title for RFID profile
home | about | site use | resources | publications | timeline   spacer graphic   blaw

overview

technologies

applications

implants

numbers

issues

advocacy















related pages icon
related
Guide:

Privacy

Economy

Security
& InfoCrime


Consumers





related pages icon
related
Profiles:


Passports

Australia
Card


Surveillance

Internet
Refrigerator
  

Biometrics














section heading icon     applications

This page covers business, institutional and personal applications of RFID technology.

It covers -

section marker     introduction

As the preceding page suggested, RFID technologies are neither inherently benign or subversive, unless you believe that they embody "the mark of the Beast".

Their value (and threat) lies in how they are used, in particular

  • what happens to information collections that incorporate data from RFIDs
  • whether people are aware of (and consent to) data collection and use.

The salient attraction for may developers is the ease of data capture: entities can be readily identified in ways that minimise labour costs and integrate that information with other applications (eg billing systems).

section marker     traffic systems

The RFID application with which most people are familiar is one of the oldest and simplest: traffic systems.

RFID-based road management systems operate on the basis of flat fees or congestion pricing. Those systems typically have two features -

  • real time automated identification of vehicles
  • automated billing, with the fee for use of the road being deducted from the user's bank account or added to a periodic bill

Singapore for example regulates traffic flow by using congestion pricing (fees or higher fees on particular roads during peak periods) and RFIDs. All vehicles in that nation carry active tags, communicating with readers dispersed across the island along all main routes. Vehicle by vehicle identification allows the government to automatically deduct payments from each user's account and, if there are insufficient funds, to issue a fine. As a single journey often involves transit past several readers it is in principle possible to get a broad idea of individual itineraries.

Australian commercial tollways (and some counterparts in the US) use a less sophisticated scheme, with travelers being able to lease an active tag that is generally left on the dashboard of the vehicle that they are using. The tag is identified by the road operator when it passes through a checkpoint onto the particular tollway, with a fee being debited from the user's account or directly from a credit card. Information about the NSW E-Toll scheme is here.

Several jurisdictions are trialling RFID-equipped smartcards for commuter rail, ferry and light rail networks. Typically commuters are billed when they pass through a barrier (or enter a vehicle) that is equipped with a reader of the relevant tag. Some cards embody a rechargeable electronic purse, with the consumer topping up the account.

Other jurisdictions, such as NSW, are considering tagging to detect vehicle registration fraud.

section marker     perimeter control

The RFID application with perhaps the highest profile in the ICT sector is, in practice, one of the simplest. Many organisations are using RFID-based cards (often called proximity cards) as a replacement for magnetic stripe cards or keypad entry controlling entry to compounds, buildings or individual rooms.

That application has attracted little consumer attention, in contrast to anxieties about use or potential misuse of tagging in supply chains (particularly at the retail link and beyond).

section marker     supply chain management

Improved inventory management - including identifying what is in stock and minimising handling of items passing from manufacturer through wholesaler to the retailer or from a component supplier to an assembler - has the potential to significantly reduce costs, of particular interest for major retailers whose business is based on high volume sales with very low margins. Benefits include reduced labour costs and, more broadly, greater scope to move to just-in-time product acquisition and strengthen EDI between various actors.

As with barcodes, initial interest in supply chain tagging was at the category or consignment level (eg a shipping container, a pallet or a class of products). It was driven by leading actors - for example the US Defence Department, the major automobile manufacturers and dominant retailers retailers such as WalMart and Tesco - who could mandate deliveries must feature particular identifiers, had the resources to establish the necessary infrastructure, the capacity to integrate RFID data with their information systems and often were in the position to develop standards.

The focus is shifting beyond the consignment to identification of individual items, with the pace of change being determined - as highlighted on the preceding page of this profile - by factors such as the cost of tags and the perceived ROI from reengineering information systems to fully leverage the data. Some actors are adopting a 'wait & see' approach, in the expectation that the next generation of tags and systems integration will allow features such as

  • dynamic pricing of items 'on the shelf'
  • seamless payment schemes (eg the vision of money being sucked out of your account via a wireless payment card as you walk your shopping trolley through the gateway where the cashregister used to be).

At the moment it is likely that some early adopters - and potential adopters - are in a position to collect data but have difficulty making sense of it on a commercial basis (eg altering their product acquisition) or reducing particular costs beyond the warehouse.

Uptake has been bedevilled by mismanagement of RFID introduction by individual retailers in the US, Germany, France and UK (exacerbated by mischiefmaking by some activist groups and hype by RFID visionaries). As we note in the following page of this profile, that has led to vandalism, boycotts and calls for regulatory intervention.

Libraries are trialling tagging for security (eg replacing traditional 'tattletape' alarms) and for inventory management, increasingly with identification at the item level to assist handling of multiple copies of a particular title. That tagging is often based on a unique number rather than on the work's ISBN or ISSN, undermining claims that surveillance agencies will park a reader outside libraries to track consumption of subversive literature. (Tracking would, presumably, be available through old-fashioned access to the institution's database).

The American Library Association's RFID Fact Sheet highlights benefits such as enhanced collection security, rapid charging and discharging of library materials by staff, easier patron self-charging, sorting for reshelving, electronic inventorying, and electronic shelf reading. The same organisation's Office for Intellectual Freedom has published a bibliography that considers privacy issues regarding library use of RFIDs.

section marker     authentication

RFIDs have also been promoted as a generic or item by item authentication mechanism, particularly for high value items such as pharmaceuticals subject to forgery. The expectation is that tagging would replace barcodes and hologram labels, with hospitals or other dispensaries able to quickly interrogate a secure global database to determine whether a particular consignment or container is what it purports to be.

Other claims for RFIDs as an anti-forgery mechanism are more problematical. Much media attention has been attracted by supposed current use of RFIDs in US and EU banknotes as an anti-counterfeiting tool or as a mechanism for pervasive surveillance. Skeptics about some conspiracist claims note that notes in many currencies already bear unique serial numbers or other identifiers: in principle the advantage of including a tag would be to speed up reading and logging of notes.

In practice the large number of notes in circulation, movement through different hands (and acceptace by people 'off the grid' without the ability to validate the tag), formidable data collection and data mining problems, and cheapness of alternate mechanisms for tracking malefactors means that fears about tagged notes appear unjustified.

section marker     materiel life-cycle control

Other proponents of RFIDs have mooted use in the 'glass pipeline' as an identifier for building material, consumer electronics and other items that might eventually be recycled. Singapore, for example, gained attention over trials in embedding tags in the fabric of buildings that are likely to be demolished in twenty years time.

It is unclear whether tagging of items for recycling - particularly those that will be in use for many years or where end-processing techniques mean that reduced sorting costs offer few benefits - is of particular value.

section marker     human identifiers

In practice use of RFIDs as human identifiers has largely taken two forms.

The first is the 'wireless bracelet' (or handcuff), which alerts a network operator if the wearer moves out of contact with the network or instead enables the operator to locate the wearer. Uses have included restricting prisoners in home detention (remove the handcuff or leave the premises results in an automated alert being sent to custodial authorities). More benignly, tagged kids in the LegoLand theme park can be tracked by anxious - or merely ambitiously technophile - parents.

The second form is as supplementary verification in official documentation, with for example moves to incorporate tags in -

  • passports - either to indicate that the document is authentic or, more usefully, supply unique identification numbers tied to citizenship and watchlist databases.
  • national identity cards or official 'access to services' cards

Tagging is accordingly a feature of plans in several nations for enhanced passports. A new global passport standard, developed by the International Civil Aviation Organization (ICAO), includes RFIDs and biometric identifiers. It has been criticised by groups such as Privacy International, Statewatch and the EFF. They have characterised it as "fundamentally flawed" and

part and parcel of a larger surveillance infrastructure monitoring the movement of individuals globally that includes Passenger-Name Record transfers, API systems and the creation of an intergovernmental network of interoperable electronic data systems to facilitate access to each country's law enforcement and intelligence information.

Proposals to more permanently identify people through implanted RFID tags have proved more controversial, although as discussed later in this profile the terms of debate strike us as misplaced. Subcutaneous implants in companion animals, other beasts and human animals are discussed in the following page.







icon for link to next page    next page  (implants)





this site
the web

Google

version of November 2004
© Caslon Analytics