Generated by GPT-5-mini| RFID | |
|---|---|
![]() | |
| Name | RFID |
| Invented | 1940s–1970s |
| Inventor | Harry Stockman; Charles Walton |
| Type | Identification technology |
| Application | Inventory tracking; access control; supply chain |
RFID Radio-frequency identification (RFID) is a method for automated identification that uses electromagnetic fields to read and capture information stored on tags attached to objects. Developed through contributions by researchers and inventors across institutions such as Massachusetts Institute of Technology, SRI International, Stanford Research Institute, and commercialized by companies like IBM and Hitachi, RFID has become integral to logistics and access systems. The technology intersects with standards bodies including International Electrotechnical Commission, GS1, and regulatory agencies such as the Federal Communications Commission.
RFID systems consist of tags, readers, antennas, and backend databases maintained by organizations such as Walmart or Amazon (company). Tags may be passive, active, or battery-assisted passive; readers interrogate tags and relay identifiers to middleware and asset-management platforms developed by firms like SAP SE and Oracle Corporation. Deployment scales from small implementations in Harvard University libraries to global supply-chain initiatives by Procter & Gamble and Zara (retailer). RFID complements technologies such as Barcode and GPS for inventory visibility and real-time location systems used by logistics providers including DHL and Maersk.
RFID operates by coupling electromagnetic fields between an interrogator (reader) and a transponder (tag). Readers transmit radio waves via antennas; tags harvest energy or use onboard power sources to modulate a response encoded in standards like those from ISO and regulatory allocations from European Telecommunications Standards Institute. Typical frequency bands include low frequency (LF), high frequency (HF), and ultra-high frequency (UHF), each with trade-offs in read range, data rate, and material penetration affecting deployments at Sephora retail counters or Boeing manufacturing lines. Tags store identifiers and optional memory conforming to protocols such as EPCglobal architectures; middleware performs filtering, deduplication, and integration with enterprise resource planning systems from Microsoft or Infor.
Systems vary by power source and communication method: passive tags (no battery), active tags (internal battery), and semi-passive tags (battery-assisted). Implementations follow standards like ISO/IEC 14443 for contactless smartcards used by Transport for London and Octopus card systems, or ISO/IEC 18000 family for UHF item-level tagging used by Zebra Technologies and Avery Dennison. Specialized systems include near-field communication devices adhering to specifications promoted by the NFC Forum, long-range asset trackers used by military contractors like Lockheed Martin, and implantable microchips for companion animals registered with services run by American Kennel Club affiliates.
RFID spans retail, logistics, healthcare, transportation, and security. Retailers such as Macy's and Decathlon use RFID for inventory accuracy and anti-theft; supply-chain operators like FedEx employ RFID for parcel sorting and tracking. Hospitals including Mayo Clinic and Johns Hopkins Hospital use RFID to track equipment and improve patient safety through tagged instruments and wristbands. Transportation systems—New York City Transit and Tokyo Metro—use contactless fare media based on HF RFID. Access-control and identification programs implemented by institutions like MIT and corporations such as Google rely on RFID-enabled badges for facility entry.
RFID raises concerns about unauthorized reading, cloning, and tracking. Research by academics at University of Cambridge and Carnegie Mellon University demonstrated vulnerabilities such as relay attacks and skimming against implementations in contactless payment systems like Visa and Mastercard programs. Responses include cryptographic protocols standardized by ISO committees, use of mutual authentication in secure elements supplied by companies like NXP Semiconductors, and policy measures advocated by civil-society groups such as the Electronic Frontier Foundation. Legislative attention from bodies including the European Parliament and national data-protection authorities addresses privacy implications for personally identifiable information in large-scale deployments.
Interoperability is governed by standards bodies: ISO/IEC JTC 1/SC 31 develops tag and reader standards; the GS1 EPCglobal framework defines numbering schemes for supply-chain use; radio spectrum allocation is managed by the International Telecommunication Union and national regulators like the Federal Communications Commission and Ofcom. Certification programs and industry consortia including the RFID Journal community and the Mobile & Embedded Linux groups provide testing, compliance, and best-practice guidelines for manufacturers such as Impinj and Alien Technology.
Conceptual precursors include radar and transponder techniques used during World War II for friend–foe identification. Pioneering work by researchers such as Harry Stockman at Princeton University and inventors like Charles Walton led to early patents and commercial systems in the 1960s and 1970s; corporations including Hewlett-Packard and Philips advanced applications through the 1980s and 1990s. The 2000s saw large-scale adoption driven by mandates from retailers like Walmart and technology roadmaps from Auto-ID Center at MIT, followed by integration with cloud platforms from Amazon Web Services and analytics vendors like SAS Institute in the 2010s.
Category:Identification technology