• Title/Summary/Keyword: RFID-Reader

Search Result 743, Processing Time 0.024 seconds

A Study on Crosswalk Guidance System for the Blind using RFID (RFID를 이용한 시각장애인 횡단보도 보행안내 시스템에 관한 연구)

  • Park, In-Jung;Park, Duck-Je
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.124-130
    • /
    • 2010
  • Current traffic guidance system offers the information of traffic light using a speaker to everybody including the blinds without object certification. Therefore, the current system gives stress by noisy sound to normal person. It is difficult for the blind to hear informations such as location, current traffic sign light status, and weather information, because of the vehicle noise and surroundings noise. If the blind or sight disabled person who has the RFID tag or has a white stick with RFID tag approaches to street crossing, RFID reader recognizes the tag and it serves necessary information through speaker or bluetooth. And also it is possible for the blind to use less expensive one with RFID tag than the white stick with RFID Reader.

Design of Mobile Telemedicine System using RFID based on Embedded Linux (임베디드 리눅스 환경에서 RFID 기반의 Mobile Telemedicine System 구현)

  • Yun, Chan-Young
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.479-482
    • /
    • 2006
  • Mobile Telemedicine uses common technologies that provide a conduit for information exchange between physicians nurses and patients. In addition to patient records, medical professionals will obtain vital signs and other reference data through Ubiquitous Sensor networks(USN). In this paper about a design and implementation of RFID reader platform that received RFID tag information from patients tags, transmit the data to SBC(Single board computer) based on Intel PXA255 ARM CPU and SBC transmit the data to MySQL server in hospital using by Wireless Internet. his system that based on Embedded Linux is composed of RFID module, ARM processor, RS-232 interface, and Wireless LAN. This paper also provides a brief overview and concept of RFID reader, and proposes the design and implementations of the RFID reader platform used QT and MySQL based on Embedded Linux.

  • PDF

Modeling of Propagation Interference and Channel Application Solution Suggestion In the UHF Band RFID Propagation Path (UHF 대역 RFID 전파경로에서의 전파간섭 모델링 및 채널 운용 방안 제안)

  • Moon, Young-Joo;Yeo, Seon-Mi;Jeon, Bu-Won;Roh, Hyoung-Hwan;Joung, Myoung-Sub;Oh, Ha-Ryoung;Seong, Yeong-Rak;Park, Jun-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.11
    • /
    • pp.2047-2053
    • /
    • 2008
  • Auto-ID industries and their services have been improved since decades ago, and radio frequency identification (RFID) has been contributing in many applications. Product management can be the foremost example. In our industrial experiences, RFID in ultra high frequency (UHF) band provides much longer interrogation ranges than that of 13.56MHz; many more applications exist thereby. There should be several interesting and useful ideas on UHF RFID; however, those ideas can be limited due to the inevitable environmental circumstances that restrict the interrogation range in shorten value. This paper discusses the propagation interference among different types of readers (e.g, mobile RFID readers in stationary reader zone) in dense-reader environment. In most cases, UHF RFIDs in Korea will be dependent on the UHF mobile RFIDs. In this sense, the UHF mobile users accidently move into the stationary reader's interrogation zone. This is serious problem. In this paper, we analyze propagation loss and propose the effective channel allocation scheme that can contribute developing less-invasive UHF RFID networks. The simulation and practical measurement process using the commercial CAD tools and measurement equipments are presented.

A Study on the RF Shower System to Extend Interrogating Range for the Low Power RFID Reader System (저출력 RFID 시스템에서 인식거리 확대를 위한 전력 공급용 RF Shower 시스템)

  • Jung, Jin-Wook;Bae, Jae-Hyun;Oh, Ha-Ryoung;Seong, Yeong-Rak;Song, Ho-Jun;Jang, Byeong-Jun;Choi, Kyung;Lee, Jung-Suk;Lee, Hong-Bae;Lee, Hak-Yong;Kim, Jong-Min;Shin, Jae-Cheol;Park, Jun-Seok
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.12
    • /
    • pp.526-533
    • /
    • 2006
  • In this paper, we presented the synchronization module between RF shower system and RFID Reader to extend interrogating range on Mobile RFID system, Costas Loop and FPLL(Frequency/phase Lock Loop) were used. We achieved compromised range of 3MHz locking frequency, 1ms locking time and figured out remarkable Hopping frequency of the Reader. The prototype of the new designed RFID system has been tested with ISO18000-6 type-B Tag. The read range between designed RFID Reader and Tag has been measured, it increased triple times by adjusting the Shower system output level.

A Design of RFID Mutual Authentication System based on Open Channel (공개 채널 기반의 RFID 상호인증 시스템 설계)

  • Yoon, Eun-Jun;Yoo, Kee-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10C
    • /
    • pp.946-954
    • /
    • 2009
  • General RFID system has assumed that the communication channel between reader and back-end database is secure channel. However, the reader can be communicated with the database through insecure channel like the communication channel between the reader and the tag according to application environment. In this paper, we propose a new secure RFID mutual authentication protocol based on open network channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol uses a secure one-way hash function to provide authentication and integrity against all communication messages which exchanged on the open channels. In addition, we designed that the proposed protocol can provide forward secrecy by performing the database and the tag update their old secret key with a new secret key after finished mutual authentication.

Record Management unified RFID System based on WindowsCE (WindowsCE 기반 통합형 RFID에서의 이력관리 방법)

  • Choi Jar-Young;Kim Tae-Seong;Park Hong-Seong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.265-268
    • /
    • 2006
  • This paper, suggest the Rrecord Management solution for unified RFID leader System based on WindowsCE. The unified RFID Reader System consider of RFID Module, GPS Module, CPU Module, WLAN(or CDMA) Module and DB into Local DB and Remote DB for of effective Record Management Systems.

  • PDF

Parallel-fed Multiple Loop Antenna for 13.56MHz RFID Reader

  • Yang Woon Geun;Park Yong Ju;Kim Hyuck Jin;Cho Jung Min;Kim Jung Ho
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.334-338
    • /
    • 2004
  • In this paper, we suggest a new antenna structure for RFID(Radio Frequency IDentification) reader. Conventional RFID reader uses a loop antenna. The central area of a loop antenna shows a low magnetic field strength especially for the case of a large loop antenna diameter. We propose a parallel-fed multiple loop antenna. Simulation results and measured results show that we can adjust field distribution with the number of turns and diameter of an inner loop antenna to obtain a longer reading distance. Simulation results for the specific case of a proposed antenna structure show that at the center point of a proposed parallel-fed multiple loop antenna, the typical card area averaged magnetic field strength is 2.53A/m, which is higher than the case of a conventional type single loop antenna of 0.44A/m and the case of a series-fed multiple loop antenna of 0.96A/m when we drive with same source signal. We realized the antenna for the case of 13.56MHz RFID reader and the performance of reading distance was much more improved than the case of a conventional antenna.

  • PDF

Mutual Authentication Protocol using One Time Password for Mobile RFID System (OTP를 이용한 모바일 RFID 상호인증 프로토콜)

  • Sung, Jong-Yeop;Lee, Sang-Duck;Ryu, Chang-Ju;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1634-1642
    • /
    • 2014
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. But security of mobile RFID system is too weak like the existing RFID system. In this paper, the mobile RFID mutual authentication protocol with high level of security is proposed to overcome the troubles such as cryptographic protocols in the existing RFID system responding with the same value in every authentication procedure and the exposure in the exchange of messages. The proposed protocol exchanges messages unexposed by using the random numbers generated in the mutual authentication between the tag and the reader and making numbers coded with the symmetric key. Besides, the protocol uses the mutual authentication utilizing OTP by considering the characteristics of the reader embedded in mobile devices in the mutual authentication process between the reader and the server. Because changed message in every authentication, which produces safe from spoofing attacks and replay attacks, etc.

An Authentication Protocol for the Security of RFID Tags and Readers using Random Number (난수를 이용한 RFID 태그와 리더의 보안 인증 프로토콜)

  • Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.229-233
    • /
    • 2012
  • A RFID system is a technology for detecting information on an object through wireless communication between a tag on the object and a reader, and its applications are being expanded to various areas. Because of its wireless communication, however, there are many vulnerabilities in security. Until now, many studies have been executed in order to solve problems related to the security and stability of RFID. In order to resolve vulnerabilities in existing security methods for privacy protection, this study proposed an authentication protocol that uses hash values received from tags and random numbers. When the proposed protocol was implemented, it was safe from various types of attacks between tag and reader and between reader and DB. Furthermore, compared to recently proposed protocols, it could implement a RFID system with enhanced security and less computation in tags.

Distance Sensing of an RFID Tag Using RFID Reader Frequency Control (RFID 리더의 주파수 조정을 통한 태그 위치 센싱)

  • Baik, Kyung-Jin;Jang, Byung-Jun
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.5
    • /
    • pp.348-355
    • /
    • 2019
  • UHF and microwave RFID systems are widely applied in various fields because they can read a plurality of tag information within a radius of several meters ahead of the RFID reader. However, they cannot detect the position of the tag in applications that recognize only a tag at a specific position. In this study, we propose a new RFID system that can interrogate the tag of a specific location selectively by using the position information of the tag. This can be done by only adjusting the reader's operating frequency. To verify the feasibility of the proposed system, we implemented a 2.4 GHz RFID reader whose frequency can be varied by using a phase-locked loop circuit and a backscattered tag. Experimental results confirm that the tag position can be sensed exactly.