Connect with us

Tech News

Track any device with RFID tags: phones, bags, tablets

Keeps tabs on your vital professional devices with RFID enabled devices, whether you travel or not and even if you’re not forgetful – you never know what can happen to your beloved iPhone, laptop or leather briefcase.

Published

on

rfid tags

What is all of this RFID talk about?

A RFID (Radio Frequency Identifier) is a small device used for tracking or identification. A typical tag consists of a chip, memory and antenna. Most new RFID tags utilize Bluetooth technology.

Why do you need RFID?

How many times have you misplaced something? Something like your keys, phone, tablet, wallet, or remote; if you are anything like me, at least a few times. If you place an RFID tag on these items, you can track them. There are several companies that offer tags that work along with smartphone apps to track your things. This is especially useful for business professionals always on the go.

You can tag your phone, briefcase, laptop, and even your luggage and your smartphone will alert you when the item is out of a set range (say 100 feet) and when it returns. RFID devices are even used with pet doors. If you place a device on your pets’ collar, the pet door reads the chip and allows them to enter, but only your pets. This will keep out those pesky raccoons that try to come in and help themselves to your refrigerator.

Four RFID options:

There are several companies that offer RFID devices; the following four can get you started as you find the option best for you:

StickNFind is one company offering these devices. The device is about the size of a quarter. It costs $25. And you can track anything you tag with a device via your smartphone. You can have up to twenty active stickers (devices) at a time. The smartphone application also allows users to trigger an alert if a sticker moves out of a specified range. This is called the “Virtual Leash” feature; users can set a distance range for each sticker. So, if you want to keep your pets or children within a certain range while they are outside, you can place a sticker on them and the phone will alert you if they go outside that range.

Bikn (“Beacon”) is another company offering a “lost and found” system. For $59.99 you get an iPhone case and tag. The tag can attach to your keys, your pet, your backpack, anything you want, really. And the best part is that your iPhone will find your tagged item, but the tagged item can also find your iPhone, even if it is dead or turned off. Currently Bikn only works for iPhone and you will have to remove any other cases you have (Otterbox, Armor, etc.) so the Bikn case can be in contact with your phone. But, if you are prone to losing things, this could be worth it.

ItemTrackr can track any Bluetooth device such as cars, headsets, low energy tags (like SticknFind) and much more. You can ring your lost Bluetooth device from the app. It will also record the GPS map and time you lost your item. This is especially helpful when you need to remember where you parked your car or left your keys. There is also something called, “separation alert”: if you are about to walk off without your Bluetooth device, the app will play a reminder so that you do not forget it.

InRange by Phillips is another Bluetooth enabled leash system. For $49.95 you get a similar system to Bikn’s. You will receive the Bluetooth device, a pouch for the tag, batteries and a pin to release the battery door. Items are tracked via the iPhone/iPad app and can be paired with up to three InRange devices. This device also allows you to still make calls via Bluetooth without any interference.

There are many other options available to suit your needs. All of them serve the same basic function: to track your possessions and help you insure they do not get lost. This seems like something worth investing in if you have a hard time keeping up with your belongings, or travel extensively.

Jennifer Walpole is a Senior Staff Writer at The American Genius and holds a Master's degree in English from the University of Oklahoma. She is a science fiction fanatic and enjoys writing way more than she should. She dreams of being a screenwriter and seeing her work on the big screen in Hollywood one day.

Continue Reading
Advertisement
9 Comments

9 Comments

  1. Tinu

    June 25, 2013 at 6:31 pm

    #frustration – I had this idea a few years ago. At least someone is doing it, and I’ll be able to find my stuff again. *walks off bitterly*

  2. JonaD

    July 2, 2013 at 2:10 am

    Yeah, people will be able to find their stuff… and ‘I’ will be able to find your stuff and YOU too. RFIDs are EASY to hack. Also because their antenna are inductively coupled… I can find out more! I can discover if other people are between my sensor and an RFID device, I can uncover other things too… like if there is a chunk of metal close to your device and so it could act as a roving detector to identify where someone is wearing a gun. Think of these as old fashioned ‘ theremins’, and imagine… your life playing to the world as creepy sci-fi music, that anyone can investigate you with. Lovely.

  3. Guest

    July 2, 2013 at 2:13 am

    Yeah, people will be able to find their stuff… and ‘I’ will be able to find your stuff and YOU too. RFIDs are EASY to hack. Also because their antenna are inductively coupled… I can find out more! I can discover if other people are between my sensor and an RFID device, I can uncover other things too… like if there is a chunk of metal close to your device and so it could act as a roving detector to identify where someone is wearing a gun. Think of these as old fashioned THERAMINS, and imagine… your life playing creepy sci-fi music that people can investigate you with. Lovely.

  4. John Andry

    May 30, 2015 at 11:41 am

    You can Track Most of things with RFID Tags! Radio Frequency Identification devices are mostly used for the purpose of tracking. Giant companies and offices use this device to easily get access to their products. The devices are also used in many other cases like that of people tracking. The components that an RFID device consists are:
    RFID Microchip/ Tag: This microchip has an antenna through which it transmits information that it consists or that is fed in it by a programmer.
    RFID Reader: The information that the microchip transmits by the help of its antenna is being read by a reader.
    RFID Middleware: It is software that resides in between the software of enterprise and RFID interrogators.
    RFID Software: The information which the reader reads is then converted into digital form which can be used by software system for processing. Thank you!!

  5. jamyy

    July 22, 2015 at 4:22 am

    RFID is very useful tracking chips, by using those tracking chips you can track many things also saves lots of time.

  6. danny

    November 7, 2015 at 10:27 am

    Does any one know if any of these devices use passive RFID chips?

    • Guest

      December 8, 2015 at 3:54 am

      RFID tags can be passive, but you will need an active RFID reader. At the moment this reader will be a bulky device and is not available as a small and affordable add-on to your phone (dec 2015). To overcome this problem and keep the tags small, you can use an active RFID scanner/reader (e.g. built into your bag) that communicates with your phone via Bluetooth/GPS/WiFi
      Btw: All the devices in this article do not use RFID, but active Bluetooth tags. Bikn uses active Wifi tags.

      • Guest

        December 8, 2015 at 4:05 am

        One adjustment to my earlier comment: RFID tags can be passive, but you will need an active RFID reader. At the moment this reader will be a bulky device and is not available as a small and affordable add-on to your phone (dec 2015) >> This is if you want to read tags over a distance more then 8 cm. Otherwise you can use the NFC reader function of most new phones

  7. Pingback: RFID technology's resurgence and why you need it - The Real Daily

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech News

Google chrome: The anti-cookie monster in 2022

(TECH NEWS) If you are tired of third party cookies trying to grab every bit of data about you, google has heard and responded with their new updates.

Published

on

3rd party cookies

Google has announced the end of third-party tracking cookies on its Chrome browser within the next two years in an effort to grant users better means of security and privacy. With third-party cookies having been relied upon by advertising and social media networks, this move will undoubtedly have ramifications on the digital ad sector.

Google’s announcement was made in a blog post by Chrome engineering director, Justin Schuh. This follows Google’s Privacy Sandbox launch back in August, an initiative meant to brainstorm ideas concerning behavioral advertising online without using third-party cookies.

Chrome is currently the most popular browser, comprising of 64% of the global browser market. Additionally, Google has staked out its role as the world’s largest online ad company with countless partners and intermediaries. This change and any others made by Google will affect this army of partnerships.

This comes in the wake of rising popularity for anti-tracking features on web browsers across the board. Safari and Firefox have both launched updates (Intelligent Tracking Prevention for Safari and the Enhanced Tracking Prevention for Firefox) with Microsoft having recently released the new Edge browser which automatically utilizes tracking prevention. These changes have rocked share prices for ad tech companies since last year.

The two-year grace period before Chrome goes cookie-less has given the ad and media industries time to absorb the shock and develop plans of action. The transition has soften the blow, demonstrating Google’s willingness to keep positive working relations with ad partnerships. Although users can look forward to better privacy protection and choice over how their data is used, Google has made it clear it’s trying to keep balance in the web ecosystems which will likely mean compromises for everyone involved.

Chrome’s SameSite cookie update will launch in February, requiring publishers and ad tech vendors to label third-party cookies that can be used elsewhere on the web.

Continue Reading

Tech News

Computer vision helps AI create a recipe from just a photo

(TECH NEWS) It’s so hard to find the right recipe for that beautiful meal you saw on tv or online. Well computer vision helps AI recreate it from a picture!

Published

on

computer vision recreates recipe

Ever seen at a photo of a delicious looking meal on Instagram and wondered how the heck to make that? Now there’s an AI for that, kind of.

Facebook’s AI research lab has been developing a system that can analyze a photo of food and then create a recipe. So, is Facebook trying to take on all the food bloggers of the world now too?

Well, not exactly, the AI is part of an ongoing effort to teach AI how to see and then understand the visual world. Food is just a fun and challenging training exercise. They have been referring to it as “inverse cooking.”

According to Facebook, “The “inverse cooking” system uses computer vision, technology that extracts information from digital images and videos to give computers a high level of understanding of the visual world,”

The concept of computer vision isn’t new. Computer vision is the guiding force behind mobile apps that can identify something just by snapping a picture. If you’ve ever taken a photo of your credit card on an app instead of typing out all the numbers, then you’ve seen computer vision in action.

Facebook researchers insist that this is no ordinary computer vision because their system uses two networks to arrive at the solution, therefore increasing accuracy. According to Facebook research scientist Michal Drozdzal, the system works by dividing the problem into two parts. A neutral network works to identify ingredients that are visible in the image, while the second network pulls a recipe from a kind of database.

These two networks have been the key to researcher’s success with more complicated dishes where you can’t necessarily see every ingredient. Of course, the tech team hasn’t stepped foot in the kitchen yet, so the jury is still out.

This sounds neat and all, but why should you care if the computer is learning how to cook?

Research projects like this one carry AI technology a long way. As the AI gets smarter and expands its limits, researchers are able to conceptualize new ways to put the technology to use in our everyday lives. For now, AI like this is saving you the trouble of typing out your entire credit card number, but someday it could analyze images on a much grander scale.

Continue Reading

Tech News

Xiaomi accidentally sent security video from one home to another

(TECH NEWS) Xiaomi finds out that while modern smart and security devices have helped us all, but there are still plenty of flaws and openings for security breeches.

Published

on

Xiaomi home device

The reason for setting up security cameras around your home is so the photos can get streamed to your neighbor’s device, right?

Okay, that’s obviously not why most (if any) of us get security cameras, but unfortunately, that scenario of the leaked images isn’t a hypothetical. Xiaomi cameras have been streaming photos to the wrong Google Home devices. This was first reported on Reddit, with user Dio-V posting a video of it happening on their device.

Xiaomi is a Chinese electronics company that has only recently started to gain traction in the U.S. markets. While their smartphones still remain abroad, two of Xiaomi’s security cameras are sold through mainstream companies like Wal-Mart and Amazon for as low as $40. Their affordable prices have made the products even more popular and Xiaomi’s presence has grown, both nationally and abroad.

To be fair, when the leaked photos surfaced, both Google and Xiaomi responded quickly. Google cut off access to Xiaomi devices until the problem was resolved to ensure it wouldn’t happen again. Meanwhile, Xiaomi worked to identify and fix the issue, which was caused by a cache update, and has since been fixed.

But the incident still raises questions about smart security devices in the first place.

Any smart device is going to be inherently vulnerable due to the internet connection. Whether it’s hackers, governments, or the tech companies themselves, there are plenty of people who can fairly easily gain access to the very things that are supposed to keep your home secure.

Of course, unlike these risks, which involve people actively trying to access your data, this most recent incident with Xiaomi and Google shows that your intimate details might even be shared to strangers who aren’t even trying to break into your system. Unfortunately, bugs are inevitable when it comes to keeping technology up to date, so it’s fairly likely something like this could happen again in the future.

That’s right, your child’s room might be streamed to a total stranger by complete accident.

Granted, Xiaomi’s integration mistake only affected a fraction of their users and many risks are likely to decrease as time goes on. Still, as it stands now, your smart security devices might provide a facade of safety, but there are plenty of risks involved.

Continue Reading
Advertisement

Our Great Partners

The
American Genius
news neatly in your inbox

Subscribe to our mailing list for news sent straight to your email inbox.

Emerging Stories

Get The American Genius
neatly in your inbox

Subscribe to get business and tech updates, breaking stories, and more!