Security and Authentication


One of the earliest uses of RFID has been in the area of security and authentication. The capability to identify, often uniquely, an object, a person, or an animal is achieved very simply with RFID tags. Some of the most popular uses of RFID in security and authentication include electronic article surveillance (EAS), document authentication, and electronic drug pedigree applications.

Electronic Article Surveillance (EAS)

What is it?

EAS, as illustrated in Figure 1.1, is one of the most basic applications of RFID for security. Objects such as articles of clothing are tagged with very inexpensive "1-bit" tags. The tags do not uniquely identify the objects but cause an alarm to go off or a camera to take a picture when an object moves within the range of specially situated readers.

Figure 1.1. A Typical Electronic Article Surveillance (EAS) Application


A new category of EAS solutions using sophisticated tags is gaining momentum. In these applications, tags are placed "into" products during their manufacture, thereby creating self-authenticating products with significantly lower risk of tampering, fraud, or counterfeiting. These product authentication tags are more costly and are generally used for expensive items such as designer brand clothing or medicine bottles.

Why use it?

Shoplifting costs retailers around the world billions of dollars every year. EAS systems can greatly reduce inventory shrinkage due to theft in retail and warehouse operations. Additionally, the likelihood of a stock-out (an item that goes unexpectedly out of stock) from shoplifting can be greatly reduced. Stock-outs can be very costly to both the retailer and the manufacturer. When faced with a stock-out, a customer might decide to buy a similar product from an alternate manufacturer or simply go to another store and buy the same product there. In either case, customer loyalty is jeopardized.

Document Authentication

What is it?

Document authentication is a new area for the use of RFID. It employs tags that uniquely identify and confirm the authenticity of the documents to which they are affixed. In January of 2004, the invitations to the Golden Globe Award ceremonies carried an inconspicuously embedded RFID tag, which reduced the possibility of counterfeiting, increased overall security, and enabled faster and easier movement and access for the participants. Other sophisticated applications use RFID to authenticate important items ranging from package deliveries and passports to identification cards and even currency.

Why use it?

Document authentication can detect and prevent fraud in addition to providing anti-counterfeiting measures. These benefits extend well beyond everyday enterprise or consumer use. We can expect this technology to be further deployed in various government and military applications.

Access Control

What is it?

RFID tags embedded in cards, key chains, or other similar carriers provide access control for any secure area such as an office building, a parking garage, or a car. Tags can be programmed to uniquely identify the holder of the tag, thereby allowing for a very granular authentication method by the reader. For example, a certain employee may be granted access to the lobby of an office building and certain designated offices. The same employee may be denied access to the computer server room or a secure storage area.

Why use it?

Access control RFID tags are a very cost effective and convenient method of providing secure, authenticated access. The tags cannot be easily duplicated or unintentionally destroyed or disabled. Additionally, access control rules programmed into the reader can easily be modified without the need to re-program the tag itself.

Electronic Drug Pedigree

What is it?

Vulnerability in the supply chain of drugs is a major issue for both pharmaceutical manufacturers and suppliers. There are many stops in the supply chain that represent a potential vulnerability, from secondary or foreign wholesalers to repackagers and Internet pharmacies. RFID technology can be used to tag drug packages and essentially build and record their pedigree as they move through different links in the supply chain.

Why use it?

Counterfeit drugs not only cause monetary damage to the manufacturers, but, more importantly, they pose a potential health risk to the consumer. Counterfeit drugs can be made using lower standards or having poor quality. They may indeed have no active ingredients at all. Some may even contain the wrong ingredients. Electronic drug pedigree methods can help to secure and authenticate drugs shipped by manufacturers and reduce the risk of tampering and counterfeiting. This use of RFID technology offers the capability to trace a drug's pedigree as it moves through numerous links in the supply chain. Additionally, the capability to monitor and record data at every stop in the supply chain helps isolate the source of counterfeiting activity in the chain.



RFID Field Guide(c) Deploying Radio Frequency Identification Systems
RFID Field Guide: Deploying Radio Frequency Identification Systems
ISBN: 0131853554
EAN: 2147483647
Year: 2006
Pages: 112

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net