RFID Journal Glossary
A device that measures acceleration (the rate of change of velocity). An accelerometer inherently measures its own motion (locomotion), as opposed to a device based on remote sensing….
When used to refer to an RFID transponder, the term "active" means a transponder has a power source. This is usually a battery, but energy can also be captured from light via photovoltaic cells or other sources. An active tag can, therefore, broadcast its own signal, like a cell phone. Because an active tag has its own source of power to broadcast a signal, it has a longer read range than most passive tags….
An RFID transponder that has its own power source, which enables it to broadcast a signal….
The ability to write data to different fields, or blocks of memory, in the microchip in an RFID transponder….
An electronic document that is sent to a trading partner, so the partner knows what goods have been shipped. These documents are typically sent via electronic data interchange (EDI)….
A generic term that usually refers to an RFID reader that can read tags operating at different frequencies or using different methods of communication between the tags and readers….
The rules that govern how tags and readers communicate….
See Orientation….
An American technical standards body and the representative of the United States to the International Organization for Standardization….
The maximum absolute value of a periodic curve measured along its vertical axis (the height of a wave, in layman's terms)….
Changing the amplitude of a radio wave. A higher wave is interpreted as a 1 and a normal wave is interpreted as a zero. By changing the wave, the RFID tag can communicate a string of binary digits to the reader. Computers can interpret these digits as digital information. The method of changing the amplitude is known as amplitude shift keying, or ASK….
Changing the amplitude of the wave to communicate data stored on a tag. …
See American National Standards Institute…
The tag antenna is the conductive element that enables the tag to send and receive data. Passive, low- (135 kHz) and high-frequency (13.56 MHz) tags usually have a coiled antenna that couples with the coiled antenna of the reader to form a magnetic field. UHF tag antennas can be a variety of shapes. Readers also have antennas which are used to emit radio waves. The RF energy from the reader antenna is "harvested" by the antenna and used to power up the microchip, which then changes the electrical load on the antenna to reflect back its own signals.…
In technical terms, the gain is the ratio of the power required at the input of a loss-free reference antenna to the power supplied to the input of the given antenna to produce, in a given direction, the same field strength at the same distance. Antenna gain is usually expressed in decibels and the higher the gain the more powerful the energy output. Antennas with higher gain will be able to read tags from farther away….
A general term used to cover methods of preventing radio waves from one device from interfering with radio waves from another. Anti-collision algorithms are also used to read more than one tag in the same reader's field….
A source-code interface provided by a computer system or program library to support a computer program's requests for services. Unlike an application binary interface, an API is specified in terms of a programming language that can be compiled when an application is built, rather than an explicit low-level description of how data is laid out in memory….
A software component designed to run in the context of another program, such as a Web browser….
An International Organization for Standardization (ISO) method forclassifying radio frequency identification by application, enabling a single air interface protocol to be used across several applications….
An EPCglobal standard that defines interfaces through which clients mayinteract with filtered, consolidated EPC data and related data from a varietyof sources. The role of the ALE interface within the EPCglobal ArchitectureFramework is to provide independence between the infrastructurecomponents that acquire the raw EPC data, the architectural component(s)that filter & count that data, and the applications that use the data….
A source-code interface provided by a computer system or program library to support a computer program's requests for services. Unlike an application binary interface, an API is specified in terms of a programming language that can be compiled when an application is built, rather than an explicit low-level description of how data is laid out in memory….
An integrated circuit (IC) customized for a particular use (such as a chip designed solely to run a cell phone) rather than general use….
A label-printing device that automatically prints and applies pressure-sensitive labels to various products. Such labels can be used for shipping, content, graphic images or complying with specific standards, such as UPC or GS1. A pressure-sensitive label consists of a label substrate and an adhesive….
An integrated circuit (IC) customized for a particular use (such as a chip designed solely to run a cell phone) rather than general use….
One of the most common applications for RFID. Placing RFID transponders on or in high-value assets and returnable transport containers enables companies to gather data on their location quickly and with little or no manual intervention. Tagging assets allows companies to increase asset utilization, identify the last known user of assets, automate maintenance routines and reduce lost items….
A global trade association for companies that provide products and services related to automatic identification, data collection, networking and information management systems….
The reduction of energy. See signal attenuation….
A device that attaches to a transmission line (a coaxial cable) that reduces the power of the RF signal as the signal travels through the cable from the reader to the antenna. Attenuators usually work by dissipating the RF energy as heat. …
The verification of the identity of a person, object or process. In RFID, the term is used in two ways. For contactless smart cards and other payments systems, the reader must make sure the transponder is a valid device within the system. That is, someone is not using an unauthorized device to commit fraud. There is also some talk of using EPC technology to authenticate products as a way of reducing counterfeiting….
A non-profit collaboration between private companies and academia that pioneered the development of an Internet-like infrastructure for tracking goods globally through the use of RFID tags carrying Electronic Product Codes. The center closed its doors in September 2003. EPCglobal was set up to continue the work of commercializing EPC technology, and the center's research work is carried on by Auto-ID Labs at universities around the world….
Nonprofit research labs, headquartered at the Massachusetts Institute of Technology, which continue to do primary research into the development of EPC and related technologies. The Auto-ID Labs are the successors to the Auto-ID Center.
…
A broad term that covers methods of collecting data and entering it directly into computer systems without human involvement. Technologies normally considered part of auto-ID include bar codes, biometrics, RFID and voice recognition….
A broad term that covers methods of identifying objects, capturing information about them and entering it directly into computer systems without human involvement. Technologies normally considered part of auto-ID include bar codes, biometrics, RFID and voice recognition….
See reverse channel….
A method of communication between passive tags (ones that do not use batteries to broadcast a signal) and readers. RFID tags using backscatter technology reflect back to the reader radio waves from a reader, usually at the same carrier frequency. The reflected signal is modulated to transmit data….
A standard method of identifying the manufacturer and product category of a particular item. The bar code was adopted in the 1970s because the bars were easier for machines to read than optical characters. The main drawbacks of bar codes main are they don't, in most cases, identify unique items and scanners have to have line of sight to read them….
See Shielding…
An RFID reader that is connected to a host system. …
These are RFID tags with batteries, but they communicate using the same backscatter technique as passive tags (tags with no battery). They use the battery to run the circuitry on the microchip and sometimes an onboard sensor. They have a longer read range than a regular passive tag because all of the energy gathered from the reader can be reflected back to the reader. They are sometimes called "semi-passive RFID tags."…
An active or semi-active RFID tag that is programmed to wake up and broadcast its signal at a set intervals….
The study of methods to uniquely recognize and authenticate the identity of humans based upon one or more intrinsic physical or behavioral traits (fingerprints, retinal patterns and so forth). Biometric technology offers several advantages over traditional systems. Unlike passwords, biometric traits cannot be lost or forgotten, and are very difficult to copy, share or distribute. Biometric systems can be used in tandem with passwords or tokens, improving existing security systems rather than replacing them….
A bistatic RFID interrogator, or reader, uses one antenna to transmit RF energy to the RFID tag and a different antenna to receive energy reflected back from the tag….
An electric circuit element used to store a charge temporarily. A capacitor usually consists of two metallic plates separated and insulated from each other by a dielectric substance….
The software program stored in the smart card IC, which manages the basic functions of the card, such as communication with the terminal, security management and data management in the smart card file system….
A frequency used to transmit data….
A radio wave of a specific frequency that is modulated or changed in some way in order to transmit data. The amplitude of the carrier wave can be increased—for example, to indicate a one or zero of binary code. …
The brains of a computer, which controls all the other parts of the computer….
A code added to the contents of a block of data stored on an RFID microchip that can be checked before and after data is transmitted from the tag to the reader to determine whether the data has been corrupted or lost. The cyclic redundancy check is one form of checksum….
A programmable digital electronic component (also called a microprocessor) designed to incorporate the functions of a central processing unit (CPU) onto a single semiconducting integrated circuit (IC). Multiple chips can serve as the CPU in a computer system, embedded system or handheld device….
An RFID tag that doesn't depend on a silicon microchip. Some chipless tags use plastic or conductive polymers instead of silicon-based microchips. Other chipless tags use materials that reflect back a portion of the radio waves beamed at them. A computer takes a snapshot of the waves beamed back and uses it like a fingerprint to identify the object with the tag. Companies are experimenting with embedding RF reflecting fibers in paper to prevent unauthorized photocopying of certain documents. Chipless tags that use embedded fibers have one drawback for supply chain uses—only one tag can be read at a time….
A UHF reader antenna that emits radio waves in a circular pattern. These antennas are used in situations where the orientation of the tag to the reader cannot be controlled. Since the waves are moving in a circular pattern, they have a better chance of hitting the antenna, but circular-polarized antennas have a shorter read range than linear-polarized antennas….
RFID tracking systems set up within a company. Since the tracked item never leaves the company's control, it does not need to worry about using technology based on open standards. …
A temperature-controlled supply chain for perishable goods such as foods and pharmaceuticals, as well as for some chemical applications. In the cold chain, storage and distribution activities must maintain a given temperature range to prevent product spoilage. Specific temperature tolerances vary, depending on the actual items being shipped….
A general term used to describe cooperation between manufacturers and retailers to better match supply of goods with demand for them….
The set of commands a reader uses to communicate with a group of tags in the read field. …
This term is sometime used to refer to the process of writing a serial number to a tag (or programming a tag) and associating that number with the product it is put on in a database….
Two RFID systems are considered compatible if they use the same protocols, frequencies and voltage levels and are able to operate together within the same overall application (see interoperability)….
A label that conforms with data content and format standards, usually established by an industry. …
Many industries, including the auto, technology and aerospace industries, have established label standards for products and goods moving through the supply chain. These standards specify the use of mandatory data fields, acceptable bar code symbologies, print quality minimums and environmental considerations. Compliance labeling standards ensure that everyone practices a similar labeling approach that clearly defines the label format, usage, and the information to include on the label. There are no compliance labeling standards yet for RFID, but some consider bar-code labels with embedded UHF EPC tags as compliance labels….
Testing done to confirm whether hardware or software product complies to a particular standard. …
A device connected to several RFID readers to gather data from the readers. The concentrator usually performs some filtering and then passes only useful information from the readers on to a host computer. …
Conducted power is the RF power that is supplied by an RFID system to the antenna. Typically, it is calculated or measured at the cable to antenna connection. In the United States, Federal Communication Commission regulations require a maximum conducted power of 1 Watt….
A type of ink able to conduct a signal, usually containing powdered silver and carbon. With conductive ink, companies can draw or print circuits on a variety of materials. Conductive ink provides a cheap method for printing circuit boards on paper, for instance….
A material, such as aluminum and copper, that readily conducts electricity. Conductors have a significant impact on the performance of RFID tags. Conductors near tags can reflect RF energy in a way that reduces tag performance, and they can also detune the tag….
Testing done to determine whether or not hardware or software products conform to a particular standard. See also compliance testing….
An awkward name for a credit card or loyalty card that contains an RFID chip to transmit information to a reader without having to be swiped through a reader. Such cards can speed checkout, providing consumers with more convenience. …
See card operating system…
See inductive coupling….
See collaborative planning, forecasting and replenishment…
See central processing unit …
See cyclic redundancy check …
Special circuitry that perform cryptographic calculations, such as modular arithmetic and large integer calculations. These circuits are added to a standard processor core and therefore are called coprocessors….
A method of checking data stored on an RFID tag to be sure that it hasn't been corrupted or some of it lost. (See Checksum.)…
A medium that holds machine-readable data. Bar codes and RFID tags are types of data carriers. The term is also applied to a carrier frequency used to transmit data….
An area of memory in RFID microchips that is assigned to a particular type of information. Data fields may be protected (see below) or they may be written over, so a data field might contain information about where an item should be sent. When the destination changes, the new information is written to the data field….
The ability to prevent data stored in a specific area of memory of an RFID microchip from being overwritten. Companies might want to protect the data field that stores an Electronic Product Code, which doesn't change during the life of the product it's associated with….
The ability of a microchip to maintain the information stored in EEPROM. RFID tags and other microchips can typically retain data for 10 years or more, but data retention depends on temperature, humidity and other factors….
The harmonisation of information between trading partners ensures that the master data is the same in all trading partners systems….
The number of characters that can be transferred from an RFID tag to a reader within a given time. Baud rates are also used to quantify how fast readers can read the information on the RFID tag. This differs from read rate, which refers to how many tags can be read within a given period of time….
See decibel….
The gain of an antenna compared to an isotropic antenna—that is, an antenna that radiates energy equally in every direction. A typical dipole antenna has a dBi of 2.2 when compared to an isotropic antenna….
See decibel…
Decibels (dB) referenced to 1.0 watt. Using the decibel formula: dB=10 log(P1/P2), P2 equals 1.0 watt and P1 is in units of watts….
UHF antennas are tuned to receive RFID waves of a certain length from a reader, just as the tuner on the radio in a car changes the antenna to receive signals of different frequencies. When UHF antenna is close to metal or metallic material, the antenna can be detuned, resulting in poor performance….
Rendering an RFID transponder in operable or, in the case of anti-theft applications, indicating an item with a specific serial number has been sold, so it does not set off an alarm as the tagged item leaves the store….
An RFID tag that cannot be read by an interrogator….
A unit used to express the ratio between two values, including antenna gain, cable losses and reader power output. The formula for decibel is: dB=10 log (P1/P2). In layman's terms, dB represents the difference in the intensity of an emitted signal or power where 0 dB is the reference, 3 dB is twice the intensity of 0 dB, 10 dB is 10 times the intensity, and 20 dB is 100 times the intensity and so on. (See also dBi, dBm and dBw.)…
The silicon block onto which circuits have been etched to create a microchip….
Unable to conduct direct electric current. Dielectric substances are used as insulators….
The measure of a material's ability to store a charge when an electric field is applied, or its "capacitance." If a material has a high dielectric constant, it reflects more RF energy and detunes the antenna more, which makes it harder to tag. Examples of materials with a low dielectric constant are dry paper (2), plastics (most are between 2 and 4), and glass (between 5 and 10). Water's dielectric constant changes: At room temperature it is 80; near boiling it is 55; and when frozen it is 3.2. …
A digital message that contains the identity of an company or organization, its public key combined and a signature of this data from a certificate authority (Trust Center) proving the correctness of this data….
As special kind of microprocessor that converts changes in analog waves into digital information. DSPs are used in RFID readers….
A cryptographic protocol that ensures the authenticity as well as the integrity of digital data. A digital signature typically is realized by encrypting the hash value of the data to be protected with the private key….
A cryptographic algorithm approved by the United States government for use in creating digital signatures….
An antenna made of two straight electrical conductors (poles). In an RFID transponder, these are connected to a microchip. The antenna is typically 1/2 wavelength from end to end….
A component of the EPCglobal Architecture Framework consisting ofa suite of services that enable users to find data held by individualcompanies related to a specific Electronic Product Code. Object NamingService is one component of Discovery Services….
See digital signal processor…
An antenna that has two dipoles. In an RFID transponder, these are attached to a chip. The dual dipole design greatly reduces the tag's orientation sensitivity….
A card that contains a microchip that can be read either when in content with a reader or remotely using radio waves. …
A generic term for a reader with limited computing power. It generally converts radio waves from a tag into a binary number and passes it to a host computer with little or no filtering. …
A channel capable of transmitting data in both directions at the same time. (Half duplex is a channel capable of transmitting data in both directions, but not simultaneously.)…
The length of time the reader can be emitting energy. Regulations in the European Union say readers can be on only 10 percent of the time. …
A method of sealing a digital document in a manner similar to that used for electronic signatures. Electronic seals enable computers to authenticate that documents or electronic messages have not been altered, providing a level of security in digital communications….
See European Article Number…
See electronic article surveillance …
A computer for running middleware or applications that is close to the edge of the network, where the digital world meets the real world. Edge servers are put in warehouses, distribution centers and factories, as opposed to corporate headquarters. …
See Electronic Data Interchange…
See Electrically Erasable Programmable Read-Only Memory…
A measurement of the output of RFID reader antennas used in the United States and elsewhere. EIRP is usually expressed in watts. …
A measurement of the output of RFID reader antennas used in Europe and elsewhere. ERP is usually expressed in watts and is not the same as EIRP. …
See Effective isotropic radiated power …
A method of storing data on microchips. Usually bytes can be erased and reprogrammed individually. RFID tags that use EEPROM are more expensive than factory programmed tags, where the number is written into the silicon when the chip is made, but they offer more flexibility because the end user can write an ID number to the tag at the time the tag is going to be used….
Interference caused when the radio waves of one device distort the waves of another. Cells phones, wireless computers and even robots in factories can produce radio waves that interfere with RFID tags….
Simple electronic tags that can be turned on or off. When an item is purchased (or borrowed from a library), the tag is turned off. When someone passes a gate area holding an item with a tag that hasn't been turned off, an alarm sounds. EAS tags are embedded in the packaging of most pharmaceuticals. They can be RF-based, or acousto-magnetic….
A method of transmitting trade documents in standardized formats….
A secure file that stores data about each move a product makes through the supply chain. Pedigrees can help to reduce counterfeiting of drugs and other products. EPCglobal has ratified an e-pedigree standard for the industry….
A serial, created by the Auto-ID Center, which will complement barcodes. The EPC has digits to identify the manufacturer, product category and the individual item. …
A method of sealing a digital document in a manner similar to that used for electronic signatures. Electronic seals enable computers to authenticate that documents or electronic messages have not been altered, providing a level of security in digital communications….
The process of using electrical current to coat an electrically conductive object with a thin layer of metal. The primary application of electroplating deposits a layer of a metal with a desired property onto a surface lacking such a trait. Electroplating can also be used to build up the thickness of undersized parts….
See Electromagnetic interference …
The scrambling of data in such a way that it can be unscrambled and read only by those for whom it is intended. In RFID systems, encryption is used to protect information store on a transponder's microchip or to prevent the interception of communications between the tag and reader….
A company that has deployed or wants to deploy an RFID system to improve the way it does business….
Software that is designed to be the operating system for large companies. ERP systems manage data across applications and functional areas, such as finance, human resources and supply chain management. …
Electronic Product Code…
An EPCglobal Network service that allows companies to search for every reader that has read a particular EPC tag….
The standard ratified by EPCglobal for the air-interface protocol for the second generation of EPC technologies….
Part of the EPC Network. The EPC Information Service is a network infrastructure that enables companies to store data associated with EPCs in secure databases on the Web. The EPC Information Service has been ratified and enables companies to provide different levels of access to data to different groups. Some information associated with an EPC might be available to everyone. Other information might be available only to a manufacturer's retail customers. The service also includes a number of applications, such as the EPC Discovery Service….
See EPCglobal Network…
An RFID reader that complies with EPCglobal standards, including the air interface protocol and Low Level Reader Protocol….
An RFID tag that complies with EPCglobal standards, includingthe tag data standard, the air interface protocol. …
A non-profit organization set up the Uniform Code Council and EAN International, the two organizations that maintain barcode standards, to commercialize EPC technology. EPCglobal is made up of chapters in different countries and regions. It is commercializing the technology originally developed by the Auto-ID Center….
The Internet-based technologies and services that enable companies to retrieve data associated with EPCs. The network infrastructure includes the Object Name Service, distributed middleware (sometimes called Savants), the EPC Information Service and Physical Markup Language….
A software application that receives EPCIS data from EPCIS Capturing Applications, either directly or via the EPCIS Query Interface, and processes those data to carry out a business objective….
Provides a path for communicating EPCIS events generated by EPCIS Capturing Applications to other roles that require them, including EPCIS Repositories, internal EPCIS Accessing Applications, and PartnerEPCIS Accessing Applications….
A set of programming interfaces by which an EPCIS application can requestEPCIS data from an EPCIS Repository or another EPCIS applications….
See erasable programmable read-only memory…
Non-volatile memory that can be erased by exposing it to intense ultraviolet light. After erasing, EPROM memory can be reprogrammed….
See Effective radiated power and enterprise resource planning…
A code stored on an RFID tag to enable the reader to figure out the value of missing or garbled bits of data. It's needed because a reader might misinterpret some data from the tag and think a Rolex watch is actually a pair of socks. …
A mode of data transmission between the tag and reader in which errors or missing data is automatically corrected. …
A set of rules used by readers to interpret data correctly from the tag….
See European Telecommunications Standards Institute…
A system for identifying products developed by EAN International, the bar code standards body in Europe. There are several types of bar codes that use EANs, including EAN-8, EAN-13 and EAN-14….
An independent, non-profit organization, whose mission is to produce telecommunications standards for Europe. Based in Sophia Antipolis, France, ETSI is officially responsible for standardization of Information and Communication Technologies, include telecommunications, broadcasting and related areas, such as intelligent transportation, medical electronics and RFID. …
Information related to a transaction or incident with significance to the business. If a tag on a pallet is read as the pallet leaves a dock door, an event is recorded (the pallet was shipped). If a reader reads a tag on a pallet in a storage bay 100 times per minute but the pallet never moves, data is generated, but there is no event….
The reader is said to "excite" a passive tag when the reader transmits RF energy to wake up the tag and enable it to transmit back….
An electronic device (also called a transmitter) that, with the aid of an antenna, propagates an electromagnetic signal such as radio, television or other telecommunications. An exciter typically incorporates a power supply, an oscillator, a modulator and amplifiers for audio frequency (AF) and radio frequency (RF)….
A widely accepted way of sharing information over the Internet in a way that computers can use, regardless of their operating system….
Some read-only have to have their identification number written into the silicon microchip at the time the chip is made. The process of writing the number into the chip is called factory programming. This data can't be written over or changed….
See phantom read….
RFID reader antennas emit electromagnetic radiation (radio waves). If an RFID tag is outside of one full wavelength of the reader, it is said to be in the "far field." If it is within one full wavelength away, it is said to be in the "near field." The far field signal decays as the square of the distance from the antenna, while the near field signal decays as the cube of distance from the antenna. So passive RFID systems that rely on far field communications (typically UHF and microwave systems) have a longer read range than those that use near field communications (typically low- and high-frequency systems)….
Also called a Faraday shield. Named after physicist Michael Faraday, a Faraday Cage is an enclosure formed of conductive material, or by a mesh of conductive material, that blocks out external static electrical fields and external electromagnetic radiation, if the conductor is thick enough and any holes in the mesh are significantly smaller than the radiation's wavelength. Faraday cages can provide effective electromagnetic shielding to prevent noise from interfering with the ability to read RFID tags, or to prevent RFID reader from interfering with other RFID devices….
See Faraday Cage….
A United States federal government standard specifying Personal Identity Verification (PIV) requirements for federal employees and contractors. FIPS 201 was developed to satisfy the requirements of HSPD 12, approved by the Secretary of Commerce….
Tags that use EEPROM, or non-volatile memory, can be programmed after it is shipped from the factory. That is, users can write data to the tag when it is placed on a product. …
A United States federal government standard specifying Personal Identity Verification (PIV) requirements for federal employees and contractors. FIPS 201 was developed to satisfy the requirements of HSPD 12, approved by the Secretary of Commerce….
Coded instructions that are stored permanently in read-only memory. When upgrading a reader to read a new protocol, the firmware usually has to be changed. Some newer readers can be upgraded remotely over a network….
An RFID interrogator mounted to a wall, doorway, gate, table, shelf or other permanent or non-mobile structure, enabling employees to read the unique ID numbers of RFID tags attached to items in a warehouse or other setting along the supply chain….
A special type of EEPROM that can be erased and reprogrammed in blocks instead of one byte at a time. It is usually written in capital letters, but it is not an acronym. …
A manufacturing process, patented by Alien Technology. It involves flowing tiny microchips in a special fluid over a base with holes shaped to catch the chips. The process is designed to mass assemble billions of RFID tags at very low cost….
A dipole antenna in which the two poles are connected to each other, as well as to the microchip….
A tag not associated with an item owned by a store or facility but which is nonetheless entering, leaving, or otherwise in the proximity of the store orfacility and readable by RFID Readers located in the store or facility….
The packaging a transponder can be put in. These include thermal transfer labels, plastic cards, key fobs and so on….
The path through which energy passes from the interrogator, or reader, to the RFID tag….
A term used to describe the reading of an RFID tag that is not attached to anything….
The number of repetitions of a complete wave within one second. 1 Hz equals one complete waveform in one second. 1KHz equals 1,000 waves in a second. RFID tags use low, high, ultra-high and microwave frequencies. Each frequency has advantages and disadvantages that make them more suitable for some applications than for others….
A technique used to prevent readers from interfering with one another. In the United States, UHF RFID readers actually operate between 902 and 928 MHz, even though it is said that they operate at 915 MHz. The readers may jump randomly or in a programmed sequence to any frequency between 902 MHz and 928 MHz. If the band is wide enough, the chances of two readers operating at exactly the same frequency is small. The UHF bands in Europe and Japan are much smaller so this technique is not effective for preventing reader interference….
A method of communicating data by switching between two slightly different frequencies. …
See frequency shift keying…
See Global Commerce Initiative…
See global data synchronization…
See EPC Generation 2…
Ports on a reader provided for interaction with hardware peripheral tothe reader itself. For example, a device such as an electronic eye maybe connected to a general purpose input (GPI) port so that when anobject breaks the beam of the electronic eye the reader begins reading.As another example, an actuator device may be connected to a generalpurpose output port (GPO) so that when a tag is read, a conveyor is turnedon or a dock door opened….
A system for capturing, storing, analyzing and managing data and associated attributes that are spatially referenced to the earth. GIS software enables users to create interactive queries, analyze spatial information, edit data, create maps and present the results of these operations. GIS is often utilized in logistics applications; other common apps include scientific investigations, resource management, asset management, cartography, criminology, history, sales, marketing and emergency disaster relief….
A term frequently used to describe the combination of spatial software and analytical methods with terrestrial or geographic datasets. The term is often employed in conjunction with geographical information systems (GIS) and geomatics….
A system for capturing, storing, analyzing and managing data and associated attributes that are spatially referenced to the earth. GIS software enables users to create interactive queries, analyze spatial information, edit data, create maps and present the results of these operations. GIS is often utilized in logistics applications; other common apps include scientific investigations, resource management, asset management, cartography, criminology, history, sales, marketing and emergency disaster relief….
See Global Location Number…
In user group founded in October 1999 by manufacturers, retailers and trade industry associations, to improve the performance of the international supply chain for consumer goods through the collaborative development and endorsement of recommended voluntary standards and best practices. Its charter is to drive the implementation of EAN•UCC standards and best practices, including use of EPC….
A term that generally refers to the process of ensuring that a manufacturer's master files with product information match those of retailers. GDS is an importan prerequisite to deploying RFID in open supply chains because companies need to ensure that RFID serial numbers refer to the right product information in a database….
A numbering scheme created by EAN International and the Uniform Code Council to as a means to identify virtually limitless numbers of legal entities, trading parties and locations to support the requirements of electronic commerce (B2B and B2C). Parties and locations that can be identified with GLNs include functional entities (e.g., a purchasing, accounting or returns department), physical entities (e.g., a particular room in a building, warehouse, loading dock, delivery point) and legal entities or trading partners (e.g. buyers, sellers, whole companies, subsidiaries or divisions such as suppliers, customers, financial services companies, or freight forwarders). …
Developed for and managed by the United States military, GPS is a satellite navigation system. It consists of 24 satellites above the earth. They transmit radio signals to receivers placed on ships, trucks or other large assets that need to be tracked. The receivers compute longitude and latitude and velocity by calculating the difference in the time signals are received from four different satellites. Some companies are integrating RFID and GPS systems to track assets in transit. …
The digital cellular telephone system, widely used in Europe, Asia and Australia. …
A standardized system of identifying products and services created by the Uniform Code Council and EAN International. Product identification numbers, such as EAN/UCC-8, UCC-12, EAN/UCC-13, and EAN/UCC-14, are based on the GTIN….
Global Positioning System…
See Global System for Mobiles…
See Global Tag…
See Global Trade Item Number…
A term sometimes used to describe the way passive tags gather energy from an RFID reader antenna. …
This is generally considered to be from 3 MHz to 30 MHz. HF RFID tags typically operate at 13.56 MHz. They can be read from less than 3 feet away and transmit data faster than low-frequency tags. But they consume more power than low-frequency tags….
A computer on a network, which provides services to users or other computers on that network….
A smart card that has both a contactless IC and a contact IC. Unlike a dual interface card, a hybrid card acts as two separate cards. …
A retardation of an effect when the forces acting upon a body are changed. When corrugated boxes and other materials absorb water and then dry, they are never as RF-friendly as they were before they became moist….
See input/output…
See input-output ports…
See integrated circuit …
A coil-wire transceiver used in a variety of applications, such as inductive loop detection, in which the coil detects metal objects. Other applications include vehicle detection at traffic lights and car parks, metal detectors and other functions involving RFID reads in the presence of metal….
In technical terms, inductive coupling is the transfer of energy from one circuit to another by virtue of the mutual inductance between the circuits. In an RFID system that uses inductive coupling, the reader antenna and the tag antenna each have a coil, which together form a magnetic field. The tag draws energy from the field. The microchip uses this energy to change the electrical load on the tag antenna. These changes are picked up by the reader antenna and converted into a unique serial number….
A group of unlicensed frequencies of the electromagnetic spectrum….
An RFID microchip attached to an antenna and mounted on a substrate. Inlays are essentially unfinished RFID labels. They are usually sold to label converters who turn them into smart labels. They are also sometimes called inlets….
See inlay…
Ports on an RFID reader that can be connected to external devices. An input port might be connected to a photoelectric eye to turn on the reader when an object enters the reader field. An output device might be connected to a door that opens when a tag is read. …
Ports on a reader. Users can connect devices, such as an electronic eye to the input port so that when an object breaks the beam of the electronic eye the reader begins reading. Devices can also be connected to an output part, so that when a tag is read, a conveyor is turned on or a dock door opened. …
A microelectronic semiconductor device comprising many interconnected transistors and other components. Most RFID tags have ICs….
A generic term that is sometimes used to describe a reader that has the ability to filter data, execute commands and generally perform functions similar to a personal computer….
A device that produces a RF signal for the purpose of data communications. Examples. Include garage door openers, cordless phones, RFID transmitter and so on….
A non-governmental organization made up of the national standards institutes of 146 countries. Each member country has one representative and the organization maintains a Central Secretariat in Geneva, Switzerland, that coordinates the system….
In computing, the term refers to the ability to exchange and use information among disparate software systems. In RFID, the term generally refers to the ability of tags and readers from different vendors to communicate….
Testing performed to assess the ability of two or more systems or components to exchange information, and to use the data that has been exchanged….
A device used to connect a microchip to an antenna to create an RFID transponder. Interposers make an electrical connection to the tiny pads on the chip and to create leads that can be bonded to an antenna….
The area in which a passive interrogator can provideenough energy to power up a passive tag and receive back information. Alsocalled the read field or reader field. Tags outside the interrogation zonedo not receive enough energy from the interrogator to reflect back a signal….
See reader…
A group of unlicensed frequencies of the electromagnetic spectrum….
See International Organization for Standardization…
The international standard for proximity cards…
The international standard defining frequencies, baud rate, bit coding and data structures of the transponders used for animal identification….
A set of international standards covering proximity smart cards….
The international standard for vicinity smart cards….
A series of international standards for the air interface protocol used in RFID systems for tagging goods within the supply chain….
A set of international standards covering the basic characteristics of smart cards, such as physical and electrical characteristics, communication protocols and others….
A standard defining two air interface protocols and a single application program interface (API) for real-time locating systems (RTLS) used in asset management. The standard is intended to allow for compatibility and encourage interoperability of products for the growing RTLS market….
Identical in all direction. An isotropic antenna emits energy equally in every direction….
A term used to discribed the tagging of individual products, as opposed to case-level and pallet-level tagging….
An EPCglobal Working Group created from participants of Industry Action Groups and Technical Action Groups to produce requirements forspecifications….
A command sent to a tag to permanently deactivate it. …
An RFID tag developed by researchers at the University of Kansas’ Information and Telecommunication Technology Center to read objects containing metal or liquid. The tag's thickness (about 1.5 millimeters, or 0.059 inch) qualifies it as one of the thinnest RFID tags designed to operate well in such conditions….
A device that applies labels to cases or other items. Some label applicators can print bar codes on and encode RFID transponders in labels before applying the labels….
This term generally applies to a simple RFID that has only a serial number that is associated with information in a database. The Auto-ID Center promoted the concept as a way to simplify the tag and reduce the cost….
An RFID tag or other data carrier that containsa unique identifier for the physical object to which it is affixed, and no otherbusiness information. Other business information must be associated withthe license plate identifier through an external database or other means….
An antenna that focuses the radio energy from the reader in one orientation or polarity. This increases the read distance possible and can provide greater penetration through dense materials. Tags designed to be used with a linear polarized reader antenna must be aligned with the reader antenna in order to be read. (See circular-polarized antenna.)…
A standard produced by the EPCglobal Reader Operations Working Group to foster RFID reader interoperability and create the foundation for technology providers to extend basic capabilities in satisfaction of industry-specific requirements. The LLRP standard is the result of collaboration between more than 90 end users, RFID infrastructure vendors, middleware vendors, industry experts and networking professionals….
Characterized by or causing dissipation of energy. For instance, a cable is said to be a lossy cable if the signal attenuates as it travels through the cable….
From 30 kHz to 300 kHz. Low-frequency tags typical operate at 125 kHz or 134 kHz. The main disadvantages of low-frequency tags are they have to be read from within three feet and the rate of data transfer is slow. But they are less subject to interference than UHF tags….
A standard produced by the EPCglobal Reader Operations Working Group to foster RFID reader interoperability and create the foundation for technology providers to extend basic capabilities in satisfaction of industry-specific requirements. The LLRP standard is the result of collaboration between more than 90 end users, RFID infrastructure vendors, middleware vendors, industry experts and networking professionals….
A system with which companies can measure and control critical production activities, offering improved traceability, productivity and quality. MES solutions serve numerous functions, such as equipment tracking, product genealogy, labor tracking, inventory management, costing, electronic signature capture, and defect and resolution monitoring…
For the purpose of data synchronization, any data or constructs that are applicable across multiple business transactions. Master data can be divided into neutral and relationship dependent data. Typically master data is static – not transactional….
The amount of data that can be stored on the microchip in an RFID tag. It can range from 64 bits to 32 kilobytes or more on passive tags….
The smallest unit of memory on an RFID tag that can be locked independently of other parts of memory….
Micro-electro-mechanical systems, smaller than microscopic dust mites and used in a variety of applications, from inkjet printers to accelerometers that deploy air bags in cars. A MEMS RFID tag contains micromechanical components that are expected to be rugged and easier to produce, and that can be attached directly to medical devices. Such a tag can withstand exposure to wide temperature ranges and gamma radiation….
Also known as MEMS, smaller than microscopic dust mites and used in a variety of applications, from inkjet printers to accelerometers that deploy air bags in cars. A MEMS RFID tag contains micromechanical components that are expected to be rugged and easier to produce, and that can be attached directly to medical devices. Such a tag can withstand exposure to wide temperature ranges and gamma radiation….
A complete microprocessor on a chip. A microcontroller includes a central processing unit, RAM or EPROM, clock and control circuits, and serial and parallel I/0 ports….
A programmable digital electronic component (also called a chip) designed to incorporate the functions of a central processing unit (CPU) onto a single semiconducting integrated circuit (IC). Multiple microprocessors can serve as the CPU in a computer system, embedded system or handheld device….
A high-frequency electromagnetic wave, one millimeter to one meter in wavelength….
A term that is sometimes used to refer to RFID tags that operate at 5.8 GHz. They have very high transfer rates and can be read from as far as 30 feet away, but they use a lot of power and are expensive. (Some people refer to any tag that operates above about 415 MHz as a microwave tag.)…
In the RFID world, this term is generally used to refer to software that resides on a server between readers and enterprise applications. The middleware is used to filter data and pass on only useful information to enterprise applications. Some middleware can also be used to manage readers on a network….
A unit of power equal to one thousandth of a watt….
Million instructions per second…
An RFID interrogator that can be carried or transported on a person, vehicle or apparatus, enabling employees to read the unique ID numbers of RFID tags attached to items in a warehouse or other setting along the supply chain….
Changing the radio waves traveling between the reader and the transponder in ways that enable the transmission of information. Waves can be changed in a variety of ways that can be picked up by the reader and turned into the ones and zeroes of binary code. Waves can be made higher or lower (amplitude modulation) or shifted forward (phase modulation). The frequency can be varied (frequency modulation), or data can be contained in the duration of pulses (pulse-width modulation). …
A monostatic RFID interrogator, or reader, uses the same antenna to transmit RF energy to and receive RF energy from the RFID tag….
Transponders are called "multimode" when they can be programmed to operate according to several different standards….
Methods of increasing the amount of data that can be transmitted wirelessly within the same frequency spectrum. Some RFID readers use Time Division Multiple Access, or TDMA, meaning they read tags at different times to avoid interfering with one another….
An electronic device that allows a reader to have more than one antenna. Each antenna scans the field in a preset order. This reduces the number of readers needed to cover a given area, such as a dock door, and prevents the antennas from interfering with one another….
The term Alien Technology uses to describe its tiny microchips, which are about the width of three human hairs….
An American standards body that establishes standards for information-processing technology, particularly IT used by the Federal government. …
RFID reader antennas emit electromagnetic radiation (radio waves). If an RFID tag is within full wavelength of the reader, it is sometimes said to be in the "near field" (as with many RFID terms, definitions are not precise). If it is more than the distance of one full wavelength away, it is said to be in the "far field." The near field signal decays as the cube of distance from the antenna, while the far field signal decays as the square of the distance from the antenna. So passive RFID systems that rely on near-field communication (typically low- and high-frequency systems) have a shorter read range than those that use far field communication (UHF and microwave systems)…
See near-field communication…
Unwanted ambient electrical signals or electromagnetic energy found in the operating environment of RFID equipment. Other RF devices, robots, electric motors and other machines can cause noise….
The read range at which the tag can be read reliably….
A generic term for the memory that holds its contents after power has been removed. EPROM, EEPROM and FLASH are examples of non-volatile memory….
Area in the reader field that doesn't receive radio waves. This is essentially the reader's blind spot. It is a phenomenon common to UHF systems….
An Auto-ID Center-designed system for looking up unique Electronic Product Codes and pointing computers to information about the item associated with the code. ONS is similar to the Domain Name Service, which points computers to sites on the Internet….
See original equipment manufacturer…
Memory that can be written to, or programmed, only once and is afterwards write protected. After the memory is written to, it is like read-only memory….
Also called a field-programmable tag. An RFID tag that can be written to once and read many times (see WORM)….
See Object Name Service …
A type of computer software designed to translate images of handwritten or typewritten text (usually captured by a scanner) into machine-editable text, or to translate pictures of characters into a standard encoding scheme (such as ASCII or Unicode). OCR began as a field of research in pattern recognition, artificial intelligence and machine vision. …
A software system used in a number of industries for order entry and processing. Such industries include e-commerce, cataloging and financial securities….
The position of a tag antenna vis-à-vis a reader antenna. With UHF systems, readers can be either circular-polarized or linear-polarized. When using a linear polarized antenna, the tag reader and antenna reader must be in alignment in order to achieve the longest reading distance. If that tag antenna is aligned vertically and the reader is sending out signals horizontally, only a small portion of the energy emitted by the reader will hit the tag antenna….
A company that builds its own products from components bought from other manufacturers. …
When used to refer to an RFID transponder, the term "passive" means a transponder has no power source and cannot actively broadcast a signal. A passive tag harvests energy emitted by a reader antenna, uses it to run the circuitry on an RFID chip and then reflects back a signal to the reader. Because the signal to the reader is reflected by the passive tag, the signal is weak and the read range of passive tags is thus relatively short….
An RFID tag without its own power source and transmitter. When radio waves from the reader reach the chip's antenna, the energy is converted by the antenna into electricity that can power up the microchip in the tag. The tag is able to send back information stored on the chip. Today, simple passive tags cost from U.S. 20 cents to several dollars, depending on the amount of memory on the tag, packaging and other features….
A term used to describe a square reader antenna made from a solid piece of metal or foil….
The ability of a particular radio frequency to pass through non-metallic materials….
In the EPC Gen 2 standard, the ability to permanently lock a memory block. …
Memory that is not erased when a tag no longer is being powered by the reader or a battery….
A format for improving the identification and authentication of federal employees and contractors for access to federal facilities and information systems….
When a reader reports the presence of a tag that doesn't exist. This phenomenon is also sometimes called a phantom transaction or false read….
A part of a complete cycle of a waveform as measured from a specified reference point….
A variant of phase-shift keying, created by Magellan Technology, which operates at 13.56 MHz and complies with the ISO/IEC 18000 3 Mode 2 standard. PJM technology enables a write data rate of up to 424 kilobits per second and a read data rate of 106 kbit/s. It is particularly suited to item-level tagging in the pharmaceutical industry….
A method of communicating data by shifting the waveform's period. Instead of being at the zero axis at a specific point in time, the wave might be shifted forward so that it is at its peak. The reader's digital signal processor might interpret the out of phase signal as a one or zero….
An Auto-ID Center-designed method of describing products in a way computers can understand. PML is based on the widely accepted eXtensible Markup Language used to share data over the Internet in a format all computers can use. The idea is to create a computer language that companies can use to describe products so that computer can search for, say, all "soft drinks" in inventory….
See Physical Markup Language …
A server that responds to requests for Physical Markup Language (PML) files related to individual Electronic Product Codes. The manufacturer of the item will maintain the PML files and servers. The name PML server has been replaced by EPC Information Service….
An RFID interrogator gateway used in manufacturing settings. Forklifts or other methods are used to transport tagged items through a portal reader to collect RFID tag data….
The amount of RF energy radiated from a reader. The higher the power output, the longer the read range, but most governments regulate power levels to avoid interference with other devices….
An RFID printer, or printer/encoder, is a device that prints a label with an embedded RFID transponder and encodes information in the chip within the transponder….
See printer…
A cryptographic key known only to the owner….
Writing data to an RFID tag. When a serial number is first written to a tag, this is sometimes called "commissioning a tag."…
A set of rules that govern communications systems. (See Air-interface protocol.)…
A proximity card is a card with a passive RFID transponder that can be read when placed near an RFID reader. Proximity cards usually use the ISO 14443 passive HF RFID standard, which is designed to have a short read range, to ensure that the tag-to-reader communication cannot be intercepted by a third party….
A device that detects the presence of an object and signals another device. Proximity sensors are often used on manufacturing lines to alert robots or routing devices on a conveyor to the presence of an object. They can be used in RFID systems to turn on readers….
The publicly available and distributed key used in public key cryptography systems. …
A generic term for all public key algorithms. PKC uses a pair of numeric "keys," one public and one private key. The public key is published and can be used by anyone to either encrypt a message for the owner of the corresponding private key or to verify a signature generated by the owner of the secret key….
A system of storing and distributing public keys together with their current status….
A method of sending data to an RFID tag by emitting pulses of energy with varying intervals, in order to indicate the ones and zeroes of binary code stored on the tag….
In the Gen 2 air interface protocol, Q is a parameter that a reader uses to regulate the probability of tag response. A reader commands tags in aninventory round to choose a random number between zero and 2^Q; a tagmay be successfully singulated if no other tags choose the same randomnumber (a "collision"). Larger Q values decrease the probability of collision,but require the reader to spend more time during singulation….
An RFID tag that can be read only occasionally with the interrogator output at full power, or which can only be read at very close range. …
Any method of identifying unique items using radio waves. Typically, a reader (also called an interrogator) communicates with a transponder, which holds digital information in a microchip. But there are chipless forms of RFID tags that use material to reflect back a portion of the radio waves beamed at them….
See random access memory…
Memory used for temporary storage of data. Information stored in RAM is lost when power is removed….
The process of retrieving data stored on an RFID tag by sending radio waves to the tag and converting the waves the tag sends back into data….
This term usually refers to percentage of tags read successfully. If there are 100 tags in the field and 95 are read, the read accuracy is 95 percent. …
See reader field….
Locking one or more of a Tag's memory areas so that a subsequent reader is required to exchange appropriate security safeguards with the Tag before being able to read these memory areas….
The distance from which a reader can communicate with a tag. Active tags have a longer read range than passive tags because they use their own power source (usually a battery) to transmit signals to the reader. With passive tags, the read range is influenced by frequency, reader output power, antenna design, and method of powering up the tag. Low-frequency tags use inductive coupling, which requires the tag to be within a few feet of the reader….
A term usually used to describe the number of tags that can be read within a given period or the number of times a single tag can be read within a given period. The read rate can also mean the maximum rate at which data can be read from a tag expressed in bits or bytes per second. (See Data transfer rate.)…
A term used to describe RFID tags that contain data that cannot be changed unless the microchip is reprogrammed electronically….
A term used to describe an RFID tag that can store new information on its microchip. These tags are often used on reusable containers and other assets. When the contents of the container are changed, new information is written to the tag. …
A device used to communicate with RFID tags. The reader has one or more antennas, which emit radio waves and receive signals back from the tag. The reader is also sometimes called an interrogator because it "interrogates" the tag. …
The area of coverage. Tags outside the reader field do not receive radio waves and can't be read. This is also sometimes referred to as the read field….
The electronics of a reader, including a digital signal processor, on a circuit board. Modules can be put in an RFID label printer or other device, as opposed to a standalone reader….
A means by which a passive UHF reader communicates with tags in its read field. The reader sends energy to the tags but the tags sit idle until the reader requests them to respond. The reader is able to find tags with specific serial numbers by asking all tags with a serial number that starts with either 1 or 0 to respond. If more than one responds, the reader might ask for all tags with a serial number that starts with 01 to respond, and then 010. This is called "walking" a binary tree, or "tree walking." (See singulation.)…
A system of finding the position of assets, using active RFID tags. The tags broadcast a signal, which is received by three reader antennas. The time each signal is received is passed on to a software system that uses triangulation to calculate the location of the asset. RTLS is used to find containers in a distribution yard, and many automakers use it to track parts bins within a large factory. …
A measurement of the strength of a radio signal being received. In RFID, RSSI is used to determine a tag's distance, as the signal is stronger from a tag that is closer to the reader antenna….
The ratio of money gained or lost on an investment relative to the amount invested. The amount gained or lost may be referred to as interest, profit/loss, gain/loss or net income/loss, while the money invested may be referred to as the asset, capital, principal or cost basis of the investment. ROI is sometimes also known as "rate of profit" or "rate of return."…
The path through which energy travels from the RFID tag to the interrogator, or reader. It is also sometimes called the back channel….
See radio frequency identification …
The leading independent publication focused on radio frequency identification and its many business applications….
A microchip attached to an antenna that is packaged in a way that it can be applied to an object. The tag picks up signals from and sends signals to a reader. The tag contains a unique serial number, but may have other information, such as a customers’ account number. Tags come in many forms, such smart labels that can have a barcode printed on it, or the tag can simply be mounted inside a carton or embedded in plastic. RFID tags can be active, passive or semi-passive….
See real-time locating system…
A two-way, active wireless protocol designed for harsh-environment, high-security asset-visibility applications. The primary purpose of most RuBee deployments is to identify objects (often weapons), in order to better manage those objects….
A term used to describe distributed middleware designed by the Auto-ID Center to filter data from EPC readers and pass it on to enterprise systems. It was envisioned that Savants would reside on servers across the EPC Network and pass data to one another and act as a kind of nervous system for the network. The term is being phase out by EPCglobal and many of the functions of Savants are being incorporated in commercial middleware products. …
A technology used for automatic identification in which low power microwave radio frequency signals are converted to ultrasonic acoustic signals by a piezoelectric crystalline material in the transponder. Variations in the reflected signal can be used to provide a unique identity….
An electronic device that can send and receive radio waves. When combined with a digital signal processor that turns the waves into bits of information, the scanner is called a reader or interrogator….
A device combining a supersensitive piezoelectric accelerometer with an ultra-low-noise amplifier, used in such applications as earthquake detection, geophysics, geothermal development, structural analysis and mine safety….
Similar to active tags, but the battery is used to run the microchip's circuitry but not to broadcast a signal to the reader. Some semi-passive tags sleep until they are woken up by a signal from the reader, which conserves battery life. Semi-passive tags can cost a dollar or more. These tags are sometimes called battery-assisted tags….
A device that responds to a physical stimulus and produces an electronic signal. Sensors are increasingly being combined with RFID tags to detect the presence of a stimulus at an identifiable location. …
Uses a Faraday cage, Mylar sheet or metal barrier to prevent RF noise from interfering with the ability to read RFID tags, or to prevent RFID readers from interfering with other RF devices….
The weakening of RF energy from an RFID tag or reader. The energy emitted by the reader naturally decreases with distance. The rate of decrease is proportional to the inverse square of the distance. Passive UHF RFID tags reflect back a signal at very low power levels. A tag's reflected signal decreases as the inverse fourth power of the distance between tag and reader. Attenuation can be increased by external factors as well. For instance, water absorbs UHF energy, causing signal attenuation….
This term covers all business solutions enabled by tagging, tracking, sensing and other technologies, including RFID, which make everyday objects intelligent and interactive. When combined with continuous and pervasive Internet connectivity, they form a new infrastructure that enables companies to collect data and deliver services without human interaction….
See subscriber identity module…
A means by which an RFID reader identifies a tag with a specific serial number from a number of tags in its field. There are different methods of singulation, but the most common is "tree walking", which involves asking all tags with a serial number that starts with either a 1 or 0 to respond. If more than one responds, the reader might ask for all tags with a serial number that starts with 01 to respond, and then 010. It keeps doing this until it finds the tag it is looking for. (See Reader talks first.)…
Reading an RFID tag on a person without their knowledge or reading a tag surreptitiously….
A generic term that refers to putting an RFID label on a case or pallet just before it is shipped from a supplier's facility to a retailer's facility. This approach to using RFID is strictly to meet the retailer's requirements and delivers no internal benefits to the supplier….
An antenna that consists only of a narrow slot cut into an electrical conductor connected to the transponder. Slotted antennas exhibit the same orientation sensitivity as dipoles….
A credit card or other kind of card with an embedded microchip. When the card uses RFID technology to send and receive data it is called a contactless smart card….
A generic term that usually refers to a bar code label that contains an RFID transponder. It's considered "smart" because it can store information, such as a unique serial number, and communicate with a reader….
See intelligent reader…
A type of interposer….
An essential component of a GSM mobile phone. It contains the identity of the subscriber and assures the authentication during the access into the network and provides data storage for other subscriber related information, such as a personal address books. …
An underlying layer….
The optimization of customer response by merging the storage and delivery of finished goods. The execution phase may involve the final assembly and packaging of products within a warehouse environment….
The process of planning, implementing and controlling the operations of the supply chain to efficiently satisfy customer requirements. Supply-chain management spans all movement and storage of raw materials, work-in-process inventory and finished goods, from the point of origin to the point of consumption….
A technology used for automatic identification in which low power microwave radio frequency signals are converted to ultrasonic acoustic signals by a piezoelectric crystalline material in the transponder. Variations in the reflected signal can be used to provide a unique identity. …
In RFID, the term refers to timing readers or reader antennas near one another so that they don't interfere with one another….
See RFID tag…
A term coined by the RFID Alliance Lab to refer to a device that sends signals to the tag regardless of the make or manufacturer. TED is used to measure the response of tags scientficially….
A means by which a reader in a passive UHF system identifies tags in the field. When tags enter the reader's field, they immediately communicate their presence by reflecting back a signal. This is useful when you want to know everything that is passing a reader, such as when items are moving quickly on a conveyor. In other cases, the reader wants to simply find specific tags in a field, in which case it wants to broadcast a signal and have only certain tags respond. (See Reader talks first.)…
An RFID tag that communicates to a reader when a package or container has been opened without authorization….
See time division multiple access …
See tag excitation device…
A method of solving the problem of the signals of two readers colliding. Algorithms are used to make sure the readers attempt to read tags at different times….
The process of retrieving information about the movement and location of goods. …
A device that both transmits and receives radio waves….
A radio transmitter-receiver that is activated when it receives a predetermined signal. RFID transponders come in many forms, including smart labels, simple tags, smart cards and keychain fobs. RFID tags are sometimes referred to as transponders….
The duration of a pulse of energy sent to UHF EPC Gen 2 tags to indicate a 0 in binary code. EPC Gen 2-compliant readers use pulse interval encoding (PIE) to code binary data. A binary ‘0’ is indicated by a short, high-level pulse, followed by a low pulse of equal length. The length of a TARI can vary from 6.25 to 25 microseconds….
See Uniform Code Council…
See ultra-high frequency…
See Unique Identification…
From 300 MHz to 3 GHz. Typically, RFID tags that operate between 866 MHz to 960 MHz. They can send information faster and farther than high- and low-frequency tags. But radio waves don't pass through items with high water content, such as fruit, at these frequencies. …
Any radio technology having a bandwidth exceeding the lesser of 500 MHz or 20 percent of the arithmetic center frequency, according to the Federal Communications Commission (FCC). Due to the extremely low emission levels currently allowed by regulatory agencies, UWB systems tend to be short-range and used indoors. High data-rate UWB can enable wireless monitors, the wireless printing of digital pictures from a camera without an intervening personal computer and the transfer of files among cell phone handsets and other handheld devices, such as personal digital audio and video players. UWB is used in location systems and real-time location systems….
The nonprofit organization that oversees the Universal Product Code, the bar code standard used in North America….
A numbering scheme used by the U.S. Department of Defense to track high-value items and items, such as chemical suits, that have an expiration date….
A unique serial number that identifies the transponder. …
A generic term that refers to the 12 digit data structure encoded in a UCC bar codes….
An external peripheral interface standard for communication between a computer and external peripherals over an inexpensive cable. Many newer RFID readers can connect to computers via a USB port….
See Universal Product Code…
See Universal Serial Bus…
Any radio technology having a bandwidth exceeding the lesser of 500 MHz or 20 percent of the arithmetic center frequency, according to the Federal Communications Commission (FCC). Due to the extremely low emission levels currently allowed by regulatory agencies, UWB systems tend to be short-range and used indoors. High data-rate UWB can enable wireless monitors, the wireless printing of digital pictures from a camera without an intervening personal computer and the transfer of files among cell phone handsets and other handheld devices, such as personal digital audio and video players. UWB is used in location systems and real-time location systems….
A standing wave may be formed when a wave is transmitted into one end of a transmission line and is reflected from the other end by an impedance mismatch. The Voltage standing wave ratio is the ratio of maximum to minimum voltage in a standing wave pattern. It may be stated as a ratio (VSWR) or in dB (return loss)….
See voltage standing wave ratio…
A key component of the supply chain, intended to control the movement and storage of materials within a warehouse and process the associated transactions, including shipping, receiving, putaway and picking. Such systems also direct and optimize stock putaway based on real-time information about the status of bin utilization. WMSs utilize auto-ID data-capture technology, such as bar-code scanners, mobile computers, wireless LANs and RFID, to efficiently monitor the flow of products….
The generic wireless interface of mobile computing devices, such as laptops used in local area networks (LANs). The term "Wi-Fi" (a play on the term "Hi-Fi") is thought to be an abbreviation for "wireless fidelity." Common uses include Internet and voice-over-IP phone access, gaming and network connectivity for such consumer electronics as televisions, DVD players and digital cameras. In spite of media reports about possible health risks from Wi-Fi, scientific studies have failed to show a causal effect….
See Work-in-process tracking….
WML is a markup language that is based on XML (eXtensible Markup Language). The official WML specification is developed and maintained by the WAP Forum, an industry-wide consortium founded by Nokia, Phone.com, Motorola, and Ericsson. This specification defines the syntax, variables, and elements used in a valid WML file….
See Wireless Markup Language…
Manufacturers often have to add parts to subassemblies or perform a series of processes on goods being manufactured. Using RFID to track work-in-process reduces manual data collection and can help ensure that the right processes are preformed at the proper time on the correct product….
See write once, read many…
A tag that can be written to only once by the user. Thereafter, the tag can only be read….
The distance from which data can be written to an RFID tag….
The rate at which information is transferred to a tag, written into the tag's memory and verified as being correct….
An electronic data interchange schema developed for the American National Standards Institute for inter-industry electronic exchange of business transactions data….
See eXtensible Markup Language…
A method of searching a database based on the extensible markup language (XML). Files created using the Auto-ID Center's Physical Markup Language can be searched using XQL….
See XML Query Language…
A specification for a suite of high-level communication protocols using small, low-power digital radios based on the IEEE 802.15.4 standard for wireless personal area networks (WPANs). ZigBee is targeted at RF applications requiring a low data rate, long battery life and secure networking….