|Home||Internet of Things||Aerospace||Apparel||Energy||Defense||Health Care||Logistics||Manufacturing||Retail|
Sharing Tag Space
Gen2v2 lets supply-chain partners manage their own information.
Apr 25, 2014—
A passive EPC Gen 2 ultrahigh-frequency RFID tag has user memory that can function as a miniature database, accumulating useful information about the object to which the tag is affixed. Consider, for example, an RFID-tagged aircraft part. The part manufacturer can write the date of manufacture on the tag. The airframe manufacturer can store information regarding how the part was installed and inspected. And over time, the airline can add specifics about maintenance and repair operations.
Some Gen 2 tags have large user memories—up to 64 kilobytes—and can accommodate all this data. But complications arise when supply-chain partners want to put their own data into the same memory. For the data to coexist, all parties' software must coordinate use of this shared memory. This is difficult because the part manufacturer doesn't know which airline will use the part, and supply-chain partners likely use different software.
Each file can be accessed as though it were a separate memory bank. So now the part manufacturer can have one file, the airframe manufacturer another and the airline a third, and each company's software can read and write its own file without disturbing the content of the other files.
Gen2v2 also allows each file to have its own security settings, with separate passwords to control access. So the part manufacturer can set its file so all parties can read the expiration date but only the part manufacturer can write or alter that data. Similarly, the airframe manufacturer and the airline can set their files with different permissions, based on need.
This means supply-chain partners do not have to worry about their data conflicting with any data previously written to the part. Each partner can use its own software to read or write a file, without any coordination with the others.
To take advantage of this feature, end users must have RFID readers equipped with upgraded firmware capable of issuing the Gen2v2 "file open" command, to select the file to use when interrogating the tag. The middleware or other software controlling the reader also may require upgrading. In addition, the software should be configured to store a Gen2v2 "file ID" value with each file, so each party can identify its own file.
Ken Traub is the founder of Ken Traub Consulting, a Mass.-based firm providing services to companies that rely on advanced software technology to run their businesses. Send your software questions to email@example.com.
Login and post your comment!
Not a member?
Signup for an account now to access all of the features of RFIDJournal.com!
SEND IT YOUR WAY
RFID JOURNAL EVENTS
ASK THE EXPERTS
Simply enter a question for our experts.
|RFID Journal LIVE!||RFID in Health Care||LIVE! LatAm||LIVE! Brasil||LIVE! Europe||RFID Connect||Virtual Events||RFID Journal Awards||Webinars||Presentations|