Patrick Plaggenborg - Social RFID

download Patrick Plaggenborg - Social RFID

of 52

Transcript of Patrick Plaggenborg - Social RFID

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    1/52

    SOCIAL RFIDinternet forthings

    Patrick PlaggenborgRotterdam, August 2006

    SUPERVISOR

    Rob van Kranenburg

    Utrecht School of the Arts

    European Media Master of Arts

    Digital Media Design

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    2/52

    SOCIAL RFIDinternetforthings

    Patrick Plaggenborg

    Rotterdam, August 2006

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    3/52

    Version 1

    August 2006Rotterdam, Te Netherlands

    Ting:189HShttp://www.thinglink.org/

    Printed at Koopman & Kraaijenbrink

    http://www.deprintservice.nl/

    More inormation about project and thesis:http://www.socialrd.org/

    Patrick Plaggenborg

    [email protected]://patrick.plaggenborg.nl

    http://www.thinglink.org/http://www.socialrfid.org/http://www.socialrfid.org/http://www.thinglink.org/
  • 8/7/2019 Patrick Plaggenborg - Social RFID

    4/52

    FOREWORDIt was quite enervating to explore RFID, starting almost rom scratch. Especially the rst period a lot

    o plain reading was involved. But the more I learned about this technology, the more enthusiastic Igot. Teoretically it is bringing a lot o possibilities. While the RFID inrastructure is still taking oits interesting to make up uture scenarios.

    For accessibility reasons I chose to write this thesis in English. Being a native Dutch speaker thatmade the whole process quite time consuming. I do think the greater reach weighs up against theextra eort.

    I want to thank my supervisor Rob van Kranenburg or his incredible enthusiasm and or oten being

    available at unusual times o the day. It was very inspiring and motivating working with him. I alsowant to thank my girlriend Priscilla or her support in this very busy period, where work and reetime mix up inconveniently.

    I hope you enjoy reading this thesis. More about the project involved and a PDF version o this thesiscan be ound at www.socialrd.org.

    Patrick Plaggenborg

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    5/52

    COntEntS

    RFID 101.1 History 10

    1.2 Adoption 10

    1.3 Hardware 11 ags Readers 11 ypes o tags 11 Classes 12

    Memory 12 Frequencies 13 Physical dierences 13

    1.4 Standards 14 Automatic identication structure 15

    Public debate 16

    2.1 Te supply chain 16 Shipping 16 ransportation Receiving 16 In-acility operations 16

    2.2 Proponents 17 Wal-Mart Availability to consumers 17 Near Field Communication 18

    2.3 Opponents 18 Privacy invasion 18 Health implications 20

    Positive RFID 21

    3.1 Division 21

    3.2 echnology examples 21 Added value 21 Binary Identication 21 Unique Identication 22

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    6/52

    Descriptive Identication 22 History collection 22 Pattern recognition 23 Masses 23 Medium 23

    Symbolic medium 24 Interace 24 Sensors 24 Evolution 25

    3.3 Ubiquitous RFID 25 ransparency User inuence 26 Social applications: RFID 2.0 26

    Project 28

    4.1 Project target 28

    4.2 Context 28

    4.3 Open platorm 29 Product code 29 Application layer 29 Layered description and content 29

    4.3 Project description 30 Emotional history 30 Mobility 31 Hardware 32 Stories 33

    Conclusion 35 Recommendations 35 Lessons learned 36

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    7/52

    ILLUStRAtIOnSFig. 1. Hierarchy in RFID Class Structure 12Fig. 2. Class Functionality 12

    Fig. 3. RFID Frequencies 13Fig. 4. A ull-scale Gen 2 RFID tag 14Fig. 5. EPC Global RFID network vs. an open RFID platorm 28Fig. 6. Extracting the story with a PDA 31Fig. 7. Fisher Price roller skate 32Fig. 8. Hand crated puppet 32Fig. 9. Stued animal 33Fig. 10. Plastic military tank 33

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    8/52

    AppEnDICES1. EPCGLOBAL, 2004,EPCGlobal Network, available online: http://www.epcglobalinc.org/about/

    EPCglobal_Network.pd(last accessed 2006/07/31)

    2. PLAGGENBORG, P. 2006, Onderzoek RFID-toepassingen, Research (Dutch), May 2006, availableonline: http://patrick.plaggenborg.nl/wp-content/uploads/2006/05/Onderzoek%20RFID-toepass-ingen%20-%20Patrick%20Plaggenborg.pd(last accessed: 2006/07/08)

    http://www.epcglobalinc.org/about/EPCglobal_Network.pdfhttp://www.epcglobalinc.org/about/EPCglobal_Network.pdfhttp://patrick.plaggenborg.nl/wp-content/uploads/2006/05/Onderzoek%20RFID-toepassingen%20-%20Patrick%20Plaggenborg.pdfhttp://patrick.plaggenborg.nl/wp-content/uploads/2006/05/Onderzoek%20RFID-toepassingen%20-%20Patrick%20Plaggenborg.pdfhttp://patrick.plaggenborg.nl/wp-content/uploads/2006/05/Onderzoek%20RFID-toepassingen%20-%20Patrick%20Plaggenborg.pdfhttp://patrick.plaggenborg.nl/wp-content/uploads/2006/05/Onderzoek%20RFID-toepassingen%20-%20Patrick%20Plaggenborg.pdfhttp://www.epcglobalinc.org/about/EPCglobal_Network.pdfhttp://www.epcglobalinc.org/about/EPCglobal_Network.pdf
  • 8/7/2019 Patrick Plaggenborg - Social RFID

    9/52

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    10/52

    IntRODUCtIOnRFID (Radio Frequency Identication) has

    been used by many o us or years already, evenwithout many people knowing this. Its the

    technology behind automatic toll collection

    systems, identication chips in cats or dogs

    and electronic door keys or ofces and cars.

    But a couple o years ago RFID became a hype.

    Especially in the supply-chain RFID was

    expected to bring changes: prosperity, but at

    the same time the technology had a negative

    atmosphere surrounding it.

    Tis thesis is looking into these supply chainchanges. On one hand its purpose is tounderstand the motives behind creating a globalproduct inormation inrastructure, and on theother hand the privacy intrusions it is causing.Te main objective o this thesis is to look oralternative uses or RFID as a technology andespecially or its application in the supply chain.

    Te core research question this is intended toanswer is: How can social applications takeadvantage o RFID?

    o understand why RFID is suddenly gettingthis huge amount o attention, its importantto rst nd out what technology is dealt with.Chapter one is answering the general sub ques-tion What is RFID? Here RFID as a technol-

    ogy is explained. ag unctionality is explained toget a good idea o the technical possibilities andalso the standards o the commercial automaticidentication structure are covered.

    Te massive adoption o RFID in the supplychain is bringing changes, both positive andnegative, on a larger scale. Te positive aspectsthat are brought to attention are mainly coming

    rom commercial parties, and involve techno-logical and commercial progression. o general

    public, primarily negativity is surrounding RFID.

    Tis negativity consists o privacy intrusions andhuman health issues. o understand the situation,both the sub questions What are the motivesbehind RFID application in the supply chain?and What are the motives behind the privacyand human health advocates? are answered.

    When looking or RFIDs positive use, like asocial application, and a lot o negativity such as

    privacy intrusion is surrounding it, the researchquestion cannot be answered without rst askingthe sub question Is negativity interconnectedwith RFID as a technology? I that would be thecase, it would be useless trying to lit RFID outo this negative atmosphere. Tere would be noprogression. Next to the supply chain applicationo RFID, a lot o other applications have beendeveloped, commercial and non-commercialand artistic. Te interconnection o positivity

    and negativity with RFID as a technology isexamined by studying the added value o RFIDin these applications.

    Ater examining RFID as a technology, theinrastructure created or its supply chainapplication is looked at. Although its developedby and or the commercial sector, this thesis islooking or the prospect o its social application.

    Te sub question What possibilities does supplychain inrastructure give social applications?is dealt with. o answer this question socialapplications or the web also get a look at.

    Te project interconnected with this thesis isplacing itsel in that part o the design eldexpanded by RFID. While taking advantage othose things learned about RFID its taking a

    critical stance on RFID data collection in thesupply chain.

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    11/52

    10 RFID

    1.1 HistoryIts hard to say when the development o RFIDstarted. echnology based on radio requencydates back to the 1920s with the development oradar (Radio Detection And Ranging) systems.Radar can be seen as the ancestor o RFIDalthough with radar it wasnt possible to actually

    identiy the detected objects. Tis became possi-ble with the technique called IFF (IdenticationFriend or Foe), invented by the British in 1939and used in World War II to identiy enemy orriendly airplanes (Goebel, 2005).

    Although Harry Stockman in 1948 was the rstto explore RFID it took about 30 years to see therst real RFID examples as the true ancestorsto RFID. Tese applications were like passive

    radio transponders equipped with memory andlook a lot like modern RFID. Te developmento RFID depended on the development oother techniques. It was impossible without thedevelopment o the transistor, the integratedcircuit, the microprocessor, development ocommunication networks and changes in ways odoing business (Lendt, 2001).

    It took until the 1970s when developers,inventors, companies, academic institutions,and government laboratories were activelyworking on RFID. Mario Cardullos U.S. Patent3,713,148 in 1973 can be seen as the rst trueexample o RFID (Cardullo, 2001), but alsothe Los Alamos Scientic Laboratory was veryadvanced on RFID. Tey demonstrated theirwork Short-range radio-telemetry or electronic

    identication using modulated backscatter in1975.

    1 RFID1 RFIDTe 1980s were the decade o ull implementa-tion and commercialization o RFID withapplications in transportation, access control andanimal identication. Especially toll implemen-tation gave the technique a boost in the early1990s. In the end o the 1990s and the begin-ning o the 21st century standards were adopted,RFID became wide spread and part o every day

    lie (Lendt, 2001).

    1.2 AdoptionTe massive distribution o RFID is mainlycaused by the aim or business to identiy andtrack the movements o their products. For along time barcode was the solution. But evenwith barcodes retailers missed about 4% o their2003 sales because o items being out-o-stock

    (McFarlane, 2003). Reported thet and otherloss o stock totalled $31.3 billion or Americancompanies in 2003 (Deutsch, 2003). RFID isbeing pushed as the successor o the barcode. Alleyes are on this technique because its expected tosolve parts o these problems with its signicantadvantages.

    Barcodes are usually printed on paper labels

    or on the outside o packaging. Te papermight damage resulting in bad reads rom thebarcode scanner. Tis means a person will haveto manually type the number correspondingwith the barcode. RFID uses radio requency,which allows the tags to be attached to itemsinside boxes or pallets. RFID will even workbehind walls. Te tags do not have to be visiblein contrast with barcodes, an optical technique.

    Barcodes can store unique identiying numbersusually on class level, while RFID can store

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    12/52

    RFID 11

    instance level identication numbers: a numberor every unique product. Next to that there isspace available or additional inormation likeexpiration, use-by and sell-by dates or instruc-

    tions. RFID systems are automated able toconsecutively read out a lot o tags at nearly thesame time. Tese advantages show us the potencyRFID has to bring the global supply system a loto efciency.

    1.3 HardwareTags

    RFID tags consist o two important components.Usually in the middle o the tag there is anIntegrated Circuit (IC, also microchip) whichcan contain a unique identication number (ID)or a small amount o other data. Around the chiptheres an antenna, used to send and receive theradio waves. Te tag can be very small since theIC and antenna do not take up a lot o space.Te antenna is a at conductive coil around theIC and the IC does not have to be bigger than

    a ew millimetres. In act, the smallest IC rightnow measures 0.15 x 0.15 mm and is 7.5 mthick (Hitachi, 2006). Te chip and antenna areusually part o a plastic tag. Te size o the wholetag depends most on the size o the antenna,resulting in tags rom the size o a postage stampup to the size o a postcard. Because the tags canbe small and thin they can easily be embeddedin packaging, plastic cards, clothing labels, paper

    tickets and books. Tere are two types o tags.ags without battery are called passive tags andactive tags have a small battery on board.

    Readers

    Te reader is the device interrogating nearbytags and reading out their inormation. Tereader will send out a radio signal, received bynearby tags. Tey will process the signal and

    respond with inormation. How the response issent depends on the type o tag. Some readers

    can only read but a lot o RFID readers used arealso able to write to the memory o tags withread/write memory. Readers can be xed in orexample doors or toll gateways, or be part o a

    handheld device such as a phone or PDA. Class5 RFID tags itsel can even unction as readerand are able to communicate with other tags.

    Types o tags

    PassivePassive tags do not have an internal battery. Onreceiving a radio signal the antenna in the chipinduces a small electrical current providing just

    enough power or the IC to work and send a sig-nal back. Te tag backscatters1 the signal receivedrom the reader. Te response range is limited bythe strength o the readers signal. O course thesignal should be strong enough to reach the tag,but not much o the power received can be usedto send a response, because the maximum rangeo a passive tag is limited anyway (around 4 to 5metres).

    Because passive tags do not need a continuouspower source they theoretically have an unlimitedlie span. Teir design is simple, making themeasy to produce. Te lowest cost tags with thestandard chosen by the big companies Wal-Mart,esco and Metro AG are available at a price o5 cents (SmartCode, 2006). Because o their lowprice they are great or use on individual productsin applications like supermarket checkouts and

    smart cards.

    Semi-passiveSemi-passive tags are quite similar to passive tagsbut contain a small battery to power the logic othe IC. Te battery can also provide the antennawith power to send a response, which removes

    Backscatter is the reection o waves,particles, or signals back to the direction they camerom.

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    13/52

    12 RFID

    the need or the antenna to be designed to collectpower rom the incoming signal. It can thereorebe optimized or signal reception only. Tesemi-passive tags have a shorter lie span because

    o their reliance on the battery. Tey are moreragile and are a lot more expensive.

    ActiveActive tags have their own internal power sourceso they dont have to harvest their power romthe incoming radio signal. Because they have anactive radio requency transmitter they can com-municate in a session with the reader, resulting

    in ewer errors. Teir read range is a lot higherthan that o passive tags: eectively aroundhundreds o meters. Being able to transmithigher powers active tags can also be moreeective in difcult environments with waterand heavy metal. With passive tags its nearlyimpossible to communicate in such conditions.Active tags can be read at very high speeds aswell. Very suitable or ull speed toll collectionare the high requency active tags, which can be

    read at speeds o 150 miles per hour (Sabetti,exas Instruments). Its also possible to createmonitoring tags by combining them with sensorsor temperature, light, humidity vibration orother purposes. Active tags also have a muchlarger memory and are more secure because otheir ICs high processing capabilities.

    Classes

    Although we have the rough division o tags inpassive and active tags, even within those typesthere are dierences in unctionality. o providea ramework or the discussion and developmento these dierent unctionalities the Auto-IDCenter dened an RFID Class Structure(Engels, Sarma, 2005). Te dierent classes orma hierarchy o unction sets, starting rom Class 1going up to Class 5, with each set increasing the

    tags unctionality (Fig. 1).

    Fig.. Hierarchy in RFID Class Structure

    Reader (Class 5)

    Active Ad Hoc (Class 4)

    Semi-Passive (Class 3)

    Higher Functionality(Class 2)

    Identity (Class 1)

    Fig.2. Class Functionality

    C Name Functionality set

    5 Reader TagCan act as reader to passivetags.

    4Active Ad Hoctag

    Active. Communication withother Class 4 tags or passivereader.

    3 Semi-Passive tagWake-up system. On-boardpower source.

    2Higher Function-ality tag

    Read/write memory.

    1 Identity tagPassive. Min. unctionalityrequired or identifcation.Write once, read many.

    Memory

    Te inormation in an RFID tag can be eitherpre-loaded and read or randomly accessed andchanged. ags with their data already stored inthe abrication process used to be called Class 0tags. Te memory is called Read Only Memory

    (ROM). Most tags however are shipped emptyand can have their memory set only once. Ater

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    14/52

    RFID 1

    data has been written to the tag, the tag canonly be read, called Write Once Read Many(WORM). Te dynamically variable memory iscalled Static Random Access Memory (SRAM)

    and can be unlimited written to. o save power,memory size is kept to a minimum. Passivetags can typically contain about 32 bits to128 kilobyte o data. Because active tags haveembedded batteries their memory can be higher.Some systems operate with up to 1 Megabyte omemory (AIMGlobal, 2006).

    Frequencies

    Tere are our dierent requency bands, eachwith own characteristics (IEE, 2005). While lowrequency signals are able to penetrate objects orwater easier, they are also slower. Higherrequency signals can provide a higher speed butalso lose their strength when going throughobjects. Penetrating metals is impossible onhigher requencies. Te dierent characteristicssuit dierent applications.

    Although the HF 13,56 MHz requency(primarily used or smart cards but also othertags) is used worldwide, there are no Internation-ally agreed requencies. For example there are

    Fig.3. RFID Frequencies

    Band LF(Low Frequency)

    HF(High Frequency)

    Ultra High Frequency Microwave

    Typical RFIDFrequency

    120-135 kHz 13,56 MHz 433 MHz 860-960 MHz 2450 MHz

    Read range < 0.5 m < 1.5 m < 100 m < 5 m < 10 mAprox. data rate < 1 kbit/s 25 kbit/s 30 kbit/s 100 kbit/s 100 kbit/s

    Characteristics Slow.Expensive.

    Medium speed.Multiple concur-rent reads (

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    15/52

    1 RFID

    backscatters the electric radio waves sent by thereader. Te IC encodes the tags inormation bymodulating the radio waves sent by the readerbeore reection. Tis long-range technique o

    backscattering radio waves can be called ar eldcommunication.

    1.4 StandardsIts important to have standards in the RFIDapplications since a lot o dierent companies,rom dierent countries have dierent tasksin the supply chain, but are working with the

    same products. For all o them to work togetherstandards have to be agreed upon.

    Tere are our dierent areas where RFIDstandards have been proposed:

    Te air interace protocol (communicationbetween tags and readers)

    Data content and encoding (data ormattingor organisation, numbering schemes)

    Conormance (testing products on meetingstandards)

    Applications (how standards are used onshipping labels, or example)

    Te Auto-ID Center was set up in 1999 todevelop code to identiy products and track themthrough the global supply chain: the ElectronicProduct Code (EPC). Goal was to develop a

    low-cost RFID system, based on UHF becauseonly the ultra-high requency band deliveredread range suitable or supply chain applications.Tey wanted the system to be global and based

    on open standards, with a layer integrated withthe internet. Tis way companies could shareinormation easily and at low cost.

    Ater the Auto-ID Center came up with thestructure o dierent classes or tags withdierent sets o unctionality, they adopted aClass 0 tag. Class 0 tags are read-only as welland are programmed at the time o manuacture,

    where Class 1 tags are read-only but can beprogrammed once by the rst user. But both tagsuse a dierent protocol, so end users had to buymulti-protocol readers to read both Class 1 andClass 2 tags.

    In 2003 the Auto-ID Center licensed theirEPC to the Uniorm Code Council. Te UCChad developed the Universal Product Code(UPC), which is the code used in most bar code

    systems in the US. In Europe the EuropeanArticle Number (EAN) was used, developedby EAN International. EAN International andUCC joined orces and set up EPCGlobal tocommercialise the EPC technology. In 2004 theybegan developing a new protocol, not backwardcompatible with either Class 1 or 0. Tis protocolwas developed to create a single global standard,close to the ISO (International Organisation

    Fig.4. A ull-scale Gen 2 RFID tag

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    16/52

    RFID 1

    or Standardization) UHF protocol, whichwas ound to be too complex earlier. Tissecond-generation tag got reerred to as Gen 2(RFIDJournal, 2005).

    Te history o the Gen 2 RFID standard is quitecomplex, and did not lead to a globally acceptedstandard yet, although the ISO is planning toincorporate the Gen 2 protocol as a new partinto ISO UHF standards. Work on the new partdocument is expected to be complete by mid2006 (Porter, 2005). In the mean time Gen 2is being adopted on a wide scale by customers

    and hardware manuacturers, including DHL,Michelin and Wal-Mart and its suppliers.

    Automatic identication structure

    An RFID-based automatic identication systemcontains the ollowing elements (McFarlane,2003):

    1. A unique identication number assigned to aparticular item

    2. An identity tag attached to the item,capable o storing - at a minimum a uniqueidentication number

    3. Networked RFID readers and data processingsystems

    4. One or more networked databases to storeproduct inormation associated to the uniqueID.

    When developing its Auto ID system the AutoID Center wanted to establish specications orlow cost tags and readers. It was important thatthe system used global standards or its number-ing system and product inormation. o enable aglobal, seamless interchange o product data, anopen, global network specication was developed.Tis together resulted in specic eatures o theirsystem:

    1. Reerence specications or write-once read-many (WORM) tags, which only contain aunique product identication number. Allother product inormation is stored in a

    database.2. Use o the Electronic Product Code (EPC),

    providing unique product identity3. An Object Naming Service (ONS) resolving

    the EPC to the location o the actual productinormation

    4. Physical Mark-up Language (PML), anXML2 based language and structure or theproduct inormation

    Te maintenance and installation costs o theseelements in the structure o automatic identica-tion can be spread across several organisations.Each o the organisations can benet romhaving uniquely identied items moving in,through and out o the organizations operations.

    2 Extensible Mark-up Language, describ-

    ing inormation text-based in a tree-based structure(http://www.w3.org/XML/)

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    17/52

    1 PublIcDebate

    2.1 The supply chainIn the supply chain the by RFID enabledautomatic identication can help improve ourbasic logistic processes (McFarlane 2003):

    1. Shipping2. ransportation

    3. Receiving4. In-acility operations

    Shipping

    For shippers one o the most important reasonsto adopt RFID is the extended visibility itprovides or the decisions to be made duringthe process rom the time the product is readyto ship until the transportation starts. Onceproducts are ready or shipping, the shipper has

    to decide how to distribute the products overthe shipments. While shippers typically look atshipments on hand to make the optimal choice,with RFID they can read the content o trailersthrough its walls and have a good overviewo where the products are. Tis allows them tourther optimize their shipment distribution byopening up trailers and taking o a shipment oradding one. Te challenge is not to decide how to

    load, but the speed and efciency o the loadingprocess. Tat is where RFID tops scanningbarcodes manually.

    Transportation

    Tere are three elements o transportation thatcan be optimized by automatic identication. Tetracking o trucks is very important in order tooptimise the loading o trucks and their routes.

    Tis is usually implemented with GPS. RFIDcan provide signicant advantage in the tracking

    2 pUbLIC DEbAtE2 pUbLIC DEbAtEo sub-conveyance including containers, pallets,racks etc. and in the tracking o individual items.Because the management tracks the whereaboutso the pallets and containers, ewer goods wouldhave to be in circulation. Also by trackingindividual items carriers know immediately whatthey pick up. Barcodes already solve this, butsystems based on RFID tags speed the reading

    process, allowing loading and unloading andterminal operations to be speeded up reducingcosts and time. Additionally, shippers can providetheir customers with up to date inormationabout the specic items they deliver.

    Receiving

    Upon receiving goods, retailers start a timeconsuming process to veriy what was actuallydelivered. With RFID a shipper can immediately

    send retailers inormation about the contento the shipment. Once the carrier delivers thegoods, the retailer can directly veriy this. Tisprocess is not just sped up by RFID, it alsoremoves the uncertainty about late delivery,shortage or wrong shipments. Tere are nesinvolved with these inractions o contract terms,which oten cause riction between the parties.Ater verication the delivered products will be

    stored. Knowing which reader or stock room hasidentied particular items can provide inventorymanagers with its location.

    In-acility operations

    Internal processes in acilities can take mostadvantage o automatic identication. Inmanuacturing plants or example a lot o barcode scanning is involved in the entire produc-

    tion. Workers are building parts separately andput them together on the main production line,

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    18/52

    PublIcDebate 1

    while throughout this process workers have toidentiy the parts. Tis happens with every itemmanuactured, so automatic identication willsave a lot o time. In warehouses the advantages

    are or a big part in locating where items can beound. With the real time inventory checkingautomatic identication provides, sta will alsoknow which items are in stock. Also inventorycan extend to virtual inventory like items onthe move or in storage. RFID can make thisextension more seamless. Te automatic andcontinuous checks on outgoing shipment canmake sure that the right shipments get routed

    rom inbound to outbound acility and thisimprove accuracy.

    On RFID based systems make an even biggerimpact in retail stores. McFarlane describes thesestores as a chaotic warehouse where non-em-ployees (consumers) are allowed -- in act, evenencouraged -- roaming the isles and perormingpicking and packing operations. By continuouslychecking shelves, out-o-stock can be reduced

    and new products can be ordered automatically.Retailers miss a lot o sales because o theseout-o-stock situations so a continuous inventorysystem can increase sales. Checkout counters canalso be automated, reducing labour, and smartshopping carts can show customers the total otheir purchasing. Tet-sensitive goods can bemonitored. Ater recognising unusual patternsthe system warns personnel to actually prevent

    the thet.

    2.2 ProponentsWal-Mart

    When in the 1980s hardly anyone was surewhether to use barcodes or not, Wal-Martwent ahead and implemented it. Suppliers werearaid to be let behind and ollowed. Nearly the

    same happened in June 2003, when Wal-Martannounced its plan to implement RFID in its

    supply chain. Although it would require compli-ance rom its top 100 suppliers by the 1st oJanuary 2005, even more - around 129 suppliers- already started implementing, araid o being

    let behind.

    o get the RFID system Wal-Mart is aimingor up and running, huge investments have to bemade. It has enormous strategic implications ortheir suppliers as well as the vendors o products.A case-study on Wal-Mart however shows anestimate o what might be saved annually whenRFID is deployed (Roberti, 2003):

    - $6.7 Billion: Reducing labour o peoplescanning bar codes on pallets and cases.

    - $600 Million: Reducing out-o-stock.- $575 Million: Reducing employee thet,

    administration errors and vendor raud.- $300 Million: Improved efciency in distribu-

    tion centres.- $180 Million: Reducing inventory and cost o

    carrying it.

    - $8.35 Billion: otal pre-tax saving.

    Tese huge amounts really show why Wal-Mart, is adopting RFID. Ater the rst realtests a study showed that by using RFID theretailer was able to reduce it s out-o-stocks by 16percent (Wal-Mart, 2005). Wal-Mart being theworlds largest retailer, they are a ront-runner inthe deployment o RFID in retail systems. Teir

    success will make many other companies alsowant to adopt RFID.

    Availability to consumers

    RFID in the supply chain is mainly used andcontrolled by business. Being implemented inhuman identication systems the technology isgetting closer to consumers. Examples are RFIDtags in smart cards or access control or to make

    payments. Sony introduced their payment systemcalled FeliCa, while Philips created MiFare, a

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    19/52

    1 PublIcDebate

    similar but inexpensive technology. WorldwideMiFare has currently the widest installed base(Philips). Both technologies still only bring thechips and not the readers to consumers, but

    they allow people to use RFID themselves. Teyprovide users with a ast and convenient wayto pay or toll, public transport or concert andairline tickets. Tey primarily started in passcards but later on moved to the mobile phone, amore personal device.

    Near Field Communication

    In these ormer cases interaction is always initi-

    ated rom the other party. Nokia together withPhilips and Sony ounded the Near Field Com-munication (NFC) Forum. Te NFC technologyprovides short-range wireless communicationthat can be initiated rom both sides. It iscompatible with both FeliCa and MiFare. Nokiaalready implemented this technology in some otheir phones (Nokia, 2004) and other manu-acturers including Samsung ollow (Philips,2006). Users can use the technology to retrieve

    timetables at bus stops or the access o promo-tional websites when holding the phone next toa commercial poster containing an RFID chip.Next to the retrieval o data users can also sharedata rom device to device. People can sharetheir avourite links, contacts, ring-tones or otherinormation. While this all would be possiblewith existing wireless protocols such as inraredor Bluetooth communication, NFC changes the

    way users initiate this communication. Insteado having to set up your device, NFC providesan intuitive way o initiation by simply holdingthe NFC enabled device against another. Here,NFCs short range is it s key eature. With longerrange protocols such as Bluetooth, devices arewithin each others range while communicationis not always wanted. With NFCs short rangeo approximately 5 cm, being in each others

    range is almost always intended. With semanticcombinations o NFC enabled devices nearly

    touching each other, convenient interacescan be created. According to the NFC-ForumNFCs intuitive operation will change the waywe interact with technology, ensuring that we can

    make the most o our environment and reap theull benets o total connectivity.

    2.3 OpponentsPrivacy invasion

    CASPIANAccording to Katherine Albrechts, ounder anddirector o the organisation called CASPIAN

    (Consumers Against Supermarket PrivacyInvasion and Numbering), it all started withSupermarket Cards. Tey rst appeared inthe 1990s, and were promoted as cards toobtain discounts, but they became devicesor supermarkets to collect huge amounts oinormation on customers purchase and eatinghabits. Modern marketers are eager to use theinormation gathered with those cards, and whilesupermarkets claim in their privacy policy that

    they will not share their data with third parties,they actually do (Albrechts, 2002).

    Albrecht sees the automatic identication withRFID poised to enter all o our lives, withproound implications or consumer privacy. TeEPC (see par. 1.3.8) assigns a unique number toevery single item manuactured. Proponents othe technique work towards a pervasive global

    network o millions o receivers along the entiresupply chain, in airports, seaports, highways,distribution centres, warehouses, retail storesand in home. Tis way companies would be ableto identiy and track items continuously andcan always determine the whereabouts o theirproducts. So how does this invade our privacy?

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    20/52

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    21/52

    20 PublIcDebate

    personal policy rates according to a personshabits. Tey could also deny coverage or evendeny medical procedures i the persons recordsreveal an unhealthy liestyle. Instead o coming

    rom publicly known readers in or exampleshopping malls, the inormation could also becollected by secretly placed transmitters withoutcourt approval.

    Mark o the beastTe mark o the beast is a concept rom the Booko Revelation o the Christian New estamentoten written as 666 in modern texts. A mark

    supposedly orced by the devil on everyonesright hand or orehead. No one could buy or sellunless he has the mark. With RFID ast beingintegrated in passports and payment cards, andreplacing bar codes rapidly, Katherine Albrechtsees in this new technology the mark o the beast(Baard, 2006). Closest resemblance is comingrom the RFID implants designed or humanscoming rom VeriChip Corporation. She alsolinks the oul and loathsome sore the mark

    would inict on man to the electromagneticradiation coming rom these RFID devices.On the other hand, specialists like BostonUniversity proessor Richard Landes say newtechnologies have always been triggering alarms.People already saw bar codes and social securitynumbers, GPS, credit cards, microcomputers andthe year 2000, as the end o time. RFID is thethe logical next victim.

    Health implications

    Electro Magnetic FieldsLevels o electromagnetic elds (EMF) rom hu-man-sources have increased steadily over the past50-100 years. An increasing concern arises aboutthe possible health consequences o EMF emit-ted by mobile phones, radar installations, powerlines and other sources. Some claim the GSM

    wave emission o a mobile phone base station onthe roo o their home is inuencing their health.

    Research is unsure about the possible healtheects. First studies indicated that UMS4exposure might produce eects on well-beingand cognition (NO, 2004). A more recent

    study however claims there is no evidence oadverse eects on well being as a result o UMSsignals (Achermann, Kuster, Rsli, 2006). Withresearch ocusing on rather new technologies, itshard to say anything about the long-term healtheects o EMF. With RFID readers in shelves,doorways, mobile devices and other places, EMFvalues are increasing. With every object radiatingits unique ID through RFID tags we are subject

    to even more EMF.

    Although there is no expert consensus about thedangers, it is wise to keep EMF radiation as lowas possible. o some extend it can be comparedwith bandwidth and computing power. Lowle-sizes, and smart programming keep thingsaster, even though bandwidth and computingpower are increasing. EMF should be consideredtoo when creating applications. For example do

    not continuously check or RFID tags but triggerthe event.

    On a larger scale, the solutions to this problemcould be moved out o the applications. In hislecture at Dorkbot Ghent, Rob van Kranenburgproposed to divide cities in dierent EMF zones.Every zone would allow radiation up to a certainlevel. Most importantly it raises questions about

    the responsibility or EMF. Do we want to cureor do we want to prevent this radiation, i evenpossible?

    Universal Mobile elephone System,standard o the 3rd generation o mobile phone

    networks that supports multimedia services such asinternet or videoteleconerencing.

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    22/52

    PosItIveRFID 21

    3.1 DivisionAt the moment, RFID is mainly used in logistics,access control and supply chain applications.According to the University o Wisconsin Dr.Veeramani (CNN, 2005) It s wrong to blamethe technology. Its the people that develop ap-plications or it. We are still trying to gure out

    what role RFID will play in the larger scheme othings.

    Tis thesis divides research on the positiveapplication o RFID in two domains:

    1. RFID technology itsel2. Te ubiquitous RFID uture

    First the technology itsel is covered. Its

    important to get a good overview o pos-sibilities o RFID as a technology, without beinginuenced by current business applications. A loto applications use RFID, but what is the addedvalue o this technology?

    Second, the ubiquitous RFID uture will belooked at. Current retail developments lead toa world where every object is identiying itsel

    through RFID technology. History will be savedin global databases. With NFC development,reader capabilities move to devices such as mo-bile phones, available to consumers as well. Whatnew possibilities are available to the public?

    3 pOSItIvE RFID3 pOSItIvE RFID3.2 Technology examplesAdded value

    An analysis o the RFID unction in existingapplications was made to create a good overviewo technical possibilities. Because art is otenshowing matter rom a dierent perspective,the main ocus o existing applications was on

    art projects. By analyzing these art projects, anddescribing the new or old, positive or negativerole o RFID in these projects (Plaggenborg,2006), an evolution o the unction o RFID canbe seen.

    Te added value o RFID is similar in a lot oprojects. By grouping these similar unctionscategories can be made that evolve rom one toanother chronologically:

    Binary identication Unique identication Descriptive identication History collection Pattern recognition Masses Medium Symbolic medium

    Interace Sensors

    Binary Identication

    Te earliest example o identication quitesimilar to RFID can be ound in the airplaneidentication system developed by the Britishin World War II. Te system called Identica-tion Friend or Foe (IFF) was used to identiy

    British aircrat rom enemy aircrat. Whereradar systems gave notice o aircrat nearby, it

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    23/52

    22 PosItIveRFID

    did not show the dierence between them. IFFdistinguished these aircrats, and described themas either riend or oe.

    Although later aircrat got assigned uniquenumbers, principally there was no dierencebetween or example two riendly aircrat.Because it had two options, riend or oe, 1 or 0,the name binary identication is suitable or thiscategory.

    Unique Identication

    By assigning unique numbers to objects, binary

    identication evolves rom two options to acertain number o unique options. First objectswere placed in either o two categories. Nowevery object can be distinguished, creating uniqueidentication. Te system is really looking at whoor what its dealing with.

    A good example o unique identication isaccess control by smart cards. In this systemevery person has his own pass with a unique

    identication number. Te pass is used at theentry o ofces or certain areas in buildings. Ithe number on the pass is allowed access, thedoor is opened. Te system does not care aboutthe name, sex or unction o the person tryingto gain access. Its a basic orm o identication,only checking privileges.

    A ree condom campaign in Shanghai can also

    be seen as an example. Te government placed200 condom vending machines across the cityand handed out 10,000 RFID cards to citizens.Its however unclear i citizens were able to getcondoms more than once. I each person wouldbe allowed to get only one item, we would talkabout unique identication. In that case thesystem would have to remember id numbers,making sure nobody would get an item twice.

    Each card has to be distinguished.

    Descriptive Identication

    In previous examples objects or persons wereidentied and there was distinction betweenthem. Te systems did care about other related

    inormation available. It is possible though, to as-sociate descriptive inormation to the identica-tion number. Te RFID chip itsel only containsthe number, but a database would link it to theactual inormation. It goes beyond noticing thebeing o the object, and distinguishing it. Teobjects properties are stored.

    Examples can be ound in applications that

    retrieve product inormation when identiyingan object. Japanese sushi bars or example startedadding RFID tags to sushi plates, enablingcustomers to retrieve sushi properties. Sushi type,time o cooking, time o serving, cook, price andother inormation was stored. Tere is a directrelation between the inormation and the object.

    Instead o describing objects with RFID, its alsopossible to describe humans. VeriChip Corpora-

    tion or instance developed an RFID chip in aglass ampoule, suitable or human implants. InBaja Beach Club nightclub in Barcelona andRotterdam these chips are used or both accesscontrol and descriptive inormation. Propertiessuch as name, sex, age and a photograph arestored. Employees can charge customers ortheir drinks by reading out the chip in their arm.Customer description is retrieved and costs could

    be charged on a prepaid account or saved creditcard number.

    History collection

    Te descriptive inormation associated to theidentication number can be used to pay i oneo the properties is describing credit or a bankaccount. Te payment would have to be doneright away. o pay a total sum in the end, all

    previous expenses should be known. Historyo the identity would have to be stored. In this

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    24/52

    PosItIveRFID 2

    example the history contains inormation aboutthe costs o each drink bought. Te total can thenbe calculated.

    Te location o the read-out is one o the mostsaved properties when storing the history oan object or person. A lot o applications use itto track the whereabouts o people. In publictransport or example, its used in combinationwith payment. When starting the travel, peopleswipe their RFID cards at the entrance. At theend, people swipe their card again, so the systemcan calculate the travelled distance.

    Te tracking o locations is also used in elderlyhomes to keep track o inhabitant movements orto restrict their access to certain areas. Compa-rable are the products that save the locations oschool going children. Arriving at school theirlocation is logged. Parents are warned in case oemergency. Tese applications collect locationhistory or saety measures, but do bring upearlier mentioned privacy problems.

    An art project called Growable Media is usinghistory to visualize human relationships. Everytime you communicate with a riend this islogged in a database. Communication can bephysical as in seeing your riend at home or isbased on telephone calls. Tis inormation isvisualized with a growing plant. Database inor-mation is used to supply the plant with water or

    light. A good relationship with your riend willresult in a ast growing plant. A bad relationshipwill make the plant grow slow or even die.

    Pattern recognition

    A history o valuable inormation can be saved.Instead o looking back, we can look orward ornew inormation. Patterns can be recognised inhistory data. Using these patterns it s possible

    to predict new inormation. Intel developed theiGlove, a monitoring glove equipped with an

    RFID-reader. In environments where all objectscontain RFID tags the glove is used to log itsusers actions. Picking up objects in a certainorder matches a pattern to make it clearer what

    is happening. Some actions like picking up atoothbrush are quite clear already but making acup o tea would need more detail.

    Instead o tracking behaviour some projects usepatterns to actually help people, or example athome. Patterns can be used to alert people whenorgetting something. I a wallet or keys are readbeore the doorknob, a watch with built-in RFID

    reader reminds its user to not orget them.

    Masses

    Instead o examining individuals, collected RFIDdata can be used to track entire masses. Werenot looking at a lot o individuals but see them aswhole groups. Tis way inormation is collectedabout the majority.

    Its appealing or railway companies to use

    history collected by their RFID based paymentapplications. By recognizing patterns in themovement o travelling masses, they can improvetheir railway systems.

    Medium

    In all the categories mentioned above theinormation associated is also related to theobject containing the RFID tag. I we unlink

    the relation between inormation and object wecreate a medium. All the object is doing in thiscase is carrying content. An object could carryany kind o data, because the data is not savedto the RFID chip but is linked to the uniqueidentication number.

    A Japanese project called Moo-pong is usingRFID as a medium or video. A portable device

    is capturing video and with a built-in RFIDreader it then associates that video to the unique

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    25/52

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    26/52

    PosItIveRFID 2

    visual eedback or its user.

    Instead o creating interaces with sensor enabledRFID tags, they can be used or data collection.

    On a bigger scale sensors can be added to RFIDto turn every object in a source o inormation.Annenberg Center or Communication ResearchFellow Julian Bleecker is imagining a worldull o objects collecting environmental data tocreate a more habitable world (Bleecker, 2006).Urban creatures like pigeons would be equippedwith smog sensors to collect data on air qualityand cars would broadcast inormation on their

    emission. Tese objects as inormation sourceshe calls blogjects, deriving rom the words blogsand objects.

    Evolution

    Te range o RFID applications shows an evolu-tion o RFID unctions. While the technologystarted out with pure identication, soon extraunctions were added around it. While the basisis still the same, especially the association with

    the unique number is where the versatility oRFID is coming rom. o go rom descriptiveunctionality to interaces the content associatedto the tag is removed, and new unctionality isassociated.

    Its questionable whether RFID equipped withsensors can still be called RFID. Te tags mutateinto little stand-alone computers equipped with

    RFID to identiy themselves. But also here, theprinciple o identication remains. Tese sensingcapable objects identiy themselves and theirenvironment.

    Te artistic applications, especially in thecategories medium, symbolic medium, interaceand sensors, show RFID rom an alternativeperspective. Data collection and object tracking

    are not the main purpose anymore. As rom thecategory medium, unctionality has been lited

    to a higher level, while at the same time they getmore abstract.

    Both the artistic and commercial applications

    can be seen as a layer on top o RFIDs technicalpossibilities. In the more abstract categories,positivity or negativity shits rom unctionality(collecting data or tracking objects or people) tothe application layer on top o the unctionality.

    People create applications causing privacyproblems, but as Dr. Veerimani says, its wrong toblame RFID as a technology (CNN, 2005). Not

    seeing RFID as a neutral technology will hinderdevelopment into useul applications that mighthave nothing to do with its original intentions.Because o the disconnection o negativity andpositivity and the unctionality, most is to gain inthe more abstract categories.

    3.3 Ubiquitous RFIDIn the evolution o RFID (Par. 3.2) the object-

    level tagging in the supply chain can be seen asan application o RFID possibilities. Althoughits going little urther than history collectionand pattern recognition, its global implementa-tion does have consequences. Business aims atitem-level tagging. With continuing businesseorts, a ubiquitous RFID world is coming up,where all objects contain an RFID tag and wherean incredible amount o inormation about these

    objects is stored in a global database. Whataspects do applications need to remain ree oprivacy problems and to be accepted by its users?

    Te answer will not be the solution to the majorprivacy implications o supply chain implementa-tion. It does however show the direction or newproducts aimed at consumers. How can theybenet rom the RFID structure retailers are

    setting up?

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    27/52

    2 PosItIveRFID

    Transparency

    EPC is committed to open use o its network,but does not save the product inormation in acentral database (See appendix 2, EPCGlobal

    Network). Tis is done by the companies dealingwith the product. Each company is keepingobject related data in their local database. Teydecide or themselves who is allowed to accesstheir data.

    Tat means already within the supply chain itselcompanies have to trust each other. But obviouslythey cannot. Companies do not allow competi-

    tors to have access to valuable inormation. Noull transparency will be created even within thesupply chain.

    End users are at the bottom o the line. A lot odata is saved, but there is hardly any inuence orthem. Sel-determination is lost because the datadoes involve them, with riction as a result.

    User infuence

    According to Klaas Kuitenbrouwer, organiser oRFID workshops at Mediamatic Amsterdam,end user inuence can be distinguished on 3domains:

    1. Inrastructure2. Content3. Use

    Its important to question who is responsible orthe inrastructure o the application. On thislevel decisions are made on how data is collectedand what will be done with it. When companiesdesign the inrastructure, end users alreadylose great inuence. So with most commercialapplications inuence is already lost beorehand.

    Even though inrastructure decisions are out

    o control o end users, applications are uselesswithout content. In supply chain applications

    companies still decide on the content. Consum-ers use the applications, but cannot control whatobjects are scanned. Neither can they inuencethe inormation about the objects. Other RFID

    applications like the Moo-pong video capturedevice enable you to create your own content.End users in that case are in total control aboutthe content.

    Te last domain o inuence on applications isabout the way people use the applications. Teymight be created or a purpose not suiting theend user, but the end users will always nd a

    way to make the application suit them. I theapplication does not allow alternative usage, itmight be hacked and modied to user needs.

    Social applications: RFID 2.0

    Te World Wide Web traditionally hosted staticweb pages and later became more dynamic. Tesecond generation o web services however, letpeople collaborate and share inormation online.It changed the nature o the web. OReilly Media

    and MediaLive International came up with thename Web 2.0 or these more social applications,and analysed their eatures (OReilly, 2005).

    Although Web 2.0 can be seen as a buzzword,the aspects o these second-generation webservices that lead to success are most interesting.Most important were their bottom up and sel-organizing nature. Tese programs, as OReilly

    says, have embraced the power o the web toharness collective intelligence. Tey are based onan architecture o participation, and are gettingbetter the more people use it.

    With a unique ID or every object, the ubiqui-tous RFID world created by business is alreadyserving the long tail5, but the way the inorma-

    Distributions with a high-requency

    or high-amplitude population are ollowed by alow-requency or low-amplitude population which

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    28/52

    PosItIveRFID 2

    tion in the EPC databases is treated is more likethe rst generation web services. Te inormationstored is dynamic but can only be changed bythe appropriate companies, quite similar to rst

    generation content management systems6

    . Apublic object data system would become availablei RFID object inormation was managed like awiki7. All users should be allowed to access andchange it.

    Te EPC databases were especially set up tomake global logistics more efcient and accurate.It can be seen as an application or RFID. I a

    platorm would be created instead, end userswould get more inuence on both content andtheir usage o RFID. Te usage would not rely onpredetermined behaviour, and more interestingservices or this platorm would be created.

    gradually tails o: the long tail.

    Content Management System, a computersotware system that assists in automating variousaspects o web publishing.

    Wiki, a type o website that allows anyuser to add or change content.

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    29/52

    2 PRoject

    4.1 Project targetTe aim o this thesis is to discover the motivesbehind at one side the privacy advocates and onthe other side business pushing the use o RFID,eventually creating a pervasive RFID world. Teproject interconnected with this thesis wants totake advantage o this RFID inrastructure that

    without business would never exist. What kindo social applications can be created, using thatRFID inrastructure? Te project learns romcurrent privacy issues. Will success ormulasor the Internet work or the RFID Internet othings as well?

    4 pROjECt4 pROjECt4.2Context

    Te accuracy and efciency provided by RFIDwill make business push the technology.Although current technology is not ready oritem-level tagging yet, its the industrys nextobjective (Dioro, 2005). With item-level tags, apervasive RFID world will be the result. Each

    object will have its own unique number, and bycollecting and saving data about these objectsinormational blogs are created. Tey resemblean objects history, but are controlled by business,resulting in no inuence or the users o theseobjects. At rst, inuence on this history seemsunimportant. But inormation on or example

    Fig.5. EPC Global RFID network vs. an open RFID platorm

    APPLICATION DATABASE

    READER

    TAGGED ITEMEPCor

    THINGLINK

    RFID APPLICATION

    WMS

    ERP

    EPCIS

    Enterprise

    READERTAGGED ITEM ELECTRONIC

    PRODUCTCODE

    MIDDLEWARE

    OTHERINTERNALSYSTEMS

    POSSIBLEOTHER

    APPLICATIONDATABASES

    Open

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    30/52

    PRoject 2

    the whereabouts o objects provides a lot oinormation about the user o the object as well.User privacy is undermined.

    Tis project does not try to solve that privacyproblem. Instead, it takes a rst step into thedirection o a public system on top o theupcoming RFID inrastructure. I end-usersdo not have inuence on the inrastructure, norcontent o the system. For as long as transpar-ency is prevented rom above, all thats let orthem is the use o the system. We then have totry to bend the existing inrastructure, and build

    a new and public inrastructure around it.

    4.3 Open platformWhen building upon an existing inrastructurewe are depending on that in rastructure. Rightnow, cost-eective Gen 2 RFID tags do not haveany security and encryption eatures built in thetag (Dioro, 2005). o extend the specication oritem-level use, these eatures will be necessary.

    A new public inrastructure will stand or all bythe ability to use the lowest level o the existinginrastructure: reading and identiying the tags.

    Product code

    Te Electronic Product Code is available tocommercial products only. Te Tinglink8 byUlla-Maaria Mutanen provides an alternativeor non-commercial objects like crated work.

    Te two complement each other and provide aunique code or every object around: commercialand non-commercial. Te global EPC network isonly making use o the EPC. But by combiningboth EPC and Tinglink, a numbering systembecomes available to end-users, serving as basisor an open RFID platorm.

    Tinglink: a ree product code to identiy

    document creative work (http://www.thinglink.org).

    Application layer

    Inormation about commercial products issaved by each participant in the network (seesupplement Te EPCGlobal Network). When

    or example a retailer needs inormation rom atransporter the retailer accesses the transportersinternal EPC database. Where this internal EPCdatabase can be ound is recorded by the ONS(Object Naming Server). Because unauthorizedaccess is prohibited, this data is inaccessible toanyone outside o the EPC network. Besides, allEPCGlobal subscribers pay an initial subscrip-tion ee and annual renewal ees, orming a high

    threshold or public to join.

    Te tags however, could be used or publicand non-commercial systems. Sotware ishandling the unique ID o tags with either theEPC or a Tinglink. Middleware in the EPCGlobal network could be replaced by customapplications (Fig. 5). Tis way applications couldmake use o the tag part o the inrastructure tocreate an open system. Tis open system should

    allow end-users to add their own inormationto objects. Based on this inormation variousapplications could be created. Tese applicationsbased on participation could range rom basicproduct commenting or rating applicationsto applications based on object related specialinterests.

    Layered description and content

    Tese applications would need their owndatabase. Tis data could be shared with otherapplications, creating mashups9 like done onthe web with or example Flickr10 and Google

    Mashup, a website or web applicationthat uses content rom more than one source to createa completely new service.

    10 Flickr, a digital photo sharing websiteand web services suite, and an online community

    platorm, generally considered an example o a Web2.0 application.

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    31/52

    0 PRoject

    content.

    Te thinglink.org website is providing the uniqueidentier and allows you to associate content

    to the object. Its hosting descriptive inorma-tion about the object and allows you to add apicture. Google Base (www.googlebase.com)takes describing objects urther. Although moretargeting the commercial, its much more detailedand to some extent it allows you to create adigital representation o just about anything byattaching les like Adobe PDF, Microsot Word,Microsot PowerPoint and others.

    So Tinglink is assigning unique identiers toobjects, and Google Base is orming a centraldatabase describing these objects. Tis descrip-tion is orming a primary content layer. Applica-tions with various themes can orm a secondaryinormation layer.

    Imagine social sotware or typophiles11: astandalone application that allows people to add

    or access inormation about certain type usedon objects. Te typography reveals interestingrelations between similar objects. It would orm adiscussion platorm about type used on objects.

    Youre walking the streets and want to discussthe ugly type used on this new building, or yound a book or poster with an interesting design.It could also be linked to an online PDF le

    orming the primary description layer o theobject. Another application in the second layer,or example printing (books) on demand, wouldallow you to recreate that book or poster usingthe descriptive inormation in the primary layer.

    Te previous mentioned applications ormexamples o possible second layer inormationapplication. Te unique identier, either EPC or

    11 ypophile, a person having an ardentinterest in typography.

    Tinglink, is gluing them together.

    4.3 Project description

    Because public is not ready yet, now would notbe the time to actually create a second layerapplication or the graduation exposition. Insteado trying to create a structure totally open topublic, the project criticizes the object historycollection by business, by making an emotionalalternative history, and is thus becoming criticaldesign (Dunne, Raby, 2003).

    Emotional history

    Even without RFID, objects have their ownhistory. Tey all lead their own lie. Some areused intensively and might build very strongrelationships with people. Others are destinedto a lonesome stay on shopping shelves. Objectscollect human emotion and experiences.Unortunately this emotional history is invisibleto strangers.

    Te projects goal is to let people look at objectsdierently, by making the unoreseen emotionalhistory visible. In this project users are able todigitally construct that emotional history bytelling their own audiovisual stories about theobjects. An object looking worthless at rst sightwill become more interesting when listeningto stories about others experiences. Hiddenemotions are revealed.

    With a uture pervasive RFID inrastructure andmobile devices capable o interacting with thedigital objects, this hidden emotional historycan be revealed. Via a database these stories areassociated to the object equipped with an RFIDtag. ogether these captured stories orm a visualolksonomy, describing the objects with emotionsand visuals instead o textual tags. RFID is

    creating a digital emotional memory, makingit possible or objects to carry the story o their

    http://www.googlebase.com/http://www.googlebase.com/
  • 8/7/2019 Patrick Plaggenborg - Social RFID

    32/52

    PRoject 1

    own history.

    History parallelA mobile device will be used to view emotional

    stories about the object. A parallel is createdbetween the descriptive history o EPCGlobalor Tinglink data and the emotional history oobject stories. Te user can go or the descriptivehistory and retrieve manuacture, transport,retail or usage inormation. On the other sideo the screen the parallel o emotional historyis displayed. A list o currently added stories isdisplayed here. Te usere can then select any o

    the stories and listen to it. In the end the goal is

    be able to expand the collection o stories aboutan object by letting the users o the system recordtheir own.

    MobilityWith the mobile device users are able to explorethe digital layer on top o the analogue world.Being mobile a close relationship with the objectcan be initiated. Tis way the interaction isdirectly the opposite o moving the object to axed reader at a standalone computer. Te useris approaching the object instead o moving theobject away rom himsel.

    Fig.6. Extracting the story with a PDA

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    33/52

    2 PRoject

    Hardware

    In the uture world o pervasive RFID, mobiledevices are able to access RFID inorma-tion. Manuacturers like Nokia already have

    mobile phones available that come with NFCtechnology (Nokia, 2004) and PDAs can also beequipped with RFID readers through their SDor CF extension slot. Both systems are quite new,and have their up- and downsides. While makinga decision the ollowing aspects were considered:

    - Concept: what system improves the idea o anopen system?

    - Graphical: what system allows the associ-ated data to be visually attractive?- echnical: what system is technically

    realizable?- Budget: what system is aordable?- EMMA Expo: what system is interesting to

    uninormed people?

    Although a Java application or the NokiaNFC enabled phone would best suit the

    concept because o the hardware integrationand availability to consumers, it is visually lessinteresting, technically possible but unrealiz-able, and or the EMMA exposition it is lessinteresting to people unaware o the RFIDdebate.

    A PDA using Macromedia Flash is visuallymore interesting, but technical possibility is

    unsure. Te main idea o extracting emo-tions rom objects through RFID is ullyrealizable though. More important or theEMMA exposition: its more interesting togeneral public.Unortunately hardware has notadvanced enough or a perect setup. Howeverwith current hardware it is possible to builda working prototype. Te prototype is builtrom a PDA running the Macromedia Flash

    standalone player or Pocket PC. Although atrst the HP Labs Mobile Bristol oolkit was

    planned to be used, only the uture release othis location-based sotware is compatible withRFID, coming too late or this project. It wouldhave allowed smooth integration o sotware and

    reader.

    Now instead, the Socket RFID 6E Compact-Flash reader is used, which is capable o sendingvirtual key strokes to any active application. Ahardware button on the PDA starts the scan orRFID tags. On a succeeded scan the ID is sentto the Flash Player. Flash hosts the animatedgraphical user interace. In Flash the video

    Fig.7. Fisher Price roller skate

    Fig.8. Hand crated puppet

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    34/52

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    35/52

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    36/52

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    37/52

    conclusIon

    In that perspective, Julian Bleeckers blogjects can be seen as a myware RFID application sensing theenvironment. It would be interesting to shit research ocus rom content determination by end-usersand urther explore the use o RFID myware or people. Ater controlling content, myware wouldallow data collection about objects people carry around, but only about inormation with permission

    o its owner. Tis would require relative longer range RFID tags. How can the objects around a personautomatically prole him, with him still being in control? And how can users learn and benet romrelations between these user proles?

    Lessons learned

    From the thesis research I learned how to better balance technical knowledge and concepting. Al-though you need to be amiliar with the technology you are using, while creating a concept you shouldnot restrict yoursel. While working out the concept its very important to dive back into technologyat the right moment. Being too soon will restrict your concept, being too late will transorm your

    concept into a bubble.

    One o the most important things learned rom making the project is the danger o going to deep intothe matter causing you to lose your less inormed audience. Te EMMA Mock Exam made this clear.Its interesting to see that ater taking a step back, the same audience was directing me to my rst idea.Tere is a process involved in getting your idea out. A struggle to redene your idea is not always thesolution. Guide your audience step by step.

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    38/52

    SUMMARYRFID (Radio Frequency Identication) is quite an old technology, already used or over a decade

    in or example animal identication chips and electronic door keys. RFID chips contain a uniquenumber or a small amount o data that can be transmitted wirelessly without the need or an onboardbattery.

    Investments in the technology are enhancing its development. Business aims to use RFID to trackobjects throughout with a unique product code (the EPC) along the entire supply chain and makeinormation about the objects globally available. Tis would improve accuracy and efciency or allparties in the supply chain, including shipping, transportation, receiving and in-acility operation,saving millions o dollars.

    Te inormation stored relates to the tracked objects, but can relate to the users o these objects aswell. Te inormation might end up at companies with a conict o interest. People lose sel-deter-mination and their privacy is invaded. Public prosecutors see the advantages o RFID in trials, as dueto digitalisation people leave an increasing amount o tracks. But there is no assurance that uturelaws will tolerate previous behaviour. Tis is a precarious situation because digital inormation has nomemory loss, so lietime records can be kept.

    Tese negative aspects o the supply chain application o RFID need to be stated and taken care o,but they dont do justice to RFID as a technology. Te supply chain network (EPCGlobal) is a usage

    layer on top o technology. Usage is where negativity should be associated to. RFID technology can bemore than the supply chain application. Example projects show RFID unctionality can be abstractedto a medium, interace or sensors. Further development in this abstract direction will be hindered iRFID remains interconnected to privacy inringement.

    Adoption in the supply chain is creating a pervasive RFID world where all objects get a digitalidentity and history. In addition to the commercial interests in this in rastructure, social sotwarecould also benet rom this digital layer. Unortunately the EPC network is not transparent to publicbecause o security reasons. However a public platorm can be built on top o the only available layer

    o the network: the RFID tags and the EPC. With the EPC or commercial products, and the openlyavailable Tinglink code or crated objects, every object can have a unique identier.

    Standalone applications can be created or communities based on various interests. Tey each havetheir own database but can all reer to the same object. Te unique number associated with each objectwould be able to connect these separate applications.

    In the so-called Internet O Tings, objects connect, and interact with each other. Tats not what theopen platorm mentioned in this thesis is about. Instead, its describing the Internet ForTings.

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    39/52

    bIbLIOGRApHYACHERMANN, P., KUSER, N., RSLI, M. 2006, Short-term UMS radiation does not impair well being,Press Release, Zurich, 6th June 2006, available online: http://www.mobile-research.ethz.ch/var/NO/Medienmit-

    teilung_E.pd(last accessed: 2006/07/03)

    AIMGLOBAL 2006, What is Radio Frequency Identifcation (RFID)?, Association or Automatic Identicationand Mobility, http://www.aimglobal.org/technologies/rd/what_is_rd.asp (last accessed: 2006/06/17)

    ALBRECHS, C.M. 2002, Supermarket Cards: Te ip o the Retail Surveillance Iceberg, Denver University LawReview, Summer 2002, Volume 79, Issue 4, pp. 534-539 and 558-565, available online: http://www.spychips.com/documents/Albrecht-Denver-Law.pd(last accessed: 2006/06/20)

    BAARD, M. 2006, RFID: Sign o the (End) imes?, Wired News, 6th June 2006, http://www.wired.com/news/tech-nology/0,70308-0.html (last accessed: 2006/07/04)

    BLEECKER, J. 2006,A Maniesto or Networked Objects Cohabiting with Pigeons, Arphids and Aibos in theInternet o Tings, Maniesto, February 2006, available online: http://research.techkwondo.com/les/WhyTings-Matter.pd(last accessed: 2006/07/06)

    BROUWER, Mr. H.N. 2005, Radio-requentie identifcatie (RFID) en de opsporing, Lecture by Chairman o theBoard o procurators-general, the Netherlands, 8th eNederlandcongres, Zeist, 10th November 2005

    CANADA, 1972, Privacy and Computers, Department o Communications and Department o Justice, Ottawa:Inormation Canada, 1972

    CAMPBELL, D. 2005, RFID Policy May Not Wait, RFIDJournal Expert View, 28th March 2005, available online:http://www.rdjournal.com/article/articleview/1461/ (last accessed: 2006/06/21)

    CARDULLO, M.W., Genesis o the Versatile RFID ag, RFID Journal, http://www.rdjournal.com/article/arti-

    cleview/392 (last accessed: 2006/06/16)

    CAVOUKIAN, A. 2004, ag, Youre It: Privacy Implications o Radio Frequency Identifcation (RFID) echnology,Inormation and Privacy Commissioner o Ontario, February 2004, available online: http://www.ipc.on.ca/docs/rd.pd(last accessed: 2006/06/20)

    CNN 2005, Lab dedicated to RFID technology, CNN Article, 30th August 2005, available online:www.uwrdlab.org/news/docs/LabpressCNN_RFID.pd(last accessed: 2006/07/05)

    DEUSCH, C., FEDER, B. 2003.A Radio chip in every Consumer Product. New York imes. 25th February 2003.

    DIORIO, C. 2005, Gen 2Te ough Questions, Part 2, Article by one o the architects o EPCglobal s Generation 2standard, RFIDJournal, 22nd August 2005, available online: http://www.rdjournal.com/article/articleview/1784

    (last accessed: 2006/07/31)

    DUNNE, A., RABY, F. 2003, Value fctions and the suspension o disbelie, Dunne And Raby Design Partnership,April 2003.

    ENGELS, W.E., SARMA, S.E 2005, Standardization Requirements within the RFID Class Structure Framework,Auto-ID Labs, Massachusetts Institute o echnology, January 2005, available online: http://autoid.mit.edu/CS/les/11/download.aspx (last accessed: 2006/06/17)

    FERGUSON, R.B. 2006, Gen 2 Spec Gets Major Acceptance, eWeek, 1st March 2006, http://www.eweek.com/arti-cle2/0,1759,1932902,00.asp (last accessed: 2006/06/18)

    GOEBEL, G. 2005, Te British Invention O Radar, In Te Public Domain, 1st February 2005, available online:

    http://www.vectorsite.net/ttwiz.html (last accessed: 2006/06/16)

    http://www.mobile-research.ethz.ch/var/TNO/Medienmitteilung_E.pdfhttp://www.mobile-research.ethz.ch/var/TNO/Medienmitteilung_E.pdfhttp://www.aimglobal.org/technologies/rfid/what_is_rfid.asphttp://www.spychips.com/documents/Albrecht-Denver-Law.pdfhttp://www.spychips.com/documents/Albrecht-Denver-Law.pdfhttp://www.wired.com/news/technology/0,70308-0.htmlhttp://www.wired.com/news/technology/0,70308-0.htmlhttp://research.techkwondo.com/files/WhyThingsMatter.pdfhttp://research.techkwondo.com/files/WhyThingsMatter.pdfhttp://www.rfidjournal.com/article/articleview/1461/http://www.rfidjournal.com/article/articleview/392http://www.rfidjournal.com/article/articleview/392http://www.ipc.on.ca/docs/rfid.pdfhttp://www.ipc.on.ca/docs/rfid.pdfhttp://www.uwrfidlab.org/news/docs/LabpressCNN_RFID.pdfhttp://www.uwrfidlab.org/news/docs/LabpressCNN_RFID.pdfhttp://www.rfidjournal.com/article/articleview/1784http://autoid.mit.edu/CS/files/11/download.aspxhttp://autoid.mit.edu/CS/files/11/download.aspxhttp://www.eweek.com/article2/0,1759,1932902,00.asphttp://www.eweek.com/article2/0,1759,1932902,00.asphttp://www.vectorsite.net/ttwiz.htmlhttp://www.vectorsite.net/ttwiz.htmlhttp://www.eweek.com/article2/0,1759,1932902,00.asphttp://www.eweek.com/article2/0,1759,1932902,00.asphttp://autoid.mit.edu/CS/files/11/download.aspxhttp://autoid.mit.edu/CS/files/11/download.aspxhttp://www.rfidjournal.com/article/articleview/1784http://www.uwrfidlab.org/news/docs/LabpressCNN_RFID.pdfhttp://www.uwrfidlab.org/news/docs/LabpressCNN_RFID.pdfhttp://www.ipc.on.ca/docs/rfid.pdfhttp://www.ipc.on.ca/docs/rfid.pdfhttp://www.rfidjournal.com/article/articleview/392http://www.rfidjournal.com/article/articleview/392http://www.rfidjournal.com/article/articleview/1461/http://research.techkwondo.com/files/WhyThingsMatter.pdfhttp://research.techkwondo.com/files/WhyThingsMatter.pdfhttp://www.wired.com/news/technology/0,70308-0.htmlhttp://www.wired.com/news/technology/0,70308-0.htmlhttp://www.spychips.com/documents/Albrecht-Denver-Law.pdfhttp://www.spychips.com/documents/Albrecht-Denver-Law.pdfhttp://www.aimglobal.org/technologies/rfid/what_is_rfid.asphttp://www.mobile-research.ethz.ch/var/TNO/Medienmitteilung_E.pdfhttp://www.mobile-research.ethz.ch/var/TNO/Medienmitteilung_E.pdf
  • 8/7/2019 Patrick Plaggenborg - Social RFID

    40/52

    HIACHI 2006, Worlds smallest and thinnest 0.1 x 0.1 mm, .m thick RFID IC chip, Press Release, HitachiLtd. okyo, 2nd February 2006, available online: http://www.hitachi.com/New/cnews/060206.pd(last accessed:2006/06/16)

    IDECHEX 2005, Standards overview, IDechEx, 15th October 2005, http://www.idtechex.com/products/en/ar-ticles/00000105.asp (last accessed: 2006/06/17)

    IEE 2005, Radio Frequency Identifcation Device echnology, Fact File, Institution o Electrical Engineers, July 2005,available online: http://www.theiet.org/publicaairs/sectorpanels/control/rd.pd(last accessed: 2006/06/17)

    LEND, J. 2001, Shrouds o ime, Te history o RFID, Association or Automatic Identication and Mobility, 1stOctober 2001, available online: http://www.aimglobal.org/technologies/rd/resources/shrouds_o_time.pd(lastaccessed: 2006/06/16)

    KRANENBURG, R. VAN 2006, Contested Spaces and RFID, Lecture at Te Futuresonic 2006 Conerence,Manchester, 21st July 2006

    McFARLANE, D. 2003, Te Impact o Automatic Identifcation on Supply Chain Operations, Paper, Auto IDCenter-Cambridge Laboratory, available online: http://web.mit.edu/shef/www/selectedMedia/genMedia.

    shef-McFarlane.pd(last accessed: 2006/06/18)NOKIA 2004,Nokia Unveils the world s frst NFC product - Nokia NFC shell or Nokia 3220 phone, Press Release,2nd November 2004, available online: http://press.nokia.com/PR/200411/966879_5.html (last accessed:2006/07/04)

    OREILLY, . 2005, What Is Web 2.0, Article OReilly Media, 30th September 2005, http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html (last accessed: 2006/07/06)

    PHILIPS,MIFARE contactless smart card ICs, Philips Semiconductors website, http://www.semiconductors.philips.com/products/identication/miare/ (last accessed: 2006/07/04)

    PHILIPS 2006, Philips, Samsung and eleonica Mviles Espaa demonstrate simplicity o Near Field Communica-

    tion technology at 3GSM World Congress, Press Release Philips, Eindhoven, 7th

    February 2006, available online:http://www.semiconductors.philips.com/news/content/le_1216.html (last accessed: 2006/07/04)

    PORER, L. 2005, Te Gen 2 Standard: What Is It, and What Does It Mean?, Paxar Corporation, March 2005,available online: http://www.hegrobelgium.be/les/RFID_gen2.pd(last accessed: 2006/06/18)

    RFIDJOURNAL 2006,A Summary o RFID Standards, RFIDJournal Article, http://www.rdjournal.com/article/articleview/1335 (last accessed: 2006/06/17)

    ROBERI, M. 2003, Case Study: Wal-Marts Race or RFID, eWeek.com Article, 15th September 2003, http://www.eweek.com/article2/0,1895,1492297.asp (last accessed: 2006/06/18)

    SABEI, A.,Applications o Radio Frequency Identifcation (RFID), exas Instruments, Association or

    Automatic Identication and Mobility, available online: http://www.aimglobal.org/technologies/rd/resources/pa-pers/applicationsord.htm (last accessed: 2006/06/17)

    SMARCODE 2006, SMARCODE CORP. announces the worlds frst cent RFID tag, Press Release,SMARCODE CORP. New York, 1st May 2006, available online: http://www.smartcodecorp.com/news-room/01-05-06.asp (last accessed: 2006/05/01)

    NO 2004, NO study on the eects o GSM and UMS signals on well-being and cognition, ElectromagneticFields Committee o the Health Council o the Netherlands, 28th June 2004, available online:www.gr.nl/pd.php?ID=1042 (last accessed: 2006/07/03)

    WAL-MAR 2005, Wal-Mart Improves On-Shel Availability Trough the Use o Electronic Product Codes, PressRelease, 14th October 2005, Bentonville, Arkansas, available online: http://www.wal-martacts.com/articles/1937.

    aspx (last accessed: 2006/07/04)

    http://www.hitachi.com/New/cnews/060206.pdfhttp://www.idtechex.com/products/en/articles/00000105.asphttp://www.idtechex.com/products/en/articles/00000105.asphttp://www.theiet.org/publicaffairs/sectorpanels/control/rfid.pdfhttp://www.aimglobal.org/technologies/rfid/resources/shrouds_of_time.pdfhttp://web.mit.edu/sheffi/www/selectedMedia/genMedia.sheffi-McFarlane.pdfhttp://web.mit.edu/sheffi/www/selectedMedia/genMedia.sheffi-McFarlane.pdfhttp://press.nokia.com/PR/200411/966879_5.htmlhttp://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.htmlhttp://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.htmlhttp://www.semiconductors.philips.com/products/identification/mifare/http://www.semiconductors.philips.com/products/identification/mifare/http://www.semiconductors.philips.com/news/content/file_1216.htmlhttp://www.hegrobelgium.be/files/RFID_gen2.pdfhttp://www.rfidjournal.com/article/articleview/1335http://www.rfidjournal.com/article/articleview/1335http://www.eweek.com/article2/0,1895,1492297.asphttp://www.eweek.com/article2/0,1895,1492297.asphttp://www.aimglobal.org/technologies/rfid/resources/papers/applicationsofrfid.htmhttp://www.aimglobal.org/technologies/rfid/resources/papers/applicationsofrfid.htmhttp://www.smartcodecorp.com/newsroom/01-05-06.asphttp://www.smartcodecorp.com/newsroom/01-05-06.asphttp://www.gr.nl/pdf.php?ID=1042http://www.gr.nl/pdf.php?ID=1042http://www.wal-martfacts.com/articles/1937.aspxhttp://www.wal-martfacts.com/articles/1937.aspxhttp://www.wal-martfacts.com/articles/1937.aspxhttp://www.wal-martfacts.com/articles/1937.aspxhttp://www.gr.nl/pdf.php?ID=1042http://www.gr.nl/pdf.php?ID=1042http://www.smartcodecorp.com/newsroom/01-05-06.asphttp://www.smartcodecorp.com/newsroom/01-05-06.asphttp://www.aimglobal.org/technologies/rfid/resources/papers/applicationsofrfid.htmhttp://www.aimglobal.org/technologies/rfid/resources/papers/applicationsofrfid.htmhttp://www.eweek.com/article2/0,1895,1492297.asphttp://www.eweek.com/article2/0,1895,1492297.asphttp://www.rfidjournal.com/article/articleview/1335http://www.rfidjournal.com/article/articleview/1335http://www.hegrobelgium.be/files/RFID_gen2.pdfhttp://www.semiconductors.philips.com/news/content/file_1216.htmlhttp://www.semiconductors.philips.com/products/identification/mifare/http://www.semiconductors.philips.com/products/identification/mifare/http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.htmlhttp://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.htmlhttp://press.nokia.com/PR/200411/966879_5.htmlhttp://web.mit.edu/sheffi/www/selectedMedia/genMedia.sheffi-McFarlane.pdfhttp://web.mit.edu/sheffi/www/selectedMedia/genMedia.sheffi-McFarlane.pdfhttp://www.aimglobal.org/technologies/rfid/resources/shrouds_of_time.pdfhttp://www.theiet.org/publicaffairs/sectorpanels/control/rfid.pdfhttp://www.idtechex.com/products/en/articles/00000105.asphttp://www.idtechex.com/products/en/articles/00000105.asphttp://www.hitachi.com/New/cnews/060206.pdf
  • 8/7/2019 Patrick Plaggenborg - Social RFID

    41/52

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    42/52

    Onderzoek RFID-toepassingen, mei 2006

    Steeds meer bedrijven zijn genteresseerd in de steedspopulairder wordende techniek genaamd RFID (RadioFrequency Identifcation). De interesses lijken vooral uit tegaan naar het gemak en de extra controle die RFID brengtin de logistiek. Extra controle over goederen maar ookextra controle over de consument. Nog niet veel consu-menten weten van deze techniek a, maar de mensendie er vana weten spreken al snel van ernstige privacy-schending. Niet zo heel vreemd als je nagaat wat bedrijvenen overheden over burgers te weten kunnen komen zodraieder object zijn eigen tag krijgt en dus inormatie overzichzel o zijn eigenaar uitzendt.

    Het aantal testprojecten met deze techniek op het gebiedvan logistiek en het volgen van identiteiten is groot en blijtgroeien. Jammergenoeg maken deze privacygevoeligeprojecten het grootste deel uit van het totaal aan experi-menten met RFID. Deze experimenten hebben voor het

    grote publiek een vooral negatieve tendens. Het is vanbelang dat er ook positieve experimenten gedaan wordenzodat RFID tags niet alleen worden geassocieerd metdoemscenarios. De techniek maakt namelijk zo veel meermogelijk dan alleen het stroomlijnen van logistiek en hetidentifceren van mensen.

    Er kunnen ook mooie, leuke en handige dingengedaan worden met RFID. De al bestaande positieveexperimenten op dit gebied bewijzen dat. Blogger RgineDebatty verzamelt op haar website www.we-make-money-not-art.com de meest uiteenlopende mediakunstprojectenwaarvan ook een groot aantal gebruik maken van RFID.

    Voor toekomstige projecten is het interessant om teweten welke gebieden bestaande RFID projecten albetreden hebben. In dit document behandel ik alle doorhaar verzamelde op RFID gebaseerde (kunst)projecten.Elk project is geanalyseerd op zijn toegevoegde waarde,nieuwe invalshoeken, voor- en nadelen, positieve benade-ring o herhaling van iets wat eerder is gedaan.

    Patrick Plaggenborg, mei 2006

    [email protected]

    Dit document is tot stand gekomen met dank aan Rob van Kranenburgen Rgine Debatty.

    . RFID telefoon reader

    RFID reader in een mobiele teleoon behuizing

    + De rollen van tag en reader worden omgedraaid. Dereader is nu mobile en de tag kan passie blijven.

    + Gewonnen inormatie kan direct via het GSM systeemworden verzonden.

    + Gebruikers kunnen producten zel scannen op hun

    persoonlijke apparaat.http://www.we-make-money-not-art.com/archives/000285.php

    Gelijkende projecten:http://www.we-make-money-not-art.com/archives/000307.php

    http://www.we-make-money-not-art.com/archives/001955.php

    2. nTag Interactive

    RFID tag ter grootte van een PDA die om de nek gedra-gen kan worden. Deze tags kunnen met elkaar en met eencentrale server communiceren. Een tijdsschema voor eenmeeting wordt weergegeven en er wordt melding gemaaktals er mensen in de buurt zijn met gelijke interesses.

    + Drager geet persoonlijke inormatie op aan centraleserver

    + Gebruikers kunnen producten zel scannen op hunpersoonlijke apparaat.

    - Communicatie met elkaar via inrarood, met server viaRFID

    - Persoonlijke inormatie wordt niet vanzel vergaard.

    http://www.we-make-money-not-art.com/archives/000336.php

    Gelijkende projecten:http://www.we-make-money-not-art.com/archives/007062.php

    3. RFID tags aan sushi borden

    Sushiborden krijgen een RFID tag met gedetailleerdeinormatie over prijs, sushi type, kok en tijd waarop hetgerecht gemaakt is.

    + Gedetailleerde inormatie over eten

    + Kwaliteit van het eten wordt gemonitord en is dus beter.

    + Gebruikers kunnen zel de sushi scannen

    - Niet meer dan inormatie over het product.

    http://www.we-make-money-not-art.com/archives/000491.php

    Gelijkende projecten:http://www.we-make-money-not-art.com/archives/004707.php

    4. Betaal-implantaat

    Bezoekers krijgen een RFID-chip geimplanteerd waarmeebetaald kan worden.

    + Automatisch betalen op rekening en automatischetoegangsverschafng

    + Geen los object nodig maar eigen lichaam wordtgescand.

    - Gaat puur over de identiteit van een persoon

    http://www.we-make-money-not-art.com/archives/000582.php

    Gelijkende projecten:http://www.we-make-money-not-art.com/archives/002078.php

    http://www.we-make-money-not-art.com/archives/004210.php

    http://www.we-make-money-not-art.com/archives/008127.php

    Onderzoek RFID-toepassingen

  • 8/7/2019 Patrick Plaggenborg - Social RFID

    43/52

    2Onderzoek RFID-toepassingen, mei 2006

    5. Betalen voor parkeren

    Een kaart voor onder de vooruit die dmv RFID door eencontroleur uitgelezen kan worden. De betaling zel wordtgeactiveerd en gedeactiveerd met een mobiele teleoon.

    + Controleur kan zijn apparaat snel inormatie laten con-troleren zonder zel een parkeerkaartje te hoeven lezeno over te typen. Het gaat hierbij om de identifcatie vande auto.

    - Het activeren en deactiveren gaat niet automatisch metde RFID tag maar moet met een mobiele teleoon.

    http://www.we-make-money-not-art.com/archives/000654.php

    6. RFID productinormatie gecombineerd metdieet