Loading color scheme

RFID cash

The name "cash 2.0" is glued to contactless payment cards more and more strongly. On the one hand, there are grounds for such a term, as small cash payments are more often replaced by the delivery of a smart card or mobile phone with an RFID chip to the reader window in a transport turnstile, vending machine or a cashier’s store terminal. But on the other hand, such a substitution of concepts is not entirely correct, since the most important properties of cash — anonymity and non-traceability of payments — are not provided for in the now widely implemented contactless payment systems. For the so-called "cash 2.0", on closer inspection, does not differ in principle from ordinary credit or debit cards that are tightly tied to specific people and their bank accounts.
From a commercial point of view, there is no need to link payment smart cards to its owner. But from the point of view of security, according to many independent experts, contactless payment cards based on RFID chips not only carry a heavy legacy of badly protected magnetic stripe credit cards, but also generate a lot of new problems. However, the card payment industry, vigorously promoting a new technology, strongly disagrees with such views and tries to convince people of the opposite - that the contactless system is safer than the traditional one. So who is right in this dispute?

TPL_COM_CONTENT_READ_MORERFID cash
RFID: tags for all # 1

RFID (Radio Frequency Identification) is a method of remotely storing and retrieving data using devices called RFID tags. An RFID tag is a small object that can be associated or combined with a product, person, animal. RFID tags contain antennas that allow them to receive and send a radio frequency identification signal requested from an RFID transceiver. Passive tags do not need an internal power source, whereas active tags need it.

Story
It is believed that the first known device was a tool for espionage and was invented by Lev Teremin for the Soviet government in 1945. Theremin's device was an eavesdropping device, not an identification tag. The technology used in RFID was in use in the early 1920s (according to one source, although the same source claims that RFID systems appeared only in the late 60s.). A similar technology, the IFF pulse transceiver, was invented by the British in 1939 and was commonly used by allies in World War II to identify aircraft in the friend-foe system. Another early work on RFID research is the significant work of Harry Stockman, entitled "Communication by Means of Reflected Power" (October 1948). However, it took another 13 years of significant progress in many areas before RFID technology became a reality.

TPL_COM_CONTENT_READ_MORERFID: tags for all # 1
RFID tags point the way to the blind

RFID tags placed on the sidewalks of Italy help blind people to move around in unfamiliar places. This project is carried out as part of a research project funded by the European Union called the SESAMONET (Secure and Safe Mobility Network), which aims to improve the lives of visually impaired people.

In the city of Laveno Mombello, the project developers created a path of about 2 km long RFID tags that leads from the city’s railway station to Lago Maggiore Bank, loop in a park near the lake, and also pass through several intersections. About 10 people, with poor or absent eyesight, test the system using specially designed canes, which act as readers for 125 kHz passive Tags, in ceramic cases that are buried in tracks. Thanks to these tests, developers get the necessary information to improve the system.

When a blind person approaches the tag, his cane recognizes it (the reader’s antenna is built into the cane’s tip, the power source and the Bluetooth transmitter are integrated near the handle). Unique ID Tag is sent, via a Bluetooth transmitter, to the user's PDA, in which a special program is running that determines a person’s location. The program quickly sets the direction (with the help of voice commands of the program), or various sound signals, which are then transmitted to wireless headphones dressed as a tester.

TPL_COM_CONTENT_READ_MORERFID tags point the way to the blind
RFID based solutions
Radio Frequency Identification Technology (RFID) is a technology of wireless data exchange via a radio signal between an electronic tag, which is placed on an object and read by a special radio-electronic device.
IT Co. offers services for creating RFID solutions for use in libraries, transport, logistics and other companies.
RFID system features
accounting and control of movement of goods, goods, etc.
control of movement and passage of control points by transport
access control
counterfeit protection
other.
The scope of application of RFID-systems is constantly expanding, besides the already existing methods of using RFID, which will be improved, there are many areas that are ready to adopt technology. The potential of using RFID is enormous.
Composition of RFID system
Tags (tags, transponders)
passive (read only information)
active (single write and multiple read or multiple read / write)
Readers (readers, antennas)
stationary
mobile
with different ranges
in room and outdoor performance.
System
writing data to tags
placing tags on goods
read data from tags
adding data to tags (about controls, etc.)
data collection and processing
transfer to other sites for control
reports and analytics.
The advantages of RFID systems compared to other identification methods
supported by major software providers (Microsoft, Oracle, SAP, etc.)
no contact or direct visibility needed
fast and accurate reading (close to 100% identification
good protection against environmental influences
passive tags have virtually unlimited lifespan
tags carry a lot of information
RFID tags are very difficult to fake.
RFID tags can be not only readable, but also with the ability to record information
the data on the RFID tag can be classified
the ability to simultaneously read multiple RFID tags at high speed.
Key RFID Applications
libraries and archives - search for literature, registration of received books and returned books to the library fund, inventory
trade and logistics - accounting and control of the movement of goods, goods, passing checkpoints by transport, inventory, etc.
public transport - traffic management, fare payment and passenger traffic optimization
security - control of access and movement of personnel in the territory and others.
Get all interesting articles to your inbox
Please wait