**2. Related application and system**

Some researchers presented that the embedding RFID can be plugged into a small device such as handheld host [1]. The handheld device users can plug in the SD or CF interface of reader card. Hence, the users can scan and induct the RFID tag everywhere. In other words, to integrate the RFID system hardware into the mobile devices is practicable. Furthermore, the RFID system including RFID induction antenna, RFID parser and reader, RFID tag, etc., today is cheap. In addition, the RFID hardware including antenna and reader is not only cheap but also can be a PnP device. It means that the RFID hardware can be used as a nor‐ mal user device such as the card-reader.

#### **2.1. RFID encryption and decryption for intellectual property protection**

#### *2.1.1. Application*

**1.** The data of manufacturing record was transformed from artificial process to electrical

**2.** Increased management (such as Inventory or Supply Chain) and production planning

Many tracking applications based on ubiquitous computing and communication technolo‐ gies have been presented in recent years such as RFID systems [4,5,7]. Therefore, RFID can be used to trace objects and asset worldwide. In addition, some warehouse systems or sup‐ ply chain management systems can be combined with RFID to form goods tracking systems. The tracking systems help enterprises to manage their raw materials and products that re‐ duce the cost of operation budget. However, more and more applications of RFID system

Due to the popularity of RFID, many local or small area wireless applications were also pro‐ posed. The RFID tags were proposed to be used in hospital or health care [12-15]. Patients should always wear the RFID tag is designed for identification. The patient's current loca‐ tion and condition is monitored every time and everywhere within the hospital. It means that patients are under cared even an emergency state happens. Some entrance guard sys‐ tems are also based on RFID system. The RFID ticket or RFID card [2, 3, 8, 10] is used to identify that a user is legal or not. According to the short-distance wireless signal, the RFID tag users can be monitored within the specific area. In other words, the RFID systems are generally used to be the hardware identification in many applications. In opposition to us‐ ing the RFID system as the hardware identification, many software applications adopt soft‐ ware encryption as the identifications to protect the intellectual property of the applications or files. Considering the serious situations of pirate, intellectual property protection is im‐

Password protection is the popular encryption method to protect the applications. Each ap‐ plication or file of software is assigned an on demand given serial numbers or calculation function. People who use this application have to input the correct serial number then ena‐ ble the application. Considering today's applications, personal multimedia services or soft‐ ware applications are popular. Customers use the personal multimedia devices such as MP3, PDA, iPod, Laptop, etc., to download the multimedia or application files from the server or website via Internet. In other words, many files or data are disseminated and ex‐ changed via Internet. In addition, many hackers can crash the software encryption with few‐ er costs (Only program tools or applications needed). It makes that the piratical files are

transmitted widely and the protection of intellectual property exists in name only.

For the purpose that the right of intellectual property and the right of the valid users are further protected and maintained, integration of the software and hardware encryption is needed. Since each RFID tag with a unique ID (UID) which records the on demand infor‐ mation can be used as the individual identification, the small and cheap RFID tag can be

process.

and scheduling efficiency than before.

2 Radio Frequency Identification from System to Applications

portant and becomes a famous issue.

**3.** Reduced the cost of operation and increased the economic effect.

that were introduced by people, and that the agriculture is the one of them.

**4.** Supply product safety information to customers to refer.

Since the RFID systems are popular and ripe for distinguishing treatment of individual tar‐ get [16, 17], the unique characteristic or identification of RFID can be the solution of intellec‐ tual property protection. Many researches proposed the possible way to protect the intellectual property, products, or applications. In some applications [18], the RFID chips are embedded in the cap of bottle. The medicine can be differentiated between fake and true. In addition, the RFID chip can be placed in the CD or DVD disk. The CD-ROM can accesses and reads the information of the RFID for valid identification check. Only the CD or DVD with the authorized RFID can be played. Although the content is protected, the self-made content that burned in the CD-R/RW or DVD-R/RW may not provide the authorized RFID information. In other words, the private, non-business, or free digital content made by the individual may be limited and cannot be transmitted free. In addition, even the CD or DVD disks are protected, the digital content such as files or data still can be copied from the disk to other devices such as hard disc or MP3 player. Therefore, how to separate the right of the digital content for each user and how to protect the digital content from illegal use become the important issues.

Due to the demand of existed system integration, some applications related to *RFID Encryp‐ tion and Decryption for Intellectual Property Protection* includes: PnP Middleware, RFID Hard‐ ware, End User RFID Device and End User RFID Tag, and Encryption/Decryption Procedure. The system framework is shown as follows.

For a normal user, there are two types of RFID devices for the encryption/decryption on RFID system (E/DonRFID system): End User RFID Device for digital content or multimedia information gaining, and End User RFID Tag for indentifying the legal user.

E/DonRFID not only provides the RFID based protection procedure but also includes the Encryption/Decryption method based on RFID character. The encryption and decryption can be implemented by hardware or software solution. The original digital data is encrypted by 1) hardware, 2) software, or 3) combination of hardware and software. Corresponding to the encryption method, suitable RFID tag of user for decrypting is needed.

*2.1.2. Method*

First, depending on the digital content storage hardware such as CD-ROM disk, the com‐ mercial RFID tag can be embedded into the disk when the disk is made. According to the characteristic of RFID tag, each RFID tag can be set with different individualities. The differ‐ ent encryption code, unique ID, information of the digital content, or authentication serial number can be recorded in the RFID tag. In addition, the RFID tag embedded in the disk is not rewritable. Hence, different disks equip the different IDs of RFID tag. When the RFID reader inducts the tag, the information about this storage can be scanned and presented. In

RFID Applications and Challenges http://dx.doi.org/10.5772/53368 5

Second, since the content or data are digital, these software, content or data, can be encrypt‐ ed as the secret codes or cipher. The key for encryption and decryption can be recorded in the RFID tag. Without the specific key, these secret codes or ciphers cannot be recovered as the original data. In other words, the digital content that recorded in the storage device (such as CD-ROM disk) can be secured. The decryption key can be recorded in the RFID tag

For the end users, *End User RFID Device/Tag* is used. The storage, whether hardware (CD-ROM) which includes the encrypted digital content, or software (files or ciphers), is called *End User RFID Device*. If the *End User RFID Device* is hardware, the third party *RFID Hard‐ ware* can induct the RFID tag embedded in the hardware. After identifying the *End User RFID Device*, the application or user can execute and read the digital content if only *Hard‐*

According to three possible states, the end user must have the decryption key for executing the digital content. In this paper, the hardware (RFID tag) or software for the decryption key is called *End User RFID Tag*. After identifying the *End User RFID Device*, the end user has to provide the *End User RFID Tag* for the *Embedded Service Middleware Application*. Only the in‐ formation or password of *End User RFID Tag* is correct and can be used to gain the secured decryption key which recorded in the *End User RFID Device*, the digital content recorded in

Considering that the three possible states are based on the RFID induction, the *RFID Hard‐ ware* is divided into two types of equipments: for *End User RFID Device* and for *End User*

According to the three possible ways to protect the digital content, when the protection is based on the combination of *Hard/Soft- Encryption/Decryption* and Only *Hardware-Encryption* with *Hard/Soft –Decryption*, the *RFID Hardware* for *End User RFID Device* is needed. Due to that the digital content is protected by the RFID tag embedded in the hardware, the informa‐ tion recorded in the tag has to be inducted before using. For example, if a tag is embedded in the CD-ROM disk, the user should have a CD-ROM driver with the *RFID Hardware* when reading the disk. In other words, if the protection is based on the hardware belongs to *End User RFID Device*, the corresponding reader with *RFID Hardware* is necessary. The *RFID Hardware* can be embedded in the CD-ROM driver, reader, or other multimedia devices.

other words, only the digital storage with the valid RFID tag is legal and true.

embedded in the storage or a palm RFID tag (such as a RFID toy).

*ware - Encryption/Decryption* is used.

the *End User RFID Device* can be presented.

*RFID Tag*.

Since three possible ways to protect the digital content are proposed, for the end users, there will be at least three possible states and method of *E/DonRFID Encryption/Decryption*, to gain the protected digital data, shown as follows:


**Figure 1.** The framework of RFID Encryption and Decryption for Intellectual Property Protection

#### *2.1.2. Method*

E/DonRFID not only provides the RFID based protection procedure but also includes the Encryption/Decryption method based on RFID character. The encryption and decryption can be implemented by hardware or software solution. The original digital data is encrypted by 1) hardware, 2) software, or 3) combination of hardware and software. Corresponding to

Since three possible ways to protect the digital content are proposed, for the end users, there will be at least three possible states and method of *E/DonRFID Encryption/Decryption*, to gain

**2.** Encryption only by Hardware with Hardware and Software combination Decryption

**3.** Encryption only by Software with Hardware and Software combination Decryption

*End User RFID Tag* Third Party

Digital Content *End User* 

**Figure 1.** The framework of RFID Encryption and Decryption for Intellectual Property Protection

*RFID Hardware*

*Embedded Service Middleware Application*

*Hard/Soft - Encryption*

*RFID Device*

*Embedded Service Middleware Application*

socket server-client

Applications

the encryption method, suitable RFID tag of user for decrypting is needed.

**1.** Encryption and Decryption by Hardware and Software combination,

**4.** Encryption only by Hardware with Hardware Decryption

**5.** Encryption only by Software with Hardware Decryption

*RFID Hardware*

RFID Parser

RFID Parser

the protected digital data, shown as follows:

4 Radio Frequency Identification from System to Applications

First, depending on the digital content storage hardware such as CD-ROM disk, the com‐ mercial RFID tag can be embedded into the disk when the disk is made. According to the characteristic of RFID tag, each RFID tag can be set with different individualities. The differ‐ ent encryption code, unique ID, information of the digital content, or authentication serial number can be recorded in the RFID tag. In addition, the RFID tag embedded in the disk is not rewritable. Hence, different disks equip the different IDs of RFID tag. When the RFID reader inducts the tag, the information about this storage can be scanned and presented. In other words, only the digital storage with the valid RFID tag is legal and true.

Second, since the content or data are digital, these software, content or data, can be encrypt‐ ed as the secret codes or cipher. The key for encryption and decryption can be recorded in the RFID tag. Without the specific key, these secret codes or ciphers cannot be recovered as the original data. In other words, the digital content that recorded in the storage device (such as CD-ROM disk) can be secured. The decryption key can be recorded in the RFID tag embedded in the storage or a palm RFID tag (such as a RFID toy).

For the end users, *End User RFID Device/Tag* is used. The storage, whether hardware (CD-ROM) which includes the encrypted digital content, or software (files or ciphers), is called *End User RFID Device*. If the *End User RFID Device* is hardware, the third party *RFID Hard‐ ware* can induct the RFID tag embedded in the hardware. After identifying the *End User RFID Device*, the application or user can execute and read the digital content if only *Hard‐ ware - Encryption/Decryption* is used.

According to three possible states, the end user must have the decryption key for executing the digital content. In this paper, the hardware (RFID tag) or software for the decryption key is called *End User RFID Tag*. After identifying the *End User RFID Device*, the end user has to provide the *End User RFID Tag* for the *Embedded Service Middleware Application*. Only the in‐ formation or password of *End User RFID Tag* is correct and can be used to gain the secured decryption key which recorded in the *End User RFID Device*, the digital content recorded in the *End User RFID Device* can be presented.

Considering that the three possible states are based on the RFID induction, the *RFID Hard‐ ware* is divided into two types of equipments: for *End User RFID Device* and for *End User RFID Tag*.

According to the three possible ways to protect the digital content, when the protection is based on the combination of *Hard/Soft- Encryption/Decryption* and Only *Hardware-Encryption* with *Hard/Soft –Decryption*, the *RFID Hardware* for *End User RFID Device* is needed. Due to that the digital content is protected by the RFID tag embedded in the hardware, the informa‐ tion recorded in the tag has to be inducted before using. For example, if a tag is embedded in the CD-ROM disk, the user should have a CD-ROM driver with the *RFID Hardware* when reading the disk. In other words, if the protection is based on the hardware belongs to *End User RFID Device*, the corresponding reader with *RFID Hardware* is necessary. The *RFID Hardware* can be embedded in the CD-ROM driver, reader, or other multimedia devices.

In opposition to *End User RFID Device*, when the decryption is based on the *End User RFID Tag* key, end user has to own the valid RFID tag for decrypting the digital content. For ex‐ ample, the decryption code is recorded in the RFID tag of *End User RFID Device*. However, the decryption code is secured by the password which locks the data slot of RFID tag. With‐ out the correct password, end user cannot gain the decryption code that secured in the RFID tag of *End User RFID Device*. To provide the password, the end users should have the *RFID Hardware* such as the USB-RFID reader, etc.

mand limitation of the period of validity or when the *End User RFID Device* is removed. In addition, when an end user tries to gain the digital data from the *End User RFID Device*, the middleware application request the end user for the password. After receiving the pass‐ word, the middle application transmits the password and tries to gain the decryption code. If the password is correct, the decryption code will be transmitted to the user application such as multimedia player, etc. Otherwise, the digital content cannot be decrypted and used. Therefore, only the two conditions: 1) the key information of *End User RFID Tag* matches the password requirement of *End User RFID Device*, and 2) the decryption code is correct in de‐ crypting the digital content are satisfied, the user can gain the information from the *End User*

RFID Applications and Challenges http://dx.doi.org/10.5772/53368 7

**2.2. Location aware public/personal information services based on embedded RFID**

Many researches proposed before presented the importance of providing information and services related the user's location to each person. Some researches assume that there are GPS devices or module included in the users' mobile devices. Then, according to the infor‐ mation of GPS (GIS) [19-22], the location aware or related information or services are pro‐ vided to the mobile user trough the wireless network. Although the GPS provides the accurate location of users, most users indeed needs the approximate local-area-aware infor‐ mation. The accuracy of location such as longitude and latitude is not the main issue. Fur‐

Hence, in addition to GPS, according to the orientation made by the station of wireless cellu‐ lar system [23], the related information according to the user's location can be given to the user via cellular system. Each cellular phone user can be served directly by the telecommu‐ nications companies. If a user is served by the specific wireless base station, the information

Since the RFID system is popular and generally implemented, many researches [24-30] tried to integrate the RFID to and applied RFID technology to context-aware systems. However, in [31], what kind of the context, the corresponding context services, and the context-aware RFID system are important to be provided for user is still an issue of the existing system. In addition, to integrate the existed system such as information service and payment system

Not only supply the public services but also give the personal services, the context aware researches [32-34] were also proposed. Research in [35] was proposed that considering the user's related location. Hospital or health care RFID systems [12-14,34] for monitor the tag users were also proposed. A designed RFID tag is given to each user such as a patient. Each patient should always wear the RFID tag every time and everywhere. Hence, the patients' current information such as location and health conditions are monitored by the hospital. In addition, some entrance guard systems are also based on RFID system. The RFID ticket or

related to the coverage area of this base station are given to the phone user.

RFID card [2, 3, 10, 36] is used to identify that a user is legal or not.

*RFID Device*

**platform**

*2.2.1. Application*

thermore, not everyone can equip the GPS.

become the important topic.

To manage the RFID information, *Embedded Service Middleware Application* is proposed to parse the information from the *RFID Hardware*. Due to that there are different RFID product, an RFID parser is needed for analyzing and parsing the information from *RFID Hardware*. After gaining the requirements or response, the *Embedded Service Middleware Application* searches the corresponding applications and passes the information. Figure 2 presents the framework of *Embedded Service Middleware Application*.

**Figure 2.** Possible ways to gain the protected digital data

The *Embedded Service Middleware Application* implements the socket server-client structure for communication with other existed or third party applications. The information comes from the *End User RFID Device*, such as specific password-requirement, will be recorded in the da‐ tabase of middleware application. The requirement will be maintained based on the on de‐ mand limitation of the period of validity or when the *End User RFID Device* is removed. In addition, when an end user tries to gain the digital data from the *End User RFID Device*, the middleware application request the end user for the password. After receiving the pass‐ word, the middle application transmits the password and tries to gain the decryption code. If the password is correct, the decryption code will be transmitted to the user application such as multimedia player, etc. Otherwise, the digital content cannot be decrypted and used. Therefore, only the two conditions: 1) the key information of *End User RFID Tag* matches the password requirement of *End User RFID Device*, and 2) the decryption code is correct in de‐ crypting the digital content are satisfied, the user can gain the information from the *End User RFID Device*

#### **2.2. Location aware public/personal information services based on embedded RFID platform**

#### *2.2.1. Application*

In opposition to *End User RFID Device*, when the decryption is based on the *End User RFID Tag* key, end user has to own the valid RFID tag for decrypting the digital content. For ex‐ ample, the decryption code is recorded in the RFID tag of *End User RFID Device*. However, the decryption code is secured by the password which locks the data slot of RFID tag. With‐ out the correct password, end user cannot gain the decryption code that secured in the RFID tag of *End User RFID Device*. To provide the password, the end users should have the *RFID*

To manage the RFID information, *Embedded Service Middleware Application* is proposed to parse the information from the *RFID Hardware*. Due to that there are different RFID product, an RFID parser is needed for analyzing and parsing the information from *RFID Hardware*. After gaining the requirements or response, the *Embedded Service Middleware Application* searches the corresponding applications and passes the information. Figure 2 presents the

> *Hard/Software Decryption*

The *Embedded Service Middleware Application* implements the socket server-client structure for communication with other existed or third party applications. The information comes from the *End User RFID Device*, such as specific password-requirement, will be recorded in the da‐ tabase of middleware application. The requirement will be maintained based on the on de‐

Digital Content

*Hardware* such as the USB-RFID reader, etc.

6 Radio Frequency Identification from System to Applications

framework of *Embedded Service Middleware Application*.

*Hard/Soft-Encryption*

*Hardware-Encryption* 

*Software – Encryption*

**Figure 2.** Possible ways to gain the protected digital data

Many researches proposed before presented the importance of providing information and services related the user's location to each person. Some researches assume that there are GPS devices or module included in the users' mobile devices. Then, according to the infor‐ mation of GPS (GIS) [19-22], the location aware or related information or services are pro‐ vided to the mobile user trough the wireless network. Although the GPS provides the accurate location of users, most users indeed needs the approximate local-area-aware infor‐ mation. The accuracy of location such as longitude and latitude is not the main issue. Fur‐ thermore, not everyone can equip the GPS.

Hence, in addition to GPS, according to the orientation made by the station of wireless cellu‐ lar system [23], the related information according to the user's location can be given to the user via cellular system. Each cellular phone user can be served directly by the telecommu‐ nications companies. If a user is served by the specific wireless base station, the information related to the coverage area of this base station are given to the phone user.

Since the RFID system is popular and generally implemented, many researches [24-30] tried to integrate the RFID to and applied RFID technology to context-aware systems. However, in [31], what kind of the context, the corresponding context services, and the context-aware RFID system are important to be provided for user is still an issue of the existing system. In addition, to integrate the existed system such as information service and payment system become the important topic.

Not only supply the public services but also give the personal services, the context aware researches [32-34] were also proposed. Research in [35] was proposed that considering the user's related location. Hospital or health care RFID systems [12-14,34] for monitor the tag users were also proposed. A designed RFID tag is given to each user such as a patient. Each patient should always wear the RFID tag every time and everywhere. Hence, the patients' current information such as location and health conditions are monitored by the hospital. In addition, some entrance guard systems are also based on RFID system. The RFID ticket or RFID card [2, 3, 10, 36] is used to identify that a user is legal or not.

The services and information of user-location-related public places such as the museum [37] are provided. According to the requirement of users, different services are given through wireless network or cellular system to different users even they are in the same places.

The other business management systems in the framework can be the third party develop‐ ments and independent of the whole system. When the user approaches the RFID system at the specified area, the induction and communication between end user RFID tag and antenna of *RFID System* is automatically established. A RFID reader will parse the signal into the digital and computing content. Then, the *RFID System* transmits the information obtained from the tag to the *Embedded Service Middleware Platform* via Internet. According to the RFID information, the *Embedded Service Middleware Platform* searches for and provides the specific personal serv‐ ice recorded in local area server according to the on demand conditions of the user. Moreover, the information or services can be updated or provided from the main database via Internet connection. Then, the user can obtain the public/personal information from the user interface.

Embedded Service Middleware Platform

Handheld Device Embedded Service Middleware Platform

Software API

Other Business Management Sys. Database

**Figure 3.** The whole framework of location-aware RFID application service system

UI provided by Server

Internet or Socket Connection

User Handheld Device

UI provided by Handheld Device

RFID API and Parser

Serverside

RFID Sys.

RFID Sys. User Tag

Commercial Tag

RFID Applications and Challenges http://dx.doi.org/10.5772/53368 9

RFID Sys.

RFID API and Parser

User Tag

RFID API and Parser

Hence, a realistic application such as Location Aware Public/Personal Information Services based on RFID is proposed. By using the location-aware RFID application, the main contri‐ butions are :


#### *2.2.2. Method*

The system structure is shown as Figure 2. The *Embedded Service Middleware Platform* is the main system to manage the internal and external system connections. The RFID API and parser are included and provided to communicate with the third party RFID system. The *Embedded Service Middleware Platform* also makes the information connection to other busi‐ ness management system or database via software API. In addition, the related information to the RFID tag inducted is presented by user interface.

For the end users, *End User RFID Handheld Facilities* consists of two appliances: *end user RFID tag* and *end user device with RFID System*. A user can use a given readable and re-writable RFID tag or a handheld device such as PDA which equipped a RFID system to gain the re‐ quired public/personal services. In Figure 2, the user handheld device also equips the RFID system, RFID API, and parser to scan and induct the commercial RFID tag. The communica‐ tion and the data transmission between the handheld device and server can be established via 1) Internet, 2) server-client socket, 3) a user RFID tag, or 4) a readable and re-writable RFID tag. A user can view the information or obtain the services via user interface (UI) pre‐ sented by server or the user handheld device.

The other business management systems in the framework can be the third party develop‐ ments and independent of the whole system. When the user approaches the RFID system at the specified area, the induction and communication between end user RFID tag and antenna of *RFID System* is automatically established. A RFID reader will parse the signal into the digital and computing content. Then, the *RFID System* transmits the information obtained from the tag to the *Embedded Service Middleware Platform* via Internet. According to the RFID information, the *Embedded Service Middleware Platform* searches for and provides the specific personal serv‐ ice recorded in local area server according to the on demand conditions of the user. Moreover, the information or services can be updated or provided from the main database via Internet connection. Then, the user can obtain the public/personal information from the user interface.

The services and information of user-location-related public places such as the museum [37] are provided. According to the requirement of users, different services are given through wireless network or cellular system to different users even they are in the same places.

Hence, a realistic application such as Location Aware Public/Personal Information Services based on RFID is proposed. By using the location-aware RFID application, the main contri‐

**1.** Users of location-aware RFID application can communicate and gain the information corresponding to the users' location through the RFID tag. The handheld devices with RFID reader can also manually obtain the extra or required or local information and

**2.** The efficiency of system management and service utilization can be improved, informa‐

**3.** The location-aware RFID application can be embedded in other similar service systems and hardware. The proposed service system can be included in the existed information

**4.** The service object and function can be various. For example, the location-aware RFID application provides not only the public or general information services to every system user, but also the deferential personal service to individual location-aware RFID appli‐

**5.** The ticket and payment services can be integrated into location-aware RFID application service system. Users needn't to bring too many identification devices or cards. All method of payment and public or personal services are integrated into one RFID tag

The system structure is shown as Figure 2. The *Embedded Service Middleware Platform* is the main system to manage the internal and external system connections. The RFID API and parser are included and provided to communicate with the third party RFID system. The *Embedded Service Middleware Platform* also makes the information connection to other busi‐ ness management system or database via software API. In addition, the related information

For the end users, *End User RFID Handheld Facilities* consists of two appliances: *end user RFID tag* and *end user device with RFID System*. A user can use a given readable and re-writable RFID tag or a handheld device such as PDA which equipped a RFID system to gain the re‐ quired public/personal services. In Figure 2, the user handheld device also equips the RFID system, RFID API, and parser to scan and induct the commercial RFID tag. The communica‐ tion and the data transmission between the handheld device and server can be established via 1) Internet, 2) server-client socket, 3) a user RFID tag, or 4) a readable and re-writable RFID tag. A user can view the information or obtain the services via user interface (UI) pre‐

tion can be the digital multimedia and updated immediately,

and location-aware RFID application service system.

to the RFID tag inducted is presented by user interface.

sented by server or the user handheld device.

center or server. The additional cost for integration can be reduced.

butions are :

8 Radio Frequency Identification from System to Applications

services.

cation user.

*2.2.2. Method*

**Figure 3.** The whole framework of location-aware RFID application service system

In the location-aware RFID application service system, the RFID antennas and reader are de‐ ployed 1) at the specific area or location such as the entrance of the rapid transit system or the information service machine, or 2) within the handheld devices such as PDA or mobile phone. When a user is given a readable RFID tag, the related information or the user's on demand service conditions about the user is given by himself and on demand recorded in the database. When the user requires the local area public or personal services, the user should be at the tiny induction area such as a local area information center or a service sta‐ tion. Then, the RFID system placed in the specific area inducts the RFID tag and gain the information such as UID from the RFID tag. The reader of RFID system then sends the infor‐ mation to the local area server via Internet.

After receiving the information and parsing the message from RFID system, the content of RFID tag can be identified. If *end user RFID tag* is used, the *embedded server service middleware* can search and present the local information such as local area shopping information, traffic information, or the customization information, recorded in local database that match the on demand conditions of the RFID tag user. In other words, the RFID user can be directly served with sufficient local area related information. If other further information needed, the *embedded server service middleware* can send the user's request to the remote main server to obtain the requested service or to the other business applications via Internet for extra serv‐ ice obtaining. At last, the user can gain the location-aware information or services via user interface. In opposition to *end user RFID tag*, when a user of *end user device with RFID System* actively scans the RFID tag of the commercial advertisement, the handheld device can send the scanned RFID tag information via wireless network or cellular mobile system to the local area server with *embedded server service middleware* embedded. Then, as the procedure of *end user RFID tag*, the *embedded server service middleware* searches for the requested services and transmits these services to the user's handheld device by wireless network or cellular mobile system.

**Figure 4.** The environment of test and verification

inventory information [42, 43].

*2.3.1. Application*

**2.3. RFID applications on supply chain management**

Existing RFID applications on supply chain management (SCM) can record something about materials, goods, and products during production [38, 39]. An integrate system with RFID and SCM also can supplies new value-added services such as products secure protection and to query products record [40]. And integrating promising information technologies such as RFID technology, mobile devices-PDA and web portals can help improve the effective‐ ness and convenience of information flow in construction supply chain control systems [41]. In addition, RFID can be use in a lifecycle of a product to reduce the time which spend to find a product. Therefore, RFID is a technology to reduce the time to identified objects that

RFID Applications and Challenges http://dx.doi.org/10.5772/53368 11

In Warehouse management, many companies have used RFID technology replaced the Bar Code or QR Code as recognition of the key features. Because of the Bar Code and QR Code are limited in existing format companies decided to select a solution improving au‐ tomation in warehouse management. Then the RFID technology is an efficient technique to solve that problem. Company integrated RFID technology with warehouse manage‐ ment that is not only an electronic process solution but can provided customers with new services such as location information of products, search stock of products, and provide

In healthcare, RFID also can use to trace patients, blood sampling, drop management, etc. Kumiko Ohashi, SakikoOta, LucilaOhno-Machado, and HiroshiTanaka [44] developed a smart medical environment with RFID technology. This research used two types of frequen‐ cy on tracking system for tracking clinical intervention such as drug administrations and blood tests at the patient bedside. Furthermore, Chung-Chih Lin, Ping-Yeh Lin, Po-Kuan Lu, and Guan-Yu Hsieh [45] proposed a healthcare integration system for disease assessment

can improve automation in the traceability management of Supply Chain.

In addition, the users can use *handheld device middleware application* to select the tag content recorded in handheld device database if needed. Then, the RFID API controls the RFID sys‐ tem embedded in the handheld device to re-write the content (such as UID) of the tag of the handheld device. At last, the RFID content requirement from other business applications or systems can be provided through the RFID tag of the handheld device.

In addition, the database can record the history of the user's requirements. The statistic user requirements can be used to classify that what kind of the service the user requests most. Next time the system can provide the personal services according to the classified results. In other words, the users can be served with the services they most pay attention to.

The real test and verification is implemented as Figure 3. The implementation shows one shoot of the verification. When the user approaches the on demand placed RFID system, the *Embedded Service Middleware Platform* automatically presents the information corresponding the content or user's related information recorded in the RFID tag. For example, if a Taiwa‐ nese uses the RFID tag, the presentation of local area server will be based on traditional Chi‐ nese. But the local area server will provide English when a native English speaker user his own RFID tag respectively.

**Figure 4.** The environment of test and verification

#### **2.3. RFID applications on supply chain management**

#### *2.3.1. Application*

In the location-aware RFID application service system, the RFID antennas and reader are de‐ ployed 1) at the specific area or location such as the entrance of the rapid transit system or the information service machine, or 2) within the handheld devices such as PDA or mobile phone. When a user is given a readable RFID tag, the related information or the user's on demand service conditions about the user is given by himself and on demand recorded in the database. When the user requires the local area public or personal services, the user should be at the tiny induction area such as a local area information center or a service sta‐ tion. Then, the RFID system placed in the specific area inducts the RFID tag and gain the information such as UID from the RFID tag. The reader of RFID system then sends the infor‐

After receiving the information and parsing the message from RFID system, the content of RFID tag can be identified. If *end user RFID tag* is used, the *embedded server service middleware* can search and present the local information such as local area shopping information, traffic information, or the customization information, recorded in local database that match the on demand conditions of the RFID tag user. In other words, the RFID user can be directly served with sufficient local area related information. If other further information needed, the *embedded server service middleware* can send the user's request to the remote main server to obtain the requested service or to the other business applications via Internet for extra serv‐ ice obtaining. At last, the user can gain the location-aware information or services via user interface. In opposition to *end user RFID tag*, when a user of *end user device with RFID System* actively scans the RFID tag of the commercial advertisement, the handheld device can send the scanned RFID tag information via wireless network or cellular mobile system to the local area server with *embedded server service middleware* embedded. Then, as the procedure of *end user RFID tag*, the *embedded server service middleware* searches for the requested services and transmits these services to the user's handheld device by wireless network or cellular mobile

In addition, the users can use *handheld device middleware application* to select the tag content recorded in handheld device database if needed. Then, the RFID API controls the RFID sys‐ tem embedded in the handheld device to re-write the content (such as UID) of the tag of the handheld device. At last, the RFID content requirement from other business applications or

In addition, the database can record the history of the user's requirements. The statistic user requirements can be used to classify that what kind of the service the user requests most. Next time the system can provide the personal services according to the classified results. In

The real test and verification is implemented as Figure 3. The implementation shows one shoot of the verification. When the user approaches the on demand placed RFID system, the *Embedded Service Middleware Platform* automatically presents the information corresponding the content or user's related information recorded in the RFID tag. For example, if a Taiwa‐ nese uses the RFID tag, the presentation of local area server will be based on traditional Chi‐ nese. But the local area server will provide English when a native English speaker user his

other words, the users can be served with the services they most pay attention to.

systems can be provided through the RFID tag of the handheld device.

mation to the local area server via Internet.

10 Radio Frequency Identification from System to Applications

system.

own RFID tag respectively.

Existing RFID applications on supply chain management (SCM) can record something about materials, goods, and products during production [38, 39]. An integrate system with RFID and SCM also can supplies new value-added services such as products secure protection and to query products record [40]. And integrating promising information technologies such as RFID technology, mobile devices-PDA and web portals can help improve the effective‐ ness and convenience of information flow in construction supply chain control systems [41]. In addition, RFID can be use in a lifecycle of a product to reduce the time which spend to find a product. Therefore, RFID is a technology to reduce the time to identified objects that can improve automation in the traceability management of Supply Chain.

In Warehouse management, many companies have used RFID technology replaced the Bar Code or QR Code as recognition of the key features. Because of the Bar Code and QR Code are limited in existing format companies decided to select a solution improving au‐ tomation in warehouse management. Then the RFID technology is an efficient technique to solve that problem. Company integrated RFID technology with warehouse manage‐ ment that is not only an electronic process solution but can provided customers with new services such as location information of products, search stock of products, and provide inventory information [42, 43].

In healthcare, RFID also can use to trace patients, blood sampling, drop management, etc. Kumiko Ohashi, SakikoOta, LucilaOhno-Machado, and HiroshiTanaka [44] developed a smart medical environment with RFID technology. This research used two types of frequen‐ cy on tracking system for tracking clinical intervention such as drug administrations and blood tests at the patient bedside. Furthermore, Chung-Chih Lin, Ping-Yeh Lin, Po-Kuan Lu, and Guan-Yu Hsieh [45] proposed a healthcare integration system for disease assessment and safety monitoring of dementia patients. The proposed healthcare integration system provides the development of an indoor and outdoor active safety monitoring mechanism.

Due to portable RFID tags and non-touched transmission, local area wireless application about disease management for tracking and collection data based on RFID system is pro‐ posed. In addition, an information platform which collects data from everywhere and stores the data in its database for the members of supply chain is needed and important. Every platform user can query and access some information from an information sharing platform via network. An information platform can store a lot professional data of a particular field. The platform also can integrate information from each region and has more powerful com‐

RFID Applications and Challenges http://dx.doi.org/10.5772/53368 13

The proposed application system structure is shown as Figure 4. The system infrastructure includes RFID system such as RFID tag, RFID reader, mobile RFID device, etc., and software framework such as database, *Environmental Affection Evaluation Method*, and *Disease Tracking Service* in cloud. The user application layer indicates the mobile RFID device which is used for inducting the RFID tag of local objects such as crops or livestock. The information read from the RFID tag by the RFID reader will be transmitted to the corresponding application and database in cloud. Considering the real implementation, *Environmental Affection Evalua‐ tion Method* and *Disease Tracking Service* can be established as the middleware of the whole system or the corresponding applications in cloud. When a user wants to query the informa‐ tion or obtain the disease warning, the proposed *Environmental Affection Evaluation Method* and *Disease Tracking Service* can notify the client user via network from cloud platform.

Generally, an RFID system includes RFID Tags, RFID Readers and Application pro‐ grams. An RFID tag is a digital storage device that used for identification and informa‐ tion recording. A Reader can access, read, or write data into RFID tags through electromagnetic induction. A user can only use the RFID tag without power consump‐ tion. In addition, the mobile device used in RFID system can be a Person Digital Assis‐ tant (PDA), a Person Computer (PC) or a laptop (Notebook), which executes the reading and writing actions via RFID systems (include software API and hardware). The middle‐ ware mainly manage and deal with the RFID event such as the RFID information sent to or from other systems. After receiving the message from RFID readers, the content of RFID tag can be identified. Then the RFID information will be transmitted and recorded in the database in cloud by *RFID Event Processing*. In addition, the corresponding infor‐ mation sent by *RFID Event Processing* is also presented by the user interface. The *RFID Event Processing* also properly manages and provides the information service for *Environ‐ mental Affection Evaluation Method* which analyzes and evaluates the affection degree of

After inducting the RFID, the information can be transmitted to the corresponding applica‐ tions and recorded into database in cloud. Each RFID tag will establish an individual object history about the location, resident time, environment state of the RFID tag when it was sto‐ raged, etc. To trace and track the potential diseased objects, the *Disease Tracking Service* for

puting for more information services.

the environmental factors.

client users is needed.

*2.3.2. Method*

Hence, due to that the RFID technology could provide some services with auto-identify such as administration of drops and samplings, safe monitoring of patients, process control in medical. These new type services can reduce the search time in administration of drops and samplings and human error in medical process. The major advantage of using RFID technol‐ ogy in medical is reduced the human error.

However, RFID applications on Supply Chain Management and Warehouse Management were provided static information as previously noted which helped to deal with problems af‐ ter accidents. Information on RFID systems was lacking warning data of preventing accidents [5]. To summarize, both Supply Chain Management and Warehouse Management are in‐ crease economic values of product. Those operations of management can be help to support product safety information and attribution of responsibility information for customer and en‐ terprise. When enterprise want reduce possible impaired factors to improve the value of product, the first thing should to do is disease management. In addition, disease management has two important methods which to find out the initial pathogen and reduce the spread of pathogens and the infection rate. The spread of pathogens and the infection rate decide the ef‐ fect areas and damages. Because of enterprise can economic damage control by detect symp‐ toms of product at early stages that will help to reduce cost of operation by itself.

For example, to improve the efficiency of management in cultivation, an *RFID Based Fuzzy Inference Algorithm for Disease Warning and Tracking via Cloud Platform* is proposed. Users could manage the cultivation history, related bio-information, and possible disease tracking. The proposed system modifies the traditional cultivation management system by several fields: 1) first, to shorten the processing time of object recognition in production operation; 2) second, to establish electronic records of production in production management systems; 3) third, to integrate supply chain managements with a central server and provide real-time environment monitoring and plant disease management services for users; and 4) last, to es‐ tablish an information platform to share with users.

Due to that the contents storage in the memory of RFID tag can be changed when users need. Furthermore, RFID can apply in recognition and also can work in hostile environment such as wet and dirty [26]. RFID provides large read range (or induction range) than Bar‐ code and QR code. Therefore, the RFID system can help to efficiently identify object which equips RFID tag even in non-uniform position. Besides, RFID tag is rewritable. User can re‐ move or rewrite the content of RFID tag when the induction happened between the RFID tag and the RFID reader. In order to overcome the environment factors of cultivation and the objects size, RFID is the solution that can suitable to solve these problems.

In recent years, transportation becomes faster with long distance and also causes more areas infected by disease more easily. After infectious disease influencing a mounts of areas, dis‐ ease management is more complex and ineffectual [6]. Therefore, quick disease control and prediction is important since it could help to reduce the cost and complex of disease man‐ agement. Hence, effective disease data tracking and collection of pathogens is necessary. Due to portable RFID tags and non-touched transmission, local area wireless application about disease management for tracking and collection data based on RFID system is pro‐ posed. In addition, an information platform which collects data from everywhere and stores the data in its database for the members of supply chain is needed and important. Every platform user can query and access some information from an information sharing platform via network. An information platform can store a lot professional data of a particular field. The platform also can integrate information from each region and has more powerful com‐ puting for more information services.

#### *2.3.2. Method*

and safety monitoring of dementia patients. The proposed healthcare integration system provides the development of an indoor and outdoor active safety monitoring mechanism.

Hence, due to that the RFID technology could provide some services with auto-identify such as administration of drops and samplings, safe monitoring of patients, process control in medical. These new type services can reduce the search time in administration of drops and samplings and human error in medical process. The major advantage of using RFID technol‐

However, RFID applications on Supply Chain Management and Warehouse Management were provided static information as previously noted which helped to deal with problems af‐ ter accidents. Information on RFID systems was lacking warning data of preventing accidents [5]. To summarize, both Supply Chain Management and Warehouse Management are in‐ crease economic values of product. Those operations of management can be help to support product safety information and attribution of responsibility information for customer and en‐ terprise. When enterprise want reduce possible impaired factors to improve the value of product, the first thing should to do is disease management. In addition, disease management has two important methods which to find out the initial pathogen and reduce the spread of pathogens and the infection rate. The spread of pathogens and the infection rate decide the ef‐ fect areas and damages. Because of enterprise can economic damage control by detect symp‐

toms of product at early stages that will help to reduce cost of operation by itself.

For example, to improve the efficiency of management in cultivation, an *RFID Based Fuzzy Inference Algorithm for Disease Warning and Tracking via Cloud Platform* is proposed. Users could manage the cultivation history, related bio-information, and possible disease tracking. The proposed system modifies the traditional cultivation management system by several fields: 1) first, to shorten the processing time of object recognition in production operation; 2) second, to establish electronic records of production in production management systems; 3) third, to integrate supply chain managements with a central server and provide real-time environment monitoring and plant disease management services for users; and 4) last, to es‐

Due to that the contents storage in the memory of RFID tag can be changed when users need. Furthermore, RFID can apply in recognition and also can work in hostile environment such as wet and dirty [26]. RFID provides large read range (or induction range) than Bar‐ code and QR code. Therefore, the RFID system can help to efficiently identify object which equips RFID tag even in non-uniform position. Besides, RFID tag is rewritable. User can re‐ move or rewrite the content of RFID tag when the induction happened between the RFID tag and the RFID reader. In order to overcome the environment factors of cultivation and

In recent years, transportation becomes faster with long distance and also causes more areas infected by disease more easily. After infectious disease influencing a mounts of areas, dis‐ ease management is more complex and ineffectual [6]. Therefore, quick disease control and prediction is important since it could help to reduce the cost and complex of disease man‐ agement. Hence, effective disease data tracking and collection of pathogens is necessary.

the objects size, RFID is the solution that can suitable to solve these problems.

ogy in medical is reduced the human error.

12 Radio Frequency Identification from System to Applications

tablish an information platform to share with users.

The proposed application system structure is shown as Figure 4. The system infrastructure includes RFID system such as RFID tag, RFID reader, mobile RFID device, etc., and software framework such as database, *Environmental Affection Evaluation Method*, and *Disease Tracking Service* in cloud. The user application layer indicates the mobile RFID device which is used for inducting the RFID tag of local objects such as crops or livestock. The information read from the RFID tag by the RFID reader will be transmitted to the corresponding application and database in cloud. Considering the real implementation, *Environmental Affection Evalua‐ tion Method* and *Disease Tracking Service* can be established as the middleware of the whole system or the corresponding applications in cloud. When a user wants to query the informa‐ tion or obtain the disease warning, the proposed *Environmental Affection Evaluation Method* and *Disease Tracking Service* can notify the client user via network from cloud platform.

Generally, an RFID system includes RFID Tags, RFID Readers and Application pro‐ grams. An RFID tag is a digital storage device that used for identification and informa‐ tion recording. A Reader can access, read, or write data into RFID tags through electromagnetic induction. A user can only use the RFID tag without power consump‐ tion. In addition, the mobile device used in RFID system can be a Person Digital Assis‐ tant (PDA), a Person Computer (PC) or a laptop (Notebook), which executes the reading and writing actions via RFID systems (include software API and hardware). The middle‐ ware mainly manage and deal with the RFID event such as the RFID information sent to or from other systems. After receiving the message from RFID readers, the content of RFID tag can be identified. Then the RFID information will be transmitted and recorded in the database in cloud by *RFID Event Processing*. In addition, the corresponding infor‐ mation sent by *RFID Event Processing* is also presented by the user interface. The *RFID Event Processing* also properly manages and provides the information service for *Environ‐ mental Affection Evaluation Method* which analyzes and evaluates the affection degree of the environmental factors.

After inducting the RFID, the information can be transmitted to the corresponding applica‐ tions and recorded into database in cloud. Each RFID tag will establish an individual object history about the location, resident time, environment state of the RFID tag when it was sto‐ raged, etc. To trace and track the potential diseased objects, the *Disease Tracking Service* for client users is needed.

Therefore, if the *Disease Tracking Service* finds the dangerous object, the corresponding histo‐ ry, members of supply chain, and the potential diseased that evaluated by *Environmental Af‐ fection Evaluation Method* can be notified and traced. In other words, no matter where the objects are, the *Environmental Affection Evaluation Method* can always give the probability val‐ ue of objects which indicate the potential diseased probability. By using the *Disease Tracking Service*, the location, warehouse, manager, etc., will be notified that how many objects with the different and individual potential diseased probability currently reside at or ever passed the place. Therefore, the object with high potential diseased probability can be discovered in

RFID Applications and Challenges http://dx.doi.org/10.5772/53368 15

early phase. Figure 5. presents the implementation of the system.

**Figure 6.** The implementation of tracing and tracking system based on RFID

warning for disease prediction.

The tracing and tracking system based on RFID system not only provide original services in supply chain or warehouse which includes the records of products for managing and query‐ ing, but also provide new services such as to obtain the potential probability of diseases and send the warning sign for users. Furthermore, the system can derive the possible disease in‐ fecting area for users to control and update the latest information of production for users to track and trace. In addition, the verification shows that the proposed system is realistic and can provide the public and personal services automatically. By using this innovation RFID system, users could get most information to prevent disease in agricultures that helps users to reduce the cost of production, control the range of disease occurrence, and providing a

**Figure 5.** The structure of RFID system with Cloud environment

Via *Disease Tracking Service*, customers or client users can obtain active and passive warning message. First, when a customer or client user uses the mobile RFID system to query the in‐ formation, the corresponding record in the past will be checked and sent back from the data‐ base in cloud platform. Then, the members of the supply chain can monitor and manage the state of objects. Second, if the specific object (crop or livestock) is found to be diseased, this object will be marked as the dangerous object. Then, according to the object history, the route, location, etc., where this dangerous object ever passed will be traced back. According to the structure presented in Figure 2, since the object history is established in cloud, the members of the supply chain can exchange the information via cloud. Therefore, the history of the dangerous object can indicate the information about place, location, resident time, etc. Therefore, if the *Disease Tracking Service* finds the dangerous object, the corresponding histo‐ ry, members of supply chain, and the potential diseased that evaluated by *Environmental Af‐ fection Evaluation Method* can be notified and traced. In other words, no matter where the objects are, the *Environmental Affection Evaluation Method* can always give the probability val‐ ue of objects which indicate the potential diseased probability. By using the *Disease Tracking Service*, the location, warehouse, manager, etc., will be notified that how many objects with the different and individual potential diseased probability currently reside at or ever passed the place. Therefore, the object with high potential diseased probability can be discovered in early phase. Figure 5. presents the implementation of the system.

**Database User Interface**

**Cloud**

14 Radio Frequency Identification from System to Applications

*Disease Tracking Service*

*Environmental Affection Evaluation Method*

**RFID Event Processing**

**RFID System and Reader in Factory/Farm or In Supply Chain**

**Figure 5.** The structure of RFID system with Cloud environment

**Middleware**

**Induction**

**RFID Tag**

Via *Disease Tracking Service*, customers or client users can obtain active and passive warning message. First, when a customer or client user uses the mobile RFID system to query the in‐ formation, the corresponding record in the past will be checked and sent back from the data‐ base in cloud platform. Then, the members of the supply chain can monitor and manage the state of objects. Second, if the specific object (crop or livestock) is found to be diseased, this object will be marked as the dangerous object. Then, according to the object history, the route, location, etc., where this dangerous object ever passed will be traced back. According to the structure presented in Figure 2, since the object history is established in cloud, the members of the supply chain can exchange the information via cloud. Therefore, the history of the dangerous object can indicate the information about place, location, resident time, etc.

**Products with RFID Tag embedded**

**User Application Layer**

**RFID System and Reader Embedded in Mobile Device**

**Figure 6.** The implementation of tracing and tracking system based on RFID

The tracing and tracking system based on RFID system not only provide original services in supply chain or warehouse which includes the records of products for managing and query‐ ing, but also provide new services such as to obtain the potential probability of diseases and send the warning sign for users. Furthermore, the system can derive the possible disease in‐ fecting area for users to control and update the latest information of production for users to track and trace. In addition, the verification shows that the proposed system is realistic and can provide the public and personal services automatically. By using this innovation RFID system, users could get most information to prevent disease in agricultures that helps users to reduce the cost of production, control the range of disease occurrence, and providing a warning for disease prediction.
