3 resultados para tag data confidentiality
em Cambridge University Engineering Department Publications Database
Resumo:
We describe an RFID tag reading system for reading one or more RFID Tags, the system comprising an RF transmitter and an RF receiver, a plurality of transmit/receive antennas coupled to said RF transmitter and to said RF receiver, to provide spatial transmit/receive signal diversity, and a tag signal decoder coupled to at least said RF receiver, wherein said system is configured to combine received RF signals from said antennas to provide a combined received RF signal, wherein said RF receiver has said combined received RF signal as an input; wherein said antennas are spaced apart from one another sufficiently for one said antenna not to be within the near field of another said antenna, wherein said system is configured to perform a tag inventory cycle comprising a plurality of tag read rounds to read said tags, a said tag read round comprising transmission of one or more RF tag interrogation signals simultaneously from said plurality of antennas and receiving a signal from one or more of said tags, a said tag read round having a set of time slots during which a said tag is able to transmit tag data including a tag ID for reception by said antenna, and wherein said system is configured to perform, during a said tag inventory cycle, one or both of: a change in a frequency of said tag interrogation signals transmitted simultaneously from said plurality of antennas, and a change in a relative phase of a said RF tag interrogation signals transmitted from one of said antennas with respect to another of said antennas.
Resumo:
We describe a methods of locating an RFID tag. One method comprises: transmitting tag location signals from a plurality of different transmit antennas, wherein said antennas are spaced apart by more than a near field limit distance at a frequency of a said signal; receiving a corresponding plurality of receiving return signals from said tag; and processing said tag return signals to determine a range to said tag; wherein said transmitting comprises transmitting at a plurality of different frequencies; wherein said processing comprises determining a phase difference at said plurality of different frequencies to determine said range, and wherein said determining of said phase difference determines a phase difference between either i) two or more of said transmit signals resulting in a maxima in the returned signal RSSI or ii) a first transmit signal and its corresponding return signal; and wherein said determining of said range to said tag uses said return signals weighted responsive to a respective received signal strength of the return signal. Further data which may be used for averaging may be generated by using the above techniques along with changes in the polarisation state of the transmit and receive antennas and/or physical reconfiguration of the antennas (e.g. switch the transmit and receive elements).
Resumo:
The Pharma(ceuticals) industry is at a cross-roads. There are growing concerns that illegitimate products are penetrating the supply chain. There are proposals in many countries to apply RFID and other traceability technologies to solve this problem. However there are several trade-offs and one of the most crucial is between data visibility and confidentiality. In this paper, we use the TrakChain assessment framework tools to study the US Pharma supply chain and to compare candidate solutions to achieve traceability data security: Point-of-Dispense Authentication, Network-based electronic Pedigree, and Document-based electronic Pedigree. We also propose extensions to a supply chain authorization language that is able to capture expressive data sharing conditions considered necessary by the industry's trading partners. © 2013 IEEE.