Presentation given at International IEEE RFID 2010 conference. For the accepted paper" Blocking Reader: Design and Implementation of a Passive UHF RFID Blocking Reader.
Towards the Internet of Things: An introduction to RFIDMiguel Pardal
The document summarizes a workshop on RFID technology, concepts, applications and challenges. It discusses [1] the Internet of Things and how RFID connects devices at a massive scale, [2] business applications of RFID like tracking physical goods, and [3] challenges around RFID security and privacy.
RFID uses radio waves to transfer data between a reader and tagged item to identify and track items. Mario Cardullo received the first patent for an active RFID tag in 1973. That same year, Charles Walton received a patent for a passive transponder to unlock doors. RFID systems have readers that power tags and establish data links to remotely identify multiple tags quickly.
This document provides instructions for using an oil slick mapping website, including how to zoom and click on the map, view point details, turn data categories and map layers on and off, add new data points by logging in and clicking on the map, and edit point properties by name, date, category, and associated files.
The document presents a cipher where letters of the alphabet correspond to numbers and uses this cipher to calculate the numerical values of words like "hard work", "knowledge", "love", "luck", "money", and "leadership". It determines that only the word "attitude" equals 100%, suggesting that having the right attitude is what truly makes life 100% fulfilling. It encourages sharing this message with others to help change attitudes and lives for the better.
The document discusses the perception of style and how it can be seen as expected and transparent when it fits expectations, but unexpected style is noticed and can create unintended meanings. It also provides recipes for a western omelet and lists some article headlines.
Javascript uses prototype-based inheritance. Objects have a prototype object that is used to fallback to when a property is not found on the object. The prototype chain is traversed by using the __proto__ property to find properties higher up the chain. Constructors are functions that are called with new that create a new object and set that object's prototype. Closures are functions that have access to variables in an enclosing scope even after that scope is closed. This is achieved through the scope chain that links scopes together through __parent__ references.
The document discusses the perception of style through three main topics. First, it examines the perception of correctness and completeness when a style is expected versus unexpected. Second, it looks at the different levels of attention paid to style when it is expected versus examined. Third, it explores how style can act as a signal that conveys information, drama, and meaning between a perceiver and communicator within a given context.
Towards the Internet of Things: An introduction to RFIDMiguel Pardal
The document summarizes a workshop on RFID technology, concepts, applications and challenges. It discusses [1] the Internet of Things and how RFID connects devices at a massive scale, [2] business applications of RFID like tracking physical goods, and [3] challenges around RFID security and privacy.
RFID uses radio waves to transfer data between a reader and tagged item to identify and track items. Mario Cardullo received the first patent for an active RFID tag in 1973. That same year, Charles Walton received a patent for a passive transponder to unlock doors. RFID systems have readers that power tags and establish data links to remotely identify multiple tags quickly.
This document provides instructions for using an oil slick mapping website, including how to zoom and click on the map, view point details, turn data categories and map layers on and off, add new data points by logging in and clicking on the map, and edit point properties by name, date, category, and associated files.
The document presents a cipher where letters of the alphabet correspond to numbers and uses this cipher to calculate the numerical values of words like "hard work", "knowledge", "love", "luck", "money", and "leadership". It determines that only the word "attitude" equals 100%, suggesting that having the right attitude is what truly makes life 100% fulfilling. It encourages sharing this message with others to help change attitudes and lives for the better.
The document discusses the perception of style and how it can be seen as expected and transparent when it fits expectations, but unexpected style is noticed and can create unintended meanings. It also provides recipes for a western omelet and lists some article headlines.
Javascript uses prototype-based inheritance. Objects have a prototype object that is used to fallback to when a property is not found on the object. The prototype chain is traversed by using the __proto__ property to find properties higher up the chain. Constructors are functions that are called with new that create a new object and set that object's prototype. Closures are functions that have access to variables in an enclosing scope even after that scope is closed. This is achieved through the scope chain that links scopes together through __parent__ references.
The document discusses the perception of style through three main topics. First, it examines the perception of correctness and completeness when a style is expected versus unexpected. Second, it looks at the different levels of attention paid to style when it is expected versus examined. Third, it explores how style can act as a signal that conveys information, drama, and meaning between a perceiver and communicator within a given context.
RFID technology uses radio waves to identify objects. It consists of tags attached to objects, readers that can detect tags, and software to process tag data. RFID has many applications including supply chain management, asset tracking, access control, and libraries. It provides benefits over barcodes like not requiring line of sight and being able to read multiple tags simultaneously. While initially used during World War II, RFID technology has advanced and miniaturized, finding growing use in various industries to enable real-time tracking of objects and inventory.
Implementation of radio frequency identification technology in accessing info...eSAT Journals
Abstract In today’s fast paced world with an enhancement of technology and innovation, healthcare systems have become so advanced with their technologies to monitor health variations. The prominent issue common man faces today is the number hours we spend in queues. This problem is not just for hospitals, but applies to every sector such as education, restaurants, malls, etc. Besides the issue mentioned above, there is another concern that we face with traditional filing system that are followed in many organizations. Loss of information has come into the radar of research, with the advancement of technologies and various ways to access them. Preservation and security of confidential information and data is expensive and requires skill to maintain them. Technology enhancement has made RFID technology more affordable over the years and is still a secure way to control the information and the usage of this technology hasn’t been explored enough. This system can be implemented as a module in any management system or security based system to allow or restrict access to any information. In order to resolve the above issues we integrated a database to secure confidential information with an easy and user friendly interface to be used by the hospital staff. RFID cards can control the access and manipulation of data. The application software for desktops integrates a RFID reader to enable easier access of information from the database, in this case the medical records and patient data. In this paper we describe the successful implementation and integration of the RFID reader with the application and the methodology that has been implemented to achieve a successful outcome. Keywords: Health Care, Radio Frequency Identification Tags (RFID), Passive and Active Tags, Low Frequency Tags, High Frequency Tags, Ultra High Frequency Tags
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
This document discusses security issues related to radio-frequency identification (RFID) systems. It begins with an overview of RFID technology and its components. It then identifies three main parts of an RFID system that are vulnerable to attacks: the edge hardware, communication part, and data support part. Six general types of attacks are described: spoofing identity, tampering with data, repudiation, information exposure, denial of service, and escalation of privilege. Potential solutions to improve RFID security are then outlined, including killing tags, blocking tags from responding, and using cryptography. The document concludes that addressing security and privacy issues is important for wider adoption of RFID technology.
Abstract Radio Frequency Identificaticationvishnu murthy
This document provides an overview of radio frequency identification (RFID) technology. It describes the historic development of RFID from early uses in World War II to current applications. The current technology is explained, including energy sources for different tag types (passive, semi-passive, active), common frequency bands, and standards. Issues of security and privacy are discussed, such as possible attacks on RFID systems and ways to authenticate tags and readers. Methods for RFID location tracking and new production methods are also outlined. Finally, the document notes some social implications of the increasing use of RFID technology.
The document discusses several methods for improving security and privacy in RFID systems. It describes RFID tags, readers, and the problems of human tracking and spying on customers that RFID enables. It then evaluates various technical approaches to address these privacy issues, including killing tags, Faraday cages, cryptographic protocols, clipped tags, randomized identifiers, blocker tags, and selective jamming. The document concludes that while the RFID Guardian approach provides the most complete privacy, blocker tags may be the most practical solution given their low cost and compatibility with existing RFID systems.
The document provides an overview of an upcoming presentation on RFID/NFC security. It begins with introducing the speaker and their background and experience. The presentation agenda is then outlined and will cover topics such as what is and isn't true about RFID, real-life examples of RFID/NFC usage, RFID hardware including tags and readers, software like LibNFC, and specific RFID protocols and formats like iClass and Mifare Classic. Motivation for the talk is cited as coming from a book on the hacker ethic and sharing skills with a technical community.
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas
Third Eye for Blind using Ultrasonic Sensor Vibrator Gloveijtsrd
The primary goal of the project is to enable blind people to use an RF remote to find their gloves. This system gives visually impaired individuals walking exceptional security by incorporating a siren and attaching many sensors. Nowadays, individuals prioritize their safety above all else when they are driving, walking, or otherwise moving around. With the help of this system, we can track a blind persons whereabouts using a mobile device and receive emergency alert messages with their precise location. The technology also provides excellent security and shows them how to walk. The system has sensors for stair detection, soil detection, and obstacle recognition so that it may automatically identify impediments and deliver alerts. Using a soil moisture detector is used to find alerts in line with soil moisture levels. So that people may see the proper path while walking on the floor, stairs, and in many other locations, this approach can be very helpful. When an emergency arises, the system can be connected to a microcontroller and notify the appropriate people. A GPS receiver, a microcontroller, and a GSM modem are the components of this tracking system. This information is processed by the microcontroller and forwarded to the appropriate numbers after processing. Dr. B. Rambabu | S. Navya | M. Sahithi Vyas | A. Dishendra Sekhar "Third Eye for Blind using Ultrasonic Sensor Vibrator Glove" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-1 , February 2023, URL: https://www.ijtsrd.com/papers/ijtsrd53888.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/53888/third-eye-for-blind-using-ultrasonic-sensor-vibrator-glove/dr-b-rambabu
This presentation introduces radio frequency identification (RFID) technology. It discusses what RFID is, how it works using three main components (transceiver, transponder, and antenna), and provides examples of RFID hardware including tags, readers, and different frequency ranges. It also outlines several common applications of RFID technology in various industries like retail, transportation, security, and more.
This document discusses using cryptography and RFID systems for network security. It begins with an introduction to cryptography as an ancient method of encrypting messages for secure transmission. It then describes RFID technology, which uses radio waves to identify objects tagged with RFID transponders. The document proposes using both cryptography and RFID for network security to achieve benefits like data confidentiality, integrity, authentication and access control. It outlines potential applications of RFID in areas like animal tracking, individual records maintenance and banking security. Finally, it concludes that combining RFID and cryptography can provide a higher degree of user and data authentication for network security compared to using each approach alone.
Radio-frequency identification (RFID) uses radio waves to automatically identify objects. RFID tags contain antennas that receive and respond to an interrogator's signals. RFID tags can be classified as active, passive, or semi-passive. An RFID system consists of tags, a reader with an antenna, and backend software. RFID is used for applications like supply chain management, asset tracking, and access control. While offering advantages like contactless identification, RFID also raises privacy and security concerns that require consideration.
This document discusses Radio Frequency Identification (RFID) technology. It describes the basic components of an RFID system including RFID tags, readers, and antennas. It explains different types of RFID tags and readers and how they communicate using various coupling techniques like backscatter, inductive and capacitive coupling. Frequency ranges used for RFID are also outlined along with typical read ranges and applications for each frequency range. Key aspects of RFID technology covered include tag and reader design, data encoding, and use of RFID for identification and tracking applications in various industries.
This document provides an overview of radio-frequency identification (RFID) technology. It discusses the history and components of RFID, including tags, readers, software, and communication networks. It then outlines several applications of RFID such as supply chain management, retail, and security/access control. Both advantages, like automatic identification without line of sight, and disadvantages, including cost and need for regulations, are mentioned. The document concludes by summarizing observations on using RFID in healthcare, gaming, and human activity detection.
A Survey: SMS Sending Through RFID SensorsEditor IJMTER
This paper throws light on combined working of RFID sensors along with SMS sending
technique. Paper is based how RFID sensors can sense data. Generally these data needs to be send
through some wired or wireless medium, But sometime we need to send such data in groupings or
indications directly from Sensors.
This document provides an overview of Radio Frequency Identification (RFID) technology. It defines RFID as an automatic data capture technology that uses radio waves to identify items. The document then discusses how RFID works and its key components, including tags, readers, and electromagnetic communication. It also covers the history and development of RFID, applications of RFID, and privacy concerns regarding the technology. The document concludes with references for further information on RFID.
This document summarizes RFID tag anti-collision algorithms. It discusses that RFID systems use wireless communication between tags and readers, which can cause collisions when multiple tags respond simultaneously. It reviews existing ALOHA-based and tree-based anti-collision algorithms and presents a new trend that combines aspects of both approaches. The document then focuses on tree-ALOHA algorithms, describing the working process and presenting simulation results showing it can reduce overhead compared to other methods.
This document provides information about an RFID-based shopping trolley project. The project aims to improve the speed of shopping purchases using RFID technology. In the project, an RFID card is used for security access to products. When a product is placed in the trolley, the amount and total amount are displayed. The RFID reader interfaced with a microcontroller reads the RFID cards attached to products to identify them and track the items placed in the trolley. This allows for faster checkout while also improving security by requiring an RFID card to access products.
Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders
RFID (Radio Frequency Identification) is a technology that uses radio waves to automatically identify objects. An RFID system consists of RFID tags attached to objects, RFID readers to interrogate the tags, and a host computer system. Some key applications of RFID technology include asset tracking, supply chain management, and library management. While RFID provides benefits like contactless tracking and identification of multiple tags, there are also challenges to address regarding standards, costs, security, and privacy. Case studies demonstrate how companies have used RFID to better track returnable assets and improve supply chain operations.
Abstract: RFID based museum guide (Electronic hand held device) is designed to replace tourist guides to an extent. It’s a voice powered device that speaks out as the tourist is travelling from one monument to another monument (museum).This is achieved by placing a RFID receiver with the tourist (palm device). As soon as the electronic hand held device comes in the local area id the microcontroller receives the RF tag unique id from the receiver and compete it with its own data. If there is similarity occurs the microcontroller will play an audio clip related to that statue/painting. An RFID module basically comprises a tag and a reader. A RFID system comprises of an antenna, a transceiver and a transponder.
RFID technology uses radio waves to identify objects. It consists of tags attached to objects, readers that can detect tags, and software to process tag data. RFID has many applications including supply chain management, asset tracking, access control, and libraries. It provides benefits over barcodes like not requiring line of sight and being able to read multiple tags simultaneously. While initially used during World War II, RFID technology has advanced and miniaturized, finding growing use in various industries to enable real-time tracking of objects and inventory.
Implementation of radio frequency identification technology in accessing info...eSAT Journals
Abstract In today’s fast paced world with an enhancement of technology and innovation, healthcare systems have become so advanced with their technologies to monitor health variations. The prominent issue common man faces today is the number hours we spend in queues. This problem is not just for hospitals, but applies to every sector such as education, restaurants, malls, etc. Besides the issue mentioned above, there is another concern that we face with traditional filing system that are followed in many organizations. Loss of information has come into the radar of research, with the advancement of technologies and various ways to access them. Preservation and security of confidential information and data is expensive and requires skill to maintain them. Technology enhancement has made RFID technology more affordable over the years and is still a secure way to control the information and the usage of this technology hasn’t been explored enough. This system can be implemented as a module in any management system or security based system to allow or restrict access to any information. In order to resolve the above issues we integrated a database to secure confidential information with an easy and user friendly interface to be used by the hospital staff. RFID cards can control the access and manipulation of data. The application software for desktops integrates a RFID reader to enable easier access of information from the database, in this case the medical records and patient data. In this paper we describe the successful implementation and integration of the RFID reader with the application and the methodology that has been implemented to achieve a successful outcome. Keywords: Health Care, Radio Frequency Identification Tags (RFID), Passive and Active Tags, Low Frequency Tags, High Frequency Tags, Ultra High Frequency Tags
Radio Frequency Identification (RFID) Security issues and possible solutionsAhmad Sharifi
This document discusses security issues related to radio-frequency identification (RFID) systems. It begins with an overview of RFID technology and its components. It then identifies three main parts of an RFID system that are vulnerable to attacks: the edge hardware, communication part, and data support part. Six general types of attacks are described: spoofing identity, tampering with data, repudiation, information exposure, denial of service, and escalation of privilege. Potential solutions to improve RFID security are then outlined, including killing tags, blocking tags from responding, and using cryptography. The document concludes that addressing security and privacy issues is important for wider adoption of RFID technology.
Abstract Radio Frequency Identificaticationvishnu murthy
This document provides an overview of radio frequency identification (RFID) technology. It describes the historic development of RFID from early uses in World War II to current applications. The current technology is explained, including energy sources for different tag types (passive, semi-passive, active), common frequency bands, and standards. Issues of security and privacy are discussed, such as possible attacks on RFID systems and ways to authenticate tags and readers. Methods for RFID location tracking and new production methods are also outlined. Finally, the document notes some social implications of the increasing use of RFID technology.
The document discusses several methods for improving security and privacy in RFID systems. It describes RFID tags, readers, and the problems of human tracking and spying on customers that RFID enables. It then evaluates various technical approaches to address these privacy issues, including killing tags, Faraday cages, cryptographic protocols, clipped tags, randomized identifiers, blocker tags, and selective jamming. The document concludes that while the RFID Guardian approach provides the most complete privacy, blocker tags may be the most practical solution given their low cost and compatibility with existing RFID systems.
The document provides an overview of an upcoming presentation on RFID/NFC security. It begins with introducing the speaker and their background and experience. The presentation agenda is then outlined and will cover topics such as what is and isn't true about RFID, real-life examples of RFID/NFC usage, RFID hardware including tags and readers, software like LibNFC, and specific RFID protocols and formats like iClass and Mifare Classic. Motivation for the talk is cited as coming from a book on the hacker ethic and sharing skills with a technical community.
RFID is not a new technology and has passed through many decades of use in military, airline, library, security, healthcare, sports, animal farms and other areas
Third Eye for Blind using Ultrasonic Sensor Vibrator Gloveijtsrd
The primary goal of the project is to enable blind people to use an RF remote to find their gloves. This system gives visually impaired individuals walking exceptional security by incorporating a siren and attaching many sensors. Nowadays, individuals prioritize their safety above all else when they are driving, walking, or otherwise moving around. With the help of this system, we can track a blind persons whereabouts using a mobile device and receive emergency alert messages with their precise location. The technology also provides excellent security and shows them how to walk. The system has sensors for stair detection, soil detection, and obstacle recognition so that it may automatically identify impediments and deliver alerts. Using a soil moisture detector is used to find alerts in line with soil moisture levels. So that people may see the proper path while walking on the floor, stairs, and in many other locations, this approach can be very helpful. When an emergency arises, the system can be connected to a microcontroller and notify the appropriate people. A GPS receiver, a microcontroller, and a GSM modem are the components of this tracking system. This information is processed by the microcontroller and forwarded to the appropriate numbers after processing. Dr. B. Rambabu | S. Navya | M. Sahithi Vyas | A. Dishendra Sekhar "Third Eye for Blind using Ultrasonic Sensor Vibrator Glove" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-1 , February 2023, URL: https://www.ijtsrd.com/papers/ijtsrd53888.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/53888/third-eye-for-blind-using-ultrasonic-sensor-vibrator-glove/dr-b-rambabu
This presentation introduces radio frequency identification (RFID) technology. It discusses what RFID is, how it works using three main components (transceiver, transponder, and antenna), and provides examples of RFID hardware including tags, readers, and different frequency ranges. It also outlines several common applications of RFID technology in various industries like retail, transportation, security, and more.
This document discusses using cryptography and RFID systems for network security. It begins with an introduction to cryptography as an ancient method of encrypting messages for secure transmission. It then describes RFID technology, which uses radio waves to identify objects tagged with RFID transponders. The document proposes using both cryptography and RFID for network security to achieve benefits like data confidentiality, integrity, authentication and access control. It outlines potential applications of RFID in areas like animal tracking, individual records maintenance and banking security. Finally, it concludes that combining RFID and cryptography can provide a higher degree of user and data authentication for network security compared to using each approach alone.
Radio-frequency identification (RFID) uses radio waves to automatically identify objects. RFID tags contain antennas that receive and respond to an interrogator's signals. RFID tags can be classified as active, passive, or semi-passive. An RFID system consists of tags, a reader with an antenna, and backend software. RFID is used for applications like supply chain management, asset tracking, and access control. While offering advantages like contactless identification, RFID also raises privacy and security concerns that require consideration.
This document discusses Radio Frequency Identification (RFID) technology. It describes the basic components of an RFID system including RFID tags, readers, and antennas. It explains different types of RFID tags and readers and how they communicate using various coupling techniques like backscatter, inductive and capacitive coupling. Frequency ranges used for RFID are also outlined along with typical read ranges and applications for each frequency range. Key aspects of RFID technology covered include tag and reader design, data encoding, and use of RFID for identification and tracking applications in various industries.
This document provides an overview of radio-frequency identification (RFID) technology. It discusses the history and components of RFID, including tags, readers, software, and communication networks. It then outlines several applications of RFID such as supply chain management, retail, and security/access control. Both advantages, like automatic identification without line of sight, and disadvantages, including cost and need for regulations, are mentioned. The document concludes by summarizing observations on using RFID in healthcare, gaming, and human activity detection.
A Survey: SMS Sending Through RFID SensorsEditor IJMTER
This paper throws light on combined working of RFID sensors along with SMS sending
technique. Paper is based how RFID sensors can sense data. Generally these data needs to be send
through some wired or wireless medium, But sometime we need to send such data in groupings or
indications directly from Sensors.
This document provides an overview of Radio Frequency Identification (RFID) technology. It defines RFID as an automatic data capture technology that uses radio waves to identify items. The document then discusses how RFID works and its key components, including tags, readers, and electromagnetic communication. It also covers the history and development of RFID, applications of RFID, and privacy concerns regarding the technology. The document concludes with references for further information on RFID.
This document summarizes RFID tag anti-collision algorithms. It discusses that RFID systems use wireless communication between tags and readers, which can cause collisions when multiple tags respond simultaneously. It reviews existing ALOHA-based and tree-based anti-collision algorithms and presents a new trend that combines aspects of both approaches. The document then focuses on tree-ALOHA algorithms, describing the working process and presenting simulation results showing it can reduce overhead compared to other methods.
This document provides information about an RFID-based shopping trolley project. The project aims to improve the speed of shopping purchases using RFID technology. In the project, an RFID card is used for security access to products. When a product is placed in the trolley, the amount and total amount are displayed. The RFID reader interfaced with a microcontroller reads the RFID cards attached to products to identify them and track the items placed in the trolley. This allows for faster checkout while also improving security by requiring an RFID card to access products.
Radio-Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders
RFID (Radio Frequency Identification) is a technology that uses radio waves to automatically identify objects. An RFID system consists of RFID tags attached to objects, RFID readers to interrogate the tags, and a host computer system. Some key applications of RFID technology include asset tracking, supply chain management, and library management. While RFID provides benefits like contactless tracking and identification of multiple tags, there are also challenges to address regarding standards, costs, security, and privacy. Case studies demonstrate how companies have used RFID to better track returnable assets and improve supply chain operations.
Abstract: RFID based museum guide (Electronic hand held device) is designed to replace tourist guides to an extent. It’s a voice powered device that speaks out as the tourist is travelling from one monument to another monument (museum).This is achieved by placing a RFID receiver with the tourist (palm device). As soon as the electronic hand held device comes in the local area id the microcontroller receives the RF tag unique id from the receiver and compete it with its own data. If there is similarity occurs the microcontroller will play an audio clip related to that statue/painting. An RFID module basically comprises a tag and a reader. A RFID system comprises of an antenna, a transceiver and a transponder.
12. Performance of Blocking Reader cont..: V apc = 1.6 (Power= 9dBm) Blocking Reader 15 April 2010
13. Performance of Blocking Reader cont..: Maximum Blocking distance when an unauthorized Sirit Reader is present V apc = 2.6 (Power= 21dBm) V apc = 1.6 (Power= 9dBm) Blocking Reader 15 April 2010 Sirit Reader Blocking Reader Squiggle Tag 1.5 mts Distance D Height 1.4 mts
14. Performance of Blocking Reader cont..: Blocking Range results comparing with Friis Power Blocking Reader 15 April 2010
15. Performance of Blocking Reader cont..: Blocking Envelope: Around the Tag Blocking Reader 15 April 2010 Sirit Reader Blocking Reader Squiggle Tag 2.1 mts Distance D Height 1.4 mts θ
16. Blocking Reader application: Performance of BR in presence of Human Blocking Reader 15 April 2010 Sirit Reader Squiggle Tag Height 1.4 mts θ Human Body Distance D 2.7 mts Blocking Reader
17.
18. Thank You Any Questions ?? Blocking Reader 15 April 2010