Minec 4x Bedienungsanleitung Seite 3

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 23
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 2
Wireless Internet for The Mobile Enterprise Consortium http://winmec.ucla.edu/
TECHNICAL REPORT/WHITE PAPER
UCLA-WINMEC-2004-205-RFID-M2M
UCLA-WINMEC-2004-205-RFID-M2M, September 2004.
3
smartphone should be secure. CryptoRF is a company that has developed technologies to
address RF security issues using cryptography and authentication.
Standards
There are four frequency bands for RFID communications: Low Frequency, high
frequency, ultra-high frequency and microwave. The appropriate frequency for the RFID
enabled smartphone depends on the range required by the application for which it is
going to be used. In the common case, high-frequency bands that allow communication
in a few meters are expected to be appropriate for the RFID enabled smartphone.
Different bodies specify the appropriate frequency ranges in different parts of the globe
causing incompatibility issues between tags and RFID readers. For example, Europian
standards bodies like ETSI, have set different frequency requirements for RFID from
USA for health and safety reasons. Hence it is harder for multinational firms to have a
consistent infrastructure across the globe [1]. In order to address this issue, RFID-enabled
smartphone manufacturers should support multiple standards.
Apart from the frequency standards RFID enabled smartphone manufacturers should
comply with RFID data standards. The EPCglobal industry consortium has released the
Electronic Product Code (EPC) specification that describes the data stored in a tag [2].
ISO 14443 is another standard used for RFID communication.
Applications
The applications of RFID-enabled smartphones span across multiple areas including the
enterprise and the consumer market. The main focus of this report is on the enterprise
market, however a few consumer applications are presented to show the potential of the
technology in the consumer market.
1.
Use a product’s tag to connect real time to the item’s entry in a centralized database: A
smartphone with an RFID reader can be placed on a tag located on machinery and use the
wireless network to browse on the specific item’s web pages [3].
A service technician touches the machine to service with his smart-phone. Up-
to-date service information is downloaded at his smartphone. E.g last service
date, what service was performed, instructions for additional service etc.
A machine operator uses his smartphone RFID reader to get the tag info attached
to a machine and a new work order is available from a web page.
An engineer uses his smartphone RFID reader to get the tag info that links to a
page to enter the reason of failure.
A technician uses his smartphone RFID reader to get the tag info and get linked
to a page to enter the materials used.
2. Collect real-time information: Use a cell phone that is equipped with an RFID reader to send
specific time and location information about a position or status to the center
Seitenansicht 2
1 2 3 4 5 6 7 8 ... 22 23

Kommentare zu diesen Handbüchern

Keine Kommentare