BS ISO 17366:2013 pdf download
BS ISO 17366:2013 pdf download.Supply chain applications of RFID—Product packaging.
5.4 Other Identification requirements
This International Standard does not supersede or replace any applicable safety or regulatory marking or labelling requirements.
This International Standard is meant to satisfy the minimum product package identification requirements of numerous applications and industry groups. As such, its applicability is to a wide range of Industries, each of which may have specilic implementation guidelines for this International Standard. This International Standard is to be applied In addition to any other mandated labelling requirements.
6 Differentiation within this layer
6.1 Business processes
Business processes such as those described below are illustrative of the applications envisioned by this International Standard.
Acquisition: ordering, including the identification of relevant specifications and requirements, can be facilitated by referencing the item’s original acquisition data using the RFIP tag’s unique ID as a database key.
Shipping: where items can have different configurations or capabilities, such as with computer software loads that differentiate items with otherwise identical form, fit and function, such Items can be issued and shipped with the tag read providing assurance that the correct item was shipped. This level of non-intrusive tracking and tracing can serve as a front end to higher level in-transit visibility RFID applications detailed In the other standards of this series.
Receiving: non-intrusive collection of receipt data can shorten data collection times, In support of automated inventory management systems and provide an electronic lransartion of record much earlier in the process. Earlier knowledge of on-hand inventory can reduce stock outs and the need for expedited premium transportation.
Cross docking: in addition to recording inbound receipts and outbound shipments, tagged items can be sorted. Many items will have exterior marking (tagging) that are used in lieu of reading the product tag.
Work in process: used to track individual components and the final assembly (bill of material) and to monitor any item through a fabrication or manufacturing process.
— Maintenance: related to work in progress and differentiated in that it covers functions prior to and subsequent to the actual work. This includes fault analysis, identification, preparation of packing and packaging.
— Inventory control: item level serialization yields a granularity of visibility that supports the management of individual items. This allows data collection, tracking and tracing of Individual items and selection at point of issue.
— Disposal: identilication of items that have recycling or other disposal requirements.
— Picking and put-away: selection of items from a package or transport unit prior to placement into shelf stock in a warehouse situation or other storage situation where a specific asset is desired or knowledge of the specific item selected is required for issue.
— Pick and place: selection of items from shelf stock in a warehouse situation or other storage situation where a specific asset is desired or knowledge of the specific item selected is required incident to the placement of the item into or onto another asset incident to a manufacturing or assembly process.
— Sortation: process that places individual items into groups based upon some selection criteria, often performed at speed.
— Identification: process that is an inherent part of each of the Functions set out above. It allows the positive differentiation of an item consistent with the business process in use. Identification can be at the discrete item level for serialized products or by commodity for non-serialized products. Identification is often the underlying base process that enables the other uses of the tag.
— Network topology: can be used to identify discrete nodes or locations on a network
— Configuration management: discrete identification of the individual component items that comprise a higherassembly. This component data can he tiered to cover each of the multiple levels ofconfiguration (e.g. the circuit board inside the radio installed in the communications suite of an aircraft).
The multitude of different business processes circumscribed by the supply chain will employ distinctly different groupings of functions and processes outlined above. The reading, writing or erasing of data to/from a tag is intended to effect identification and data capture about the product and the process Involved, and shall be Integrated Into business processes as required by the business process owner.