Wal-Mart put RFID on the map in 2005, when they informed their 100 largest suppliers that in order to conduct business...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
with the chain, their inventory must be tagged.
The possibilities for using these devices are endless. They can be used to track warehouse inventory, animals and livestock, and have been tested on humans for identity confirmation, age verification for entering bars and to automatically retrieve medical records from tagged patients in hospitals. They are also being used in subways and toll collection systems, some on a trial basis, as a means for automatic payments so drivers and riders can pass through turnstiles without stopping.
Does RFID have a future? Probably. Despite the media hype over Wal-Mart, RFID will most likely become more common for tracking things and people. However, before its use becomes widespread, the following issues need to be resolved:
- Privacy. Although RFID tags are supposed to only emit radio waves a short distance, radio receivers can receive the tags over longer ranges than expected. Which means if the tag contains personal information, the data can be sniffed.
- RFID data isn't secure. It generally travels unencrypted and can be either snatched, or worse spoofed, for malicious purposes. A radio transmitter spoofing an RFID tag could transmit bogus data to the receiving computer system to steal warehouse inventory for example.
Once security is strengthened and privacy is better protected, RFID will likely become more popular.
Dig Deeper on Two-Factor and Multifactor Authentication Strategies
Related Q&A from Joel Dubin
After a server room door has been compromised, finding a more secure solution is of utmost importance. Learn how to choose a server room door that ...continue reading
In the IAM world, what's the difference between access control and identity management. This IAM expert response explains how the two relate as well ...continue reading
When working with PeopleSoft and Unix, which single sign-on (SSO) vendors offer the most effective products? Learn how to choose an SSO product in ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.