated toll collection systems. Typical frequencies are 868MHz (Europe), 915MHz (USA), 950MHz (Japan), and 2.45GHz.Frequencies for LF and HF tags are license exempt and can be used worldwide; however frequencies for UHF tags differ from country to country and require a permit.3. StandardsThe wide range of possible applications requires many different types of tags, often with conflicting goals (e.g. low cost vs. security). That is reflected in the number of standards. A short list of RFID standards follows: ISO11784, ISO11785, ISO14223, ISO10536, ISO14443, ISO15693, ISO18000. Note that this list is not exhaustive. Since the RFID technology is not directly Internet related it is not surprising that there are no RFCs available. There cent hype around RFID technologyhas resulted in an explosion in patents. Currently there are over 1800 RFID related patents issued (from 1976 to 2001) and over 5700 patents describing RFID systems or applications are backlogged.4. RFID SystemsA RFID reader and a few tags are in general of little use. The retrieval of a serial number does not provide much information to the user nor does it help to keep track of items in a production chain. The real power of RFID comes in combination with a backend that stores additional information such as descriptions for products and where and when a certain tag was scanned. In general a RFID system has a structure as depicted in figure 2. RFID readers scan tags, and then forward the information to the backend. The backend in general consists of a database and a well defined application interface. When the backend receives new information, it adds it to the database and if needed performs some computation on related fields. The application retrieves data from the backend. In many cases, the application is collocated with the reader itself. An example is the checkout point in a supermarket (Note that the given example uses barcodes instead of RFID tags since they are more common; however, the system would behave in exactly the same way if tags were used). When the reader scans the barcode, the application uses the derived identifier to look up the current price. In addition, the backend also provides discount information for qualifying products. The backendalso decreases the number of available products of that kind and notifies the manager if the amount falls below a certain threshold.This section describes how RFID tags work in general, what types of tags exist and how they differ. The three frequency ranges that RFID tags typically use are LF, HF, and UHF. Also the difference between passive, semi-passive, and active tags was explained and their advantages and disadvantages were compared. The section concluded by looking at different standards and showed the great interest of the industry by counting the number of issued and backlogged patents [US Patent Office].翻译:当前的RFID技术该节描述的是RFID标签由哪些部分组成、工作原理和确实存在的标签类型,关注标签的供电方式和使用频率范围。
RFID技术外文翻译文献RFID技术外文翻译文献(文档含中英文对照即英文原文和中文翻译)原文:Current RFID TechnologyThis section describes out of which parts RFID tags consist of, how they work in principle, and what types of tags do exist. It focuses on how tags are powered and what frequency ranges is used. The section concludes by covering a few important standards.RFID transponders (tags) consist in general of: Micro chip, Antenna, Case, Battery (for active tags only)The size of the chip depends mostly on the Antenna. Its size and form is dependent on the frequency the tag is using. The size of a tag alsodepends on its area of use. It can range from less than a millimeter for implants to the size of a book in container logistic. In addition to the micro chip, some tags also have rewritable memory attached where the tag can store updates between reading cycles or new data like serial numbers.A RFID tag is shown in figure 1. The antenna is clearly visible. As said before the antenna has the largest impact of the size of the tag. The microchip is visible in the center of the tag, and since this is a passive tag it does not have an internal power source In principle an RFID tag works as follows: the reading unit generates an electro-magnetic field which induces a current into the tag's antenna. The current is used to power the chip. In passive tags the current also charges a condenser which assures uninterrupted power for the chip. In active tags a battery replacesthe condenser. The difference between active and passive tags is explained shortly. Once activated the tag receives commands from the reading unit and replies by sending its serial number or the requested information. In general the tag does not have enough energy to create its own electro-magnetic field, instead it uses back scattering to modulate (reflect/absorb) the field sent by the reading unit. Because most fluids absorb electro-magnetic fields and most metal reflect those fields the reading of tags in presence of those materials is complicated.During a reading cycle, the reader has to continuously power the tag. The created field is called continuous wave, and because the strength of the field decreases with the square of the distance the readers have to use a rather large power. That field overpowers any response a tag could give, so therefore tags reply on side-channels which are located directly below and above the frequency of the continuous wave.1. Energy SourcesWe distinguish 3 types of RFID tags in relation to power or energy: Passive, Semi-passive, Active Passive tags do not have an internal power source, and they therefore rely on the power induced by the reader. This means that the reader has to keep up its field until the transaction is completed. Because of the lack of a battery, these tags are the smallest and cheapest tags available; however it also restricts its reading range to a range between 2mm and a few meters. As an added benefit those tags are also suitable to be produced by printing. Furthermore their lifespan is unlimited since they do not depend on an internal power source.The second type of tags is semi-passive tags. Those tags have an internal power source that keeps the micro chip powered at all times. There are many advantages: Because the chip is alwayspowered it can respond faster tore quests, therefore increasing the number of tags that can be queried per second which is important to some applications. Furthermore, since the antenna is not required for collecting power it canbe optimized for back scattering and therefore increasing the reading range. And last but not least, since the tag does not use any energy from the field the back scattered signal is stronger, increasing the range even further. Because of the last two reasons, a semi-active tag has usually a range larger than a passive tag.The third type of tags is active tags. Like semi-active tags they contain an internal power source but they use the energy supplied for both, to power the micro chip and to generate a signal on the antenna. Active tags that send signals without being queried are called beacons. An active tag's range can be tens of meters, making it ideal for locating objects or serving as landmark points. The lifetime is up to 5 years.2. Frequency BandsRFID tags fall into three regions in respect to frequency: Low frequency (LF, 30- 500kHz), High frequency (HF.10-15MHz), Ultra high frequency (UHF, 850- 950MHz, 2.4-2.5GHz, 5.8GHz) Low frequency tags are cheaper than any of the higher frequency tags. They are fast enough for most applications, however for larger amounts of data the time a tag has to stay in a readers range will increase. Another advantage is that low frequency tags are least affected by the presence of fluids or metal. The disadvantage of such tags is their short reading range. The most common frequencies used for low frequency tags are 125-134.2 kHz and 140-148.5 kHz.High frequency tags have higher transmission rates and ranges but also cost more than LF tags. Smart tags are the mostcommon member of this group and they work at 13.56MHz. UHF tags have the highest range of all tags. It ranges from 3-6 meters for passive tags and 30+ meters for active tags. In addition the transmission rate is also very high, which allows to read a single tag in a very short time. This feature is important where tagged entities are moving with a high speed and remain only for a short time in a readers range. UHF tags are also more expensive than any other tag and are severely affected by fluids and metal. Those properties make UHF mostly useful in automated toll collection systems. Typical frequencies are 868MHz (Europe), 915MHz (USA), 950MHz (Japan), and 2.45GHz.Frequencies for LF and HF tags are license exempt and can be used worldwide; however frequencies for UHF tags differ from country to country and require a permit.3. StandardsThe wide range of possible applications requires many different types of tags, often with conflicting goals (e.g. low cost vs. security). That is reflected in the number of standards. A short list of RFID standards follows: ISO11784, ISO11785, ISO14223, ISO10536, ISO14443, ISO15693, ISO18000. Note that this list is not exhaustive. Since the RFID technology is not directly Internet related it is not surprising that there are no RFCs available. There cent hype around RFID technologyhas resulted in an explosion in patents. Currently there are over 1800 RFID related patents issued (from 1976 to 2001) and over 5700 patents describing RFID systems or applications are backlogged.4. RFID SystemsA RFID reader and a few tags are in general of little use. The retrieval of a serial number does not provide much informationto the user nor does it help to keep track of items in a production chain. The real power of RFID comes in combination with a backend that stores additional information such as descriptions for products and where and when a certain tag was scanned. In general a RFID system has a structure as depicted in figure 2. RFID readers scan tags, and then forward the information to the backend. The backend in general consists of a database and a well defined application interface. When the backend receives new information, it adds it to the database and if needed performs some computation on related fields. The application retrieves data from the backend. In many cases, the application is collocated with the reader itself. An example is the checkout point in a supermarket (Note that the given example uses barcodes instead of RFID tags since they are more common; however, the system would behave in exactly the same way if tags were used). When the reader scans the barcode, the application uses the derived identifier to look up the current price. In addition, the backend also provides discount information for qualifying products. The backendalso decreases the number of available products of that kind and notifies the manager if the amount falls below a certain threshold.This section describes how RFID tags work in general, what types of tags exist and how they differ. The three frequency ranges that RFID tags typically use are LF, HF, and UHF. Also the difference between passive, semi-passive, and active tags was explained and their advantages and disadvantages were compared. The section concluded by looking at different standards and showed the great interest of the industry by counting the number of issued and backlogged patents [USPatent Office].翻译:当前的RFID技术该节描述的是RFID标签由哪些部分组成、工作原理和确实存在的标签类型,关注标签的供电方式和使用频率范围。
Introduction Chapter RFID Basics1.1 Definition of RFIDWhat is RFID,Radio Frequency Identification RFID is the abbreviation, that is, radio frequency identification, commonly known as RFID. RFID is the main core components of an electronic tag, less than 2 mm in diameter just by a few centimeters to several meters distance away from the radio waves emitted sensor, can read information stored in electronic tags, identification tag representative of the goods, people and equipment status.1.2 RFID radio frequency identification technology, the concept ofRadio Frequency Identification RFID is a non-contact automatic identification technology that automatically recognizes through the target RF signal and access to relevant data, identification of the work without human intervention, can work in all kinds of environments. RFID technology can identify fast moving objects and can also identify multiple tags, the operation quickly and conveniently.Ferguson, chief scientist of Accenture Labs is a breakthrough that the RFID technology: "First, the individual can be identified very specific objects, rather than bar codes can only be identified as a class of objects; second, the use of radio frequency can read data through the external materials, but must rely on laser to read bar code information; Third, multiple objects simultaneously literacy, and bar code can only be read one by one. In addition, the amount of information stored is also very large. "1.3 RFID's basic componentsThe most basic RFID system consists of three components:Tag (Tag): the coupling components and chips, and each tag has a unique electronic code, attachedto the object identified target audience;Reader (Reader): read (sometimes also write) tags for a device that can be designed for handheldAntenna (Antenna): the label and pass RF signals between the reader.1.4 RFID technology, the basic working principleThe basic principle of RFID technology is not complex: labels into the magnetic field, the receiver RF signals emitted by interpretation, by virtue of induced current obtained by sending out the energy stored in the chip in the product information (Passive Tag, passive tags or passive tags) , or take the initiative to send a frequency signal (Active Tag, active tags or active tags); readers to read the information and decode the information sent to the central data processing system related.Chapter RFID technology standards2.1 RFID Overview of relevant standards[Abstract] RFID technology and its application to the relevant standards for a structured sort, and analyze the RFID-related standards in China's development, RFID standard of social factors, such as a standard drive.Standards to ensure that the conduct work together, to achieve economies of scale, work to implement the security and many other areas. The main purpose of RFID standardization through the development, distribution and implementation of standards to resolve coding, communications, air interface and data sharing issues such as maximum promote RFID technology and related system. But if the criterion used by the early, may restrict development and progress of technology; if used too late, then may limit the application of technology, lead to dangerous incidents and unnecessary overhead.In fact, RFID related standards related to many of its specific application, such as: electronic toll collection system, pet identification, cargo container identification and smart card applications. The RFID is mainly used for logistics management, etc., need to tag to achieve data sharing. Currently, many RFID-related ISO standards are being developed, including recycled shipping containers, returnable transport single items, transport units, product packaging, product identification and electronic container seals and so on. From GS1 (e-commerce, goods identification, global data synchronization exchange standards organization), EPC Global and ISO to a number of national and local organizations (such as Japan, UID, etc.) and other US IEEE and AIM Global RFID-related standards have been involved in Development of these.As WiFi, WiMax, Bluetooth, ZigBee, dedicated short range communication protocol (DSRC) and other short-range wireless communication protocol is being used for RFID systems or RFID devices into them, which makes the practical application of RFID, etc. have becomemore complex. In addition, RFID which "interface the interface between the" short-range wireless communications (Near Field Communication, NFC) for use has its root: its use of RFID devices usually the best frequency.Expert analysis of a reference for the industry, RFID and standard relations can be run froma deal with the following questions:(1) technology - such as the interface and transfer technologies. For example, the middleware technology-RFID middleware, RFID tags and applications to play an intermediary role between, from an application client uses a set of middleware provides a common application program interface (API), which can be connected to the RFID reader, read RFID tag data. RFID middleware using program logic and memory to transfer him (Store-and-Forward) functions to provide order of message flow with data flow design and management.(2) consistency. Mainly refers to its ability to support multiple encoding formats, such as support for EPC, DOD and other provisions of encoding formats, including EPCglobal tag data format required by the standard.(3) performance - particularly refers to the structure and content of data, or data encoding and memory allocation.(4) battery assisted and sensor fusion. Currently, RFID gradually with the integration of sensing, positioning items using RFID triangulation and more complex technology, and some RFID technology instead of using sensor chips. For example, to achieve the temperature and strain sensing of surface acoustic wave (SAW) tags used in RFID technology. However, almost all of the sensor system, including active RFID and so need to get energy from the battery.(A) ISO / IEC standards related to RFIDISO / IEC RFID standards have been introduced in the main concern of basic building blocks, air interface, data structures involved and their implementation. Concrete can be divided into technical standards, data content standards, consistent application of standards and standard four.2.2 RFID technology standard AspectsRFID reader sends a frequency known as the RFID system frequency or carrier frequency. RFID carrier frequency are basically three areas: low-frequency (30kHz ~ 300kHz), high frequency (3MHz ~ 30MHz) and UHF (300MHz ~ 3GHz). Common frequency withlow-frequency 125kHz and 134.2kHz, high frequency 13.56MHz, UHF 433Mhz, 860MHz ~ 930MHz, 2.45GHz so.The low frequency RFID system is mainly used for short-range, low-cost applications, such as most of the access control, campus cards, gas, water, etc.; high-frequency system is required to transmit large amounts of data for application systems; ultra-high frequency system applications read and write at a longer distance and higher access speed of the occasion, the direction of the antenna beam is narrow and the price is high, train control, highway toll applications and other system. Also worth mentioning that in the supply chain application, EPC Global EPC provides for carrier frequency of 13.56MHz and 860MHz ~ 930MHz two bands, which use the standard 13.56MHz frequency prototype is ISO/IEC15693, has revenues to the ISO / IEC18000-3 in. The frequency application has been very mature.And 860 ~ 930MHz frequency band applications are more complex, the international use of the frequency of the different countries: the United States for the 915MHz, Europe 869MHz, while the country caused by the GSM, CDMA and other occupation, is still to be determined.Common international standards for RFID at present mainly used for animal identification in the ISO 11784 and 11785 for contactless smart cards ISO 10536 (Close coupled cards), ISO 15693 (Vicinity cards), ISO 14443 (Proximity cards), for container identification The ISO 10374, etc.. Some standards are being formed and perfected, such as supply chain, ISO 18000 for passive UHF (860Mhz ~ 930Mhz carrier frequency) of the C1G2 standard would be formally launched soon, our own national standards would be introduced as early as the end of this year . Following several criteria to be brief on this.ISO 11784 and ISO 11785Provisions of ISO 11784 and 11785 respectively, the animal identification code structure and technical guidelines, standards of style size transponder not be provided, so you can designed for animals involved in various forms, such as glass tubes, ear tag or collar and so on. Technical guidelines for data transfer method transponder and reader specifications. Operating frequency 134.2KHz, data transmission has two full-duplex and half duplex, differential phase data reader source said. Transponder using FSK modulation, NRZ coding.Because of the transponder long charging time and frequency constraints, communication rate lower.ISO 10536, ISO 15693 and ISO 14443ISO 10536 standards for major development in 1992 and 1995, due to the high cost of this card, contactless IC card, compared with the advantages of small, so this card has never been on the market.ISO 14443 and ISO 15693 standards for operation in 1995, a single system to enter the market in 1999, the completion of the two standards is after 2000. Both of which 13.56MHz carrier frequency alternating signal: ISO15693 read and write distance, of course, also with the application of antenna shape and the transmitted power; and ISO 14443 reader from slightly close, but was widely applied in the current second-generation e-ID standard used in ISO 14443 TYPE B protocol.ISO14443 defined TYPE A, TYPE B are two types of agreements. Communication rate of 106kbits / s, mainly in their different carrier modulation depth and position of the encoding.Transmission from PCD to PICC signal, TYPE A encoding a modified Miller, 100% modulation depth of ASK signal; TYPE B are encoded using NRZ modulation depth of 10% of the ASK signal.Transmission from PICC to PCD signals, both of which transmit signals by modulating the carrier, subcarrier frequency are all 847KHz. TYPE A with switch keying (On-Off keying) of Manchester encoding; TYPE B of BPSK with NRZ-L coding.Compared with TYPE A TYPE B, as modulation depth and the different encoding with transmit power without interruption, the rate higher, the advantages of stronger anti-interference ability.ISO 15693 standard specifies the carrier frequency also 13.56MHz, VCD and the VICC using ASK modulation for all modulation depth of 10% and 100%, VICC two modulation depth must be correct decoding.Transmit the signal from VCD to VICC when encoding for the two: "256 1" and "4 1." Both of which the fixed period of time to position coding. Both the choice of encoding and modulation depth. 10% ASK modulation of priority in the use of long-distance mode, in which combinations, and the carrier signal of field strength than the lower sideband modulation wave field strength to allow full use of license magnetic field intensity on the IC card to provide energy. On the contrary, readers of "4 1" code can be 100% ASK modulation and a combination of shorterdistances in the role of readers in the vicinity or in use by shielding.Transmit the signal from VICC to VCD, use sub-carrier load modulation. Resistance or capacitance impedance of the sub-carrier modulation frequency of the clock in turned on and off. The subcarrier data stream itself is encoded in the Manchester modulated clock in the use of ASK or FSK modulation. Modulation choice is sent by the reader in the FLAG byte transfer protocol tag bit to indicate, therefore, VICC always supports two methods: ASK (sub-carrier frequency of 424KHz) and FSK (sub-carrier frequency 424/484KHz ). The choice of the same data rate in bits by the FLAG to show, and it must support two rates: high-speed and low speed. The two rate used subcarrier according to different rates of slightly different when the low single sub-carrier for the 6.62kbits / s, high-speed for the 26.48kbits / s; when the dual sub-carrier respectively 6.67kbits / s and 26.69kbits / s.Visible, ISO 15693 application more flexible, operating from far and, more importantly, it is compatible with the ISO 18000-3, ISO 15693 standards in the future to understand about our country's national standard is useful, because certainly our national standards and Most compatible with ISO 18000.In the same period of time if there is more than one VICC or PICC same response, it indicates a collision. The core of RFID anti-collision technology, which is contactless IC card and the main difference. ISO 14443-3 provides TYPE B TYPE A and anti-collision mechanism. Both anti-collision mechanism works differently: the former is based on the bit collision detection protocol, and TYPE B through a series of command sequences to complete anti-collision; ISO 15693 by round search mechanism, time-sharing manner inquiries anti-collision mechanism, the third in a standard Some have detailed requirements.Anti-collision mechanism allows read and write while in the region more than the correct operation of the card is possible only with the algorithm programmed to automatically select one of the first reading of a card reading and writing. This will not only facilitate the operation, but also to improve the operation speed.If the hardware co-Keyong some algorithms to achieve more rapid identification card, such as TI's R6C interface chip has a decoding error indication pin, which allows more rapid identification card: When the collision arises pin change, Ci Shi record low UID bit is used to query, and then based on the increase in the low median query until no collision occurs, so thatyou can identify all the cards.2.3 RFID front-end technical standard system outlined[Abstract] the most commonly used international standards for RFID are mainly used for animal identification in the ISO 11784 and 11785 for contactless smart cards ISO 10536, ISO 15693, ISO 14443, ISO 10374 for the container and so identified.RFID technology has many outstanding advantages: realization of a passive and contactless operation, application convenience, no mechanical wear, long life equipment directly to end users without opening up the physical interface, to better ensure the safety of equipment; data security In addition to the password protected area label, the data part of the safety management can be a number of algorithms such as DES, RSA, DSA, MD5, etc., reading and writing equipment and mutual authentication between cards can achieve secure communication and storage; total cost has been on the decline among closer contact IC card costs and even lower, to lay the foundation for many of its applications; application Ling Yu Ye is very wide, RFID technology Yijing logistics management, production station Shibie, green animal Yangzhigeti Ji Lu tracking, vehicle security control, identity card, a large number of successful application fields of public transportation.2.5 RFID-related standards of social factorsWireless communication management - such as ETSI (RFID RF Express Note: The European Telecommunications Standards Institute), FCC (RFID RF Express Note: Federal Communications Commission) and other related requirements;Human health - mainly the ICNIRP (International Commission on Non-Ionizing Radiation Protection), a World Health Organization and other institutions to provide information on Non-Ionizing Radiation Protection of the proposed independent body of the relevant requirements, many countries use the recommended standards as the country's radiation specifications. The main is the operating frequency, power, radio waves and other health effects of radiation standards.Privacy. Privacy problem solving based on the principle of consent, that is, whether the user or consumer level of tolerance.Data security-OECD (RFID RF Express Note: Organization for Economic Cooperation and Development) has released the relevant documents, providing information systems and networksecurity guidelines. And ISO 17799 (information security management practices code) similar to, is not mandatory to follow these guidelines, but these guidelines are for the information security program to provide a solid foundation.2.6 RFID-related standards for the operation in ChinaRFID technology in the first 10 years, the RFID technologies unprecedented warm discussion of international standards, the International Organization for Standardization ISO / IEC JTCl SC31 lower RFID Standardization Committee set up working group WG4. China RFID-related standardization activities, appointed by the beacon Automatic Identification and Data Collection Sub-Committee, Counterpart International ISO / IEC JTC1 SC31, for bar code and radio frequency part of the national standards for the centralized management.EAN bar code and national standards authorities in the field is the Standardization Administration, the national standard RF Ministry of Information Industry and the State authorities is the Standardization Administration, the field of technical focal points appointed by the beacon automatic identification and data collection technology sub-committee responsible for .China ISO / IEC JTC1 SC31 secretariat Article Numbering Centre of China. Article Numbering Centre of China affiliated to the China Association for Automatic Identification Technology in 2003, began to organize their radio working group began tracking and senior industry experts to conduct research of international standard ISO/IEC18000, has completed work on the draft standards, ISO18000-related national standard developed Committee this year and officially approved national standard, the next year will see the relevant national standard based on the standard of this series.Chapter RFID technology features and the difficulties3.1 RF technology and bar code technology differences[Abstract] RF technology and bar code are two different technologies have different scope, sometimes overlapping. The biggest difference between the two is bar codes are "visual technology." RFID tags as long as the role of the receptor context can be read.3.2 Features and System Smart Label Printing Technology Analysis[Abstract] smart label printing with traditional label printing with great distinction, as smarttags and chips are unique, can not withstand the pressure of printing, so, in addition to inkjet printing, the general is using the first printing surface and then combined with the chip layer, cutting the process.The traditional bar code label widely used in various industries and the role of its convenient and some security features have become the people's consensus, but as people for goods production, storage, durability, security, management and many other aspects of more higher and more comprehensive information needs, the traditional barcode labels apparently powerless, and it is not only unable to provide commodity production, management, information, product shelf life can not warn the required temperature, etc., the effect on security, but also because of its single print easy to copy the effect of losing the security of goods. With advances in technology and applications in the field of labeling, a new, multi-functional, with good security results have begun to widely used smart tags, it will bring new label printing system of vigor and vitality.3.3 SAW RFID technology and application of passive RFID tagsRadio Frequency Identification SystemRadio Frequency Identification (RFID) technology is a non-contact automatic identification technology, its basic principlesIs the use of radio frequency signal and its spatial coupling, transmission characteristic, stationary or movingAutomatic identification of items of machinery to be identified.Radio frequency identification system generally consists of two parts, namely, electronic tags and readers. ElectronicBetween tag and reader device by coupling the RF signal of Space (contactless) coupling, In the coupling channel, according to temporal relations, to achieve energy transfer, the data exchange. OccurReader and tag in the RF signal coupling between the two types:Distance of less than 1m, the typical role of distance 10cm ~ 20cm. Electromagnetic backscatter coupling generally suitable for high-frequency, microwave, radio frequency identification system of remote work. Typical working frequency: 433MHz, 868MHz, 915MHz, 2.45GHz, 5.8GHz. RecognitionDistance greater than 1m, a typical operating range for the 3m ~ l0m.Tag, also known as radio frequency tags, transponders, data carriers, electronic tag attached toItems to be identified, the RFID system is the real data carrier. In general, electricSub-tags from the tag antenna and tag-specific chip.Power supply based on the different electronic tags can be divided into active tags (Active tag)And passive tags (Passive tag) are two types of active tag that has the battery, no built-in battery passive tags.Reader device, also known as read, readers can read / write or read-only device forWhen the electronic tag attached to identify items to be read out by its range, the automatic no-touchManner agreed upon electronic label identifying information removed, toautomatically identify objects orAutomatic collection of identification information of the feature articles.SAW device technologySAW (SAW) is transmitted to the piezoelectric crystal surface mechanical wave, the speed of sound is onlySpeed of one hundred thousandth of electromagnetic wave, propagation attenuation is small. SAW devices are used in the piezoelectric substrate interdigitated micro process technology, electro-acoustic transducer shape and reflector coupler, using the piezoelectric effect of substrate materials, through the input interdigital transducer (IDT) to power signals into sound Signal, and limited spread of the substrate surface, the output IDT to restore the voice signal into electrical signals, to achieve power - sound - power transformation process, the completion of signal processing, access to various applications of electronic devices. Use of advanced microelectronics manufacturing processing technology of SAW devices with small size, light weight, high reliability, consistency, and design a flexible multi-functional advantages, such as communications, television, remote control and alarm system has been widely applications, hundreds of millions of mobile phones and television sets are applied in a number of SAW filters. With the rapid development of processing technology, SAW device operating frequency covers10MHz ~ 2.5GHz, is essential for modern information technology industry, the key components.Chapter IV Application of RFID Technology4.1 RFID technology, typical applicationsLogistics and Supply ManagementManufacturing and assemblyAirline baggage handlingMail / Express package dealDocument tracking / Library ManagementAnimal identityMovement timeAccess Control / Electronic TicketsAutomatic toll road4.2 The reasons for retailers to respected RFIDAccording to Sanford C. Bernstein analysts estimate the company's retail business, through the use of RFID, Wal-Mart could save 8.35 billion U.S. dollars per year, mostly because the purchase of the bar code does not need manual see savings in labor costs. While other analysts believe that 8 billion U.S. dollars of this figure is too optimistic, but there is no doubt, RFID will help to solve the two biggest problems Retail: goods out of stock and loss (due to theft and supply chain to be disturbed for the loss of product) , and now just the theft of a Wal-Mart one-year loss in almost two billion U.S. dollars, if a legitimate company's turnover could reach this figure, we can in the U.S. 1000 list of largest companies ranked 694. Research estimates that RFID technology can help to reduce theft and inventory levels of 25%.4.3 RFID and RFID inventory management[Abstract] tag is nowadays the most advanced non-contact sensor technology, anti-collision of RFID tags, packaging arbitrary, long life and can be reused and so on, so that RFID inventory management inventory management techniques designed to become the new favorite.Tag is nowadays the most advanced non-contact sensor technology, since 1998, Texas Instruments (TI) and the Netherlands, Philips (Philips) announced the development of a low-cost non-contact sensor chip, to 2000, the International Standardization This organization has writtena non-contact sensor chip international standard ISO15693.4.4 RFID in the food and medicine and other important market developments[Abstract] RFID technology, including new developments in long-range non-UHF tags can be applied to the substrate of the RFID device more refractory and resistant to the sterilization process of the RFID tag. This article will tell you for food, medicine and other important markets, these are what it means.As we all know that in most countries of the radio frequency under control, RFID can not be more than one meter outside the scope of the role, unless the use of UHF (ultra high frequency, that is, around 900MHz license-free frequency). If RFID tags are installed with the battery, then more long read range is also achievable, for vehicles, this is a viable option. However, these so-called life of active tags is limited, more expensive, their size is also relatively large, and there are more errors may occur in parts. Therefore, in accordance with the United States and Europe's leading retailers and the U.S. military's demands, UHF passive tags are used as food and other products, standardization of packaging and pallet RFID tags.RFID射频识别技术介绍第一章 RFID基础知识简介1.1 RFID的定义RFID是什么?RFID是Radio Frequency Identification的缩写,即射频识别,俗称电子标签。
仓储物流外文文献翻译中英文原文及译文2023-2023原文1:The Current Trends in Warehouse Management and LogisticsWarehouse management is an essential component of any supply chain and plays a crucial role in the overall efficiency and effectiveness of logistics operations. With the rapid advancement of technology and changing customer demands, the field of warehouse management and logistics has seen several trends emerge in recent years.One significant trend is the increasing adoption of automation and robotics in warehouse operations. Automated systems such as conveyor belts, robotic pickers, and driverless vehicles have revolutionized the way warehouses function. These technologies not only improve accuracy and speed but also reduce labor costs and increase safety.Another trend is the implementation of real-time tracking and visibility systems. Through the use of RFID (radio-frequency identification) tags and GPS (global positioning system) technology, warehouse managers can monitor the movement of goods throughout the entire supply chain. This level of visibility enables better inventory management, reduces stockouts, and improves customer satisfaction.Additionally, there is a growing focus on sustainability in warehouse management and logistics. Many companies are implementing environmentally friendly practices such as energy-efficient lighting, recycling programs, and alternativetransportation methods. These initiatives not only contribute to reducing carbon emissions but also result in cost savings and improved brand image.Furthermore, artificial intelligence (AI) and machine learning have become integral parts of warehouse management. AI-powered systems can analyze large volumes of data to optimize inventory levels, forecast demand accurately, and improve operational efficiency. Machine learning algorithms can also identify patterns and anomalies, enabling proactive maintenance and minimizing downtime.In conclusion, warehouse management and logistics are continuously evolving fields, driven by technological advancements and changing market demands. The trends discussed in this article highlight the importance of adopting innovative solutions to enhance efficiency, visibility, sustainability, and overall performance in warehouse operations.译文1:仓储物流管理的当前趋势仓储物流管理是任何供应链的重要组成部分,并在物流运营的整体效率和效力中发挥着至关重要的作用。
毕业论文(设计)文献翻译本翻译源自于:RFID Handbook (Second Edition)毕业设计名称:电力系统高速数据采集系统设计外文翻译名称:射频识别技术手册(第二版)学生姓名:翁学娇院(系):电子信息学院专业班级:电气10803指导教师:唐桃波辅导教师:唐桃波时间:2012年2月至2012年6月射频识别技术手册:基于非接触式智能卡和识别的原理和应用 第二版Klaus Finkenzeller版权 2003 John Wiley& Sons 有限公司国际标准图书编号:0-470-84402-75.频率范围和无线电许可条例5.1 频率范围因为射频识别系统产生和辐射电磁波,他们已被列为合法的无线电系统。
其他功能的无线服务在任何情况下都不能受到射频识别操作系统的干扰和损害。
尤其重要的是要确保RFID 系统不会干扰附近的广播和电视,移动无线电服务(警察、保安服务、工业),航海和航空无线电服务和移动电话。
对射频识别系统来讲,运动保健方面需要的其他无线电服务明显制约了适宜范围内的可操作频(图 5.1).出于这个原因,它通常是唯一可以使用的频率范围,已经有人预定了专供工业,科学和医学中的应用。
这些世界范围内的频率划分成国际频率范围(工业-科学-医学),它们也可以用于射频识别应用。
实际可用的射频频率f :图5.1 用于射频识别系统范围内的频率范围为135千赫一下的超长范围通过短波以及超短波到微波范围,包括最高频率24千兆赫。
在上述的135千赫的范围内,可用的ISM 频段是全球首选。
:图5.2 百万应答机单元中的不同频率范围的转发器的全球市场估计分布除了ISM 频率,整个频率范围内低于135千赫(在北美、南美和日本:低于400千赫)也是可用的,因为在这个范围内,它是可能与高磁场的优势联合工作的,特别是操作时电感耦合的射频识别系统。
对射频识别系统来说最重要的频率范围是0-135千赫,ISM 的是6.78左右(在德国不适用),13.56兆赫,27.125兆赫,40.68兆赫,433.92兆赫,869.0兆赫,915.0兆赫(不是在欧洲),2.45兆赫,5.8兆赫和24.125兆赫。
射频识别技术XXX摘要:射频识别技术(RFID)在近来几年得到了迅速旳发展。
其关键是运用无线电波来进行通信旳一种自动识别技术。
它与老式识别技术相比,具有远距离能迅速识别,数据存储量较大,数据可更新等优势。
其基本原理则是通过阅读器和粘贴在物体上旳电子标签间旳电磁耦合来进行旳数据通信。
本文以RFID技术为研究对象,论述RFID旳基本定义、系统旳构成部件、工作原理、分类、分析RFID技术旳优势,并简介RFID 技术旳重要应用例子。
关键字:射频识别技术自动识别技术电子标签Radio Frequency Identification technology and applications Abstract:Radio Frequency Identification technology has been rapid development. The key to RFID technology is an automatic identification technology which it uses radio waves to communicate. Compared with the traditional identification technology, RFID can quickly identify the large data in a large range, and also the data can be updated .RFID is an advanced form of automatic identification technology .I will give the definition of RFID, the components of the system, the working principle and classification and I will analyze the advantages of RFID technology, at last I will describe the main application areas of RFID technology.Keywords:Radio frequency identification technology Automatic Identification Technology Electronic tags 1 RFID技术与国内外研究现实状况1.1 RFID技术射频识别技术RFID--Radio Frequency Identification,又作电子标签或无线射频识别,是一种通信技术,可以通过无线电讯号识别特定目旳并读写有关数据,并且无需识别系统与特定目旳之间建立机械或光学接触。
山东理工大学毕业设计(外文翻译材料)学院:电气与电子工程学院专业:电子信息科学与技术学生姓名:指导教师:An Introduction to RFID TechnologyIn recent years, radio frequency identification technology has moved from obscurity into mainstream applications that help speed the handling of manufactured goods and materials. RFID enables a distance, and unlike earlier bar-code technology (see the sidebar), it does so without requiring a line of RFID tags (see figure 1) support a larger set of unique IDs than bar codes and can incorporate additional data such as manufacturer, product type, and even measure environmental factors such as temperature. Furthermore, RFID systems can discern many different tags located in the same general area without human assistance.So why has it taken over 50 years for this technology to become mainstream? The primary reason is cost. For electronic identification technologies to compete with the rock-bottom pricing of printed symbols, they must either be equally low-cost or provide enough added value for an organization to recover the cost elsewhere. RFID isn’t as cheap as traditional labeling technologies, but it does offer added value and is now at a critical price point that could enable its large-scale adoption for managing consumer retail goods. Here I introduce the principles of RFID, discuss its primary technologies and applications, and review the challenges organizations will face in deploying this technology.RFID principlesMany types of RFID exist, but at the highest level, we can divide RFID devices into two classes: active and passive. Active tags require a power source—they’re either connected to a powered infrastructure or use energy stored in an integrated battery. In the latter case, a tag’s lifetime islimited by the stored energy, balanced against the number of read operations the device must undergo. One example of an active tag is the transponder attached to an aircraft that identifies its national origin.Passive RFID is of interest because the ta gs don’t require batteries or maintenance. The tags also have an indefinite operational life and are small enough to fit into a practical adhesive label. A passive tag consists of three parts: an antenna, a semi- conductor chip attached to the antenna,and some form of encapsulation.The tag reader is responsible forpowering and communicating with a tag. The tag antenna captures energy and transfers the tag’s ID (the tag’s chip coordinates thisprocess). The encapsulation maintains the tag’s integrity and protects the antenna and chip from environmental conditions or reagents. The encapsulation could be a small glass vial (see figure 2a) or a laminar plastic substrate with adhesive on one side to enable easy attachment to goods (see figure2b).Two fundamentally different RFID design approaches exist for transferring power from the reader to the tag: magnetic induction and electromagnetic (EM) wave capture. These two designs take advantage of the EM properties associated with an RF antenna—the near field and the far field. Both can transfer enough power to a remote tag to sustain its operation—typically between 10 _W and 1 mW, depending on the tag type. (For comparison, the nominal power an Intel XScale processor consumes is approximately 500 mW, and an Intel Pentium 4 consumes up to 50 W.) Through various modulation techniques, near- and far-field-based signals can also transmit and receive data.Near-field RFIDFaraday’s principle of magnetic induction is the basis of near-field coupling between a reader and tag. A reader passes a large alternating current through a reading coil, resulting in an alternating magnetic field in its locality. If you place a tag that incorporates a smaller coil (see figure 3) in this field, an alternating voltage will appear across it. If this voltage is rectified and coupled to a capacitor, a reservoir of charge accumulates, which you can then use to power the tag chip.Tags that use near-field coupling send data back to the reader using load modulation. Because any current drawn from the tag coil will give rise to its own small magnetic field—which will oppose the reader’s field—the reader coil can detect this as a small increase in current flowing through it. This current is proportional to the load applied to the tag’s coil (hence load modulation).This is the same principle used in power transformers found in most homes today—although usually a transformer’s primary and secondary coil are wound closely together to ensure efficient power transfer. However, as the magnetic field extends beyond the primary coil, a secondary coil can still acquire some of the energy at a distance, similar to a reader and a tag. Thus, if the tag’s electronics applies a load to its own antenna coil and varies it over time, a signal can be encoded as tiny variations in the magnetic field strength representing the tag’s ID. The reader can then recover this signal by monitoring the change in current through the reader coil. Avariety of modulation encodings are possible depending on the number of ID bits required, the data transfer rate, and additional redundancy bits placed in the code to remove errors resulting from noise in the communication channel.Near-field coupling is the moststraightforward approach for implementing a passive RFID system. This is why it was the first approach taken and has resulted in many subsequent standards, such as ISO 15693 and 14443, and a variety of proprietary , near-field communication has some physical limitations.The range for which we can use magneticinduction approxi mates to c/2πf,where c is a constant (the speed of light)and f is the frequency. Thus, as the frequency of operation increases, the distance over which near-field coupling can operate decreases.A further limitation is the energy available for induction as a function of distance from theFar-field RFIDRFID tags based on far-field emissions capture EM waves propagating from a dipole antenna attached to the reader. A smaller dipole antenna in the tag receives this energy as an alternating potential difference that appears across the arms of the dipole.A diode can rectify this potential and link it to a capacitor, which will result in an accumulation of energy in order to power its electronics. However, unlike the inductive designs, the tags are beyond the range of the reader’s near field, and information can’t be transmitted back to the reader using load modulation. The technique designers use for commercial far-field RFID tags is back scattering. If they design an antenna with precise dimensions, it can be tuned to a particular frequency and absorb most of the energy that reaches it at that frequency. However, if an impedance mismatch occurs at this frequency, the antenna will reflect back some of the energy (as tiny waves) toward the reader which can then detect the energy using a sensitive radio receiver. By changing the antenna’s impedance over time, the tag can reflect back more or less of the incoming signal in a pattern that encodes the tag’s ID.In practice, you can detune a tag’santenna for th is purpose by placing a transistor across its dipole and then turning it partially on and off. As a rough design guide, tags that use far-field principles operate at greater than 100 MHz typically in the ultra high-frequency (UHF) band (such as GHz); below this frequency is the domain of RFID based on near-field coupling.A far-field system’s range is limited by the amount of energy that reaches the tagfrom the reader and by how sensitive the reader’s radio receiver is to the reflected signal. The actual return signal is very small, because it’s the result of two attenuations, each based on an inverse square law—the first attenuation occurs as EM waves radiate from the reader to the tag, and the second when reflected waves travel back from the tag to the reader. Thus the returning energy is 1/r4(again, r is the separation of the tag and reader).Fortunately, thanks to Moore’s law and the shrinking feature size of semiconductor manufacturing, the energy required to power a tag at a given frequency continues to decrease (currently as low as a few microwatts). So, with modern semiconductors, we can design tags that can be read at increasingly greater distances than were possible a few years ago. Furthermore, inexpensive radio receivers have been developed with improved sensitivity so they can now detect signals, for a reasonable cost, with power levels on the order of –100 dBm in the band. A typical far-field reader can successfully interrogate tags 3m away, and some RFID companies claim their products have read ranges ofup to 6m .EPCglobal’s work was key to promoting the design of UHF tags (see which has been the basis of RFID trials at both Wal-Mart and Tesco (see the sidebar for more information about the trials). EPCglobal was originally the MIT Auto-ID Center, a nonprofit organization set up by the MIT Media Lab. The center later divided into Auto-ID labs, still part of MIT, and EPCglobal, a commercial company. This company has defined an extensible range of tag standards, but its Class-1 Generation-196-bit tag is the one receiving the most attention of late. This tag can label over 50 quadrillion (50 -1015) items, making it possible to uniquely label every manufactured item for the foreseeable future—not just using generic product codes. This isn’t neces sary for basic inventory control, but it has implications for tracing manufacturing faults and stolen goods and for detecting forgery.Adopting a standard: The Near-Field Communication Forum An important recent development opens up new possibilities for more widespread RFID applications. Since 2002, Philips has pioneered an open standard through EMCA International,resulting in the Near-Field Communication Forum The forum sets out to integrate active signaling between mobile devices using nearfield coupling, and it uses an approach that is compatible with reading existing passive RFID products. The new NFC standard aims to provide a mechanism by whichwireless mobile devices can communicate with peer devices in the immediate locality (up to 20 cm), rather than rely on the discovery mechanisms of popular short-range radio standards, such as Bluetooth and Wi-Fi, have unpredictable propagation characteristics and might form associations with devices that aren’t local.The NFC standard aims to streamline the discovery process by passing wireless Media Access Control addresses and channel-encryption keys between radios through a near-field coupling side channel,which, when limited to 20 cm, lets users enforce their own physical security for encryption key exchange. The forum deliberately designed the NFC standard to be compatible with ISO 15693 RFID tags operating in the also allows mobile devices to read this already popular tag standard and to be compatible with the FeliCa and Mifaresmart card standards, widely used in Japan.A complication for broad adoption of the NFC standard is that state-of-the-art EPCglobal RFID tags are based on farfield farfieldcommunication techniques, working at UHF frequencies. Unfortunately,NFC and EPCglobal standards are fundamentally incompatible.Reading colocated tagsOne commercial objective of RFID systems is to read, and charge for, all tagged goods in a standard supermarket shopping cart as it is pushed through an instrumented checkout aisle. Such a system would speed up the checkout process and reduce operational costs.Even if the RF reading environment for an RFID tag is ideal, it’s still an engineering challenge to support multiple colocated tags. Consider two tags situated next to each other and equidistant from the reader. On hearing the reader’s signal, both would acquire enough power to turn on and transmit a response back to the reader, resulting in a collision. Thedata from both tags would be superimposed and garbled.In CSMA (carrier sense multiple access)-based communication networks,such as Ethernet, this is an old problem that an anticollision protocol can resolve. In its simplest form, the protocol inserts a random delay between the beginning of the interrogation signal and the tag’s response. But a collision might still occur, so the reader must initiate several rounds of interrogation until it hears all the tags in that area with high number of rounds used, number of tags present, and duration of each tag reply can be used to calculate the probability of all tags being modifying thenumber of rounds, we can adjust the probability to suit typical operation conditions. We can further enhance this protocol by preventing tags that have already been heard by the reader from responding on the next round until the current interrogation cycle ends.Using another anticollision approach,the EPCglobal class-1 standard implements an algorithm based on a Query Tree protocol. The reader starts an interrogation cycle by asking which of the ID space’s top branches (modeled as a binary tree) contain tags. The algorithm recursively repeats for each subtree branch, but if a particular subtree doesn’t generate a reply, the reader won’t consider any of its branches and subtrees in the remaining search space. In other words, that branch is pruned from the binary tree. After a short time, all tags present will respond to the reader in depth-first-search order. EPCglobal systems using this anticollision algorithm can potentially read 500 colocated tagsper second.Enabling a distributed memory revolutionAnother distinguishing feature of modern RFID is that tags can contain far more information than a simple ID They can incorporate additional readonly or read-write memory, which a reader can then further interact with.Read-only memory might contain additional product details that don’t need to be read every time a tag is interrogated but are available when required. For example, the tag memory might contain a batch code, so if some products are found to be faulty, the code can help find other items with the same defects.Tag memory can also be used to enable tags to store self-describing information. Although a tag’s unique ID can be used to recover its records in an online database, communication with the database might not always be possible. For example, if a package is misdirected during transportation, the receiving organization might not be able to determine its correct destination. Additional destination information written into the tag would obviate the need and cost of a fully networked tracking system.Other RFID applications take advantage of read-write memory available in some tag types. Although the size of these memories is currently small—typically 200 to 8,000 bits—it’s likely to grow in the future and be used in creative tags could lead to a distributed memory capability embedded in our locations in a city were tagged with RFID,4 a reader could write messages directly into the tag. This might be used for historical data or for updates about nearby services.Additionally, tags in commercial products could contain ownership history. For example, a tag attached to secondhand consumer goods might tell you about the previous owners and when and where theproduct changed hands. This is similar to the providence documentation that often accompanies antiques of value;using RFID to extend this kind of tracking to everyday items could provide consumers with greater confidence in their secondhand purchases.Time stamps can also be stored in RFID memory alongside other data that has been written there. For example, if two writes occur sequentially but separated in time, the second write must have occurred after the first write. If a reader were trying to forge the writing time of the second write, the first write at least constrains when the forgery has occurred to after the first time , passive RFID doesn’t have the continuous power needed to support an onboard clock, so time stamps couldn’t be derived from the tag itself. However, the readers—powered from the infrastructure or from batteries in a handheld unit—could contain an electronic clock and write time stamps alongside other data written into the tag.RFID that incorporates sensingOne of the most intriguing aspects of modern RFID tags is that they can convey information that extends beyond data stored in an internal memory and include data that onboard sensors created Commercial versions of RFID technology can already ensure that critical environmental parameters haven’t been exceeded. For example, if you drop a package on the floor, the impact might have damaged the enclosed product.A passive force sensor can supply a single bit of information that can be returned along with an RFID tag’s ID, alerting the system about the problem.Another application of RFID sensing is in relation to perishable goods. Typically,items such as meat, fruit, and dairy products shouldn’t exceed a critical temperature during transportation or they won’t be safe for consumption. An RFID temperature sensor could both identify goods and ensure they remain within a safe temperature range.Antitamper product packaging is another application domain for RFID sensing. Most modern consumable products are protected by a packaging technology that clearly shows customers if the product has been tampered with. A simple binary switch (sensor) can be incorporated into an RFID tag, perhaps a thin loop of wireextending from the tag through the packaging and back to the tag. If tampering occurs, the wire breaks and shows up as a tamper bit when the tag is read during checkout. In this way,a store can ensure that it only purveys tamper-free , at each point in the supply chain, you can check individual products for tamper activity,making it easier to find the culprits.Privacy concernsRFID has received much attention in recent years as journalists, technologists,and privacy advocates have debated the ethics of its use. Privacy advocates are concerned that even though many of the corporations considering RFID use for inventory tracking have honorable intentions, without due care, the technology might be unwittingly used to create undesirable outcomes for many customers.The inherent problem is that radiobased technologies interact through invisible communication channels, so we don’t know when communication is occurring. Consider a clothing store that labels its garments with RFID tags. From the store’s perspective, this improvesinventory stock checks, because employees can quickly catalog the contents of various racks and bins, even when customers have mixed up the clothes. Also,employees can perform fast periodic stock checks to detect thefts, which isn’t usually an easy task.However, if the store fails to remove a tag at the point of purchase, it’s possible to track customers every time they wearthe tagged clothing. Vendors—including vendors other than the original seller—could learn where the customer shops to better target the person with direct-marketingtechniques. Even more troubling, a criminal might track consumers, judging their wealth based on purchases, possibly targeting them for theft.Although the potential for RFID misuse is high, undesirable scenarios can be turned into potentially useful ones. For example, if clothes were tagged, washing machine manufacturers could integrate RFID readers into the doors of their machines, making them aware of all items selected for washing. The machines could then choose the appropriate washing cycle and possibly warn you about incompatible garments that might result in color runs.The current focus, however, remains on the potential for misuse. A growing cloud of public and media concern forced Benetton, a well-known clothing store,to hastily retreat after it announced plans to use RFID tags in its Concern also surfacedwhen the US government announced plans to put RFID tags into passports to make them easier to check at borders and harder to forge. Privacyadvocates argued that covert readers might steal the information, enabling identity The passport scheme is still going forward, but the government is modifying its implementation to address public concerns. EPCglobal has addressed some of these concerns by designing a kill switch in their tags that lets vendors permanently disable a tag at the point of sale Vendors then wouldn’t have to remove the tag itself, which might be woven into a garment and (deliberately) difficult to remove. Of course, concerns still exist that vendors might become complacent and that not all stores would be vigilant about disabling the tags. An insidious number of tags could still become part of our daily activities, which could later be exploited for criminal purposes.RSA’s proposed solution is the concept of a blocker tag8—a modified RFID tag that takes advantage of EPCglobal’s anticollision protocol. The blocker tag responds to each interrogation such that it appears that all possible tag IDs arepresent, so the reader has no idea what tags are actually nearby. Perhaps having simple countermeasures to prevent tag misuse is exactly what we need to overcome privacy concerns.Remaining challengesThree main issues are holding back RFID’s widespread adoption, the first of which is cost. Although RFID tags are now potentially available at prices as low as 13 cents each, this is still much more expensive than printed labels. (As of September 2005, Alien Technologies could supply RFID tags for cents each in quantities of1 million.)Market analysts can’t agree on the price tipping point—will it be a 10-cent,5-cent, or 1-cent tag? Consider a 50-cent candy bar—if you replace a bar code (which costs nothing because you can print it on the wrapper) with a 10-cent RFID tag, then you might not have any remaining profit. Consequently, RFID tags are likely to have their first deployments with high-profit items. Of course, when adoption does take hold, it could rapidly accelerate as mass production drives down prices.Another important issue is design. We still need to engineer tags and readers so that they guarantee highly reliable solutions must be resilient to all tag orientations, packaging materials, and checkout configurations found in typical stores. Improved tag antenna design can solve some of these issues. Tag readers can also be designed toexhibit antenna diversity by multiplexing their signals between several antenna modules mounted in orthogonal orientations, or by coordinating multiple readers. In the latter case, we must avoid the reader collision problem, 9 as interrogation signals will interfere with each other. A strict time division scheme would allow multiple readers to be deployed.The final issue is acceptance. The press and civil libertarians have raised some genuine concerns, so it’s important that we proceed cautiously to incorporate safeguards that address the potential for RFID misuse. In 2003, Simson Garfinkel proposed “An RFID Bill of Rights,”10 which laid down a set of guidelines that retailers should adhere to in order to protect citizens’ rights. Currently, no laws regulate tag use, and legislation might be required to assure the public. In the meantime,early adopters such as Wal-Mart nd Tesco could help defuse concerns by publicly adopting a similar proposal.Despite these challenges, RFID continues to make inroads into inventory control systems,and it’s only a matter of time before the component costs fall low enough to make RFID an attractive economic proposition. Furthermore, extensive engineering efforts are under way to overcome current technical limitations and to build accurate and reliable tagreading systems. We might also start to see economic pressure from the larger distributors to modify product packaging and its associated materials to more effectively integrate RFID. Finally, at this delicate stage, while major corporations are trialing the technology, media reaction and outspoken privacy groups can influence the rules by which we use the technology. Given that legislation is now in place among most of the developed countries to protect our personal information held in computers at banks and other organizations, there is no reason,why RFID data manag ement can’t acquire a similar code of conduct.RFID’s potential benefits are large,and we’re sure to see many novel applications in the future—some of which we can’t even begin to imagine.射频识别技术简介RFID技术最近几年来,无线电频率识别技术已在物流治理方面的应用已慢慢成为主流。
Access Control 访问控制Amplitude 振幅Analog Data 模拟数据Active RFID System主动射频系统用自身的射频能量主动地发送数据给读写器Active Tag 有源标签, 或称为主动标签Agile Reader 灵敏解读器AIM 自动识别技术协会Antenna 天线Anti-collision 防冲突Application Integration 应用集成Application Programming Interface (API) 应用程序接口Asset Management 资产管理Asset Tracking 资产跟踪Audit 核查Automatic data capture (ADC) 自动数据获取Automatic Identification (Auto-ID) 自动识别Automatic Identification and Data Collection (AIDC) 自动识别和数据采集BBack Scatter 反射散布Barcode 条形码Bill of Lading 提货单Bit 位Bluetooth 蓝牙技术Business Process 业务流程Cache 缓存Carrier 载体Carrier Signal 载波讯号Check Digit 校验位Chip 芯片Chipless Tag 无芯标签Collision 冲突Concatenation 链接Contactless Smart Card 无接触智能卡Container 集装箱Control Module 控制模块Coupling 耦合DData Carrier 数据载体Data Collection 数据采集Data Entry 数据输入Data Field 数据段Data Standard 数据标准Data Structure 数据结构Data Titles 数据段简称Decode 解码Die 模块Distributed Architecture 分布式结构Distributed Architecture 分布式架构Distribution Center 分发中心DUN-14 (Despatch Unit Number)Dynamic Data 动态数据EEAN International 国际物品编码协会EAN UCC Company Prefix EAN·UCC厂商识别代码EAN UCC Prefix EAN·UCC前缀码Electromagnetic Compatibility (EMC) 电磁兼容能力Electromagnetic Interference (EMI) 电磁干扰Electromagnetic Spectrum 电磁波频谱Electromagnetic Waves 电磁波Electronic Article Surveillance (EAS) 商品电子防盗系统Electronic Data Interchange (EDI) 电子数据交换Electronic Invoice 电子发票Electronic Product Code (EPC) 电子产品码Encode 编码Enterprise Application Integration (EAI) 企业应用集成Enterprise Resource Planning (ERP) 企业资源规划EPC Information Service (EPCIS)EPC信息服务European Article Numbering (EAN) 欧洲商品编码Excite 激发Extensible Markup Language (XML)可扩展标识语言Extension Digit 扩展位FFast Moving Consumer Goods 快速消费品FCC 美国联邦传播委员会Firmware 固件Fixed Measure Trade Item 定量贸易项目GGlobal Commercial Initiative 全球商业联盟Global Location Number 全球位置码Global Tag (GTAG) 全球标准标签(G标签)Global Trade Identification Number (GTIN) 全球贸易识别号码Global Trade Item Number 全球贸易项目代码GTIN 全球贸易项目代码HHigh Frequency (HF) 高频House Way Bill Number 货运代理人运单号IInductive Coupling 感应耦合Industrial, Scientific and Medical (ISM) Bands 工业,科学和医药频段Infrastructure 基础设施Integrated Circuit (IC) 集成电路International Standards Organization (ISO) 国际标准化组织International Telecommunications Union (ITU) 联合国国际电信联盟Internet of things 物联网Interrogator 询问器Interrogator (see Reader) 讯问器(参照解读器)Inventory 库存ISO 国际标准化组织Item 产品Item Model 产品型号Item Number 产品编号Item Reference 项目参考Item Reference Number 项目代码LLine-of-sight Technology 可视传输技术Logistic Measures 物流计量Logistic Unit 物流单元Logistics 物流Low Frequency (LF) 低频MMagnification 放大系数Manufacturer 制造商Manufacturer’s ID 制造商标识Manufacturer’s Number 制造商代码Microchip 微芯片Microchip 微芯片Micron 微米Microwave Tags 微波标签Middleware 中间件Modulation 调制Multiple Access Schemes 多路配置Multiplexer 多路转换器NNanoblock 纳块Nominal Range 标称范围Null Spot 无效点OObject Naming Service (ONS) 对象名解析服务PPackaging and Labeling 包装和标记Packaging Type 包装类型Pallet 运输托盘Passive RFID system被动射频系统Passive Tag 无源标签, 或称被动标签Physical Markup Language (PML) 物理标识语言Platform 平台PML Server 物体标示语言服务器PML Server PML服务器Protocol 协议Prototype 原型Proximity Sensor 近距离传感器RRadio Frequency (RF) Spectrum 无线电频谱Radio Frequency Identification (RFID) 射频识别Radio Wave 射频信号Read Range 解读范围Read Rate 读取速度Reader 解读器, 或称阅读器, 读写器Reader Collision 解读器冲突Reader Field 解读器区域Read-Only Tag 只读标签Read-Write Tag 读写标签Receiver 接收器Retailer 零售商Return on Investment (ROI) 投资回报Returnable Asset 可回收资产RFID Tag 射频标签SScanner 扫描器Semi-passive RFID System半主动射频系统Semi-Passive Tag 半无源电子标签, 或称半被动式电子标签Sensor 感应器Short Range 短距离Simultaneous identification 同时识别功能Smart Card 智能卡Smart Label 智能标签Static Data 静态数据Supplier 供应商Supply Chain Management (SCM) 物流管理System Implementation 系统实施TTag 标签Tag Collision 标签冲突Temporal Data 暂态数据Track and Trace 跟踪与追踪Trade Measures 贸易计量Transmitter 发射器Transponder 转发器UUHF 超高频Uniform Code Council (UCC) 美国统一代码协会Uniform Product Code (UPC) 通用产品代码WWafer 晶片Warehouse Management 仓库管理Write Rate记录速度。
RFID射频识别原理外文翻译文献(文档含中英文对照即英文原文和中文翻译)原文:RFID Basic PrincipleWhat is the RFID?RFID is the abbreviation for Radio Frequency Identification, called electronics label .What is the RFID technology?RFID recognition is a non-contact automatic identification technology, rf signal through its automatic target recognition and access to relevant data, identify work without manual intervention, it can work in various environments. RFID technologycan identify high-speed moving objects and can identify multiple tags, the operation is fast and convenient.Accenture laboratory's chief scientist sir alex ferguson feels RFID is a breakthrough technology: "first, can identify a very specific objects, rather like the code that can identify class objects; second, the use of rf, can read data through external materials, and bar code must rely on laser to read information; third, can also read on to multiple objects, and bar code can only read one by one. In addition, store of information is also very big."What is the basic component of RFID?The most basic RFID system consists of three parts:Tag:Tag consists of components and chips, each Tag has only electronic coding, adhere to the object for identifiering target;Reader:read (sometimes also can write) label information equipment,it canbe designed for portable or fixed;Antenna: Transmit radio frequency signals between in the label and reader.The basic principle of RFID technology is what?The basic principle of RFID technology is not complex: Label into the field, Receive radio frequency signals from reader collision, with all the energy stored in a chip of the product information (passive tag, there is no source label or labels ), Or actively to send a frequency signals(active tag and to label or labels );to read information and understanding of the decoder after the central information systems to carry out the relevant data processing.What makes retailers so highly RFID?Sanford Bernstein cristiano, according to analysts estimate the retailing company, by adopting the RFID, wal-mart can save $8.35 billion each year, mostly because of the purchase of artificial view does not need to save the cost of labor code. Although some analysts think $8 billion in the digital too optimistic, but undoubtedly, RFID help solve the problem: the two biggest retail commodities and loss (broken by theft and supply chain was unsettled and loss of products),now a wal-mart, stealing a loss isalmost 20 billion dollars, if a legitimate business turnover can achieve this number, can in American 1,000 enterprise's list of top first 694. Research organizations estimate, This rfid technology can help to reduce the level of 25% reduction and stock.The typical application of RFID technology is what?Logistics and supply managementManufacturing and assemblyAirline baggage handlingMail/express parcelA document tracking/library managementAnimal identity tagsMovementAccess control/electronic ticketsAutomatic charge. RoadRFID automatic recognition term explanationmicro wave: wavelength of 0.1-100 centimeters or frequency in 1-100GHZ electromagnetic wave.radiation frequency: usually microwave.electronic tags: stored data object code identification tag, also calledrf CARDS.passive tags: without power and internal by receiving microwave energy work.active tags: by internal batteries work labels.microwave antenna: used for launching and receive a signal.read device: Used to read the labels in electronic data.programming device: for electronic data written to the label or labels for the stored data.beam bracketing: refers to the antenna beam range of microwave irradiation range launch power.tag capacity: The label of programming can be written in the number of digits orlogical.A - Biz -utomatic identification technology application case frameASN - senior freight noticeBIS - commercial information systemDA - shipment notificationEAN --European articles coding EPCTM - electronic productsONS - objects name resolution servicesPML - entity markup languageUCC - unity coding committeeUML - unified modeling languageSystem composition and working principleThe most basic RFID system consists of three parts:Tag:Tag consists of components and chips, each Tag has only electronic coding, adhere to the object for identifiering target;Reader:read (sometimes also can write) label information equipment,it canbe designed for portable or fixed;Antenna: Transmit radio frequency signals between in the label and reader.Some systems have readers RS232 or RS485 interface with external computer (upper computer system) connection, and exchange data.The system of basic workflow is: reader through the antenna send certain frequencies of rf signals, when the rf card to enter the antenna working area induced current, rf cards gain energy to be activated, rf cards will own coding information through the card built-in transmitting antenna send out, System receiving aerial from rf card from the carrier signal, the antenna of a regulator to the reader, the reader to receive a signal and demodulates and decodes to the system to deal with the relevant ;the main system based on logic, determine the legality of smart cards, in different settings make the appropriate treatment and control signals control and direction of movement. in the coupling between inductors and electromagnetic way (),communication process (FDX, HDX, SEQ)、From rf card to the reader of data transmission of the load method (modulation, reverse scattering, high time harmonics) and frequency, from the contact method transmission a fundamental difference, but all the reader in principle, and the decision of the design structures are very similar. all the reader is a simple matter of high frequency and control unit two basic module. high frequency interface includes both transmitters and receivers, its functions include: to produce high-frequency transmit power to start and provide rf card energy. To launch signal used to send data to rf CARDS, Receive and demodulation of high frequency signals from rf CARDS. Different rfid system with some difference frequency interface design, the system frequency inductive coupling interface diagram shown.Readers of the control unit features include: communicate with the application software, Application software and to execute the order of radio frequencies ;control and communication from the principle of the lord - ();signal of the decoding. to some specific systems are the collision, the algorithm to rf card reader, and to the transfer of data encryption and decryption, as well as on radio frequencies and the reader's authentication for an additional function.The rfid system is a key and distance of the parameters. At present, the price of long-distance rfid system is very expensive, thus to improve their reading for distance of the method is very important. Influence factors of distance and RF card reader, including antenna working frequency of RF output power, reader's receptionsensitivity, RF card power, antenna and the resonant circuit Q value, antenna, RF card reader and the direction of the coupling, and RF card itself of energy and send information energy etc. Most of the system of writing is read and write different, read the distance is about 40% to 80%.Theory analysisRFID technology USES radio-frequency mode in the reader and rf card no contact between the bidirectional data transmission, in order to achieve target recognition and data exchange. And the tradition of code, magnetic and IC card, compared with non-contact, rf card reading speed, wear, not by environmental impact, long life, easy to use and has the characteristics of anti-collision function, can handle more CARDS. Abroad, rfid technology has been widely used in industrial automation, commercial automation, transportation control, etc.RFID基本原理什么是RFID?RFID是Radio Frequency Identification的缩写,即射频识别,俗称电子标签。