09.03.2013 Views

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

BLOCKING READER: DESIGN AND IMPLEMENTATION OF A ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.6 Summary<br />

It is surprising that a modest device like a RFID Tag is lacking personal security.<br />

And being naked to any justified interrogators to attain secure data of the Tag. The<br />

thesis ensures privacy of the RFID Tag with a low cost ISO 18000-6C compliant<br />

Blocking Reader. BR can be used to block the communication between your Tag and<br />

any unauthorized Reader in the vicinity. A low-cost Reader design architecture is<br />

used in the Blocking Reader hence having a low cost of implementation. The BR uses<br />

inventory round of the protocol for blocking. The Tag replies to the communication of<br />

the BR. Hence the Blocking Reader is actually blocking and not jamming. Laboratory<br />

experiments prove that the BR can deliver a maximum blocking range of about 1m.<br />

1m of envelope around the BR is like a shied inside which no Tags can be read.<br />

BR provide personal privacy for a person wearing the decide. Laboratory experiment<br />

shows a maximum blocking envelope of about less then 1m when used a 5 gallon filled<br />

water bottle. The concept of BR can be used in other RFID systems with inventory<br />

round. The BR provides scope for implementing it on the Tag. Finally Blocking<br />

Reader can provide a solution to personal privacy issues of the Tag.<br />

9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!