北大RFID培训课件-谭群华博士

上传人:jiups****uk12 文档编号:40037679 上传时间:2018-05-22 格式:PDF 页数:88 大小:1.73MB
返回 下载 相关 举报
北大RFID培训课件-谭群华博士_第1页
第1页 / 共88页
北大RFID培训课件-谭群华博士_第2页
第2页 / 共88页
北大RFID培训课件-谭群华博士_第3页
第3页 / 共88页
北大RFID培训课件-谭群华博士_第4页
第4页 / 共88页
北大RFID培训课件-谭群华博士_第5页
第5页 / 共88页
点击查看更多>>
资源描述

《北大RFID培训课件-谭群华博士》由会员分享,可在线阅读,更多相关《北大RFID培训课件-谭群华博士(88页珍藏版)》请在金锄头文库上搜索。

1、 Clic k to edit PKUSession 7 Radio Frequency Identification谭群华 博士谭群华 博士 Senior Software IT Architect for Telecom Manager of Customer Value Experience Center IBM Certified IT Architect Email: Session 7 RFID2本课程教学目的本课程教学目的通过本课程,您将了解RFID的:概念应用解决方案Session 7 RFID3Emerging Business FocusCore Business Matu

2、re business and marketsGrowth Business Major new growth business and marketsEmerging Opportunities Investments for long term growthH1H2H3 Digital Media Linux/Grid Learning Solutions Wireless Broadband and Sensing Sols.EBS AM RFIDGrowthTime and business policy management-Consumer privacy is an issue

3、of customer message management and opt- in choices for customers-IBM offers consulting, and I/T services; and software solutions to address both information security solutions and consumer privacy policy and practicesSession 7 RFID57Some important advice esp. for the retailers To preserve customer g

4、oodwill, retailers should introduce RFID technology only after understanding their customers potential concerns and developing a strategy to address them. For example, they should develop security and privacy policies and practices, and deploy the right technology and business processes in support o

5、f these policies. Information on IBMs Privacy and Security Offerings are available at:IBM Security and Privacy SolutionsFor further information please contact Michel Bobillier, or Mike Bilger, Session 7 RFID58Our message around RFID Information Security and Privacy-Clearly articulating the retailer

6、s own privacy policy and documenting it in a way they can share with customers.-Educating employees and notifying customers about their privacy policy.-Telling customers where tags are being used, what information is on the tags, and what their purpose is, as well as what value the tags provide to b

7、oth the retailer and the customer.-Offering customers opt- in participation programs for collection of personally identifiable information. For example, there are some applications for which it is advantageous to a customer to keep the tag, such as in cases of products with warranties.Tag management

8、 options, such as the following:1.Placing the tag on product packaging. 2.Killing or removing the tag at the point of sale (POS).3.Rendering the tag non- identifying or non- traceable at the POS, or substituting a non- identifying tag for the item- specific tag at the POS.Session 7 RFID59The AMR Res

9、earch Risk Assessment Profile lists IBM Global Services as the Leading Service Provider for RFID DeploymentsThe AMR Research Report, RFID in Consumer Products: Which Service Providers Have the Goods? May 2004, Kara Romanow and Dana StifflerSession 7 RFID60Agenda RFID 基本概念基本概念 RFID 举例举例 RFID 体系架构体系架构

10、 RFID 未来未来Session 7 RFID61RFID technology is moving on, with readers are becoming smart and smaller, executing basic edge functionality. Generation 2 (Gen2) UHF RFID Protocol is gaining acceptance-frequency range 860- 960 MHz RFID readers are becoming smart-provide filtering and reconciliation capab

11、ilities, potentially making edge servers in some cases obsolete ALE (Application Level Events) specified by EPCglobal is emerging as a standard for filtering and consolidating EPC data-reduces the volume of data data that comes directly from RFID readers into coarser “events” of interest to applicat

12、ions Smaller Readers-to be used in new applications Motes!Session 7 RFID62RFID TagTrusted RFID GatewayTrusted Monitoring ServerSecure Operating SystemSecure Operating System Messages (WS- Security)RFID Monitoring AppRFID ReaderDBRS- 232CConfigurationsLogTampering TPM (Identity or any other assets or

13、 locations that are intended to be tracked or monitored, including the use of sensors on tags. Since object and tag are physically attached they are considered as components of the same domain. q This domain also includes all those components that are required to get the tag on the object i.e. silic

14、on, labels etc. q Decisions for a specific tag type (passive, active, semi- active) depend very much on the characteristics of the physical object on which they are tagged (tagged pallet, food with temperature sensor, etc.); accuracy desired; and other things. q In contrast to other domains, most of

15、 the artefacts in the Tagged Object Domain are mobile, i.e. can move across different RFID Infrastructures. This imposes strict interoperability requirements on those artefacts which would ideally be addressed through open standards.Session 7 RFID71The Antenna i.e. events that are important in conte

16、xt of a business operation or process. It can store data and it interacts with enterprise back end systems through business process integration. Premises are most typically hierarchical, in a sense that a head office coordinates subordinate premises. Business logic can be specific for a premise. As an example, a distribution ce

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 行业资料 > 其它行业文档

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号