RFIDIOts!!! RFID Hacking without a Soldering Iron (... or a Patent Attorney :)
|
|
- Alannah Dawson
- 8 years ago
- Views:
Transcription
1 RFIDIOts!!! RFIDHackingwithoutaSolderingIron (...orapatentattorney:) AdamLaurie CanSecWest Vancouver,2007
2
3
4 WhatisRFID? ContaclessAuto IDtechnology RadioFrequencyorMagneticallyCoupledchip Chipispassive Energyfromreaderactivatesthechip
5 Whatisitfor? SimpleIDonly DoorEntrySystems Smartcards PaymentCards e.g.oyster Biometrics e.g.hid e.g.passports
6 RFIDMooamI? AnimalID HotelKeys CarImmobilisers SkiPasses GoodsLabels LuggageHandling Vending HumanImplants
7 SellingtheideaofHumanImplants
8 HumanImplants Military MentalPatients Tracking BeachBars AccessControl DigitalWallets
9 UniqueID!!! Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned
10 UniqueID? DIYCloningUnits Spottheoriginal?
11 UniqueID? DIYCloningUnits Spottheoriginal? IndustryDefence:
12 UniqueID? DIYCloningUnits Spottheoriginal? IndustryDefence: Clonesdonothave thesameformfactor andarethereforenot trueclones
13 UniqueID? Readerscannot'see' soformfactor irrelevant
14 UniqueID? = Readerscannot'see' soformfactor irrelevant
15 CloningDevices
16 CloningDevices
17 CloningDevices
18 CloningDevices
19 CloningDevices
20 CloningDevices
21 CloningDevices
22 CloningDevices
23 TheChallenge Createa'true'clone SameID SameFormFactor
24 UnderstandingtheID Industrystandardexample AnimalTagging ISO 11784/5FDX B Applicationflag(Animal/Non Animal) 3DigitCountryorManufacturercode NationalID
25 SendingtheID ReaderandTAGwillcommunicatewith Specificfrequency 125/134.2kHz (13.56MHz) Specificdatabitrate Specificencoding(modulation)scheme RF/2 RF/128 FSK,Manchester,BiPhase,PSK,NRZ Specificbitpatterns Header/Data/CRC
26 DecodingtheID 8ByterawIDfrom'dumb'reader Byte7 Byte6 Byte5 Byte4 Byte3 NationalID ReverseMSB/LSB ReverseeachNibble Rightshift(x2) ConverttoDecimal Byte2 Country Byte1 Byte0 ApplicationCode
27 DecodingtheID 8ByterawID EA 6F F6 AE CA 89 0E ReverseeachNibble ReverseMSB/LSB F6 57
28 DecodingtheID 8ByterawID ApplicationID Country F65 CA 89 0E NationalID 748CA890E CountryF65rightshifted:3D9=='985'decimal F6 icar.org:'destronfearing/digitalangelcorporation' NationalID748CA890E==' '
29 EncodingtheID Reversethedecodingprocess 64BitID AddHeader/CRCtorawbinaryID Header ID B ID B ID B ID B ID B ID B ID B ID FixedbitsembeddedinIDpreventheaderbeing duplicatedindatastream Nowwehave128bitsofrawbit levelid B CRC Howdowedeliverit?
30 Multi FormatTransponders Whymake10transpondertypeswhenyoucan make1? Lowermanufacturingcosts Lowerstocking/distributioncosts Convenience
31 Multi FormatTransponders Independentlyconfigurableparameters ConfigurationforBitRate,Modulationetc. 224Bitsuserprogrammablememory Dump<n>datablocksonwakeup Multiple'personalities' Q5 Hitag2 Configurationfor'PublicModes' 256Bituserprogrammablememory Dump<n>datablocksonwakeupasperModesetting
32 SendingtheID TakearedundantDoorEntrytag Re Setconfigurationasappropriate BitRate Modulation Inversion Numberofblockstodumpon'wakeup' ProgramdatablockswithrawID
33 Demonstration CloneTrovan'Unique'TAG AccessControlSystem CloneISO11784'Animal'TAG(FDX B) CowImplant VeriChippaperweight
34 RFIDimplantedchipthreats Trackindividuals Targetindividuals Impersonateindividuals Gainaccesstorestrictedareas Providealibiforaccomplice! 'Smart'Bombs Deviceonlygoesoffiftargetofsufficientrankisin range.
35 Encryptionisyourfriend RFIDEnabled 'Biometric'passports 48ItemsofData Fingerprint FacialImage BirthCertificate HomeAddress PhoneNumbers Profession
36 Keystoyourkingdom PseudorandomUID Cannotdetermine presenceofspecific passportwithout loggingin StrongAuthentication BasicAccessControl ContentEncryption 3DES ExtendedAccess Control
37 DerivingtheKeys MRZ MachineReadable Zone Key DocumentNumber DateofBirth ExpiryDate
38 epassportdemonstration
39 epassportthreats Keydatamaybeobtainedthroughother channels Passportprofiling Determinecountryoforiginwithoutloggingin Implementationerrors: AustralianpassportIDdoesnotstartwith'08'onselect AustralianpassportdoesnotrequireBasicAuthon'File Select',onlyon'FileRead'. Targetspecificpassportholders BombthatdetonatesforAustraliansonly...
40 RFIDIOt OpenSourcePythonlibrary Hardwareindependent ACG Frosch OpenPCDcomingsoon Lowcostreader/writersnowavailable
41 ACGreactiontoRFIDIOt Unfortunatelyyourcompaniesactivities seemtobecountertoacg'sinterestsso wewillnotbeabletosupportyouany further. 3rdJanuary,2007
42 Questions?
adam@thebunker.net http://www.thebunker.net
ADayInTheLifeofaHacker Thingswegetuptowhennobodyislooking,andthatkeepmeawakeatnight... AdamLaurie adam@thebunker.net http://www.thebunker.net FIRSTGeekZone Seville,2007 Contents InfraRed RFID ATMs/(Magstripes?)
More informationE-Passport Testing. Ensuring Global Acceptance. Jos Chehin Date: 17 November 2006 Location: ASML
E-assport Testing Ensuring Global Acceptance By: Jos Chehin Date: 17 ovember 2006 Location: ASML Global Acceptance of the e-assport Global Acceptance Interoperability Functionality Security Test Standards
More informationRFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
More informationAdvanced Security Mechanisms for Machine Readable Travel Documents and eidas Token
Technical Guideline TR-03110-4 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 4 Applications and Document Profiles Version 2.20 3. February 2015 History Version
More informationGemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
More informationAchieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
More informationUsing Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
More informationSecure Remote Photo Identification With ID card
Secure Remote Photo Identification With ID card Keith Jentoft 888-456-0425 kjentoft@audiosmartcard.com www.ncryptone.com 1 AudioSmartCard, group Basic concept: Remote Photo Authentication Cardholder s
More informationSecurity by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
More informationMIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
More informationToday, there are three major initiatives for cards and credentials. Every security
What s the Near Future Hold for ID Cards & Credentials? Jeremy Earles, Ingersoll Rand Security Technologies Portfolio Marketing Manager-Credentials & Readers Today, there are three major initiatives for
More informationHow To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
More informationEntrust Smartcard & USB Authentication
Entrust Smartcard & USB Authentication Technical Specifications Entrust IdentityGuard smartcard- and USB-based devices allow organizations to leverage strong certificate-based authentication of user identities
More informationCHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
More informationPMAfob Home Automation Demo
PMAfob Home Automation Demo User Guide V1.1 October 20 th, 2010 PMAfob Home Automation Demo User Guide Overview PMAfob Software PMAfob Hardware Receiver Software Receiver Hardware Setup of the PMAfob Home
More informationadvant advanced contactless smart card system
LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and
More informationDevelopment of Hybrid Radio Frequency Identification and Biometric Security Attendance System
International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi
More informationLoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
More informationAjay Gummalla-July 2001
DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way
More informationTechnical Data Sheet UM-005. UM005-doc-01.04 In reference to UM005-c-01.04
Technical Data Sheet UM-005 UM005-doc-01.04 In reference to UM005-c-01.04 Contents Contents... 2 Introductions... 3 Specifications... 3 Pin description... 4 Connection diagram... 4 Module PCB dimensions...
More informationRFID Design Principles
RFID Design Principles Second Edition Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents CHAPTER 1 Introduction CHAPTER 2 Short-Range Communications Systems 2.1 Radio-Frequency Spectrum
More informationEuropean Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso anabela.pedroso@umic.pt Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
More informationKeep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
More informationA Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 hlavm1am@artax.karlin.mff.cuni.cz and trosa@ebanka.cz 1 Department of Algebra, Charles University
More informationW.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationVidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
More informationA C C E S S C O N T R O L S Y S T E M
A C C E S S C O N T R O L S Y S T E M TIME & ATTENDANCE SYSTEM Model No. Z.AC.R.BIO.M8.TA Z.AC.RC.BIRO.M8+ID.TA Type: BIOMETRIC TIME & ATTENDANCE SYSTEM Combination of silver & black colour Instant verification
More informationCotag active cards and tags
Cotag active cards and tags For a truly hands-free access control environment. SiPass cards and tags Hands-free, proximity or multi-purpose? Take your pick. Siemens recommends Cotag, smart card or standard
More informationMoving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
More informationAN3332 Application note
Application note Generating PWM signals using STM8S-DISCOVERY Application overview This application user manual provides a short description of how to use the Timer 2 peripheral (TIM2) to generate three
More informationMobitex Network Security
Mobitex Network Security olleb of the Toolcrypt Group olle@toolcrypt.org Mobitex Background Network structure Security features Mobitex background History of the Mobitex protocol Overview of network operators
More informationAccess Control System Access Control System is designed for the places where need for crucial security.
rt RichtonTec as a company based on biometric and RFID technology has been supplying access control solution and time and attendance terminals for over 6 years. Over this time we developed our own unique
More informationrf Technology to automate your BUsiness
Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,
More informationFull page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
More informationSmart Card Evolution
Smart Card Evolution Fernando Ferreira Departamento de Informática, Universidade do Minho 4710-057 Braga, Portugal fernando.ferreira4@mail.telepac.pt Abstract. This comunnication describes the state of
More informationPRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
More informationIn this article we will discuss the SI. Both from the point of view of how it s used to create an EPG, and what effect SI errors may have on the EPG
Using SI Tables to Create Electronic Program Guides. Application Note. Introduction. The Electronic Program Guide (EPG) is a feature unique to the digital TV world. It's the electronic equivalent of the
More informationUsing Smart Cards for Secure Physical Access
Using Smart Cards for Secure Physical Access A Smart Card Alliance Report Publication Date: July 2003 Publication Number: ID-03003 Smart Card Alliance 191 Clarksville Rd. Princeton Junction, NJ 08550 www.smartcardalliance.org
More informationSecurity Classification: EIDA ID Card Toolkit v2.7. Developer s Guide
Security Classification: EIDA ID Card Toolkit v2.7 Developer s Guide Organization Document Title Date 31-10-2012 Doc Name / Ref Classification Document Type Document Details Emirates Identity Authority
More informationAN3998 Application note
Application note PDM audio software decoding on STM32 microcontrollers 1 Introduction This application note presents the algorithms and architecture of an optimized software implementation for PDM signal
More informationChapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of
More informationSECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS
************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************
More informationHow Does It Work? Internet of Things
Intermec UAP-2100 What is RFID? 18-759: Wireless Networks Lecture 14: RFID Peter Steenkiste and Hedda R. Schmidtke Departments of Computer Science and Electrical and Computer Engineering Spring Semester
More informationOBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications
OBID RFID by FEIG ELECTRONIC OBID classic / OBID classic-pro RFID Reader Technology for Security Applications OBID RFID Reader Technologies RFID Readers from the number 1 manufacturer FEIG ELECTRONIC specialized
More informationMulti-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
More informationMulti Factor Authentication
Seminar Web Engineering Multi Factor Authentication Matr. 233181 stefan.meier@s2009.tu-chemnitz.de Outline 1. Idea 2. Security Issues 3. Key Success Factors 4. Technologies 4.1 Knowledge 4.2 Property 4.3
More informationReaders and Credentials. from Security Technologies
Readers and Credentials from Security Technologies readers AVAILABLE FINISHES: Black (Standard) Cream PR10 XceedID Proximity Mini-Mullion Reader Cool Tone Gray Warm Tone Brown Simplifying the security
More informationMobitex Network Security
Mobitex Network Security olleb of the Toolcrypt Group olle@toolcrypt.org Mobitex Background Network structure Security features Mobitex background History of the Mobitex protocol Overview of network operators
More informationContactless Technology for Secure Physical Access: Technology and Standards Choices
Contactless Technology for Secure Physical Access: Technology and Standards Choices A Smart Card Alliance Report Publication Date: October 2002 Publication Number: ID-02002 Smart Card Alliance 191 Clarksville
More informationElectronic Access Control Solutions
Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical
More informationID Document Scanning and Biometric Solutions
ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process
More informationintertrax MOBILE PIV
intertrax MOBILE PIV Personnel Identification Verification Software User Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882;
More informationBuilding Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business
s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the
More informationNFC Hacking: The Easy Way
DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! We re always looking for cool security projects!
More informationAccessories for the SoMo 655 Handheld Computer
Accessories for the SoMo 655 Handheld Computer Flexibility / Expandability / Lower Total Cost of Ownership Socket Mobile offers a full line of accessories to complement the SoMo 655 Series. Whether you
More informationPreventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
More informationOracle IVR Integrator
Oracle IVR Integrator Concepts and Procedures Release 11i for Windows NT July 2001 Part No. A86103-03 1 Understanding Oracle IVR Integrator This topic group provides overviews of the application and its
More informationAtmel Innovative Silicon RFID IDIC Solutions
Atmel Innovative Silicon RFID IDIC Solutions 2 2013 / www.atmel.com Table of Contents Atmel: The Expert with Long-term Know-how....4 The Technology.... 4-5 Passive RFID....4 Active RFID....5 RFID Applications....
More informationSecurity and Privacy in RFID Applications
Security and Privacy in RFID Applications Torstein Haver Master of Science in Communication Technology Submission date: June 2006 Supervisor: Svein Johan Knapskog, ITEM Co-supervisor: Martin Gilje Jaatun,
More informationCombining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University
More informationFile System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich fsfs@stefan-ludwig.de Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
More informationTCB Workshop. Unlicensed National Information Infrastructure Devices (U-NII)/Dynamic Frequency Selection (DFS)
1 TCB Workshop Unlicensed National Information Infrastructure Devices (U-NII)/Dynamic Frequency Selection (DFS) Andrew Leimer Office of Engineering and Technology/Equipment Authorization Branch FCC Laboratory
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationNew Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany
New Attacks against RFID-Systems Lukas Grunwald DN-Systems GmbH Germany Agenda What is RFID? How to exploit and attack RFID systems Attacks against the middleware Reader-emulation, soft-tags Unexpected
More informationManufacturers Suggested Retail Price List
Manufacturers Suggested Retail Price List Effective December 11th, 2008 15182 Triton Lane Suite 102, Huntington Beach, CA 92649 Voice 714.901.5462 Fax 714.901.5472 www.pyramidcomm.com SVR-250 Repeater
More informationNACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
More informationEP902. 2-line Industrial Long Range Cordless System. Overview
2-line Industrial Long Range Cordless System Overview, Industrial Cordless offer durability and coverage with various levels of phone system functionality. Their feature of broadcast, 2-way radio, 2-line
More informationAUDIENCE MEASUREMENT SYSTEM BASED ON BLUETOOTH CORDLESS COMMUNICATION
21 22 September 2007, BULGARIA 113 Proceedings of the International Conference on Information Technologies (InfoTech-2007) 21 st 22 nd September 2007, Bulgaria vol. 2 AUDIENCE MEASUREMENT SYSTEM BASED
More informationE-Blocks Easy RFID Bundle
Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course
More informationWBS AFC Standard SW Solution Development
WBS AFC Standard SW Solution Development 1. Company Overview - General Establishment : Joint Venture Overview [ ] Korea Smart Card Co., Ltd Seoul Metropolitan Government + LG Group Company Name Korea Smart
More informationSampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.
Sampling Theorem We will show that a band limited signal can be reconstructed exactly from its discrete time samples. Recall: That a time sampled signal is like taking a snap shot or picture of signal
More informationIntroducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
More informationSecure recharge of disposable RFID tickets
Secure recharge of disposable RFID tickets Riccardo Focardi Flaminia Luccio Università Ca Foscari, Venezia {focardi,luccio}@unive.it FAST 2011 15-16 September 2011, Leuven FAST 2011 ()Secure recharge of
More informationSIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used.
SIM CARD PROTOCOLS Though rarely thought about by most users their mobile phone contains a remarkable computing device that enables them to go about their business of making calls, text messaging or playing
More informationWhy test results can t compare
Automotive RF immunity test set-up analysis Why test results can t compare Mart Coenen, EMCMCC, Eindhoven, the Netherlands Hugo Pues, Melexis Technologies NV, Tessenderlo, Belgium Thierry Bousquet, Continental,
More informationGrundig SAT Systems HEADEND RECEIVER MODULATOR HRM 391 TWIN ENGLISH
Grundig SAT Systems HEADEND RECEIVER MODULATOR HRM 391 TWIN ENGLISH CONTENTS 3 General Scope of delivery Technical data The terrestrial cassette HRM 391 TWIN 4 General/Connecting Installing the cassette
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
More informationWater Metering System SmartMeter Prepayment. SmartMeter Prepayment. Water Metering System
Water Metering System SmartMeter Prepayment SmartMeter Prepayment Water Metering System Water Metering System SmartMeter Prepayment SmartMeter Prepayment Water Metering System A dynamic approach to Prepayment
More informationTime recording with the Terminal B-web 93 00
Time recording with the Terminal B-web 93 00 Elegant design with innovative usability concept In pursuit of perfection «Perfection is achieved, not when there is nothing more to add, but when there is
More informationDetailed Specifications
1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for
More informationLED Bulb Manual. Aeotec by Aeon Labs LED Bulb.
LED Bulb Manual Aeotec by Aeon Labs LED Bulb. Aeotec LED Bulb is a multi-coloured LED bulb which allows control (on/off/dim/colour change) via wireless Z-Wave commands. The LED Bulb can also communicate
More information1-MINIMUM REQUIREMENT SPECIFICATIONS FOR DVB-T SET-TOP-BOXES RECEIVERS (STB) FOR SDTV
1-MINIMUM REQUIREMENT SPECIFICATIONS FOR DVB-T SET-TOP-BOXES RECEIVERS (STB) FOR SDTV Standard definition television Terminology SHALL (mandatory): Denotes that the item is mandatory. SHOULD (recommended):
More informationLTE BACKHAUL REQUIREMENTS A REALITY CHECK PETER CROY, SENIOR NETWORK ARCHITECT, AVIAT NETWORKS
LTE BACKHAUL REQUIREMENTS A REALITY CHECK PETER CROY, SENIOR NETWORK ARCHITECT, AVIAT NETWORKS 1 LTE Cell: Single User Throughput Estimates Data Rate Down/Up [Mbps] vs. Distance from Cell Center Channel
More informationGuard All Security Symposium. Identity and Access Management
Guard All Security Symposium Identity and Access Management The Complex Digital World Welcome to the Identiverse Segments / Brands Product Offerings Applications ID Management Solutions Governmental credentialing
More informationAdvanced Electronic System for Human Safety (Smart Watch)
Advanced Electronic System for Human Safety (Smart Watch) Ganesh Ghorpade 1, Tushar Gaikwad 2, Laxman Jangid 3 Department of Electronics and Telecommunication Pimpri Chinchwad College of Engineering,Pune,Maharashtra,India
More informationSecure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Embedded RF ABSTRACT This application report describes
More informationBroadband access. Nils Holte, NTNU. NTNU Department of Telecommunications Kursdagene ved NTNU, Digitale telenett, 9. januar 2002 1.
Broadband access - properties of the copper network Nils Holte, Kursdagene ved, Digitale telenett, 9. januar 2002 1 Definition of broadband Overview Alternatives for fixed broadband access pair cable,
More informationComplete Technology and RFID
UGM 2007 Complete Technology and RFID Overview Operating Principles Inductive Coupling Microwave Coupling Coupling to Circuit Simmulation Summary T. Wittig 1 twi, apr / v2.0 / 12. Jun 2007 Overview Radio
More informationTwo-Way Radio Express Products List (EPL) 3744 Effective November 1, 2014
Two-Way Radio Express Products List (EPL) 3744 Two-Way Radio Express Products List (EPL) 3744 Effective November 1, 2014 Cover Warranty: 1 Year Parts and Labor at Manufacturer 1 of 8 Synthesized Vehicular
More informationGlobal network of innovation. Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway)
Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway) Agenda Security Portfolio intro Why SmartCard? SmartCard Applications SmartCard Solution Components
More informationProject 25 Compliance Assessment Program Summary Test Report NX-5200 Portable Radio, VHF STR-JKWRD-NX5200-0815
roject 25 Compliance Assessment rogram NX-5200 ortable Radio, VHF Device Under Test Description Manufacturer JVCKENWOOD Corporation JVCKENWOOD USA Corporation Manufacturer Contact Donald E. Wingo, 678-474-4719
More informationSmart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
More informationContents. User guide. TDX Headend Unit - Art. No. 492090 891072I
Contents User guide TDX Headend Unit - Art. No. 492090 891072I 1 EN Contents Contents SAFETY PRECAUTIONS... 4 Environment... 4 Power supply... 4 Weight... 4 Earth... 4 Disposal... 4 INTRODUCTION... 5 BOX
More informationTraining Webcast on Contactless Cards for Access Control. January 21, 2004
Training Webcast on Contactless Cards for Access Control January 21, 2004 Your presenters» Perry Garvis Business Development Manager Access Control & Security Products» Kelly Stark TI-RFid Systems Strategic
More informationUnverified Fields - A Problem with Firewalls & Firewall Technology Today
Unverified Fields - A Problem with Firewalls & Firewall Technology Today Ofir Arkin The Sys-Security Group ofir.arkin@sys-security.com October 2000 1 Introduction The following problem (as discussed in
More informationRFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
More information