Utilizing application- and data fact identifiers for structured

Jun 16, 2005 - Complexity and cost estimation. Product data. Create. Use. Product data contract. What would an open trust and relationship model look like?
717KB taille 3 téléchargements 151 vues
Utilizing application- and data fact identifiers for structured, RFID-based data communication Dieter Uckelmann Email: [email protected]

Folie 1

XX.XX.2007 RFID Academic Convocation

Basics – data on tag ƒ Advantages of RFID compared to optical identification ƒ No line of sight required ƒ Bulk reading ƒ Large memory possible ƒ Data can be changed and added Not a focus of the EPC network as it is today

„Based on a research by IDC, 2/3 of the companies already using RFID or planning to do so only want to store a product identification number. Therewith, the advantages of this marking method (RFID) above traditional barcode are not utilized at all.“ (Computerwoche 16.06.2005)

Folie 2 RFID Academic Convocation

What kind of data may be stored on a tag? ƒ Existing company or branch-specific identification numbering schemes in addition to international identification number schemes ƒ Level indicator (e.g. level 1 – product, level 2 – packaging, level 3 – case,…) ƒ Structured static data (e.g. lot, production line, addresses…), ƒ Add and change data throughout the logistic process (e.g. path and routing information), ƒ Add and change data throughout product life-cycle (e.g. recycling data, software revision levels), ƒ Collect sensor data (e.g. temperature), ƒ Store processed data (e.g. throughput data, remaining shelf life) Folie 3 RFID Academic Convocation

Obstacles concerning the „Internet of Things“ Level

Obstacle

Cross supply chain business and legal issues

ƒ

ƒ ƒ Technical integration

ƒ

Competition instead of cooperation (reluctance to share data across the supply chain) Limited availability of compliant partners Regional legal requirements

ƒ

Complexity and cost of infrastructure (as well as investment in existing infrastructure) Vulnerable to change

Semantics

ƒ

Branch- and company specific needs

Syntax

ƒ

Fragmentation of standards

ONS, PML, …

ƒ

Missing dissemination

Data transmission and security

ƒ

Complexity and cost of trusted transmission for business relevant data Folie 4 RFID Academic Convocation

Automation level vs. need of collaboration and trust EPC network

EDI and automated balancing with RFID EDI E-Mail

n to n

Fax

1 to 1 1 to 1 1 to 1

Open trust and relationship model required

Need of collaboration and trust

Product data contract required

1 to 1

Automation level Folie 5 RFID Academic Convocation

Product data contract (1 to 1)

Product data

Create

Use

Product data contract

What would an open trust and relationship model look like?

ƒ Data contract contains: ƒ Process information ƒ Relevant people ƒ Appoint data producer and data user ƒ Define data quality ƒ Define data exchange intervals ƒ Push- or pull of information ƒ Specify data exchange infrastructure ƒ Used soft- and hardware ƒ Interface definition ƒ Data security ƒ Complexity and cost estimation Folie 6

Based on: Schichtel 2002 RFID Academic Convocation

Possible solution – go back one step ƒ Make use of the data storage capacity of RFID ƒ Adopt existing standards ƒ ISO / IEC 15434 Information technology — Automatic identification and data capture techniques — Syntax for high-capacity ADC media ƒ Example: [)>RS05GS00390123456789012345GS11310107GS13010207GS312111GS313122GS32023300RSEOT

ƒ EAN/UCC application identifier, Fact data identifier or text element identifier (ISO / IEC 15418)

ƒ Utilize existing infrastructure (EDI) ƒ Stick to 1 to 1 relationship models and corresponding product data contracts

Folie 7 RFID Academic Convocation

Market offerings

64

Impinj

96

TI

128

STMicroelectronics

User Memory [bit] 224

NXP

1024

Atmel 0

200

400

600

800

1000

1200

HF-Tags: up to 10 kBit Intelleflex: 64 kBit

If you consider Moore‘s law, this is just the beginning! Folie 8 RFID Academic Convocation

Our approach Step 1

Step 3 Step 2

ƒ Writing: ƒ Step 1- Choose identifier scheme ƒ Step 2 - Select wanted identifiers / data fields ƒ Step 3 - Enter data ƒ Step 4 - Structure data string according to ISO 15434 ƒ Step 5 - Write data to tag ƒ Reading ƒ Automated interpretation of used identifiers Folie 9 RFID Academic Convocation

Advantages ƒ ƒ ƒ ƒ ƒ ƒ ƒ

No online connection needed to access data Readable by anyone using the same standards Compatible to barcodes license plates / shipping labels Branch- and company specific data may be stored on tag Existing EDI-infrastructure may be used No EPCIS integration required Data access (tag) is limited to the supply-chain stakeholders in close proximity to the logistic objects ƒ No open trust and relationship model needed

Folie 10 RFID Academic Convocation

Challenges and solution approaches 1. Read / write times (easily 3 to 5 seconds with a handheld reader)

Adjust processes?! 2. Limited user memory (only NXP with Gen2 available) / data overhead

Compression?! 3. Incomplete transmission

Read check?!

Uncompressed Compressed 32 Byte

57 Byte

52 Byte

60 Byte

62 Byte

60 Byte

72 Byte

59 Byte

132 Byte

62 Byte

272 Byte

64 Byte Folie 11 RFID Academic Convocation

What‘s missing? ƒ Indicator for user memory ƒ Standardized structure for Gen2 user memory (now vendor defined) ƒ Data standards for sensor data / dynamic data ƒ Data standards for processed data (e.g. remaining shelf life) Thank you for your attention Dieter Uckelmann Phone: ++49 421 218 5550 [email protected]

http://www.logdynamics.de/ Folie 12 RFID Academic Convocation