Concerning unauthorized tag reading threat, consumers need to be protected from unwanted scanning of RFID
tags on cloths, shoes or other items they possess. EPC Global has designed a “kill switch” in their tags that lets
vendors permanently disable a tag at the point of sale, instead of removing it [37]. This allows the tag to be
embedded into the product. However, many applications require the tags to remain active in purchased goods.
For example, for returned products, for a recall of specific set of products, for recycling, for store-issued coupons
that can be scanned at the checkout counter, for a refrigerator or pantry shelf that need to check expiration date,
for airport tickers that allow tracking of passengers within the airport, etc [38]. A better and low cost solution is
the “blocker tag” that protect items in the hands of consumers, while at the same time permitting unimpeded
reading of tags in commercial environments. As reported in [38], “a blocker tag simulates the full spectrum of
possible serial numbers for tags, thereby obscuring the serial numbers of other tags. The blocker tag effectively
overwhelms this process by forcing it to sweep the full space of all possible tag identifiers, which is extremely
large”.
Concerning unauthorized tag reading threat, consumers need to be protected from unwanted scanning of RFID
tags on cloths, shoes or other items they possess. EPC Global has designed a “kill switch” in their tags that lets
vendors permanently disable a tag at the point of sale, instead of removing it [37]. This allows the tag to be
embedded into the product. However, many applications require the tags to remain active in purchased goods.
For example, for returned products, for a recall of specific set of products, for recycling, for store-issued coupons
that can be scanned at the checkout counter, for a refrigerator or pantry shelf that need to check expiration date,
for airport tickers that allow tracking of passengers within the airport, etc [38]. A better and low cost solution is
the “blocker tag” that protect items in the hands of consumers, while at the same time permitting unimpeded
reading of tags in commercial environments. As reported in [38], “a blocker tag simulates the full spectrum of
possible serial numbers for tags, thereby obscuring the serial numbers of other tags. The blocker tag effectively
overwhelms this process by forcing it to sweep the full space of all possible tag identifiers, which is extremely
large”.
การแปล กรุณารอสักครู่..
