Protected rfid system
Abstract
The present invention consist on a device such us RFID, EAS, Smart Cards’, Rubee and Smart Dot’s that are constructed initially deactivated and shall be added an access element which will enable the device to work only under a specific action by the user. Without such access element the device would not react to any field or outer influence, thus making anyreading and/or writing attempt of the identification device impossible. The added device may be two contacts giving access to a MOS wrench, or by means of a touch switch such as a membrane contact.
Background of the invention
An RFID system may consist of several components, such as tags, tag readers, tag programming stations, circulation readers, sorting equipment and tag inventory wands.Security may be handled in two ways. Security interfaces may ask the ILS to determine its security status or the tag may contain a security bit which would set at a high or low level by circulation or by the self-checking reader stations. The purpose of a RFID system consists in enabling data transmissions through a portable device, which is called tag, and which is read by a RFID reader and processedaccording to the needs of a certain application. The data transmitted by the tag may provide information about the identification or location or specific information about the tagged product, such as price, color, purchase date, etc. The RFID use for access and follow-up applications appeared for the first time by the 80’s. The RFID stood out due to its ability to follow mobile objects.
TheRFID codes are so long that each RFID tag may have a unique code. This uniqueness of RFID tags means that a product may be individually followed while moving from place to place, to end in the user’s hands. Such a system may help companies to fight against thefts and other ways of product losses. Likewise, RFID has been proposed to storage checks from the sales outlet and then replace thecashier by an automatic system which does not need any bar code uptake. However, it is unlikely that it may be possible without a significant cost reduction of current tags. A reasearch is being carried out about the ink that may be used as RFID tag which would significantly reduce costs. However, it will take some years to be profitable.
The use of RFID technology has raised a considerablecontroversy, even product boicots. The four main reasons by which RFID becomes worrying as privacy is concerned, are the following:
• The purchaser of an item does not need to know about the existence of a tag or be able to to remove it.
• The tag may be read at a certain distance without the individual being aware of it.
• If a tagged item is paid by means of a credit card or together with theuse of a fidelity card, then it would be possible to link the unique ID of said item with the purchaser’s identity.
• The EPCGlobal tag system creates or intends to create global series numbers which are unique for all the products althoug it raises privacy problems and it is completely unnecessary in most applications.
Most concerns relate to the fact that the RFID tags placed on productscontinue being functional even after the products had beed bought and taken home and, as a consequence, said fact may be used for watching purposes s well as for any other vile purposes without having any relationship with their inventory role in the supply chain. Even though the idea consists in using short-distance RIFD tags, they may be interrogated from longer distances by any person having ahigh gain antenna, thus potentially enabling that the content of a house may be explored from a certain distance. Likewise, a short-range scan is worrying if all the detected items appear in a database every time a person passes by a reader or if that is maliciously done, as for example a theft made by using a hand portable scanner to obtain an instant examination of the number of potential...
Regístrate para leer el documento completo.