Date post: | 18-Dec-2015 |
Category: |
Documents |
View: | 213 times |
Download: | 0 times |
Fall 2006
Introduction to Introduction to RFIDRFID
Choong Seon HongChoong Seon Hong
Kyung Hee UniversityKyung Hee University [email protected]@khu.ac.kr
2Fall 2006
RFID InfrastructureRFID Infrastructure
CouplingTag
Antenna
Reader
RFID Middleware
Server
Host Server
3Fall 2006
Software ComponentsSoftware Components
Tag ReaderHost
ComputerNetwork
RFID System Software
RFID Middleware
Host Application
4Fall 2006
““Slap and Ship” ProcessSlap and Ship” Process
1. De-palletize cases
3. Enter # of cases
2. Scan SKUs
4. Print RFID case labels
Sequenceof
Operations
5. Apply labels manually
6. Re-palletize cases
7. Print RFID pallet labels
8. Read RFID tags on pallet
9. Print reports & ASNs
5Fall 2006
RFID Tag AnatomyRFID Tag Anatomy
Integrated Circuit (IC)
Antenna
Courtesy of Alien Technology
9Fall 2006
Barcode vs. RFIDBarcode vs. RFID
Barcode Requires line of sight between reader and label Can read many labels simultaneously but expensive Many symbologies – UPC-A, Code 39, UCC128, Unique serialized identity not standardized
RFID “No Human” data collection Does not require line of sight Can hold more data than bar codes Data can be changed or added to as a tag passes throug
h specific operations More effective in harsh environments (sealed tags) Reads many tags simultaneously (cheaply) Each tag uniquely serialized as standard (EPC)
10Fall 2006
:
01•0000A89•00016F•000169DC0
01•0000A89•00016F•000169DC1
01•0000A89•00016F•000169DC2
01•0000A89•00016F•000169DC3
01•0000A89•00016F•000169DC4
01•0000A89•00016F•000169DC5
01•0000A89•00016F•000169DC6
01•0000A89•00016F•000169DC7
:
Simultaneous read of
numerous tags-
Multiple transactions
posting
Transaction ProcessingTransaction Processing
RFID Portal
PO: 2456 PO Line: 12 SKU: 34878 Qty:1
One read of bar code
-
One transaction
posting
Bar Code Scanning
Automated Data Collection RFID Data Collection
11Fall 2006
Proximity technologyProximity technology
Presence known if within a certain radiusDo not know exactly the position
Cycle count Smart shelf
13Fall 2006
RFID & Product LifecycleRFID & Product Lifecycle
Distribution
Customers
Manufacturing
ProcessEfficiency
•Supply Chain Efficiency•Replenishment•Product Recall•Loss Prevention
•Track and Trace•Receiving•Cycle Count•Packing•Shipping•Interplant Transfers
•Track WIP•Monitoring/Time Stamp•Value-Added Processing•Lot id/Serialization
14Fall 2006
WalWal∗∗Mart MandateMart Mandate
RFID tags with EPCs(Eletronic Product Codes) are required on all pallets and cases Cases are defined as totes, reusable plastic containers or corrugated boxes Electronic ITEMS such as television set, stereo, or CD must be tagged.
Tag requirements EPC Global Class 0 or 1, moving to Class 1 Gen 2 when available A logo on the tag stating it is there
Reader accuracy requirements Dock doors: 100% on all pallet tags on forklift traveling at 5-7 mph Conveyors: <= 540 fpm, 6 inch gap between products, 100% at all orientatio
ns Information Processing
EPC compliant middleware that works with existing infrastructure, no ONS or PML
15Fall 2006
Why they want it?Why they want it?
Automated check-in Visibility of product movement from backroom to the
floor Eventual linkage to the POS (point of sale) Replenishment feedback to suppliers Reduction in personnel and increase in accuracy Ultimate goal – reduce “out of stocks”
The costs are borne by the supplier
16Fall 2006
1870s
1873Maxwell’s equations
published
1880s 1890s 1900s
1887Hertz experimentally
proved Maxwell’s equations
1905Einstein proves light
is a constant
1940s 1950s 1960s 1970s 1990s1980s 2000s
1942Friend or Foe
1999Auto-ID Center
MIT
Wal-Mart Mandate
2003
2003RFID used
By DoD Operation Iraq Attack
1989Toll CollectionBy the Dallas
North Turnpike
Late 1960s
Electronic Article Surveillance
(EAS)
RFID – Historical PerspectiveRFID – Historical Perspective
17Fall 2006
An implementation based only on the air interfaceAn implementation based only on the air interface
18Fall 2006
RFID InfrastructureRFID Infrastructure
CouplingTag
Antenna
Reader
RFID Middleware
Server
Host Server
19Fall 2006
Software ComponentsSoftware Components
Tag ReaderHost
ComputerNetwork
RFID System Software
RFID Middleware
Host Application
20Fall 2006
RFID System SoftwareRFID System Software
Read/Write Basic functions of a tag
Anti-Collision Establish cooperation between tags and readers Algorithm to sequence tag response to reader’s request
Error Detection/Correction Encryption, Authorization, and Authentication
(Security) Secure data exchange
21Fall 2006
RFID MiddlewareRFID Middleware
Monitors device health and statusManage RFID-specific infrastructure and data
flow Encoding, collection, processing, filtering and
aggregation of data transmitted by tags and Data normalization
• Different formats• Communication protocols
Fall 2006
How to apply a proximity technology to How to apply a proximity technology to resolve a business problem?resolve a business problem?
23Fall 2006
RFID interrogation zoneRFID interrogation zone
“Choke point” Any point where the material flows in a specific
direction and a business process can be associated to it
Business processes Receiving Shipping Raw goods transfer Etc…
26Fall 2006
Dock door setupDock door setup
What you need! High-powered UHF system Ample power to the antennas in the interrogation zone Reader set to constantly poll for tags
Setup Decide on the area to be covered and the number of
antennas to use Determine where to place the antennas Install them and make sure they are canted Perform a thorough path loss contour mapping (PLCM)
27Fall 2006
Dock door setupDock door setup
121.50
119.00
36.00
6 3.00
1 8.67
1 2.93
3 6.00
0 6.00
LightStack
Bollard
DC600 RFIDPortal System
30Fall 2006
Shrink-wrap stationShrink-wrap station
Best results achieved for reading cases on a pallet
Turntable of the stretch-wrap machine is constantly changing the location and orientation of the tags, giving the readers many attempts to read each of the tags as the pallet spins in the same spot
31Fall 2006
Smart shelfSmart shelf
HF (13.56 MHz) – Near Field -1 to 6 inchesLess affected by metals or liquidsState change as reading modeHF tags must be perpendicular to the
magnetic field for couplingFaraday’s law at work here
33Fall 2006
PortalsPortals
Anywhere where you have a “choke” point Doorway portals
Item-level tracking Security and personnel access Asset tracking Electronic Article Surveillance (EAS)
Security portals Sensitive secure areas of Government facilities Active RFID asset tracking in hospitals
Luggage portals Airports
Car or bus portals Tollroad booth Commuter lanes
34Fall 2006
1. De-palletize cases
3. Enter # of cases
2. Scan SKUs
4. Print RFID case labels
Sequenceof
Operations
5. Apply labels manually
6. Re-palletize cases
7. Print RFID pallet labels
8. Read RFID tags on pallet
9. Print reports & ASNs
Tag and ShipTag and Ship
35Fall 2006
Inline production applicationInline production application
No tangible ROI on tag and ship Migrate process upstream to production line Benefits
Eliminate breakdown and rebuild of pallets Automatic work-in-process tracking Better controls for companies fulfilling orders from inventory and
then manufacturing to those order volumes May bring greater speed and accuracy to quality assurance and
shipping processes
36Fall 2006
Other applicationsOther applications
Ski resorts RFID wrist bands w/ dollar amount Tracking of individuals and their preferences Diminished lines for the ski resort Counterfeiting eliminated
Law enforcement Tracking imports Controlling access to secure areas Tracking evidences Drug shipments
Pharmaceuticals Theft and counterfeiting
• Viagra Diversion
• Tiered pricing structures
37Fall 2006
Additional Business ApplicationsAdditional Business Applications
Hazardous materials and recallsWarranty verification and returnsManufacturingMaintenance
Airline industry• Boeing• Airbus
38Fall 2006
Keyless Remote
EAS
ProductAuthentication
Ticketing
RFID Sample ApplicationsRFID Sample Applications
Airline baggage ID Sports Timing
Document Tracking
Express Parcel ID
EPC Supply Chain
Highway Toll Collection
Smart Cards
and many more…
41Fall 2006
Tag characterization testTag characterization test
1. Connect a single antenna to a reader through an attenuator2. Mount the antenna 2 feet away from a flat surface like your SKU
(stock keeping unit) testing stand3. To characterize a certain type of tag, gather at least 100 of the same
type of tags4. Test the tags one at a time under the antenna for readability. Slowly
turn down or attenuate the signal until the tag can no longer be read and record the results
5. When you have complete data for 100 tags, set the antenna up on the edge of your grid that’ furthest from the direction you will be positioning the tag, so you can get as far away from the reader as possible
6. Test several of the tags, one at a time, that were of the highest attenuation value and see how far they can be read and then repeat the process for each of the different tag attenuation values
43Fall 2006
Tag testingTag testing
Tag is the only thing that should vary during the test
Isolate the performance of the tag Location on the case Orientation (vertical, horizontal, random)
Examine the material composition of the items in the case
44Fall 2006
Physics and tag performancePhysics and tag performance
Absorption (loss)Reflection/refractionDielectric effectsComplex propagation effects
Standing waves Multi-pathing
45Fall 2006
Material effects on RFID communicationsMaterial effects on RFID communications
Material Composition Effects on RF Signals
Corrugated cardboard Absorption from moisture
Conductive liquids Absorption
Glass Attenuation (weakening)
Groups of cans Multiple propagation effects; reflection
Human body/animals Absorption; detuning; reflection
Metals Reflection
Plastics Detuning (dielectric effect)
47Fall 2006
Best spot for testingBest spot for testing
1. Determine whether the outside packaging material is RF transparent
2. If the packaging material is RF transparent, open the container and visually inspect the contents
3. Determine where the contents fit on the RF pyramid4. Rank eight or ten different areas of the object on their
positions in the RFID pyramid based on how close to the peak they are
5. Start your tag testing by using the highest ranked (most RF-friendly) areas
48Fall 2006
Label PlacementLabel Placement
Reader Location
Customer Requirements
Package Contents Pallet Loading
Packaging Materials Package Orientation
Handling RequirementsPackage Design/Branding
51Fall 2006
Selecting tags to testSelecting tags to test
Not all tags are created equal… To get a statistically significant result, test 100 tags of each ty
pe. Method
1. Activate the reader and set the attenuator to its lowest output power2. Place a single tag in the filed generated by the reader in autoread mode3. Manually adjust the attenuator to increase it power drain on the signal returning fro
m the tag4. When the tag no longer can be read, record the corresponding value on the attenu
ator for the tag you’re testing5. Repeat steps 1 through 4 for all 100 tags6. Calculate the average attenuation value and standard deviation for the 100 tags tes
ted7. Grab tags that have a tested attenuation value close to the calculated average
52Fall 2006
Tag performance index (TPI)Tag performance index (TPI)
Evaluate performance across all channels in a particular frequency band
Three critical performance measures Percent of successful reads Dispersion of reads across the ISM band Ratio of nulls, or poor performers, to successful reads
Measurements are entered in a simple formula that yields a TPI (range from 0 to 100)
53Fall 2006
Tag test setupTag test setup
Equipment Fixed-mount RFID reader and single circularly polarized antenna Tag testing software Wooden or plastic table Measuring tape
Set up1. Position the antenna and the reader at least 25 feet from any
obstructions that may interfere with the interrogation zone2. Mount the antenna approximately 3 feet off the ground in a fixed
location3. Mark off 1-foot measurements heading directly out from the
antenna4. Position the table with the tagged product directly in front of the
antenna, 1 foot away
54Fall 2006
Tag testTag test
Three methods1. Collect Frequency Response Characterization
(FRC) at 3 different distances – 1, 3, and 5 feet
2. Move the tagged object farther and farther away until it cannot be read and then compare different distances with each other
3. Take reader threshold power measurements
55Fall 2006
Frequency Response Characterization (FRC)Frequency Response Characterization (FRC)
Goal:Find the optimal product/tag combination that works well across the entire RFID spectrum of choice
Required: Software tool Signal generator Spectrum analyzer or reader
Test Pick 50 channels at random Issues 100 read commands Record number of successful read cycles Record number of successful tag wake-ups Repeat the same test for different tag placements and distances
56Fall 2006
FRC Results ExampleFRC Results Example
% Reads @ Distance
Tag Type Placement 1’ 3’ 5’
I Tag 1 98.36% 68.42% 24.64%
2 97.36% 17.72% 1.78%
3 98.54% 1.12% 0.00%
Strip 4 98.10% 40.18% 4.54%
5 97.92% 3.76% 0.00%
6 97.92% 1.10% 0.00%
Squiggle 7 99.46% 71.40% 27.58%
8 95.72% 71.74% 22.15%
9 95.72% 25.48% 0.00%
10 99.36% 5.38% 0.00%
11 95.64% 77.82% 14.22%
62Fall 2006
Reader typeReader type
Hand-held Acceptable if you have only one or two tags per read location No reader with high power output and long battery life available
Mobile Printer, reader and bar code scanner can be in one easily movable
solution Communites using 802.11 back to main database
Fixed location Located at choke points Ability to automatically count and capture data without human interv
ention
64Fall 2006
Reader evaluation criteriaReader evaluation criteria
Determine all the costs involvedTest reader performanceAssess connectivity
Network connectivity Manufacturer’s configuration software Manufacturer’s data export software Upgradeability
Evaluate how well a reader can be fine-tuned
65Fall 2006
Costs involvedCosts involved
Purchase price Installation costsMaintenance costs
Replacing readers Upgrading for new protocols and standards Changing configurations Replacing damaged antennas
66Fall 2006
Assess connectivityAssess connectivity
RS-232 Well-known reliable system for short-range wired communications Communications speeds are low (9600 bps to 115.2 Kbps) Length limited to 30 meters No error control Point-to-point communications system
RS-485 Similar to RS-232 Greater cable lengths (up to 1200 meters) Higher speeds (up to 2.5 Mbps Bus protocol
Ethernet Connectivity solution of choice for RFID Ethernet infrastructures very common Speed sufficient for RFID readers Reliable communication protocol: TCP/IP TCP/IP packets can only travel 100 meters
67Fall 2006
Reducing cabling needsReducing cabling needs
Wireless connectivity Eliminates the need for a separate network conne
ction Need power IEEE 802.11 Wi-Fi
Power over Ethernet Power and connectivity delivered over the same C
AT-5 cable Maximum power output of 15.4 watts
68Fall 2006
Reader fine tuningReader fine tuning
Forward compatibility with future tag protocols Make sure your reader is upgradeable to Gen 2.0 via software or firmware u
pgrade Get written commitment from vendor
Tunability Acquisition cycle design (timing and number of wakeup, read, and sleep co
mmands) Acquisition frequency Timing No standard configuration tools across readers Experiment with various settings to find the common setup to use in your op
erations Flexible power output
Many tagged items have a maximum performance threshold well below the maximum power output of a reader
Minimize power output for each application
69Fall 2006
Reader fine tuningReader fine tuning
Clean RF output RFID tags have simple timing device to synchronize with the carrier
signal emitted by the carrier Signal phase variance ➙ Trouble “Splatter” – Undesirable additional frequencies generated
by the reader Antenna programmability
Multiplexing• No two antennas are ever active at the same time• Avoid interference and data collision
Change sequence to fit needs of your application• Default – 1,2,3,4,1,2,3,…• Custom – 1, 2 ,3,3,3,4,1,…
Always design the system for the most challenging use case
70Fall 2006
Installing a Reader and AntennasInstalling a Reader and Antennas
1. Mount the readera. As far from harm’s way as possibleb. Clean and dry place with normal temperaturec. Six-inches clearance all around the reader for ample airflow and easy cablingd. Away from any source of EM wavese. Consider a ruggedized RFID rack
2. Mount and connect the antennasa. Decide the locations of the antennasb. Map the RF path loss contourc. Mount the antennas and protect them from people or machineryd. Attach the antenna in sequential order
3. Power up the readera. Similar to booting up a PCb. Goes through internal verificationsc. Put a tag in front of the antenna to verify if the reader can read it – Light flashes on
4. Test the interrogation zone for RF path loss
91Fall 2006
Reader power and path loss Reader power and path loss
Reader transmit power (Pr) of 30 dBm
Reader receiver sensitivity (Sr); -80 dBm or 10-11 watts
Reader antenna gain (Gr); 6 dBi
Tag has a power requirement of -10 dBm, or 100 microwatts Tag antenna has a gain (Gt) of only 1 dBi
The tag’s has a backscatter efficiency (Et) of -20dB
λ = 33 cm
P
2
2
4 d
GGPP trrt
4
2
t
trr
P
GGPd
92Fall 2006
Basic distance testBasic distance test
1. Find location with little to no AEN2. Affix a RFID tag to an empty cardboard box3. Layout measurement grid outward from reader4. Set up the reader in the factory default setting (usually full
power) with a single antenna attached5. Mount the antenna 3 feet off the ground6. Put the cardboard box on the SKU table7. Measure the number of reads over a 60-second time
period at 2, 4, 6, 8, 10 and 12 feet away from the antenna8. Record the results from each reader and compare the
numbers
93Fall 2006
Conveyor testConveyor test
Specific speed conditions required by various mandates 600 fpm 6 inches separation between each case
Expensive to implement a loop conveyor for testing Upwards of $200,000. – High acceleration Build up acceleration and speed over time
94Fall 2006
Running a conveyor testRunning a conveyor test
Set up the readers in their fastest polling mode and read at gradually increasing speeds (400, 600 and 1200 fpm)
Test a baseline RF-friendly product, such as cardboard box
Test around your most RF-unfriendly itemsTest your most representative or popular
productsMeasure at least 50 passes
95Fall 2006
Interpreting the resultsInterpreting the results
Control variables Speed Product
Dependent variable Average number of successful read cycles completed per pass
Normalized the data for each reader Raw data for each product divided by baseline data (empty cardboard
box) Eliminate all firmware- and software related variables Compare each reader performance against its own unique baseline
Note: Make sure you use the same tags on the same cases of products for all readers involved eliminating case and tag variance
96Fall 2006
ResultsResults
PAPER
0 0.5 1 1.5
400
600
1200
Sp
ee
d (
fpm
)
Relative Performance
SAMSys
Symbol
AWID
Alien
METAL
0 0.2 0.4 0.6 0.8 1 1.2
400
600
1200
Sp
ee
d (
fpm
)
Relative Performance
SAMSys
Symbol
AWID
Alien
97Fall 2006
Test for FCC ComplianceTest for FCC Compliance
1. Set the power of reader to maximum (should be 1 watt)2. Set up the spectrum analyzer with a center frequency of 915
MHz and a span of 50 MHz so that you can record all activity from 865 to 965 MHz
3. Monitor the reader for 60 minutes and keep the hold lock ON in your spectrum analyzer to record all the read points
4. Look for any signals outside the 902-928 MHz range
105Fall 2006
Secrets of Read SuccessSecrets of Read Success
Avoid cross talk Adjust power output Utilize reader triggering Use software to coordinate readers
Ensuring high-speed reads Tune the reader acquisition mode Change how the antennas are pointed
Executing full pallet reads Place tags on the outer cases of a pallet Adjust antenna sequencing to focus RF power on challenging
areas Tune the reader acquisition mode
107Fall 2006
RFID System SoftwareRFID System Software
Read/Write Basic functions of a tag
Anti-Collision Establish cooperation between tags and readers Algorithm to sequence tag response to reader’s request
Error Detection/Correction Encryption, Authorization, and Authentication (Security)
Secure data exchange
108Fall 2006
Why a middleware?Why a middleware?
Tag and reader physics solves only the problem of being able to capture RFID data
You must process the incoming RFID data and intelligently integrate it into your business applications
Reasons Not all of the incoming RFID data is valuable Not all readers speak the same language Different RFID information needs to be passed off to different
applications and data stores
109Fall 2006
Middleware capabilitiesMiddleware capabilities
Reader and device management Configure, deploy, and issue commands directly to the readers
Data management Filter and route data to appropriate destinations
Application integration Messaging, routing and connectivity features to integrate RFID data into existing host systems (WMS, SCM,
ERP and CRM) SOA
Partner integration Sharing RFID data with partners to improve collaborative processes
Process management and application development Orchestrate RFID-related end-to-end processes No human involvement
Packaged RFID content Routing logic Product data schemas Integration with RFID-related processes like shipping, receiving and asset tracking
Architecture scalability and administration Dynamically processing loads across multiple servers Reroute data when server fails
110Fall 2006
RFID MiddlewareRFID Middleware
Monitors device health and statusManage RFID-specific infrastructure and data
flow Encoding, collection, processing, filtering and
aggregation of data transmitted by tags and Data normalization
• Different formats• Communication protocols
113Fall 2006
Tag Types and ApplicationsTag Types and Applications
Tag Type Advantages Disadvantages Application
Active Greater read range,
memory capacity,
continuous signal.
Batteries require maintenance.
Larger size.
Used with high-value
asset tracking
Semi-passive Greater read range,
longer battery life
Battery wear
and expense.
Reusable containers
and asset tracking
Passive Read/Write Longer life, multiple
form factors, erasable
and programmable
Time and expense
to program
Case & pallet applications.
Approved for use
with Wal-Mart.
Passive WORM Suited for item
identification,
controllable at the
packaging source
Limited to a few
re-writes, replacing
existing data with
new data.
Case & pallet applications.
Approved for use
with Wal-Mart.
Passive Read Only Simplest approach Identification only,
no tracking updates
Case & pallet applications.
Approved for use
with Wal-Mart.
116Fall 2006
Classification of passive and active tagClassification of passive and active tag
Characteristics Passive RFID tag Active RFID tag
Power Source Provided by a reader Inbuilt
Availability of power Within the field of reader
Continuous
Signal Strength (Reader to Tag)
High Low
Signal Strength (Tag to Reader)
Low High
Communication range
< 3meters >100 meters
Tag reads < 20 moving tags @ 3mph in few seconds
>1000 moving tags @ 100mph in 1 sec
Memory 128 bytes 128 Kbytes
Applicability in supply chain
Applicable where tagged items movement is constrained
Applicable where tagged items movement is variable and unconstrained
121Fall 2006
Devices and interfaces that are used by Devices and interfaces that are used by Active RFIDActive RFID
Source: IDTechEx.
122Fall 2006
FrequenciesFrequencies
315 to 433 MHz Most popular
2.45 GHz Increasingly important Suitability for RTLS ZigBee WiFi Blue Tooth
13.56 MHz Near Field Communication NFC Semi-passive RFID sensor devices
123Fall 2006
Applications of active RFIDApplications of active RFID
Condition monitoring tags, asset tags, RTLS, etc.
Animals, people and thingsAnimals, farming, research, libraries, archiving, leisure, manufacturing, financial and other
VariousVariousSecure access/other security and safety
Active, active with sensing, RTLS, SAL
People, assets, conveyances, vehicles
Healthcare
Smart seals, RTLS, RFID with sensing
Assets, consumables, conveyances, vehicles
Postal and Courier
Air industry
SAL, e.g. self-adjusting use by date, in-transit condition monitor
Items, assets, conveyances, vehicles
Consumer goods and retail
Smart wrist and ankle bandsPeoplePrison (correctional facility) and parole service
Key fobs, etc., active with sensing, RTLS, SAL
Vehicle, premises and computer access, vehicles, ticketing, assets
Passenger transport/automotive
Active, active with sensing, RTLS, SAL
Items, assets, conveyances, vehicles
Other Logistics
Smart seals and RTLSIntermodal containers, etc.Smart and Secure Tradelanes global initiative
Smart seals, RTLS, RFID with sensing
Assets, consumables, conveyances, vehicles
Military
TagsLocationApplication
Condition monitoring tags, asset tags, RTLS, etc.
Animals, people and thingsAnimals, farming, research, libraries, archiving, leisure, manufacturing, financial and other
VariousVariousSecure access/other security and safety
Active, active with sensing, RTLS, SAL
People, assets, conveyances, vehicles
Healthcare
Smart seals, RTLS, RFID with sensing
Assets, consumables, conveyances, vehicles
Postal and Courier
Air industry
SAL, e.g. self-adjusting use by date, in-transit condition monitor
Items, assets, conveyances, vehicles
Consumer goods and retail
Smart wrist and ankle bandsPeoplePrison (correctional facility) and parole service
Key fobs, etc., active with sensing, RTLS, SAL
Vehicle, premises and computer access, vehicles, ticketing, assets
Passenger transport/automotive
Active, active with sensing, RTLS, SAL
Items, assets, conveyances, vehicles
Other Logistics
Smart seals and RTLSIntermodal containers, etc.Smart and Secure Tradelanes global initiative
Smart seals, RTLS, RFID with sensing
Assets, consumables, conveyances, vehicles
Military
TagsLocationApplication