RFIDIOts!!! RFID Hacking without a Soldering Iron (... or a Patent Attorney :)
|
|
|
- Alannah Dawson
- 10 years ago
- Views:
Transcription
1 RFIDIOts!!! RFIDHackingwithoutaSolderingIron (...orapatentattorney:) AdamLaurie CanSecWest Vancouver,2007
2
3
4 WhatisRFID? ContaclessAuto IDtechnology RadioFrequencyorMagneticallyCoupledchip Chipispassive Energyfromreaderactivatesthechip
5 Whatisitfor? SimpleIDonly DoorEntrySystems Smartcards PaymentCards e.g.oyster Biometrics e.g.hid e.g.passports
6 RFIDMooamI? AnimalID HotelKeys CarImmobilisers SkiPasses GoodsLabels LuggageHandling Vending HumanImplants
7 SellingtheideaofHumanImplants
8 HumanImplants Military MentalPatients Tracking BeachBars AccessControl DigitalWallets
9 UniqueID!!! Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned
10 UniqueID? DIYCloningUnits Spottheoriginal?
11 UniqueID? DIYCloningUnits Spottheoriginal? IndustryDefence:
12 UniqueID? DIYCloningUnits Spottheoriginal? IndustryDefence: Clonesdonothave thesameformfactor andarethereforenot trueclones
13 UniqueID? Readerscannot'see' soformfactor irrelevant
14 UniqueID? = Readerscannot'see' soformfactor irrelevant
15 CloningDevices
16 CloningDevices
17 CloningDevices
18 CloningDevices
19 CloningDevices
20 CloningDevices
21 CloningDevices
22 CloningDevices
23 TheChallenge Createa'true'clone SameID SameFormFactor
24 UnderstandingtheID Industrystandardexample AnimalTagging ISO 11784/5FDX B Applicationflag(Animal/Non Animal) 3DigitCountryorManufacturercode NationalID
25 SendingtheID ReaderandTAGwillcommunicatewith Specificfrequency 125/134.2kHz (13.56MHz) Specificdatabitrate Specificencoding(modulation)scheme RF/2 RF/128 FSK,Manchester,BiPhase,PSK,NRZ Specificbitpatterns Header/Data/CRC
26 DecodingtheID 8ByterawIDfrom'dumb'reader Byte7 Byte6 Byte5 Byte4 Byte3 NationalID ReverseMSB/LSB ReverseeachNibble Rightshift(x2) ConverttoDecimal Byte2 Country Byte1 Byte0 ApplicationCode
27 DecodingtheID 8ByterawID EA 6F F6 AE CA 89 0E ReverseeachNibble ReverseMSB/LSB F6 57
28 DecodingtheID 8ByterawID ApplicationID Country F65 CA 89 0E NationalID 748CA890E CountryF65rightshifted:3D9=='985'decimal F6 icar.org:'destronfearing/digitalangelcorporation' NationalID748CA890E==' '
29 EncodingtheID Reversethedecodingprocess 64BitID AddHeader/CRCtorawbinaryID Header ID B ID B ID B ID B ID B ID B ID B ID FixedbitsembeddedinIDpreventheaderbeing duplicatedindatastream Nowwehave128bitsofrawbit levelid B CRC Howdowedeliverit?
30 Multi FormatTransponders Whymake10transpondertypeswhenyoucan make1? Lowermanufacturingcosts Lowerstocking/distributioncosts Convenience
31 Multi FormatTransponders Independentlyconfigurableparameters ConfigurationforBitRate,Modulationetc. 224Bitsuserprogrammablememory Dump<n>datablocksonwakeup Multiple'personalities' Q5 Hitag2 Configurationfor'PublicModes' 256Bituserprogrammablememory Dump<n>datablocksonwakeupasperModesetting
32 SendingtheID TakearedundantDoorEntrytag Re Setconfigurationasappropriate BitRate Modulation Inversion Numberofblockstodumpon'wakeup' ProgramdatablockswithrawID
33 Demonstration CloneTrovan'Unique'TAG AccessControlSystem CloneISO11784'Animal'TAG(FDX B) CowImplant VeriChippaperweight
34 RFIDimplantedchipthreats Trackindividuals Targetindividuals Impersonateindividuals Gainaccesstorestrictedareas Providealibiforaccomplice! 'Smart'Bombs Deviceonlygoesoffiftargetofsufficientrankisin range.
35 Encryptionisyourfriend RFIDEnabled 'Biometric'passports 48ItemsofData Fingerprint FacialImage BirthCertificate HomeAddress PhoneNumbers Profession
36 Keystoyourkingdom PseudorandomUID Cannotdetermine presenceofspecific passportwithout loggingin StrongAuthentication BasicAccessControl ContentEncryption 3DES ExtendedAccess Control
37 DerivingtheKeys MRZ MachineReadable Zone Key DocumentNumber DateofBirth ExpiryDate
38 epassportdemonstration
39 epassportthreats Keydatamaybeobtainedthroughother channels Passportprofiling Determinecountryoforiginwithoutloggingin Implementationerrors: AustralianpassportIDdoesnotstartwith'08'onselect AustralianpassportdoesnotrequireBasicAuthon'File Select',onlyon'FileRead'. Targetspecificpassportholders BombthatdetonatesforAustraliansonly...
40 RFIDIOt OpenSourcePythonlibrary Hardwareindependent ACG Frosch OpenPCDcomingsoon Lowcostreader/writersnowavailable
41 ACGreactiontoRFIDIOt Unfortunatelyyourcompaniesactivities seemtobecountertoacg'sinterestsso wewillnotbeabletosupportyouany further. 3rdJanuary,2007
42 Questions?
E-Passport Testing. Ensuring Global Acceptance. Jos Chehin Date: 17 November 2006 Location: ASML
E-assport Testing Ensuring Global Acceptance By: Jos Chehin Date: 17 ovember 2006 Location: ASML Global Acceptance of the e-assport Global Acceptance Interoperability Functionality Security Test Standards
RFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, [email protected] Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token
Technical Guideline TR-03110-4 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 4 Applications and Document Profiles Version 2.20 3. February 2015 History Version
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Using Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
How To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
Entrust Smartcard & USB Authentication
Entrust Smartcard & USB Authentication Technical Specifications Entrust IdentityGuard smartcard- and USB-based devices allow organizations to leverage strong certificate-based authentication of user identities
CHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
PMAfob Home Automation Demo
PMAfob Home Automation Demo User Guide V1.1 October 20 th, 2010 PMAfob Home Automation Demo User Guide Overview PMAfob Software PMAfob Hardware Receiver Software Receiver Hardware Setup of the PMAfob Home
advant advanced contactless smart card system
LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and
Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System
International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
Ajay Gummalla-July 2001
DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way
Technical Data Sheet UM-005. UM005-doc-01.04 In reference to UM005-c-01.04
Technical Data Sheet UM-005 UM005-doc-01.04 In reference to UM005-c-01.04 Contents Contents... 2 Introductions... 3 Specifications... 3 Pin description... 4 Connection diagram... 4 Module PCB dimensions...
RFID Design Principles
RFID Design Principles Second Edition Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents CHAPTER 1 Introduction CHAPTER 2 Short-Range Communications Systems 2.1 Radio-Frequency Spectrum
European Electronic Identity Practices Country Update of Portugal
European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso [email protected] Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations
Keep Out of My Passport: Access Control Mechanisms in E-passports
Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.
A Note on the Relay Attacks on e-passports
A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 [email protected] and [email protected] 1 Department of Algebra, Charles University
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
A C C E S S C O N T R O L S Y S T E M
A C C E S S C O N T R O L S Y S T E M TIME & ATTENDANCE SYSTEM Model No. Z.AC.R.BIO.M8.TA Z.AC.RC.BIRO.M8+ID.TA Type: BIOMETRIC TIME & ATTENDANCE SYSTEM Combination of silver & black colour Instant verification
Cotag active cards and tags
Cotag active cards and tags For a truly hands-free access control environment. SiPass cards and tags Hands-free, proximity or multi-purpose? Take your pick. Siemens recommends Cotag, smart card or standard
Moving to Multi-factor Authentication. Kevin Unthank
Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that
AN3332 Application note
Application note Generating PWM signals using STM8S-DISCOVERY Application overview This application user manual provides a short description of how to use the Timer 2 peripheral (TIM2) to generate three
Mobitex Network Security
Mobitex Network Security olleb of the Toolcrypt Group [email protected] Mobitex Background Network structure Security features Mobitex background History of the Mobitex protocol Overview of network operators
Access Control System Access Control System is designed for the places where need for crucial security.
rt RichtonTec as a company based on biometric and RFID technology has been supplying access control solution and time and attendance terminals for over 6 years. Over this time we developed our own unique
rf Technology to automate your BUsiness
Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,
Full page passport/document reader Regula model 70X4M
Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses
Smart Card Evolution
Smart Card Evolution Fernando Ferreira Departamento de Informática, Universidade do Minho 4710-057 Braga, Portugal [email protected] Abstract. This comunnication describes the state of
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
In this article we will discuss the SI. Both from the point of view of how it s used to create an EPG, and what effect SI errors may have on the EPG
Using SI Tables to Create Electronic Program Guides. Application Note. Introduction. The Electronic Program Guide (EPG) is a feature unique to the digital TV world. It's the electronic equivalent of the
Using Smart Cards for Secure Physical Access
Using Smart Cards for Secure Physical Access A Smart Card Alliance Report Publication Date: July 2003 Publication Number: ID-03003 Smart Card Alliance 191 Clarksville Rd. Princeton Junction, NJ 08550 www.smartcardalliance.org
Security Classification: EIDA ID Card Toolkit v2.7. Developer s Guide
Security Classification: EIDA ID Card Toolkit v2.7 Developer s Guide Organization Document Title Date 31-10-2012 Doc Name / Ref Classification Document Type Document Details Emirates Identity Authority
AN3998 Application note
Application note PDM audio software decoding on STM32 microcontrollers 1 Introduction This application note presents the algorithms and architecture of an optimized software implementation for PDM signal
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1
Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of
SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS
************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************
OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications
OBID RFID by FEIG ELECTRONIC OBID classic / OBID classic-pro RFID Reader Technology for Security Applications OBID RFID Reader Technologies RFID Readers from the number 1 manufacturer FEIG ELECTRONIC specialized
Multi-Factor Authentication of Online Transactions
Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best
Multi Factor Authentication
Seminar Web Engineering Multi Factor Authentication Matr. 233181 [email protected] Outline 1. Idea 2. Security Issues 3. Key Success Factors 4. Technologies 4.1 Knowledge 4.2 Property 4.3
Readers and Credentials. from Security Technologies
Readers and Credentials from Security Technologies readers AVAILABLE FINISHES: Black (Standard) Cream PR10 XceedID Proximity Mini-Mullion Reader Cool Tone Gray Warm Tone Brown Simplifying the security
Mobitex Network Security
Mobitex Network Security olleb of the Toolcrypt Group [email protected] Mobitex Background Network structure Security features Mobitex background History of the Mobitex protocol Overview of network operators
Contactless Technology for Secure Physical Access: Technology and Standards Choices
Contactless Technology for Secure Physical Access: Technology and Standards Choices A Smart Card Alliance Report Publication Date: October 2002 Publication Number: ID-02002 Smart Card Alliance 191 Clarksville
Electronic Access Control Solutions
Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical
ID Document Scanning and Biometric Solutions
ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process
intertrax MOBILE PIV
intertrax MOBILE PIV Personnel Identification Verification Software User Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882;
Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business
s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the
NFC Hacking: The Easy Way
DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! We re always looking for cool security projects!
Accessories for the SoMo 655 Handheld Computer
Accessories for the SoMo 655 Handheld Computer Flexibility / Expandability / Lower Total Cost of Ownership Socket Mobile offers a full line of accessories to complement the SoMo 655 Series. Whether you
Preventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
Oracle IVR Integrator
Oracle IVR Integrator Concepts and Procedures Release 11i for Windows NT July 2001 Part No. A86103-03 1 Understanding Oracle IVR Integrator This topic group provides overviews of the application and its
Atmel Innovative Silicon RFID IDIC Solutions
Atmel Innovative Silicon RFID IDIC Solutions 2 2013 / www.atmel.com Table of Contents Atmel: The Expert with Long-term Know-how....4 The Technology.... 4-5 Passive RFID....4 Active RFID....5 RFID Applications....
Security and Privacy in RFID Applications
Security and Privacy in RFID Applications Torstein Haver Master of Science in Communication Technology Submission date: June 2006 Supervisor: Svein Johan Knapskog, ITEM Co-supervisor: Martin Gilje Jaatun,
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software
Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University
File System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich [email protected] Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
TCB Workshop. Unlicensed National Information Infrastructure Devices (U-NII)/Dynamic Frequency Selection (DFS)
1 TCB Workshop Unlicensed National Information Infrastructure Devices (U-NII)/Dynamic Frequency Selection (DFS) Andrew Leimer Office of Engineering and Technology/Equipment Authorization Branch FCC Laboratory
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany
New Attacks against RFID-Systems Lukas Grunwald DN-Systems GmbH Germany Agenda What is RFID? How to exploit and attack RFID systems Attacks against the middleware Reader-emulation, soft-tags Unexpected
Manufacturers Suggested Retail Price List
Manufacturers Suggested Retail Price List Effective December 11th, 2008 15182 Triton Lane Suite 102, Huntington Beach, CA 92649 Voice 714.901.5462 Fax 714.901.5472 www.pyramidcomm.com SVR-250 Repeater
NACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
EP902. 2-line Industrial Long Range Cordless System. Overview
2-line Industrial Long Range Cordless System Overview, Industrial Cordless offer durability and coverage with various levels of phone system functionality. Their feature of broadcast, 2-way radio, 2-line
AUDIENCE MEASUREMENT SYSTEM BASED ON BLUETOOTH CORDLESS COMMUNICATION
21 22 September 2007, BULGARIA 113 Proceedings of the International Conference on Information Technologies (InfoTech-2007) 21 st 22 nd September 2007, Bulgaria vol. 2 AUDIENCE MEASUREMENT SYSTEM BASED
E-Blocks Easy RFID Bundle
Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course
WBS AFC Standard SW Solution Development
WBS AFC Standard SW Solution Development 1. Company Overview - General Establishment : Joint Venture Overview [ ] Korea Smart Card Co., Ltd Seoul Metropolitan Government + LG Group Company Name Korea Smart
Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.
Sampling Theorem We will show that a band limited signal can be reconstructed exactly from its discrete time samples. Recall: That a time sampled signal is like taking a snap shot or picture of signal
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
Secure recharge of disposable RFID tickets
Secure recharge of disposable RFID tickets Riccardo Focardi Flaminia Luccio Università Ca Foscari, Venezia {focardi,luccio}@unive.it FAST 2011 15-16 September 2011, Leuven FAST 2011 ()Secure recharge of
SIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used.
SIM CARD PROTOCOLS Though rarely thought about by most users their mobile phone contains a remarkable computing device that enables them to go about their business of making calls, text messaging or playing
Why test results can t compare
Automotive RF immunity test set-up analysis Why test results can t compare Mart Coenen, EMCMCC, Eindhoven, the Netherlands Hugo Pues, Melexis Technologies NV, Tessenderlo, Belgium Thierry Bousquet, Continental,
Grundig SAT Systems HEADEND RECEIVER MODULATOR HRM 391 TWIN ENGLISH
Grundig SAT Systems HEADEND RECEIVER MODULATOR HRM 391 TWIN ENGLISH CONTENTS 3 General Scope of delivery Technical data The terrestrial cassette HRM 391 TWIN 4 General/Connecting Installing the cassette
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
End-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
Water Metering System SmartMeter Prepayment. SmartMeter Prepayment. Water Metering System
Water Metering System SmartMeter Prepayment SmartMeter Prepayment Water Metering System Water Metering System SmartMeter Prepayment SmartMeter Prepayment Water Metering System A dynamic approach to Prepayment
Time recording with the Terminal B-web 93 00
Time recording with the Terminal B-web 93 00 Elegant design with innovative usability concept In pursuit of perfection «Perfection is achieved, not when there is nothing more to add, but when there is
Detailed Specifications
1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for
LED Bulb Manual. Aeotec by Aeon Labs LED Bulb.
LED Bulb Manual Aeotec by Aeon Labs LED Bulb. Aeotec LED Bulb is a multi-coloured LED bulb which allows control (on/off/dim/colour change) via wireless Z-Wave commands. The LED Bulb can also communicate
1-MINIMUM REQUIREMENT SPECIFICATIONS FOR DVB-T SET-TOP-BOXES RECEIVERS (STB) FOR SDTV
1-MINIMUM REQUIREMENT SPECIFICATIONS FOR DVB-T SET-TOP-BOXES RECEIVERS (STB) FOR SDTV Standard definition television Terminology SHALL (mandatory): Denotes that the item is mandatory. SHOULD (recommended):
LTE BACKHAUL REQUIREMENTS A REALITY CHECK PETER CROY, SENIOR NETWORK ARCHITECT, AVIAT NETWORKS
LTE BACKHAUL REQUIREMENTS A REALITY CHECK PETER CROY, SENIOR NETWORK ARCHITECT, AVIAT NETWORKS 1 LTE Cell: Single User Throughput Estimates Data Rate Down/Up [Mbps] vs. Distance from Cell Center Channel
Guard All Security Symposium. Identity and Access Management
Guard All Security Symposium Identity and Access Management The Complex Digital World Welcome to the Identiverse Segments / Brands Product Offerings Applications ID Management Solutions Governmental credentialing
Advanced Electronic System for Human Safety (Smart Watch)
Advanced Electronic System for Human Safety (Smart Watch) Ganesh Ghorpade 1, Tushar Gaikwad 2, Laxman Jangid 3 Department of Electronics and Telecommunication Pimpri Chinchwad College of Engineering,Pune,Maharashtra,India
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
Broadband access. Nils Holte, NTNU. NTNU Department of Telecommunications Kursdagene ved NTNU, Digitale telenett, 9. januar 2002 1.
Broadband access - properties of the copper network Nils Holte, Kursdagene ved, Digitale telenett, 9. januar 2002 1 Definition of broadband Overview Alternatives for fixed broadband access pair cable,
Complete Technology and RFID
UGM 2007 Complete Technology and RFID Overview Operating Principles Inductive Coupling Microwave Coupling Coupling to Circuit Simmulation Summary T. Wittig 1 twi, apr / v2.0 / 12. Jun 2007 Overview Radio
Two-Way Radio Express Products List (EPL) 3744 Effective November 1, 2014
Two-Way Radio Express Products List (EPL) 3744 Two-Way Radio Express Products List (EPL) 3744 Effective November 1, 2014 Cover Warranty: 1 Year Parts and Labor at Manufacturer 1 of 8 Synthesized Vehicular
Global network of innovation. Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway)
Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway) Agenda Security Portfolio intro Why SmartCard? SmartCard Applications SmartCard Solution Components
Project 25 Compliance Assessment Program Summary Test Report NX-5200 Portable Radio, VHF STR-JKWRD-NX5200-0815
roject 25 Compliance Assessment rogram NX-5200 ortable Radio, VHF Device Under Test Description Manufacturer JVCKENWOOD Corporation JVCKENWOOD USA Corporation Manufacturer Contact Donald E. Wingo, 678-474-4719
Smart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
Contents. User guide. TDX Headend Unit - Art. No. 492090 891072I
Contents User guide TDX Headend Unit - Art. No. 492090 891072I 1 EN Contents Contents SAFETY PRECAUTIONS... 4 Environment... 4 Power supply... 4 Weight... 4 Earth... 4 Disposal... 4 INTRODUCTION... 5 BOX
Unverified Fields - A Problem with Firewalls & Firewall Technology Today
Unverified Fields - A Problem with Firewalls & Firewall Technology Today Ofir Arkin The Sys-Security Group [email protected] October 2000 1 Introduction The following problem (as discussed in
RFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
