|Home||Internet of Things||Aerospace||Apparel||Energy||Defense||Health Care||Logistics||Manufacturing||Retail|
Scottish Startup Promotes Silent Tags
A system developed by Friendly Technologies uses the privacy mode found in NXP's Icode and Ucode chips to keep tags from being read by unauthorized parties.
Sep 03, 2009—Friendly Technologies, a startup company based in Aberdeen, Scotland, has developed what it claims is a means by which RFID technology can be used in the retail industry without compromising high standards for security or consumer privacy.
Friendly Technologies employs off-the-shelf passive RFID tags and interrogators, but uses them in a novel way and with the aid of a software platform it developed in-house. Rather than interrogating the RFID tags in order to collect the unique code encoded to each tag's memory, Friendly Technologies' Silent Tag software queries a group of tags by broadcasting their passwords and asking the tags to respond affirmatively when their numbers are broadcasted. To accomplish this, the company employs RFID tags that utilize NXP Semiconductors' chips—either the Icode for high-frequency (HF) passive tags (compliant with the ISO 14443 standard), or the Ucode for ultrahigh-frequency (UHF) tags (compliant with ISO 18000-6C and EPC Gen 2 standards). These chips have a special function known as a privacy mode, in which the chip is set to respond only when a password is presented, rather than respond to any reader that tries to interrogate it.
In a retail environment, as envisioned by Friendly Technologies, products are tagged at the item level and the entire store—from the back room to the sales floor—is divided into zones, with an RFID interrogator assigned to each zone. As products are tagged and entered into inventory, each item is assigned to a zone within that location. The Friendly Technologies software manages the network of readers and associates a list of tag privacy passwords to each zone. The interrogator in each zone continuously polls that zone by making a query for each tag using the tag's privacy password—essentially, taking attendance of the population of tags within its interrogation zone. If any tag assigned to the zone does not respond, the software instructs the readers in the adjacent read zones to poll for that tag until it is located, at which point it is associated with that new zone. Using this approach, the software can track the movement of tagged items from one zone to another.
Only readers networked into the Friendly Technologies software platform in that store would have access to the database of tag privacy passwords. Therefore, if a third party were to bring an RFID reader into the store, it would not be able to read the tags or track their movements within that location.
Login and post your comment!
Not a member?
Signup for an account now to access all of the features of RFIDJournal.com!
SEND IT YOUR WAY
RFID JOURNAL EVENTS
ASK THE EXPERTS
Simply enter a question for our experts.
|RFID Journal LIVE!||RFID in Health Care||LIVE! LatAm||LIVE! Brasil||LIVE! Europe||RFID Connect||Virtual Events||RFID Journal Awards||Webinars||Presentations|