Counterfeit protection
It is no secret that any expensive and mass production causes a huge temptation to fake in order to obtain super-profits from the sale of such counterfeit products. For example, you can take the issue of alcoholic beverages. Placing labels on each product during production at the factory allows not only to protect the manufactured goods, but also to trace the product’s path to the final consumer. Putting a label on each product during the reception of goods, for example, in a wholesale store, allows you to verify the authenticity of the information indicated on the product box (date, place of manufacture, etc.). The data from the tags gets to the reader, which in turn sends them to a computer on which special software is installed. The obtained information is analyzed and compared with the data available in the database. When using contactless tags, this process does not take much time, since the reader receives information from several tags at once (provided that the system provides the anti-collision mechanism). If in the process of reading tags there is a discrepancy in the data, then it will not be difficult to find this product when using a scanner that reads up to several dozen marks at a time in tens of centimeters. Physical removal of the label from the product leads to its further unsuitability, therefore, the labeling of the label from one bottle to another is impossible.
Automatic vehicle identification system
The automatic identification system (ASI) of transport is organized on the basis of radio frequency contactless RFID tags.
The system is designed for automatic or automated vehicle identification when driving through a control point.
The system solves the following tasks:
Identification of transport in motion over long distances (from 2 to 30m).
Fully automatic registration of transport (without human participation in the identification process).
Simultaneous identification of several objects in the transport stream.
Accounting and protection against theft of books
The problem of accounting books in libraries and repositories, and protecting them from theft is very relevant. Some specimens can be of very high value, and therefore are of increased interest not only among ordinary readers.
Using RFID technology can solve these problems. To do this, you must provide each edition with a label with a unique number. Labels can be made in any form and be attached in such a way that physical removal will be impossible. In this case, the appearance of the book will not suffer.
A label can contain a large amount of various information, for example, storage conditions, circulation and many other useful information. Installing radio frequency tags will allow you to keep records in the repositories, where there is a large number of books. This process, in contrast to working with bar codes, is not so laborious, since an RF scanner connected to a PC simultaneously reads several dozen marks at a distance of about one meter. Thus, the problem of thefts from libraries is solved. A radio frequency reader is installed near the exit from the reading room, and if you carry a book with a tag past it, information about the attempt to carry it out will go to a guard post or a librarian.
Using RFID technology can solve these problems. To do this, you must provide each edition with a label with a unique number. Labels can be made in any form and be attached in such a way that physical removal will be impossible. In this case, the appearance of the book will not suffer.
A label can contain a large amount of various information, for example, storage conditions, circulation and many other useful information. Installing radio frequency tags will allow you to keep records in the repositories, where there is a large number of books. This process, in contrast to working with bar codes, is not so laborious, since an RF scanner connected to a PC simultaneously reads several dozen marks at a distance of about one meter. Thus, the problem of thefts from libraries is solved. A radio frequency reader is installed near the exit from the reading room, and if you carry a book with a tag past it, information about the attempt to carry it out will go to a guard post or a librarian.