Skip to main content

Classification and characteristics of RFID middleware

Looking at the current variety of RFID applications, the first question companies want to ask is: "How do I connect existing systems to these new RFID readers?" The essence of the problem is the problem of enterprise applications and hardware interfaces. Therefore, permeability is the key to the entire application. Properly capturing data, ensuring the reliability of data reads and efficiently transferring data to back-end systems are issues that must be considered. The traditional application and application data transparency is solved through the middleware architecture, and various Application Server applications are developed. Similarly, middleware architecture design solutions are also an integral part of RFID applications. A very important core technology.


RFID middleware acts as an intermediary between RFID tags and applications. A set of general purpose application programming interfaces (APIs) provided by the middleware on the application side can be connected to the RFID reader to read the RFID tag data. Thus, even if the database software or the back-end application storing the RFID tag information is replaced or replaced by another software, or the type of the read-write RFID reader/writer is increased, the application side is not required to be modified, and many-to-many connection maintenance is omitted.

RFID middleware is a message-oriented middleware (MOM). Information is transmitted from one program to another in the form of a message. Information can be transmitted asynchronously, so the sender does not have to wait for a response. Message-oriented middleware not only includes the ability to communicate information, but also the ability to interpret data, security, data broadcasts, error recovery, locate network resources, find cost-compliant paths, determine messages and prioritize extensions, and debug extended services. 

RFID middleware can be divided into two types from architecture:
Application-centric (Application Centric)
Use the API provided by the RFID Reader vendor to directly write the Adapter of a specific Reader to read the data in the Hot Code mode and transfer it to the application or database. The backend system implements the purpose of the backend system or service connection.

Architecture-centric (Infrastructure Centric)
With the increasing complexity of enterprise application systems, enterprises can not load Adapter for each application in HotCode mode, and at the same time face the problem of object standardization, enterprises can consider the RFID middleware of the standard specifications provided by the manufacturer. In this way, even if the database software storing the RFID tag information is replaced by another software, or the type of the RFID reader that reads and writes the RFID tag is increased, the application side can cope without modification.

Comments

Popular posts from this blog

RFID Technology Provides Strong Scientific and Technological Support for the Service Guarantee of the 2022 Winter Olympics

​ As the only official entry and exit port for the Beijing Winter Olympics, the   use of RFID   and other technologies to collect and share transportation data between the Capital Airport and the three Olympic villages can make the arrival and departure of luggage just like receiving and sending express delivery. Using   RFID readers ,   RFID tags   and a complete   AIDC system   to perform comprehensive data management of athletes' luggage,the whole process of tracking can not only provide reliable tracking and monitoring means for the support unit, but also provide a transparent and convenient information acquisition channel for athletes, etc., and provide strong scientific and technological support for the service guarantee of the 2022 Winter Olympics. (Some of the pictures and text above are excerpted from Capital Airport Group Co., Ltd. public account)

Wal-Mart Will Expand RFID Applications To Improve Its Inventory Accuracy

  It is reported that Wal-Mart's headquarters has notified suppliers to expand its   RFID e-tags   to some new product categories. As of September, these newly expanded products will carry   R FID e-tags   on Walmart store shelves. The new areas of expansion include the following: 1. Consumer Electronics (such as TV, xbox) 2. Wireless Devices (such as mobile phones, tablets, accessories) 3. Kitchen And Dining 4. Home Decoration 5. Bathtubs And Showers 6. Storage And Organization 7. Car Battery ... As early as 2005, Wal-Mart required its top 100 suppliers to adopt RFID technology. The introduction of RFID tags has further increased the efficiency of Wal-Mart's supply chain; previously it took hours for all retail store staff to check what's on the shelf, but now it can be done in 30 minutes. Automated workflows based on RFID technology can automatically place orders, sort and screen. After using RFID technology, the system automatically generates electronic order...

RFID Technology Optimizes Self-service in Restaurants

Smokin' Oak Wood-Fired Pizza & Taproom is a growing franchise that combines a pizzeria with a self-serve bar wall, offering fast casual dining across the United States. The company operates five stores and has plans to expand as many as 75 stores over the next few years. The company was originally designed to offer the old-fashioned way of ordering food—with the help of a cashier or bartender at a traditional bar. But its Omaha store offers a self-serve pouring booth powered by RFID technology. The company's CEO, Matt Mongoven, said the model will be replicated in all subsequent stores. The self-service system in this self-service pouring booth utilizes RFID self-pouring t echnology . Pizza and self-service tap facilities are under one roof. When customers arrive, the cashier asks if they would like to use the self-filling bar wall. If they answer "yes", the cashier scans their license and scans the RFID wristband with the restaurant's logo, ...