RFIDIOts!!! RFID Hacking without a Soldering Iron (... or a Patent Attorney :)

Size: px
Start display at page:

Download "RFIDIOts!!! RFID Hacking without a Soldering Iron (... or a Patent Attorney :)"

Transcription

1 RFIDIOts!!! RFIDHackingwithoutaSolderingIron (...orapatentattorney:) AdamLaurie CanSecWest Vancouver,2007

2

3

4 WhatisRFID? ContaclessAuto IDtechnology RadioFrequencyorMagneticallyCoupledchip Chipispassive Energyfromreaderactivatesthechip

5 Whatisitfor? SimpleIDonly DoorEntrySystems Smartcards PaymentCards e.g.oyster Biometrics e.g.hid e.g.passports

6 RFIDMooamI? AnimalID HotelKeys CarImmobilisers SkiPasses GoodsLabels LuggageHandling Vending HumanImplants

7 SellingtheideaofHumanImplants

8 HumanImplants Military MentalPatients Tracking BeachBars AccessControl DigitalWallets

9 UniqueID!!! Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned Cannotbecloned

10 UniqueID? DIYCloningUnits Spottheoriginal?

11 UniqueID? DIYCloningUnits Spottheoriginal? IndustryDefence:

12 UniqueID? DIYCloningUnits Spottheoriginal? IndustryDefence: Clonesdonothave thesameformfactor andarethereforenot trueclones

13 UniqueID? Readerscannot'see' soformfactor irrelevant

14 UniqueID? = Readerscannot'see' soformfactor irrelevant

15 CloningDevices

16 CloningDevices

17 CloningDevices

18 CloningDevices

19 CloningDevices

20 CloningDevices

21 CloningDevices

22 CloningDevices

23 TheChallenge Createa'true'clone SameID SameFormFactor

24 UnderstandingtheID Industrystandardexample AnimalTagging ISO 11784/5FDX B Applicationflag(Animal/Non Animal) 3DigitCountryorManufacturercode NationalID

25 SendingtheID ReaderandTAGwillcommunicatewith Specificfrequency 125/134.2kHz (13.56MHz) Specificdatabitrate Specificencoding(modulation)scheme RF/2 RF/128 FSK,Manchester,BiPhase,PSK,NRZ Specificbitpatterns Header/Data/CRC

26 DecodingtheID 8ByterawIDfrom'dumb'reader Byte7 Byte6 Byte5 Byte4 Byte3 NationalID ReverseMSB/LSB ReverseeachNibble Rightshift(x2) ConverttoDecimal Byte2 Country Byte1 Byte0 ApplicationCode

27 DecodingtheID 8ByterawID EA 6F F6 AE CA 89 0E ReverseeachNibble ReverseMSB/LSB F6 57

28 DecodingtheID 8ByterawID ApplicationID Country F65 CA 89 0E NationalID 748CA890E CountryF65rightshifted:3D9=='985'decimal F6 icar.org:'destronfearing/digitalangelcorporation' NationalID748CA890E==' '

29 EncodingtheID Reversethedecodingprocess 64BitID AddHeader/CRCtorawbinaryID Header ID B ID B ID B ID B ID B ID B ID B ID FixedbitsembeddedinIDpreventheaderbeing duplicatedindatastream Nowwehave128bitsofrawbit levelid B CRC Howdowedeliverit?

30 Multi FormatTransponders Whymake10transpondertypeswhenyoucan make1? Lowermanufacturingcosts Lowerstocking/distributioncosts Convenience

31 Multi FormatTransponders Independentlyconfigurableparameters ConfigurationforBitRate,Modulationetc. 224Bitsuserprogrammablememory Dump<n>datablocksonwakeup Multiple'personalities' Q5 Hitag2 Configurationfor'PublicModes' 256Bituserprogrammablememory Dump<n>datablocksonwakeupasperModesetting

32 SendingtheID TakearedundantDoorEntrytag Re Setconfigurationasappropriate BitRate Modulation Inversion Numberofblockstodumpon'wakeup' ProgramdatablockswithrawID

33 Demonstration CloneTrovan'Unique'TAG AccessControlSystem CloneISO11784'Animal'TAG(FDX B) CowImplant VeriChippaperweight

34 RFIDimplantedchipthreats Trackindividuals Targetindividuals Impersonateindividuals Gainaccesstorestrictedareas Providealibiforaccomplice! 'Smart'Bombs Deviceonlygoesoffiftargetofsufficientrankisin range.

35 Encryptionisyourfriend RFIDEnabled 'Biometric'passports 48ItemsofData Fingerprint FacialImage BirthCertificate HomeAddress PhoneNumbers Profession

36 Keystoyourkingdom PseudorandomUID Cannotdetermine presenceofspecific passportwithout loggingin StrongAuthentication BasicAccessControl ContentEncryption 3DES ExtendedAccess Control

37 DerivingtheKeys MRZ MachineReadable Zone Key DocumentNumber DateofBirth ExpiryDate

38 epassportdemonstration

39 epassportthreats Keydatamaybeobtainedthroughother channels Passportprofiling Determinecountryoforiginwithoutloggingin Implementationerrors: AustralianpassportIDdoesnotstartwith'08'onselect AustralianpassportdoesnotrequireBasicAuthon'File Select',onlyon'FileRead'. Targetspecificpassportholders BombthatdetonatesforAustraliansonly...

40 RFIDIOt OpenSourcePythonlibrary Hardwareindependent ACG Frosch OpenPCDcomingsoon Lowcostreader/writersnowavailable

41 ACGreactiontoRFIDIOt Unfortunatelyyourcompaniesactivities seemtobecountertoacg'sinterestsso wewillnotbeabletosupportyouany further. 3rdJanuary,2007

42 Questions?

adam@thebunker.net http://www.thebunker.net

adam@thebunker.net http://www.thebunker.net ADayInTheLifeofaHacker Thingswegetuptowhennobodyislooking,andthatkeepmeawakeatnight... AdamLaurie adam@thebunker.net http://www.thebunker.net FIRSTGeekZone Seville,2007 Contents InfraRed RFID ATMs/(Magstripes?)

More information

E-Passport Testing. Ensuring Global Acceptance. Jos Chehin Date: 17 November 2006 Location: ASML

E-Passport Testing. Ensuring Global Acceptance. Jos Chehin Date: 17 November 2006 Location: ASML E-assport Testing Ensuring Global Acceptance By: Jos Chehin Date: 17 ovember 2006 Location: ASML Global Acceptance of the e-assport Global Acceptance Interoperability Functionality Security Test Standards

More information

RFID Penetration Tests when the truth is stranger than fiction

RFID Penetration Tests when the truth is stranger than fiction RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon

More information

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token

Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Technical Guideline TR-03110-4 Advanced Security Mechanisms for Machine Readable Travel Documents and eidas Token Part 4 Applications and Document Profiles Version 2.20 3. February 2015 History Version

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Using Contactless Smart Cards for Secure Applications

Using Contactless Smart Cards for Secure Applications Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,

More information

Secure Remote Photo Identification With ID card

Secure Remote Photo Identification With ID card Secure Remote Photo Identification With ID card Keith Jentoft 888-456-0425 kjentoft@audiosmartcard.com www.ncryptone.com 1 AudioSmartCard, group Basic concept: Remote Photo Authentication Cardholder s

More information

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA

Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the

More information

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.

More information

Today, there are three major initiatives for cards and credentials. Every security

Today, there are three major initiatives for cards and credentials. Every security What s the Near Future Hold for ID Cards & Credentials? Jeremy Earles, Ingersoll Rand Security Technologies Portfolio Marketing Manager-Credentials & Readers Today, there are three major initiatives for

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

Entrust Smartcard & USB Authentication

Entrust Smartcard & USB Authentication Entrust Smartcard & USB Authentication Technical Specifications Entrust IdentityGuard smartcard- and USB-based devices allow organizations to leverage strong certificate-based authentication of user identities

More information

CHAPTER 1 Introduction 1

CHAPTER 1 Introduction 1 Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation

More information

PMAfob Home Automation Demo

PMAfob Home Automation Demo PMAfob Home Automation Demo User Guide V1.1 October 20 th, 2010 PMAfob Home Automation Demo User Guide Overview PMAfob Software PMAfob Hardware Receiver Software Receiver Hardware Setup of the PMAfob Home

More information

advant advanced contactless smart card system

advant advanced contactless smart card system LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and

More information

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

Ajay Gummalla-July 2001

Ajay Gummalla-July 2001 DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way

More information

Technical Data Sheet UM-005. UM005-doc-01.04 In reference to UM005-c-01.04

Technical Data Sheet UM-005. UM005-doc-01.04 In reference to UM005-c-01.04 Technical Data Sheet UM-005 UM005-doc-01.04 In reference to UM005-c-01.04 Contents Contents... 2 Introductions... 3 Specifications... 3 Pin description... 4 Connection diagram... 4 Module PCB dimensions...

More information

RFID Design Principles

RFID Design Principles RFID Design Principles Second Edition Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents CHAPTER 1 Introduction CHAPTER 2 Short-Range Communications Systems 2.1 Radio-Frequency Spectrum

More information

European Electronic Identity Practices Country Update of Portugal

European Electronic Identity Practices Country Update of Portugal European Electronic Identity Practices Country Update of Portugal Speaker: Anabela Pedroso anabela.pedroso@umic.pt Date: 3 November 2006 1. Status of National legislation on eid Are eid specific regulations

More information

Keep Out of My Passport: Access Control Mechanisms in E-passports

Keep Out of My Passport: Access Control Mechanisms in E-passports Keep Out of My Passport: Access Control Mechanisms in E-passports Ivo Pooters June 15, 2008 Abstract Nowadays, over 40 different countries issue biometric passports to increase security on there borders.

More information

A Note on the Relay Attacks on e-passports

A Note on the Relay Attacks on e-passports A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 hlavm1am@artax.karlin.mff.cuni.cz and trosa@ebanka.cz 1 Department of Algebra, Charles University

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...

More information

A C C E S S C O N T R O L S Y S T E M

A C C E S S C O N T R O L S Y S T E M A C C E S S C O N T R O L S Y S T E M TIME & ATTENDANCE SYSTEM Model No. Z.AC.R.BIO.M8.TA Z.AC.RC.BIRO.M8+ID.TA Type: BIOMETRIC TIME & ATTENDANCE SYSTEM Combination of silver & black colour Instant verification

More information

Cotag active cards and tags

Cotag active cards and tags Cotag active cards and tags For a truly hands-free access control environment. SiPass cards and tags Hands-free, proximity or multi-purpose? Take your pick. Siemens recommends Cotag, smart card or standard

More information

Moving to Multi-factor Authentication. Kevin Unthank

Moving to Multi-factor Authentication. Kevin Unthank Moving to Multi-factor Authentication Kevin Unthank What is Authentication 3 steps of Access Control Identification: The entity makes claim to a particular Identity Authentication: The entity proves that

More information

AN3332 Application note

AN3332 Application note Application note Generating PWM signals using STM8S-DISCOVERY Application overview This application user manual provides a short description of how to use the Timer 2 peripheral (TIM2) to generate three

More information

Mobitex Network Security

Mobitex Network Security Mobitex Network Security olleb of the Toolcrypt Group olle@toolcrypt.org Mobitex Background Network structure Security features Mobitex background History of the Mobitex protocol Overview of network operators

More information

Access Control System Access Control System is designed for the places where need for crucial security.

Access Control System Access Control System is designed for the places where need for crucial security. rt RichtonTec as a company based on biometric and RFID technology has been supplying access control solution and time and attendance terminals for over 6 years. Over this time we developed our own unique

More information

rf Technology to automate your BUsiness

rf Technology to automate your BUsiness Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,

More information

Full page passport/document reader Regula model 70X4M

Full page passport/document reader Regula model 70X4M Full page passport/document reader Regula model 70X4M Full page passport reader with no moving parts inside. Automatic reading and authenticity verification of passports, IDs, visas, driver s licenses

More information

Smart Card Evolution

Smart Card Evolution Smart Card Evolution Fernando Ferreira Departamento de Informática, Universidade do Minho 4710-057 Braga, Portugal fernando.ferreira4@mail.telepac.pt Abstract. This comunnication describes the state of

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

In this article we will discuss the SI. Both from the point of view of how it s used to create an EPG, and what effect SI errors may have on the EPG

In this article we will discuss the SI. Both from the point of view of how it s used to create an EPG, and what effect SI errors may have on the EPG Using SI Tables to Create Electronic Program Guides. Application Note. Introduction. The Electronic Program Guide (EPG) is a feature unique to the digital TV world. It's the electronic equivalent of the

More information

Using Smart Cards for Secure Physical Access

Using Smart Cards for Secure Physical Access Using Smart Cards for Secure Physical Access A Smart Card Alliance Report Publication Date: July 2003 Publication Number: ID-03003 Smart Card Alliance 191 Clarksville Rd. Princeton Junction, NJ 08550 www.smartcardalliance.org

More information

Security Classification: EIDA ID Card Toolkit v2.7. Developer s Guide

Security Classification: EIDA ID Card Toolkit v2.7. Developer s Guide Security Classification: EIDA ID Card Toolkit v2.7 Developer s Guide Organization Document Title Date 31-10-2012 Doc Name / Ref Classification Document Type Document Details Emirates Identity Authority

More information

AN3998 Application note

AN3998 Application note Application note PDM audio software decoding on STM32 microcontrollers 1 Introduction This application note presents the algorithms and architecture of an optimized software implementation for PDM signal

More information

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1

Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Chapter 6 Bandwidth Utilization: Multiplexing and Spreading 6.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note Bandwidth utilization is the wise use of

More information

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS ************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************

More information

How Does It Work? Internet of Things

How Does It Work? Internet of Things Intermec UAP-2100 What is RFID? 18-759: Wireless Networks Lecture 14: RFID Peter Steenkiste and Hedda R. Schmidtke Departments of Computer Science and Electrical and Computer Engineering Spring Semester

More information

OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications

OBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications OBID RFID by FEIG ELECTRONIC OBID classic / OBID classic-pro RFID Reader Technology for Security Applications OBID RFID Reader Technologies RFID Readers from the number 1 manufacturer FEIG ELECTRONIC specialized

More information

Multi-Factor Authentication of Online Transactions

Multi-Factor Authentication of Online Transactions Multi-Factor Authentication of Online Transactions Shelli Wobken-Plagge May 7, 2009 Agenda How are economic and fraud trends evolving? What tools are available to secure online transactions? What are best

More information

Multi Factor Authentication

Multi Factor Authentication Seminar Web Engineering Multi Factor Authentication Matr. 233181 stefan.meier@s2009.tu-chemnitz.de Outline 1. Idea 2. Security Issues 3. Key Success Factors 4. Technologies 4.1 Knowledge 4.2 Property 4.3

More information

Readers and Credentials. from Security Technologies

Readers and Credentials. from Security Technologies Readers and Credentials from Security Technologies readers AVAILABLE FINISHES: Black (Standard) Cream PR10 XceedID Proximity Mini-Mullion Reader Cool Tone Gray Warm Tone Brown Simplifying the security

More information

Mobitex Network Security

Mobitex Network Security Mobitex Network Security olleb of the Toolcrypt Group olle@toolcrypt.org Mobitex Background Network structure Security features Mobitex background History of the Mobitex protocol Overview of network operators

More information

Contactless Technology for Secure Physical Access: Technology and Standards Choices

Contactless Technology for Secure Physical Access: Technology and Standards Choices Contactless Technology for Secure Physical Access: Technology and Standards Choices A Smart Card Alliance Report Publication Date: October 2002 Publication Number: ID-02002 Smart Card Alliance 191 Clarksville

More information

Electronic Access Control Solutions

Electronic Access Control Solutions Electronic Access Control Solutions Access Control Access Control Digitus BIOMETRIC ACCESS CONTROL Secure every access point The new db (Digitus Biometric) Biolock Technology paired with our Electromechanical

More information

ID Document Scanning and Biometric Solutions

ID Document Scanning and Biometric Solutions ID Document Scanning and Biometric Solutions PRODUCT CATALOGUE Contents ID DOCUMENT SCANNING & BIOMETRIC SOLUTIONS Advanced ID document reading solutions Typical applications ID document scanning process

More information

intertrax MOBILE PIV

intertrax MOBILE PIV intertrax MOBILE PIV Personnel Identification Verification Software User Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882;

More information

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the

More information

NFC Hacking: The Easy Way

NFC Hacking: The Easy Way DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! We re always looking for cool security projects!

More information

Accessories for the SoMo 655 Handheld Computer

Accessories for the SoMo 655 Handheld Computer Accessories for the SoMo 655 Handheld Computer Flexibility / Expandability / Lower Total Cost of Ownership Socket Mobile offers a full line of accessories to complement the SoMo 655 Series. Whether you

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

Oracle IVR Integrator

Oracle IVR Integrator Oracle IVR Integrator Concepts and Procedures Release 11i for Windows NT July 2001 Part No. A86103-03 1 Understanding Oracle IVR Integrator This topic group provides overviews of the application and its

More information

Atmel Innovative Silicon RFID IDIC Solutions

Atmel Innovative Silicon RFID IDIC Solutions Atmel Innovative Silicon RFID IDIC Solutions 2 2013 / www.atmel.com Table of Contents Atmel: The Expert with Long-term Know-how....4 The Technology.... 4-5 Passive RFID....4 Active RFID....5 RFID Applications....

More information

Security and Privacy in RFID Applications

Security and Privacy in RFID Applications Security and Privacy in RFID Applications Torstein Haver Master of Science in Communication Technology Submission date: June 2006 Supervisor: Svein Johan Knapskog, ITEM Co-supervisor: Martin Gilje Jaatun,

More information

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software

Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Combining Mifare Card and agsxmpp to Construct a Secure Instant Messaging Software Ya Ling Huang, Chung Huang Yang Graduate Institute of Information & Computer Education, National Kaohsiung Normal University

More information

File System Encryption with Integrated User Management

File System Encryption with Integrated User Management File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich fsfs@stefan-ludwig.de Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of

More information

TCB Workshop. Unlicensed National Information Infrastructure Devices (U-NII)/Dynamic Frequency Selection (DFS)

TCB Workshop. Unlicensed National Information Infrastructure Devices (U-NII)/Dynamic Frequency Selection (DFS) 1 TCB Workshop Unlicensed National Information Infrastructure Devices (U-NII)/Dynamic Frequency Selection (DFS) Andrew Leimer Office of Engineering and Technology/Equipment Authorization Branch FCC Laboratory

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany

New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany New Attacks against RFID-Systems Lukas Grunwald DN-Systems GmbH Germany Agenda What is RFID? How to exploit and attack RFID systems Attacks against the middleware Reader-emulation, soft-tags Unexpected

More information

Manufacturers Suggested Retail Price List

Manufacturers Suggested Retail Price List Manufacturers Suggested Retail Price List Effective December 11th, 2008 15182 Triton Lane Suite 102, Huntington Beach, CA 92649 Voice 714.901.5462 Fax 714.901.5472 www.pyramidcomm.com SVR-250 Repeater

More information

NACCU 2013. Migrating to Contactless: 2013 1

NACCU 2013. Migrating to Contactless: 2013 1 NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise

More information

EP902. 2-line Industrial Long Range Cordless System. Overview

EP902. 2-line Industrial Long Range Cordless System. Overview 2-line Industrial Long Range Cordless System Overview, Industrial Cordless offer durability and coverage with various levels of phone system functionality. Their feature of broadcast, 2-way radio, 2-line

More information

AUDIENCE MEASUREMENT SYSTEM BASED ON BLUETOOTH CORDLESS COMMUNICATION

AUDIENCE MEASUREMENT SYSTEM BASED ON BLUETOOTH CORDLESS COMMUNICATION 21 22 September 2007, BULGARIA 113 Proceedings of the International Conference on Information Technologies (InfoTech-2007) 21 st 22 nd September 2007, Bulgaria vol. 2 AUDIENCE MEASUREMENT SYSTEM BASED

More information

E-Blocks Easy RFID Bundle

E-Blocks Easy RFID Bundle Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course

More information

WBS AFC Standard SW Solution Development

WBS AFC Standard SW Solution Development WBS AFC Standard SW Solution Development 1. Company Overview - General Establishment : Joint Venture Overview [ ] Korea Smart Card Co., Ltd Seoul Metropolitan Government + LG Group Company Name Korea Smart

More information

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically.

Sampling Theorem Notes. Recall: That a time sampled signal is like taking a snap shot or picture of signal periodically. Sampling Theorem We will show that a band limited signal can be reconstructed exactly from its discrete time samples. Recall: That a time sampled signal is like taking a snap shot or picture of signal

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

Secure recharge of disposable RFID tickets

Secure recharge of disposable RFID tickets Secure recharge of disposable RFID tickets Riccardo Focardi Flaminia Luccio Università Ca Foscari, Venezia {focardi,luccio}@unive.it FAST 2011 15-16 September 2011, Leuven FAST 2011 ()Secure recharge of

More information

SIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used.

SIM CARD PROTOCOLS. This paper attempts in broad strokes to outline the construction of these protocols and how they are used. SIM CARD PROTOCOLS Though rarely thought about by most users their mobile phone contains a remarkable computing device that enables them to go about their business of making calls, text messaging or playing

More information

Why test results can t compare

Why test results can t compare Automotive RF immunity test set-up analysis Why test results can t compare Mart Coenen, EMCMCC, Eindhoven, the Netherlands Hugo Pues, Melexis Technologies NV, Tessenderlo, Belgium Thierry Bousquet, Continental,

More information

Grundig SAT Systems HEADEND RECEIVER MODULATOR HRM 391 TWIN ENGLISH

Grundig SAT Systems HEADEND RECEIVER MODULATOR HRM 391 TWIN ENGLISH Grundig SAT Systems HEADEND RECEIVER MODULATOR HRM 391 TWIN ENGLISH CONTENTS 3 General Scope of delivery Technical data The terrestrial cassette HRM 391 TWIN 4 General/Connecting Installing the cassette

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory

More information

End-to-end security with advanced biometrics technology

End-to-end security with advanced biometrics technology www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments

More information

Water Metering System SmartMeter Prepayment. SmartMeter Prepayment. Water Metering System

Water Metering System SmartMeter Prepayment. SmartMeter Prepayment. Water Metering System Water Metering System SmartMeter Prepayment SmartMeter Prepayment Water Metering System Water Metering System SmartMeter Prepayment SmartMeter Prepayment Water Metering System A dynamic approach to Prepayment

More information

Time recording with the Terminal B-web 93 00

Time recording with the Terminal B-web 93 00 Time recording with the Terminal B-web 93 00 Elegant design with innovative usability concept In pursuit of perfection «Perfection is achieved, not when there is nothing more to add, but when there is

More information

Detailed Specifications

Detailed Specifications 1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for

More information

LED Bulb Manual. Aeotec by Aeon Labs LED Bulb.

LED Bulb Manual. Aeotec by Aeon Labs LED Bulb. LED Bulb Manual Aeotec by Aeon Labs LED Bulb. Aeotec LED Bulb is a multi-coloured LED bulb which allows control (on/off/dim/colour change) via wireless Z-Wave commands. The LED Bulb can also communicate

More information

1-MINIMUM REQUIREMENT SPECIFICATIONS FOR DVB-T SET-TOP-BOXES RECEIVERS (STB) FOR SDTV

1-MINIMUM REQUIREMENT SPECIFICATIONS FOR DVB-T SET-TOP-BOXES RECEIVERS (STB) FOR SDTV 1-MINIMUM REQUIREMENT SPECIFICATIONS FOR DVB-T SET-TOP-BOXES RECEIVERS (STB) FOR SDTV Standard definition television Terminology SHALL (mandatory): Denotes that the item is mandatory. SHOULD (recommended):

More information

LTE BACKHAUL REQUIREMENTS A REALITY CHECK PETER CROY, SENIOR NETWORK ARCHITECT, AVIAT NETWORKS

LTE BACKHAUL REQUIREMENTS A REALITY CHECK PETER CROY, SENIOR NETWORK ARCHITECT, AVIAT NETWORKS LTE BACKHAUL REQUIREMENTS A REALITY CHECK PETER CROY, SENIOR NETWORK ARCHITECT, AVIAT NETWORKS 1 LTE Cell: Single User Throughput Estimates Data Rate Down/Up [Mbps] vs. Distance from Cell Center Channel

More information

Guard All Security Symposium. Identity and Access Management

Guard All Security Symposium. Identity and Access Management Guard All Security Symposium Identity and Access Management The Complex Digital World Welcome to the Identiverse Segments / Brands Product Offerings Applications ID Management Solutions Governmental credentialing

More information

Advanced Electronic System for Human Safety (Smart Watch)

Advanced Electronic System for Human Safety (Smart Watch) Advanced Electronic System for Human Safety (Smart Watch) Ganesh Ghorpade 1, Tushar Gaikwad 2, Laxman Jangid 3 Department of Electronics and Telecommunication Pimpri Chinchwad College of Engineering,Pune,Maharashtra,India

More information

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Embedded RF ABSTRACT This application report describes

More information

Broadband access. Nils Holte, NTNU. NTNU Department of Telecommunications Kursdagene ved NTNU, Digitale telenett, 9. januar 2002 1.

Broadband access. Nils Holte, NTNU. NTNU Department of Telecommunications Kursdagene ved NTNU, Digitale telenett, 9. januar 2002 1. Broadband access - properties of the copper network Nils Holte, Kursdagene ved, Digitale telenett, 9. januar 2002 1 Definition of broadband Overview Alternatives for fixed broadband access pair cable,

More information

Complete Technology and RFID

Complete Technology and RFID UGM 2007 Complete Technology and RFID Overview Operating Principles Inductive Coupling Microwave Coupling Coupling to Circuit Simmulation Summary T. Wittig 1 twi, apr / v2.0 / 12. Jun 2007 Overview Radio

More information

Two-Way Radio Express Products List (EPL) 3744 Effective November 1, 2014

Two-Way Radio Express Products List (EPL) 3744 Effective November 1, 2014 Two-Way Radio Express Products List (EPL) 3744 Two-Way Radio Express Products List (EPL) 3744 Effective November 1, 2014 Cover Warranty: 1 Year Parts and Labor at Manufacturer 1 of 8 Synthesized Vehicular

More information

Global network of innovation. Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway)

Global network of innovation. Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway) Svein Arne Lindøe Arnfinn Strand Security Competence Center Scandic Siemens Business Services (Norway) Agenda Security Portfolio intro Why SmartCard? SmartCard Applications SmartCard Solution Components

More information

Project 25 Compliance Assessment Program Summary Test Report NX-5200 Portable Radio, VHF STR-JKWRD-NX5200-0815

Project 25 Compliance Assessment Program Summary Test Report NX-5200 Portable Radio, VHF STR-JKWRD-NX5200-0815 roject 25 Compliance Assessment rogram NX-5200 ortable Radio, VHF Device Under Test Description Manufacturer JVCKENWOOD Corporation JVCKENWOOD USA Corporation Manufacturer Contact Donald E. Wingo, 678-474-4719

More information

Smart Cards and Biometrics in Physical Access Control Systems

Smart Cards and Biometrics in Physical Access Control Systems Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product

More information

Contents. User guide. TDX Headend Unit - Art. No. 492090 891072I

Contents. User guide. TDX Headend Unit - Art. No. 492090 891072I Contents User guide TDX Headend Unit - Art. No. 492090 891072I 1 EN Contents Contents SAFETY PRECAUTIONS... 4 Environment... 4 Power supply... 4 Weight... 4 Earth... 4 Disposal... 4 INTRODUCTION... 5 BOX

More information

Training Webcast on Contactless Cards for Access Control. January 21, 2004

Training Webcast on Contactless Cards for Access Control. January 21, 2004 Training Webcast on Contactless Cards for Access Control January 21, 2004 Your presenters» Perry Garvis Business Development Manager Access Control & Security Products» Kelly Stark TI-RFid Systems Strategic

More information

Unverified Fields - A Problem with Firewalls & Firewall Technology Today

Unverified Fields - A Problem with Firewalls & Firewall Technology Today Unverified Fields - A Problem with Firewalls & Firewall Technology Today Ofir Arkin The Sys-Security Group ofir.arkin@sys-security.com October 2000 1 Introduction The following problem (as discussed in

More information

RFID Design Principles

RFID Design Principles RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison

More information