BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
provide with a good authorized blocking. And can the Blocking envelope can be<br />
controllable.<br />
Blocking Reader can be strapped to a person and provide personal privacy<br />
for all his Tags. From laboratory experiments I have concluded that it can create<br />
an secure envelope of about 1m around the person called blocking envelope. This<br />
envelope successively blocks any unauthorized Readers trying to read the persons<br />
Tags.<br />
I conclude that the Blocking Reader is a Low cost device. With cheap hardware<br />
privacy of the RFID systems can be preserved. Also in doing this research we have<br />
noticed a potential for using this hardware design for making a full blown Ultra-Low<br />
Cost Readers. Hence reducing the cost of a Reader by a factor of 10.<br />
The concept used here is foolproof. It can easily be used by any RFID systems<br />
as it uses the same protocol used by the respective systems. All RFID systems uses<br />
inventory round for accessing the TID of the Tag. Hence implementing this concept<br />
in inventory round will ensure privacy of other systems also.<br />
9.2 Future Work<br />
The Blocking Reader concept can be used for other RFID systems where the<br />
protocol has a inventory round. The Blocking Reader Architecture can be used for<br />
designing a Ultra-Low Cost UHf RFID Readers. The concept can be implemented<br />
on the Tags to make a Tag emulator. A tag emulator emulates the Tags. So if<br />
unauthorized Readers trying to access the Tags, Tag emulator will respond instead<br />
of the Tag, hence blocking. Like blocker tag we can call it passive blocker reader. If<br />
we use this concept on Tag creating a Blocking Reader Tag we can further reduce the<br />
cost to few cents. Here a strong wide band Tag is implemented with Blocking Reader<br />
protocol. When an unauthorized Reader tries to communicate with your Tag, you will<br />
93