Home About Login Current Archives Announcements Editorial Board
Submit Now For Authors Call for Submissions Statistics Contact
Home > Archives > Volume 20, No 11 (2022) > Article

DOI: 10.14704/nq.2022.20.11.NQ66082

MANAGE RFID ACCESS TO ITEMS ON THE INTERNET

Viloyat Abdukhalilovna Gazieva

Abstract

This article describes the global distribution of radio frequency signals and the specifics of RFID technology, the history of its emergence. It also shows how to transmit a radio signal through a radio frequency electromagnetic field and how to automatically detect an object, as well as how to design and implement automated control systems. The ability to read remotely RFID tags is a concern for people’s safety. For example, an RFID key that a thief can count without being noticed will learn more about his access. The use of RFID tags has caused serious controversy, criticism and even a boycott of goods. You will learn about the privacy issues of this technology. In addition, some cities use RFID cards to pay for travel on public transport. In these systems, data is not only read from the card, but also written to the card. Here's a few basic facts about a stomp pad and how it is used.

Keywords

Radio frequency tags, RFID technology, Radio signal, control systems, RFID tags, boycott of goods, RFID public transport, RFID, technology privacy.

Full Text

PDF

References

?>