Tag: rfid technology

Radio Frequency Identification (RFID) is a product identification method that relies on storing and remotely retrieving data using RFID tags. This technology aids primarily in the accountability and identification of product. Unlike UPC bar codes, RFID technology does not require contact or line of sight for communication. This system enables automatic identification of any material object or inventory item without scanning individual labels or tags.

The RFID tags are integrated circuits that include a small antenna, using electromagnetic fields to transfer data. The tagging system includes the tag itself, a read/write device, and a host system application for data collection, processing, and transmission. The RFID reader transmits an encoded radio signal to the tag. The tag receives the message and then responds with its identification and other data. This may simply be a unique tag serial number, or may contain product-related data such as a stock number, lot or batch number, or other specific information. Since tags have individual serial numbers, the RFID system design can discriminate among several tags that might be within the range of the RFID reader and read them simultaneously.

[text ad for Loss Prevention Technology free report]

RFID tags that contain their own power source are known as active tags. An active tag has an on-board battery and periodically transmits its ID signal. Active tags have more memory and can be read at greater ranges. Those without a power source are known as passive tags. A passive tag is cheaper and smaller because it has no battery. This type of tag is briefly activated by the radio frequency scan of the reader. The electrical current is small—generally just enough for transmission of an ID number.

Systems are flexible and adaptable, able to read large amounts of tagged items at once and allowing for various applications. RFID tags can be applied to or incorporated into a product, allowing for various applications. They are typically small enough that they are not easily noticeable and therefore can be placed on many types of objects. This technology is continuing to grow in use and application.


5 Omni-channel Retailing Examples in 2018

5 Omni-channel Retailing Examples in 2018

As online-only retailers continue to see expanded success, traditional brick-and-mortar stores must turn to new strategies to keep up with customer demand. Today’s retail environment demands that the customer shopping journey be a seamless one as it transitions from a physical store to a smartphone app to an interactive catalog (or   Read More


The ROI for RFID Technology in Retail

The ROI for RFID Technology in Retail

Over recent years, we’ve witnessed a resurgence of interest and substantial growth in the use of radio frequency identification (RFID) technology in retail—a veritable RFID renaissance—with more than six billion tags used in 2016 alone, not just in apparel, but for other categories and uses as well.

We wanted to find   Read More


Use Cases for RFID Inventory Control

Use Cases for RFID Inventory Control

A 2014 survey of 120 major retailers polled by Chain Link Research found improved inventory accuracy, which translated into reduced out-of-stock and better on-floor availability of merchandise, was the number-one reason for implementing an RFID inventory control program.

According to Su Doyle, former IoT and RFID industry program lead for Checkpoint,   Read More


The Reinvention of Retail Stock Management

The Reinvention of Retail Stock Management

Everyone knows that the first rule of managing inventory shrink is being able to measure it. This means distinguishing between known and unknown loss and between malicious and non-malicious reasons for stock not being where it should be. And in an industry where loss prevention practitioners are increasingly more commercially   Read More


RFID Blocking Wallets: Are They Necessary?

RFID Blocking Wallets: Are They Necessary?

Radio frequency identification (RFID) skimming is a form of digital theft which enables information from RFID-equipped credit cards to be read and duplicated. It can be used as a form of wireless identity theft or credit card theft.

Typically, it involves the illegitimate reading of RFID-enabled credit cards (or other devices)   Read More


Wrestling with Total Loss

Wrestling with Total Loss

In 2017, Adrian Beck, professor in the criminology department at the University of Leicester, published a piece in Security Journal outlining a new conceptual typology regarding loss. Beck argues that “shrink” is an antiquated term that lacks a clear definition in the retail industry. [Editor’s Note: Beck published a piece   Read More