October 17, 2023
Author: Jim Romeo Translation: GOOGLE
Many of counterfeit wines are now bottled with cheap wines from recycled original bottles, which is illegal. The scammer perfectly packed a cheap imitation of wine into a bottle of expensive wine, while all packaging and labels remained intact. Consumers don't know and it's very hard for wine sellers to stop this kind of scam.
Things are changing with RFID technology and this kind of scam is getting a lot harder. RFID chips can be installed on corks or closed wine bottles. The chip contains a unique identification number to authenticate a bottle of wine. It uniquely identifies a bottle of wine and ensures that bottle has not been tampered with and product is genuine.
This is just one of many ways RFID is being used to secure and change our lives. While this technology is nothing new, its applications are numerous and need for this technology is ubiquitous.
According to a study by BCC Research Institute, global RFID technology market will reach $38 billion by 2021. This will come from $16.2 billion in 2016 and will grow at a CAGR of 18.6%. At same time, this technology is finding its way into many different vertical markets for a variety of purposes, from tracking solutions to asset control and management, authentication and fraud prevention, among others.
Retailers are making extensive use of RFID technology to control product loss and speed up point-of-sale (POS) inspections. New York-based Rebecca Minkoff Apparel and Accessories is using RFID in its self-checkout boutiques, just like a supermarket or a big box store.
"Retailers are adopting RFID at breakneck speed - unit price of tags and monitoring equipment in retail stores and distribution centers is very affordable," says Keith Jelinek, managing director of Berkeley Research Group in Los Angeles, California. "It's a very exciting technology - instead of traditional method of routinely inventorying products and then determining possible losses, products can accumulate financially based on location at any point in time This can be compared to POS data to determine where a product is, whether sold or removed The same technology has another benefit, and retailers use it to keep track of what's on floor as well as what's in stock for real-time refills.
Retailing luxury goods has a long history of not only theft, but counterfeiting. Buyers are interested in counterfeit products because of their attractive price. RFID tags prevent this and are widely used as a tool not only against theft, but also underdeals. They are used for product authentication and loss prevention.
Retailer Maria & Donato is integrating SpeedTap label into its line of luxury handbags to offer shoppers a simple and effective product authentication feature," said Bill Cummings of ThinFilm in San Jose, California. The company produces RFID tags. Barbadillo, a leading Spanish wine producer, has integrated OpenSense label into limited-edition Versos sherry bottles to prevent adulteration and authenticate product. ThinFilm is in talks with a number of other leading brands interested in authentication and anti-counterfeit technology. These companies represent a range of vertical industries including tobacco, pharmaceuticals, cosmetics and specialty products such as olive oil, caviar and chocolate.
RFID and Smart Identity
RFID, combined with other technologies, is becoming a very effective tool for intelligent authentication and identification of products, goods and people.
Identity solutions provider HID Global expects 2017 to be year of digital identity transformation, bringing a number of key trends, including mobile app credentialing and management through cloud and innovative Internet of Things. The readiness of digital identity for use with RFID readers makes trusted visits and other physical and online interactions more personal, contextual and valuable.
This technology can be combined with other technologies such as cloud computing, mobile technology, biometrics and Internet of Things to have a huge impact. Other technologies include biometrics, where facial recognition, fingerprints, and other identification technologies can be combined with RFID for maximum security. It provides a whole new level of security by allowing very strong authentication to be associated with unique identities where such identities are available.
RFID is best suited for security when combined with other measures such as biometrics," said Mark Brown of GlobeRanger, which provides an RFID IoT platform. It can often be seen as a way to establish presence rather than identity: if someone takes your RFID tag, they suddenly become "you" unless a multi-modal authentication scheme is in place, he noted. Therefore, as a stand-alone solution, it is too early to use RFID technology as a real security application in most cases.
As with interfacing with biometrics, RFID can also be used in conjunction with Internet of Things. Smart tags or RFID chips can be detected and controlled using Internet. This opens up many new possibilities for technology.and because it can allow many different assets to be monitored and controlled from anywhere in world, as well as other assets anywhere in world.
According to GlobeRanger's Mark Brown, RFID can be used as a means of verifying identity. He noted that he works for a client who works in a remote part of Canada, where cellular reception is limited to about two hours a day, making cloud-based biometric security nearly impossible. Their employees are given RFID-enabled badges, extended memory, and when scanning physical characteristics, photos are extracted from tags on computer screens (rather than connected systems).
According to HID Global, Internet of Things offers more efficient ways to connect people and things. Their prediction is that digital identities will increasingly be used to secure, customize, and enhance user experience across a growing number of industry segments and use cases. They will also help streamline process with real-time location systems, condition monitoring, and other features. For example, demand for cloud-based authentication platforms will grow, increasing trust in proof-of-presence and Internet of Things (IoT) applications. By simply connecting your phone to a trusted tag to prove you were there and completed task at hand, you will have a profound impact on how people handle complex processes from remote locations using inherent speed, flexibility and mobility of technology.
HID Global RFID used by Datawatch Inc. for access control is an example of how RFID readers used in mobile access technology are integrating with Internet of Things in smart buildings. Use mobile access technology to help facility managers effectively control HVAC systems based on who enters or exits apartments or common areas using mobile IDs. HVAC and energy management systems automatically adjust settings such as turning off lights when last person leaves area. Datawatch has deployed HID Mobile Access and its RFID readers for building entry and access to interior doors, including public building areas, elevators, individual suites and apartments in nearly 30 commercial properties in major cities.
RFID-based security makes sense for Datawatch customers in Canada as well as GlobeRanger customers in remote locations. Its uniqueness lies in its speed and flexibility. When completing transactions as quickly as possible is a priority, he says, RFID is a good choice because results are almost instantaneous. In terms of flexibility, you can adjust detection range and integrate other databases. For example, you can connect to a training database to quickly determine which employees have completedcertain training courses, which employees can work on project elements that require special skills, or whose certificates expire a few minutes after their expiration date.
In addition to remote locations, RFID is a suitable solution for customers or employees scattered across multiple locations. For workers who need to access their desktops from multiple locations, combination of NFC or RFID with other security verification such as a PIN or biometric allows them to do so at shared computer terminals, expanding their access by combining them with accessibility. local resources. . brown.
Looking ahead, RFID will become even smarter, more personal, and more ubiquitous.
First, RFID is often used to track items in warehouses and other similar large-scale applications, Brown said. While such apps will certainly continue, we are also seeing recent trends towards making technology more personalized. Today, if you lose your keys, RFID tag attached to them will send a message straight to your phone, telling you exactly where they are using swarm intelligence. This technology will become more ubiquitous and more individual as it develops further.