BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
1.6 Summary<br />
It is surprising that a modest device like a RFID Tag is lacking personal security.<br />
And being naked to any justified interrogators to attain secure data of the Tag. The<br />
thesis ensures privacy of the RFID Tag with a low cost ISO 18000-6C compliant<br />
Blocking Reader. BR can be used to block the communication between your Tag and<br />
any unauthorized Reader in the vicinity. A low-cost Reader design architecture is<br />
used in the Blocking Reader hence having a low cost of implementation. The BR uses<br />
inventory round of the protocol for blocking. The Tag replies to the communication of<br />
the BR. Hence the Blocking Reader is actually blocking and not jamming. Laboratory<br />
experiments prove that the BR can deliver a maximum blocking range of about 1m.<br />
1m of envelope around the BR is like a shied inside which no Tags can be read.<br />
BR provide personal privacy for a person wearing the decide. Laboratory experiment<br />
shows a maximum blocking envelope of about less then 1m when used a 5 gallon filled<br />
water bottle. The concept of BR can be used in other RFID systems with inventory<br />
round. The BR provides scope for implementing it on the Tag. Finally Blocking<br />
Reader can provide a solution to personal privacy issues of the Tag.<br />
9