Radio-frequency identification (RFID) is the wireless non-contact use of radio-
frequencyelectromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. he tags contain electronically stored information. !ome tags are powered by and read at short ranges (a few meters) "ia magnetic fields (electromagnetic induction). #thers use a local power source such as a battery, or else ha"e no battery but collect energy from the interrogating $% field, and then act as a passi"e transponder to emit microwa"es or &'( radio wa"es (i.e., electromagnetic radiation at high frequencies). )attery powered tags may operate at hundreds of meters. &nlike a bar code, the tag does not necessarily need to be within line of sight of the reader, and may be embedded in the tracked object. R(*+ tags are used in many industries. ,n R(*+ tag attached to an automobile during production can be used to track its progress through the assembly line. -harmaceuticals can be tracked through warehouses. .i"estock and pets may ha"e tags injected, allowing positi"e identification of the animal. !ince R(*+ tags can be attached to cash, clothing, e"eryday possessions, or e"en implanted within people, the possibility of reading personally-linked information without consent has raised serious pri"acy concerns !mall R(*+ chip, here compared to a grain of rice, is incorporated in consumer products, and implanted in pets, for identification purposes History *n /012 .3on heremin in"ented an espionage tool for the !o"iet &nion which retransmitted incident radio wa"es with audio information. !ound wa"es "ibrated adiaphragm which slightly altered the shape of the resonator, which modulated the reflected radio frequency. $"en though this de"ice was a co"ert listening de"ice, not an identification tag, it is considered to be a predecessor of R(*+ technology, because it was likewise passi"e, being energi4ed and acti"ated by wa"es from an outside source. 567 !imilar technology, such as the *(( transponder, was routinely used by the allies and 8ermany in 9orld 9ar ** to identify aircraft as friend or foe. ransponders are still used by most powered aircraft to this day. ,nother early work e:ploring R(*+ is the landmark /01; paper by 'arry !tockman, titled <=ommunication by %eans of Reflected -ower< (-roceedings of the *R$, pp //0>?/6@1, #ctober /01;). !tockman predicted that <... considerable research and de"elopment work has to be done before the remaining basic problems in reflected-power communication are sol"ed, and before the field of useful applications is e:plored.< %ario =ardulloAs de"ice, patented on Banuary 6C, /0DC, was the first true ancestor 5C7 of modern R(*+, as it was a passi"e radio transponder with memory. 517 he initial de"ice was passi"e, powered by the interrogating signal, and was demonstrated in /0D/ to the Eew Fork -ort ,uthority and other potential users and consisted of a transponder with /> bit memory for use as a toll de"ice. he basic =ardullo patent co"ers the use of R(, sound and light as transmission media. he original business plan presented to in"estors in /0>0 showed uses in transportation (automoti"e "ehicle identification, automatic toll system, electronic license plate, electronic manifest, "ehicle routing, "ehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates, sur"eillance) and medical (identification, patient history). ,n early demonstration of reflected power (modulated backscatter) R(*+ tags, both passi"e and semi-passi"e, was performed by !te"en +epp, ,lfred Goelle, and Robert (reyman at the .os ,lamos Eational .aboratory in /0DC. 527 he portable system operated at 0/2 %'4 and used /6- bit tags. his technique is used by the majority of todayAs &'(*+ and microwa"e R(*+ tags. 5>7 he first patent to be associated with the abbre"iation R(*+ was granted to =harles 9alton in /0;C. Design Tags , radio-frequency identification system uses tags, or labels attached to the objects to be identified. wo-way radio transmitter-recei"ers called interrogators or readers send a signal to the tag and read its response. R(*+ tags can be either passi"e, acti"e or battery-assisted passi"e. ,n acti"e tag has an on-board battery and periodically transmits its *+ signal. , battery-assisted passi"e (),-) has a small battery on board and is acti"ated when in the presence of an R(*+ reader. , passi"e tag is cheaper and smaller because it has no battery. 'owe"er, to start operation of passi"e tags, they must be illuminated with a power le"el roughly three magnitudes stronger than for signal transmission. hat makes a difference in interference and in e:posure to radiation. ags may either be read-only, ha"ing a factory-assigned serial number that is used as a key into a database, or may be readHwrite, where object-specific data can be written into the tag by the system user. (ield programmable tags may be write-once, read-multipleI <blank< tags may be written with an electronic product code by the user. , tag with no inherent identity is always threatened to get manipulated. R(*+ tags contain at least two parts: an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (R() signal, collecting += power from the incident reader signal, and other speciali4ed functionsI and an antenna for recei"ing and transmitting the signal. he tag information is stored in a non-"olatile memory. he R(*+ tag includes either a chip-wired logic or a programmed or programmable data processor for processing the transmission and sensor data, respecti"ely. ,n R(*+ reader transmits an encoded radio signal to interrogate the tag. he R(*+ tag recei"es the message and then responds with its identification and other information. his may be only a unique tag serial number, or may be product-related information such as a stock number, lot or batch number, production date, or other specific information. Readers R(*+ systems can be classified by the type of tag and reader. , Passive Reader Active Tag (PRAT) system has a passi"e reader which only recei"es radio signals from acti"e tags (battery operated, transmit only). he reception range of a -R, system reader can be adjusted from /?6,@@@ feet (@.C@?>@0.>@ m) 5citation needed7 , allowing fle:ibility in applications such as asset protection and super"ision. ,n Active Reader Passive Tag (ARPT) system has an acti"e reader, which transmits interrogator signals and also recei"es authentication replies from passi"e tags. ,n Active Reader Active Tag (ARAT) system uses acti"e tags awoken with an interrogator signal from the acti"e reader. , "ariation of this system could also use a )attery-,ssisted -assi"e (),-) tag which acts like a passi"e tag but has a small battery to power the tagAs return reporting signal. (i:ed readers are set up to create a specific interrogation 4one which can be tightly controlled. his allows a highly defined reading area for when tags go in and out of the interrogation 4one. %obile readers may be hand-held or mounted on carts or "ehicles. Signaling !ignaling between the reader and the tag is done in se"eral different incompatible ways, depending on the frequency band used by the tag. ags operating on .( and '( bands are, in terms of radio wa"elength, "ery close to the reader antenna because they are only a small percentage of a wa"elength away. *n this near field region, the tag is closely coupled electrically with the transmitter in the reader. he tag can modulate the field produced by the reader by changing the electrical loading the tag represents. )y switching between lower and higher relati"e loads, the tag produces a change that the reader can detect. ,t &'( and higher frequencies, the tag is more than one radio wa"elength away from the reader, requiring a different approach. he tag can backscatter a signal. ,cti"e tags may contain functionally separated transmitters and recei"ers, and the tag need not respond on a frequency related to the readerAs interrogation signal. ,n $lectronic -roduct =ode ($-=) is one common type of data stored in a tag. 9hen written into the tag by an R(*+ printer, the tag contains a 0>-bit string of data. he first eight bits are a header which identifies the "ersion of the protocol. he ne:t 6; bits identify the organi4ation that manages the data for this tagI the organi4ation number is assigned by the $-=8lobal consortium. he ne:t 61 bits are an object class, identifying the kind of productI the last C> bits are a unique serial number for a particular tag. hese last two fields are set by the organi4ation that issued the tag. Rather like a &R., the total electronic product code number can be used as a key into a global database to uniquely identify a particular product. 5//7 #ften more than one tag will respond to a tag reader, for e:ample, many indi"idual products with tags may be shipped in a common bo: or on a common pallet. =ollision detection is important to allow reading of data. wo different types of protocols are used to <singulate<a particular tag, allowing its data to be read in the midst of many similar tags. *n a slotted ,loha system, the reader broadcasts an initiali4ation command and a parameter that the tags indi"idually use to pseudo-randomly delay their responses. 9hen using an <adapti"e binary tree< protocol, the reader sends an initiali4ation symbol and then transmits one bit of *+ data at a timeI only tags with matching bits respond, and e"entually only one tag matches the complete *+ string. 5/67 ,n e:ample of a binary tree method of identifying an R(*+ tag )oth methods ha"e drawbacks when used with many tags or with multiple o"erlapping readers. )ulk reading is a strategy for interrogating multiple tags at the same time, but lacks sufficient precision for in"entory control. Miniaturization R(*+s are easy to conceal or incorporate in other items. (or e:ample, in 6@@0 researchers at )ristol &ni"ersity successfully glued R(*+ micro-transponders to li"e ants in order to study their beha"ior. 5/C7 his trend towards increasingly miniaturi4ed R(*+s is likely to continue as technology ad"ances. 'itachi holds the record for the smallest R(*+ chip, at @.@2mm J @.@2mm. his is /H>1th the si4e of the pre"ious record holder, the mu-chip. 5/17 %anufacture is enabled by using the silicon-on- insulator (!#*) process. hese dust-si4ed chips can store C;-digit numbers using /6;-bit Read #nly %emory (R#%). , major challenge is the attachment of antennas, thus limiting read range to only millimeters. Uses he R(*+ tag can be affi:ed to an object and used to track and manage in"entory, assets, people, etc. (or e:ample, it can be affi:ed to cars, computer equipment, books, mobile phones, etc. R(*+ offers ad"antages o"er manual systems or use of bar codes. he tag can be read if passed near a reader, e"en if it is co"ered by the object or not "isible. he tag can be read inside a case, carton, bo: or other container, and unlike barcodes, R(*+ tags can be read hundreds at a time. )ar codes can only be read one at a time using current de"ices. *n 6@//, the cost of passi"e tags started at &!K@.@0 eachI special tags, meant to be mounted on metal or withstand gamma sterili4ation, can go up to &!K2. ,cti"e tags for tracking containers, medical assets, or monitoring en"ironmental conditions in data centers start at &!K2@ and can go up o"er &!K/@@ each. )attery-,ssisted -assi"e (),-) tags are in the &!KC?/@ range and also ha"e sensor capability like temperature and humidity. 5citation needed7 R(*+ can be used in a "ariety of applications, 5/>75/D7 such as: ,ccess management racking of goods racking of persons and animals oll collection and contactless payment %achine readable tra"el documents !martdust (for massi"ely distributed sensor networks) racking sports memorabilia to "erify authenticity ,irport baggage tracking logistics 5/;7 *n 6@/@ three key factors dro"e a significant increase in R(*+ usage: decreased cost of equipment and tags, increased performance to a reliability of 00.0L and a stable international standard around &'( passi"e R(*+. he adoption of these standards were dri"en by $-=global, a joint "enture between 8!/ and 8!/ &!, which were responsible for dri"ing global adoption of the barcode in the /0D@s and /0;@s. he $-=global Eetwork was de"eloped by the ,uto-*+ =enter, an academic research project headquartered at the %assachusetts *nstitute of echnology (%*) with labs at fi"e leading research uni"ersities around the globe: =ambridge, ,delaide, Geio, !hanghai, (udan, !t. 8allen. 5/07 ,t R(*+ Bournal .i"e 6@/@ in #rlando, ,irbus detailed /> acti"e projects, *)% andMmost recently added to the teamM=!=. he two other areas of significant use are financial ser"ices for * asset tracking and healthcare. R(*+ is becoming increasingly pre"alent as the price of the technology decreases. Payment by mobile phones !ince summer 6@@0, two credit card companies ha"e been working with +allas, e:as-based +e"ice(idelity to de"elop speciali4edmicro!+ cards. 9hen inserted into a mobile phone, the micro!+ card can be both a passi"e tag and an R(*+ reader. 5667 ,fter inserting the micro!+, a userAs phone can be linked to bank accounts and used in mobile payment. +airy Nueen in conjunction with Oi"otech has also begun using R(*+s on mobile phones as part of their new loyalty and rewards program. 56C7 -atrons can ask to recei"e an R(*+ tag to place on their phone. ,fter acti"ation, the phone can recei"e promotions and coupons, which can be read by OiO#techAs speciali4ed Eear (ield =ommunication (E(=) de"ices. !imilarly, D-$le"en has been working alongside %aster=ard to promote a new touch-free payment system. hose joining the trial are gi"en a complimentary Eokia C66@ cell phone ? after acti"ation, it can be used as an R(*+-capable %aster=ard credit card at any of D-$le"enAs worldwide chains. 5617 EokiaAs 6@@; de"ice, the >6/6, has R(*+ capabilities also. =redit card information can be stored, and bank accounts can be directly accessed using the enabled handset. he phone, if used as a "ector for mobile payment, has added security in that users would be required to enter a passcode or -*E before payment is authori4ed. 5627 Asset management R(*+ combined with mobile computing and 9eb technologies pro"ide a way for organi4ations to identify and manage their assets. %obile computers, with integrated R(*+ readers, can now deli"er a complete set of tools that eliminate paperwork, gi"e proof of identification and attendance. his approach eliminates manual data entry. 9eb based management tools allow organi4ations to monitor their assets and make management decisions from anywhere in the world. 9eb based applications now mean that third parties, such as manufacturers and contractors can be granted access to update asset data, including for e:ample, inspection history and transfer documentation online ensuring that the end user always has accurate, real-time data. #rgani4ations are already using R(*+ tags combined with a mobile asset management solution to record and monitor the location of their assets, their current status, and whether they ha"e been maintained. R(*+ is being adopted for item-le"el retail uses. ,side from efficiency and product a"ailability gains, the system offers a superior form ofelectronic article sur"eillance ($,!), and a superior self checkout process for consumers. 6@@0 witnessed the beginning of wide-scale asset tracking with passi"e R(*+. 9ells (argo and )ank of ,merica made announcements that they would track e"ery item in their data centers using passi"e R(*+. %ost of the leading banks ha"e since followed suit. he(inancial !er"ices echnology =onsortium ((!=) set a technical standard for tagging * assets 56>7 and other industries ha"e used that standard as a guideline. (or instance the &! !tate +epartment is now tagging * assets with passi"e R(*+ using the *!#H*$= /;@@@-> standard. Inventory systems ,n ad"anced automatic identification technology based on R(*+ technology has significant "alue for in"entory systems. he system can pro"ide accurate knowledge of the current in"entory. *n an academic study 56;7 performed at 9al-%art, R(*+ reduced #ut-of-!tocks by C@ percent for products selling between @./ and /2 units a day. he R(*+ can also help the company to ensure the security of the in"entory. 9ith the just in time tracking of in"entory through R(*+, the computer data can show whether the in"entory stored in the warehouse is correct with quantity currently. #ther benefits of using R(*+ include the reduction of labor costs, the simplification of business processes, and the reduction of in"entory inaccuracies. *n 6@@1, )oeing integrated the use of R(*+ technology to help reduce maintenance and in"entory costs on the )oeing D;D +reamliner. 9ith the high costs of aircraft parts, R(*+ technology allowed )oeing to keep track of in"entory despite the unique si4es, shapes and en"ironmental concerns. +uring the first si: months after integration, the company was able to sa"e K60,@@@ in labor. 5607 ,irbus began an R(*+ program in 6@@> that recei"ed the 6@@; )est R(*+ +eployment award at the R(*+ Bournal .i"e e"ent. 5C@7 *n 6@@D, Recall =orporation integrated the use of R(*+ to help organi4ations track and audit their records, to support compliance with regulations such as the !arbanes-#:ley ,ct and '*-,, Product tracking *n 6@@2, the 9ynn =asino, .as Oegas, began placing indi"idual R(*+ tags on high "alue chips. hese tags allowed casinos the ability to detect counterfeit chips, track betting habits of indi"idual players, speed up chip tallies, and determine counting mistakes of dealers. *n 6@/@, the )ellagio casino was robbed of K/.2@ million in chips. he R(*+ tags of these chips were immediately in"alidated, thus making the cash "alue of these chips K@. 5C67 R(*+ can also be used for supply chain management in the fashion industry. he R(*+ label is attached to the garment at production, can be readHtraced throughout the entire supply chain and is remo"ed at the point of sale (-#!). Access contro R(*+ tags are widely used in identification badges, replacing earlier magnetic stripe cards. hese badges need only be held within a certain distance of the reader to authenticate the holder. ags can also be placed on "ehicles, which can be read at a distance, to allow entrance to controlled areas without ha"ing to stop the "ehicle and present a card or enter an access code. Social media *n 6@/@ Oail Resorts began the $pic%i: program to allow skiers to earn "irtual badges, compete for "ertical feet skied and other milestones using &'( -assi"e R(*+ tags in ski passes. he $pic%i: system not only allowed automated social sharing and capturing of ski data but also streamlined the "erification process which used to be performed by using a bar code and line-of- sight scanner. !oon other brands began adopting this method and in 6@/C it has become a growing area of use for R(*+. (acebook is using R(*+ cards at most of their li"e e"ents to allow guests to automatically capture and post photos. he automoti"e brands ha"e adopted R(*+ for social media product placement more quickly than other industries. %ercedes was an early adopted in 6@// at the -8, 8olf =hampionships, 5CC7 and by the 6@/C 8ene"a %otor !how many of the larger brands were using R(*+ for social media marketing. Promotion tracking o pre"ent retailers di"erting products, manufacturers are e:ploring the use of R(*+ tags on promoted merchandise so that they can track e:actly which product has sold through the supply chain at fully discounted prices. Transortation and logistics .ogistics and transportation are major areas of implementation for R(*+ technology. Fard management, shipping and freight and distribution centers use R(*+ tracking technology. *n the railroad industry, R(*+ tags mounted on locomoti"es and rolling stock identify the owner, identification number and type of equipment and its characteristics. his can be used with a database to identify the lading, origin, destination, etc. of the commodities being carried. 5C>7 *n commercial a"iation, R(*+ technology is being incorporated to support maintenance on commercial aircraft. R(*+ tags are used to identify baggage and cargo at se"eral airports and airlines. 5CD75C;7 !ome countries are using R(*+ technology for "ehicle registration and enforcement. 5C07 R(*+ can help detect and retrie"e stolen cars. Pu!lic transort R(*+ cards are used for access control to public transport. *n .ondon tra"ellers use #yster =ards on the tube, buses and ferries. *t identifies the tra"eller at each turnstile and so the system can calculate the fare. Infrastructure "anage"ent and rotection Passorts he first R(*+ passports (<$-passport<) were issued by %alaysia in /00;. *n addition to information also contained on the "isual data page of the passport, %alaysian e-passports record the tra"el history (time, date, and place) of entries and e:its from the country. #ther countries that insert R(*+ in passports include Eorway (6@@2), 51C7 Bapan (%arch /, 6@@>), most $& countries (around 6@@>), ,ustralia, 'ong Gong, the &nited !tates (6@@D), *ndia (Bune 6@@;), !erbia (Buly 6@@;), Republic of Gorea (,ugust 6@@;), aiwan (+ecember 6@@;), ,lbania (Banuary 6@@0), he -hilippines (,ugust 6@@0), Republic of %acedonia (6@/@), and =anada (6@/C). !tandards for R(*+ passports are determined by the *nternational =i"il ,"iation #rgani4ation (*=,#), and are contained in *=,# +ocument 0C@C, -art /, Oolumes / and 6 (>th edition, 6@@>). *=,# refers to the *!#H*$= /111C R(*+ chips in e-passports as <contactless integrated circuits<. *=,# standards pro"ide for e-passports to be identifiable by a standard e- passport logo on the front co"er. !ince 6@@>, R(*+ tags included in new &! passports will store the same information that is printed within the passport and also include a digital picture of the owner. 5117 he &! !tate +epartment initially stated the chips could only be read from a distance of /@ centimetres (C.0 in), but after widespread criticism and a clear demonstration that special equipment can read the test passports from /@ metres (CC ft) away, 5127 the passports were designed to incorporate a thin metal lining to make it more difficult for unauthori4ed readers to <skim< information when the passport is closed. he department will also implement )asic ,ccess =ontrol (),=), which functions as a -ersonal *dentification Eumber (-*E) in the form of characters printed on the passport data page. )efore a passportAs tag can be read, this -*E must be entered into an R(*+ reader. he ),= also enables the encryption of any communication between the chip and interrogator. Libraries .ibraries ha"e used R(*+ to replace the barcodes on library items. he tag can contain identifying information or may just be a key into a database. ,n R(*+ system may replace or supplement bar codes and may offer another method of in"entory management and self-ser"ice checkout by patrons. *t can also act as a security de"ice, taking the place of the more traditional electromagnetic security strip. *t is estimated that o"er C@ million library items worldwide now contain R(*+ tags, including some in the Oatican .ibrary in Rome. !ince R(*+ tags can be read through an item, there is no need to open a book co"er or +O+ case to scan an item, and a stack of books can be read simultaneously. )ook tags can be read while books are in motion on a con"eyor belt, which reduces staff time. his can all be done by the borrowers themsel"es, reducing the need for library staff assistance. 9ith portable readers, in"entories could be done on a whole shelf of materials within seconds. 5>D7 'owe"er, as of 6@@; this technology remains too costly for many smaller libraries, and the con"ersion period has been estimated at // months for an a"erage-si4e library. , 6@@1 +utch estimate was that a library which lends /@@,@@@ books per year should plan on a cost of P2@,@@@ (borrow- and return- stations: /6,2@@ each, detection porches /@,@@@ eachI tags @.C> each). R(*+ taking a large burden off staff could also mean that fewer staff will be needed, resulting in some of them getting laid off, 5>>7 but that has so far not happened in Eorth ,merica where recent sur"eys ha"e not returned a single library that cut staff because of adding R(*+. *n fact, library budgets are being reduced for personnel and increased for infrastructure, making it necessary for libraries to add automation to compensate for the reduced staff si4e. ,lso, the tasks that R(*+ takes o"er are largely not the primary tasks of librarians. , finding in the Eetherlands is that borrowers are pleased with the fact that staff are now more a"ailable for answering questions. -ri"acy concerns ha"e been raised surrounding library use of R(*+. )ecause some R(*+ tags can be read from up to /@@ metres (CC@ ft), there is some concern o"er whether sensiti"e information could be collected from an unwilling source. 'owe"er, library R(*+ tags do not contain any patron information, 5>;7 and the tags used in the majority of libraries use a frequency only readable from appro:imately /@ feet (C.@ m). 5>27 (urther, another non-library agency could potentially record the R(*+ tags of e"ery person lea"ing the library without the library administratorAs knowledge or consent. #ne simple option is to let the book transmit a code that has meaning only in conjunction with the libraryAs database. ,nother possible enhancement would be to gi"e each book a new code e"ery time it is returned. *n future, should readers become ubiquitous (and possibly networked), then stolen books could be traced e"en outside the library. ag remo"al could be made difficult if the tags are so small that they fit in"isibly inside a (random) page, possibly put there by the publisher. Museums R(*+ technologies are now also implemented in end-user applications in museums. ,n e:ample was the custom-designed temporary research application, <eQspot,< at the $:ploratorium, a science museum in !an (rancisco, =alifornia. , "isitor entering the museum recei"ed an R( ag that could be carried as a card. he eQspot system enabled the "isitor to recei"e information about specific e:hibits. ,side from the e:hibit information, the "isitor could take photographs of themsel"es at the e:hibit. *t was also intended to allow the "isitor to take data for later analysis. he collected information could be retrie"ed at home from a <personali4ed< website keyed to the R(*+ tag. Schools and universities !chool authorities in the Bapanese city of #saka are now chipping childrenAs clothing, backpacks, and student *+s in a primary school. 5D@75dead link7 , school in +oncaster, $ngland is piloting a monitoring system designed to keep tabs on pupils by tracking radio chips in their uniforms. 5D/7 !t =harles !i:th (orm =ollege in west .ondon, $ngland, started !eptember, 6@@;, is using an R(*+ card system to check in and out of the main gate, to both track attendance and pre"ent unauthori4ed entrance. !imilarly, 9hitcliffe %ount !chool in =leckheaton, $ngland uses R(*+ to track pupils and staff in and out of the building "ia a specially designed card. *n the -hilippines, some schools already use R(*+ in *+s for borrowing books and also gates in those particular schools ha"e R(*+ *+ scanners for buying items at a school shop and canteen, library and also to sign in and sign out for student and teacherAs attendance. Sorts R(*+ for timing races began in the early /00@s with pigeon racing, introduced by the company +eister $lectronics in 8ermany. R(*+ can pro"ide race start and end timings for indi"iduals in large races where it is impossible to get accurate stopwatch readings for e"ery entrant. *n the race, the racers wear tags that are read by antennae placed alongside the track or on mats across the track. &'( tags pro"ide accurate readings with specially designed antennas. Rush error, lap count errors and accidents at start time are a"oided since anyone can start and finish any time without being in a batch mode. he design of chipRantenna controls the range from which it can be read. !hort range compact chips are twist tied to the shoe or "elcro strapped the ankle. hese need to be about 1@@mm from the mat and so gi"e "ery good temporal resolution. ,lternati"ely a chip plus a "ery large (a /62mm square) antenna can be incorporated into the bib number worn on the athleteAs chest at about /.62m height. -assi"e and acti"e R(*+ systems are used in off-road e"ents such as #rienteering, $nduroand 'are and 'ounds racing. Riders ha"e a transponder on their person, normally on their arm. 9hen they complete a lap they swipe or touch the recei"er which is connected to a computer and log their lap time. R(*+ is being adapted by many recruitment agencies which ha"e a -$ (-hysical $ndurance est) as their qualifying procedure especially in cases where the candidate "olumes may run into millions (*ndian Railway Recruitment =ells, -olice and -ower sector). #o"le"ent to !arcode R(*+ tags are often a complement, but not a substitute, for &-= or $,E barcodes. hey may ne"er completely replace barcodes, due in part to their higher cost and the ad"antage of multiple data sources on the same object. ,lso, unlike R(*+ labels, barcodes can be generated and distributed electronically, e.g. "ia e-mail or mobile phone, for printing or display by the recipient. ,n e:ample is airlineboarding passes. he new $-=, along with se"eral other schemes, is widely a"ailable at reasonable cost. he storage of data associated with tracking items will require many terabytes. (iltering and categori4ing R(*+ data is needed to create useful information. *t is likely that goods will be tracked by the pallet using R(*+ tags, and at package le"el with &ni"ersal -roduct =ode (&-=) or $,E from unique barcodes. he unique identity is a mandatory requirement for R(*+ tags, despite special choice of the numbering scheme. R(*+ tag data capacity is large enough that each indi"idual tag will ha"e a unique code, while current bar codes are limited to a single type code for a particular product. he uniqueness of R(*+ tags means that a product may be tracked as it mo"es from location to location, finally ending up in the consumerAs hands. his may help to combat theft and other forms of product loss. he tracing of products is an important feature that gets well supported with R(*+ tags containing a unique identity of the tag and also the serial number of the object. his may help companies cope with quality deficiencies and resulting recall campaigns, but also contributes to concern about tracking and profiling of consumers after the sale. *t has also been proposed to use R(*+ for -#! store checkout to replace the cashier with an automatic system which needs no barcode scanning. *n the past this was not possible due to the higher cost of tags and e:isting -#! process technologies. 'owe"er, *ndustry !tandard, a couture shop and recording studio in #hio has successfully implemented a -#! procedure that allows faster transaction throughput. ,n (+,-nominated task force concluded, after studying the "arious technologies currently commercially a"ailable, which of those technologies could meet the pedigree requirements. ,mongst all technologies studied including bar coding, R(*+ seemed to be the most promising and the committee felt that the pedigree requirement could be met by easily le"eraging something that is readily a"ailable. Tele"etry ,cti"e R(*+ tags also ha"e the potential to function as low-cost remote sensors that broadcast telemetry back to a base station. ,pplications of tagometry data could include sensing of road conditions by implanted beacons, weather reports, and noise le"el monitoring. 5D>7 -assi"e R(*+ tags can also report sensor data. (or e:ample, the 9ireless *dentification and !ensing -latform is a passi"e tag that reports temperature, acceleration and capacitance to commercial 8en6 R(*+ readers. *t is possible that acti"e or battery-assisted passi"e (),-) R(*+ tags, used with or in place of barcodes, could broadcast a signal to an in-store recei"er to determine whether the R(*+ tag (product) is in the store.