Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers Study leader: Mr. D.V.

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V."

Transcription

1 EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management system Project Proposal P.D. Ehlers Study leader: Mr. D.V. Bhatt Evaluation of content Mark/20: Acceptable: Yes No Problem statement User requirement statement Functional analysis System specifications Deliverables Comments (also see inside): Proofreader: D.P. Visser Date

2 Development of a wireless home anti theft asset management system Project Proposal P.D. Ehlers Submitted as partial fulfilment of the requirements of Project EPR402 in the Department of Electrical, Electronic and Computer Engineering University of Pretoria Approved: April 2006 Study leader: Mr. D.V. Bhatt Mr. D.V. Bhatt (Study leader) Date Approved: Prof. J.J. Hanekom (Project lecturer) Date

3 1. PROBLEM STATEMENT With the ongoing and rapidly increasing acts of crime and theft in our society, an ever growing need arise to secure ourselves and our possessions. The main reason fueling these acts of theft is the unlimited demand for stolen goods on the black market. In order to eliminate these malicious acts of theft, one has to eliminate the market. The project addresses this problem and will assist the user in managing his/her domestic assets in a home environment. This system will easily be integrated in any electronic device in a home environment. The envisioned system will consist mainly of the following three elements; firstly, a wireless management module (WMM) that will be integrated in an electronic device. Secondly, wireless server that will act as an interface between the user and the WMM, and finally a radio frequency identification tag and reader. A device equipped with the WMM will, when powered, be non-functional until the user disables the WMM remotely over a computer network or manually with a authentication tag. The user will be in possession of a unique authentication code which will only entitle him/her to enable/disable the WMM. The engineering challenge faced in this project is the development of hardware and software needed to construct a wireless anti-theft asset management system. Challenges include the interfacing of a microprocessor to Zigbee transceiver and to a smart card reader. This task includes the physical realization of the circuitry as well as the development of the control firmware to be loaded on the microprocessor. Cryptographic firmware must also be developed and loaded on the microprocessor to ensure secure data transmissions to and from the WMM. Server side software must be developed which will include cryptographic algorithms to secure transmissions between client and server using the IEEE protocol as well as between the server and the WMM using the IEEE protocol. Limitations of this project are available hardware, the size of the WMM, the material of the enclosure of the electronic device to be equipped with the WMM and the RF range of a Zigbee transceiver. The transceiver required must incorporate encryption but the available transceivers do not support encryption. Thus, to compensate from this shortcoming, encryption firmware must be developed and loaded onto a powerful microprocessor which will be interfaced to the transceiver instead. The design requires a contact smart card but due to size and adaptability requirements a contactless smart card must be used. The size of the WMM is extremely important and therefore, the smallest components available will be used. The material of which the electronic device is manufactured of also plays a role when considering the RF range of the Zigbee transceiver as well as the RF contactless smart card reader. To accommodate this limitation certain modifications should be made to antennas of these components. 1

4 2. USER REQUIREMENT STATEMENT A durable WMM integrated into an electronic domestic device, which render the device non-functional when enabled and functional when disabled, is required. The life-cycle, durability, size, shape and working of the electronic domestic device should not be impaired by the WMM. The WMM should have wireless capabilities to connect to a wireless server through which the user can remotely change the state of the WMM. When the WMM comes into contact with an RF 1 authentication tag it should toggle between enable and disable. The WMM should by default be enabled, disabling the electronic domestic device. The domestic device should remain non-functional until the user disables the WMM with a unique authentication code, either sent through the wireless network or with a unique authentication tag. The user should at any time be able to check or change the status of the device given the device is powered. A flag should be toggled inside the WMM to store the current state on any specific time. 2.1 SYSTEM MISSION REQUIREMENTS The following list provides the mission requirements of the design. The WMM to be integrated in an electronic domestic device should in no way impair the device size, shape, life-cycle, durability and operation. To maintain the durability of the domestic device, it is critical that the WMM should be robust and durable. Integration of the WMM into a domestic device should limit tampering possibilities. The communication ability of the WMM should not be impaired by the noise generated by the domestic device. A power converter must be included in the WMM to convert the operating power of the electronic device to the operating power required by the WMM. The WMM should be enabled by default and should only change status when a user with a unique authentication code commands it. After a power failure, the WMM should adapt the enabled state. The wireless server and planted WMM should be able to work within a large home environment. 1 Radio frequency 2

5 2.2 VALUE SYSTEM The following aspects constitute the value system used in the design: functionality, cost, reliability, size and shape. 3. FUNCTIONAL ANALYSIS The system works in two directions, from the electronic device to the end user and from the end user to the electronic device, as shown in the functional diagrams(figure 1a and Figure 1b). When the user desires to query or change the status of a domestic device, the working direction will be from the end user to the electronic device (figure 1a). Figure 1a. Functional block diagram for user to electronic device communication. The user will access a web based user interface (FU3.2) located on the server unit (FU3) through the private wireless channel (FU2) with his/her wireless device (FU1). User input received from the user interface unit will be processed by the server processing unit (FU3.3). User input comprises of a device identification code, status command and 3

6 unique authentication code. Processed user input will be broadcast over the wireless channel with the wireless unit (FU3.1) to all the wireless management modules (FU4) in the domestic domain. The WMM consists of a wireless transceiver (FU4.1), a WMM processing unit (FU4.2), an enable/disable unit (FU4.3) and an authentication tag reader(fu4.4). All the wireless management modules in the domestic devices receive the broadcast with there wireless transceivers (FU4.1) and sends the received data to their processing units. The WMM processing unit compare it s device identification code to the received identification code. If the codes match, the received data is further processed, otherwise discarded. After confirmation on the authentication code is established, the received command is processed and executed. A control signal will be sent to the enable/disable unit (FU4.3) rendering the device functional or non-functional depending on the received command. If the system replies on a status check or confirms a status change, the system will operate in a reversed direction (figure 1b). Figure 1b. Functional block diagram for electronic device to user communication. After the WMM received and processed a status check or change command, the WMM processing unit sends a device identification code and a current status back to the server unit over the wireless channel. After data was received by the server it is sent to it s processing unit to update the user interface accordingly. An alternative to WMM disabling/enabling is the use of a unique authentication tag (FU5). The code read from the authentication tag will be sent to the WMM processor 4

7 unit where it will be matched to the stored code in the processing unit. The authentication tags will be read by the tag reader (FU4.4) in the WMM. If they match, the data processor unit will command the enable/disable unit to toggle the device functional or non-functional. A status change confirmation will be sent to the server unit (FU3) after a WMM status change occurred. 4. SYSTEM SPECIFICATIONS The following is a list of the specifications that this system has to comply with. 4.1 GLOBAL SPECIFICATIONS The wireless management module (WMM) should by default disable the device and it should stay in this state until a valid user authenticates it. The WMM should stay authenticated until the user commands it otherwise or it experience a power failure. A smart card and wireless network must be the only two methods of authentication. The wireless network will be the transmission medium for data sent, on the user s command, from a centralized server which will host the WMM control software. The WMM should be small enough to fit into the electronic device s enclosure. Devices equipped with a WMM should not be impaired by the WMM. The wireless communication network (FU2) must provide a reliable RF link over a diametrical distance of 20 meters. 4.2 DETAILED SPECIFICATIONS The WMM must not have an alternative power source other than the power source of the electronic device. The WMM in the electronic device should be able to cope with the noise generated by a device. The user s wireless device (FU1) should be able to communicate with the wireless server (FU3) using the and should IEEE standard and should operate at 11Mbps 2 or 54Mbps. The server unit (FU3) should be a personnel computer capable of processing high level cryptographic algorithms. A Pentium III with 256 MB 3 RAM 4 or higher. 2 Mega bits per second 3 Megabytes 4 Random access memory 5

8 The server wireless unit (FU3.1) must consist of and wireless devices capable of communicating with the different standard networks. The web based user interface unit must display a encrypted login web page which requires a username and password of a valid user stored in a secured database. After a secure login, the user is routed to a secure web page displaying the wireless module command software. The server unit (FU3) must communicate with the planted module (FU4) using the IEEE standard. The WMM (FU4) should consist of an zigbee transceiver, microprocessor and a smart card reader. The processing unit (FU4.2) must handle all the cryptographic calculations and the data processing required for data transmissions. An affordable RF tag (FU5) should be uniquely programmed to be the only tag which can enable/disable the WMM. 5. DELIVERABLES 5.1 TECHNICAL DELIVERABLES The following need to be delivered on completion of the project. A fully functional asset management system comprised of a WMM, a wireless server and a unique authentication tag. The WMM will contain a printed circuit board with an off-the-shelf wireless zigbee transceiver, microprocessor and a smart card reader etched on it. The smart card reader will require an antenna which will be designed and developed from first principles. A smart card programmed to authenticate the WMM. A server unit which will comprise of a personal computer and wireless access devices for different standards. The wireless access devices will be off-the-shelf products. Web based user interface software developed in C# and loaded on the server for easy remote access. The low level machine code (assembly code) to be loaded on the microprocessor will be developed from first principles. 6

9 5.2 ADDITIONAL PROJECT REQUIREMENTS In addition to the final product described above, a user manual for the system will also be provided. 5.3 DEMONSTRATION The following will be demonstrated at the exam. A working wireless home anti-theft asset management system will be demonstrated. This system will consist of a WMM integrated into a electronic domestic device and a wireless server which will handle all communication between user and WMM. The demonstration will show that when a device, equipped with the WMM, is powered, it will by default be non-functional till the user disables the WMM. It will be demonstrated that the user will be able to enable/disable the WMM through the wireless channel in a specific device or in all the devices simultaneously, as well as to check the status of any or all of the devices. It will also show that the device will be non-functional when the WMM is enabled and functional when the WMM is disabled. The demonstration will show that the user can enable/disable the WMM with a unique authentication tag when it makes physical contact with the device. 7

10 6. REFERENCES Kulkarni, A.D., Artificial Neural Networks for Image Understanding. New York: Van Nostrand Reinhold. 8

Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens

Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens Oxford University Press 2007. All rights reserved. 1 Smart systems Smart Labels Smart labels RFID Smart tokens Oxford University

More information

The next generation of knowledge and expertise Wireless Security Basics

The next generation of knowledge and expertise Wireless Security Basics The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Online Communication of Critical Parameters in Powerplant Using ZIGBEE

Online Communication of Critical Parameters in Powerplant Using ZIGBEE International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Online Communication of Critical Parameters in Powerplant Using ZIGBEE D.Santhiya 1, R.Renita Priyatharshini 2,K.C.Dhivya

More information

RF transceiver (Zigbee/X-Bee) based energy meter monitoring system. (Energy Meter reading on PC over wireless communication)

RF transceiver (Zigbee/X-Bee) based energy meter monitoring system. (Energy Meter reading on PC over wireless communication) RF transceiver (Zigbee/X-Bee) based energy meter monitoring system. (Energy Meter reading on PC over wireless communication) The purpose of this project is to read the Energy meter reading and transmit

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Online Student Attendance Management System using Android

Online Student Attendance Management System using Android Online Student Attendance Management System using Android ABSTRACT: We have seen over the years that the process of manual attendance has been carried outacross almost all educational institutions. The

More information

Gemalto Mifare 4K Datasheet

Gemalto Mifare 4K Datasheet Gemalto Mifare 4K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare 4K Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

YO-301AP POE AP Datasheet

YO-301AP POE AP Datasheet YO-301AP POE AP Datasheet 300Mbps Wi-Fi Ceiling POE Access Point VER:1.0 Date:2013-06-03 1 Product Description: Practical and powerful The Ceiling PoE wireless access point for your home or office network

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at

More information

MOBILE GAMING SYSTEM POLICIES

MOBILE GAMING SYSTEM POLICIES MOBILE GAMING SYSTEM POLICIES This document is intended to provide further clarification on applicable mobile gaming Technical Standards and additionally to define policies associated with the manufacturing

More information

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1.

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & 802.11b up to 108 Mbps) User Manual. Version: 1. EPI-3601S Wireless LAN PCI Adapter (802.11g & 802.11b up to 108 Mbps) User Manual Version: 1.2 1 TABLE OF CONTENTS 1 INTRODUCTION...3 2 FEATURES...3 3 PACKAGE CONTENTS...4 4 SYSTEM REQUIREMENTS...5 5 INSTALLATION...5

More information

920MHz Band Multi-hop Wireless Network System

920MHz Band Multi-hop Wireless Network System 920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

An Overview of RFID Systems and their Security Implications By: Caitlin Klein

An Overview of RFID Systems and their Security Implications By: Caitlin Klein An Overview of RFID Systems and their Security Implications By: Caitlin Klein I. Abstract RFID has become a ubiquitous piece of technology entrenched in many peoples daily lives. To name just a few of

More information

SMART VEHICLE TRACKING SYSTEM

SMART VEHICLE TRACKING SYSTEM SMART VEHICLE TRACKING SYSTEM Mrs. K.P.Kamble 1 Lecturer 1 Department of Electronics and Telecommunication Engineering, YCCE, Nagpur kanchan_114@rediffmail.com ABSTRACT It is amazing to know how simple

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Radio Frequency Identification (RFID) Presenter: Dusan Stevanovic April 3, 2007

Radio Frequency Identification (RFID) Presenter: Dusan Stevanovic April 3, 2007 Radio Frequency Identification (RFID) Presenter: Dusan Stevanovic April 3, 2007 Introduction RFID are systems that transmit identity (in the form of a unique serial number) of an object or person wirelessly,

More information

RADIO FREQUENCY IDENTIFICATION FOR STUDENT ATTENDENCE TRACKING

RADIO FREQUENCY IDENTIFICATION FOR STUDENT ATTENDENCE TRACKING International Journal of Science, Environment and Technology, Vol. 4, No 2, 2015, 468 473 ISSN 2278-3687 (O) 2277-663X (P) RADIO FREQUENCY IDENTIFICATION FOR STUDENT ATTENDENCE TRACKING Anu Sunny, Tharika

More information

We recommend that the computer running the Server should meet the following minimum requirements to run EVE:

We recommend that the computer running the Server should meet the following minimum requirements to run EVE: EVE5 Hardware and Software Requirements EVE5 is a Client/Server program. i.e. there are 2 components to the program: 1/ The Server: this controls your database and will be installed on one computer only.

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items

More information

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0

Mobile MasterCard PayPass Testing and Approval Guide. December 2009 - Version 2.0 Mobile MasterCard PayPass Testing and Approval Guide December 2009 - Version 2.0 Proprietary Rights Trademarks The information contained in this document is proprietary and confidential to MasterCard International

More information

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Review of the Air Force Academy No 2 (24) 2013 BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Marian ALEXANDRU, Vlad URSU Transilvania University of Brasov, Romania Abstract: A study of how to implement

More information

What is a Smart Card?

What is a Smart Card? An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types

More information

FTP 4 ANDROID ABSTRACT

FTP 4 ANDROID ABSTRACT FTP 4 ANDROID ABSTRACT In this project we propose FTP 4 ANDROID, a new app to store the days in FTP servers. Nowadays it is common practice to handle any type of file with the personal computer. The introduction

More information

Voice Over Internet Protocol (VoIP) Configuration

Voice Over Internet Protocol (VoIP) Configuration (VoIP) Configuration ENGINEERING REPORT No: 02-003 Introduction This report describes interfacing the IPCS VoIP Gateway Model EGW-902 to an ESTeem Model 192E Wireless Ethernet radio modem in a demonstration

More information

Linksys WAP300N. User Guide

Linksys WAP300N. User Guide User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

ADVANCED VEHICLE TRACKING SYSTEM USING ARM7

ADVANCED VEHICLE TRACKING SYSTEM USING ARM7 ADVANCED VEHICLE TRACKING SYSTEM USING ARM7 L. Kishore 1, Arun Raja 2 1 M.E. Embedded Systems Technologies, Sri Ramakrishna Engineering College 2 Assistant Professor, Department of ECE, Sri Ramakrishna

More information

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19

4. H.323 Components. VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4. H.323 Components VOIP, Version 1.6e T.O.P. BusinessInteractive GmbH Page 1 of 19 4.1 H.323 Terminals (1/2)...3 4.1 H.323 Terminals (2/2)...4 4.1.1 The software IP phone (1/2)...5 4.1.1 The software

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing Ensuring Data Storage Security in Cloud Computing ABSTRACT Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

Glossary of RTLS/RFID Terms

Glossary of RTLS/RFID Terms Glossary of RTLS/RFID Terms A Active tag: An RFID tag that has a transmitter to send back information, rather than reflecting back a signal from the reader, as a passive tag does. Most active tags use

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

QUICKSTART GUIDE FOR CDI CELLULAR STARTER KIT

QUICKSTART GUIDE FOR CDI CELLULAR STARTER KIT QUICKSTART GUIDE FOR CDI CELLULAR STARTER KIT A softcopy of this document can be found in the Support Center of our website. http://www.commdevices.com/support-center/technical-manuals/ - PA100/200 Cell-QuickStart.

More information

Quick Start Guide: Iridium GO! Advanced Portal

Quick Start Guide: Iridium GO! Advanced Portal Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...

More information

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially

More information

Using Contactless Smart Cards for Secure Applications

Using Contactless Smart Cards for Secure Applications Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,

More information

RFID Security: Threats, solutions and open challenges

RFID Security: Threats, solutions and open challenges RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)

More information

Hyper-V Server 2008 Setup and Configuration Tool Guide

Hyper-V Server 2008 Setup and Configuration Tool Guide Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V

More information

Microsoft Office Outlook 2013: Part 1

Microsoft Office Outlook 2013: Part 1 Microsoft Office Outlook 2013: Part 1 Course Specifications Course Length: 1 day Overview: Email has become one of the most widely used methods of communication, whether for personal or business communications.

More information

Security White Paper The Goverlan Solution

Security White Paper The Goverlan Solution Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful

More information

WISP 101. The DO s and DON T s of becoming a Wireless ISP

WISP 101. The DO s and DON T s of becoming a Wireless ISP WISP 101 The DO s and DON T s of becoming a Wireless ISP WISP 101 topics Choosing your hardware Setting up the Highsite Hardware Software Security Wireless Backhaul Setting up the client Choosing your

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

Enhancing Organizational Security Through the Use of Virtual Smart Cards

Enhancing Organizational Security Through the Use of Virtual Smart Cards Enhancing Organizational Security Through the Use of Virtual Smart Cards Today s organizations, both large and small, are faced with the challenging task of securing a seemingly borderless domain of company

More information

Using ISO 15693 Compliant RFID Tags in an Inventory Control System

Using ISO 15693 Compliant RFID Tags in an Inventory Control System Using ISO 15693 Compliant RFID Tags in an Inventory Control System University: Louisiana State University, Baton Rouge, Louisiana Course: Undergraduate Capstone Project Student Team Members: Joseph Gates,

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,

More information

System Services. Engagent System Services 2.06

System Services. Engagent System Services 2.06 System Services Engagent System Services 2.06 Overview Engagent System Services constitutes the central module in Engagent Software s product strategy. It is the glue both on an application level and on

More information

7.0 Self Service Guide

7.0 Self Service Guide 7.0 Self Service Guide Copyright 2010 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,

More information

Process Control and Automation using Modbus Protocol

Process Control and Automation using Modbus Protocol Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has

More information

Living Requirements Document: Sniffit

Living Requirements Document: Sniffit Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps

More information

Kingpin, @stake, January 2002

Kingpin, @stake, January 2002 Research In Motion s BlackBerry Wireless E-Mail Devices: Decoding the Mobitex protocol Kingpin, @stake, January 2002 1 Introduction The Research In Motion BlackBerry wireless e-mail device product line

More information

SECTION 25 15 16 INTEGRATED AUTOMATION SOFTWARE FOR CONTROL OF MONITORING NETWORKS

SECTION 25 15 16 INTEGRATED AUTOMATION SOFTWARE FOR CONTROL OF MONITORING NETWORKS SECTION 25 15 16 INTEGRATED AUTOMATION SOFTWARE FOR CONTROL OF MONITORING NETWORKS Specifier: The Specifier/Design Professional is responsible for the accuracy of all project specifications, including

More information

Longmai Mobile PKI Solution

Longmai Mobile PKI Solution Longmai Mobile PKI Solution A quick Solution to External and Internal fraud in Insurance Industry Putting the client at the center of modernization Contents 1. INTRODUCTION... 3 1.1 Challenges... 3 1.2

More information

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Embedded RF ABSTRACT This application report describes

More information

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode. 802.11a/n Long Range Wireless Outdoor CPE Key Features IEEE 802.11 a/n compliant Up to 300Mbps (5GHz) 24V Proprietary PoE support Waterproof Housing IP65 rated AP/CB/CR/WDS Modes 4 SSIDs support + VLAN

More information

Using. Microsoft Virtual PC. Page 1

Using. Microsoft Virtual PC. Page 1 Using Microsoft Virtual PC T4 Page 1 Microsoft Virtual PC Microsoft Virtual PC allows multiple Guest Operating Systems (Virtual Machines) to run using the resources of the Host Operating System (The PC

More information

Building a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home

Building a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Building a Basic Communication Network using XBee DigiMesh Jennifer Byford April 5, 2013 Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Abstract: Using Digi International s in-house

More information

Universal RF Communication System Project Plan

Universal RF Communication System Project Plan Universal RF Communication System Project Plan Submitted: September 25, 2001 Revised: October 9, 2001 Client: ECPE Senior Design Faculty Advisors: John Lamont Ralph Patterson Team May02-06 Members: Tony

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong

VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security

More information

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India archanathange7575@gmail.com,

More information

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based

More information

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log

More information

Project Report on. RFID based Employee Attendance & Database Management System. (READS Version 1.0) Using RFID Module [RKI-1512] Mehta Sohil [EC-073]

Project Report on. RFID based Employee Attendance & Database Management System. (READS Version 1.0) Using RFID Module [RKI-1512] Mehta Sohil [EC-073] Project Report on RFID based Employee Attendance & Database Management System (READS Version 1.0) Using RFID Module [RKI-1512] By Mehta Sohil [EC-073] Majithia Smit [EC-065] Under Supervision of Prof.

More information

Software Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007

Software Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007 Software Requirements Specification for VODKA Version 1.1 Approved April 24, 2007 Prepared by: Archit Baweja, Drew Hall, Sunny Huynh, Kevin Lynch, and Kanwarpreet Sethi Drexel University Revision History

More information

CipherShare Features and Benefits

CipherShare Features and Benefits CipherShare s and CipherShare s and Security End-to-end Encryption Need-to-Know: Challenge / Response Authentication Transitive Trust Consistent Security Password and Key Recovery Temporary Application

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Network Projector Operation Guide

Network Projector Operation Guide Network Projector Operation Guide Table of contents Preparation...3 Connecting the projector with your computer...3 Wired connection... 3 Wireless connection (for selective models)... 4 QPresenter...7

More information

Security & Chip Card ICs SLE 44R35S / Mifare

Security & Chip Card ICs SLE 44R35S / Mifare Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info

More information

BlackHawk for MAC Software User Guide

BlackHawk for MAC Software User Guide BlackHawk for MAC Software User Guide Products: BLK-DH2 Series and BLK-HD Series DVRs Please read this manual before using your software, and always follow the instructions for safety and proper use. Save

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Configuring and Monitoring Hitachi SAN Servers

Configuring and Monitoring Hitachi SAN Servers Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this

More information

SaaS: Products and Licenses

SaaS: Products and Licenses SaaS: Products and Licenses Responsible for the content: audeosoft GmbH, Kreuzberger Ring 44a, 65205 Wiesbaden, Germany, hereinafter referred to as audeosoft. (Addendum to Terms of use audeosoft GmbH staffitpro

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Introduction to RFID Technology

Introduction to RFID Technology Introduction to RFID Technology 1 Definition RFID (Radio Frequency Identification) is a technology that enables the electronic and wireless labeling and identification of objects, humans and animals Radar

More information

300Mbps Wireless N Gigabit Ceilling Mount Access Point

300Mbps Wireless N Gigabit Ceilling Mount Access Point Datasheet 300Mbps Wireless N Gigabit Ceilling Mount Access Point 120 Highlights Wireless N speed up to 300Mbps Clustering function greatly simplified business wireless network management, to easy manage

More information

Risk Management in the Development Process A Progress Report

Risk Management in the Development Process A Progress Report Risk Management in the Development Process A Progress Report 1 Introduction 2 Smart Meter Gateway - basic facts 3 Real Life Example Introduction Industry 4.0 and IoT gain importance of Embedded Systems

More information

Configuring Microsoft RADIUS Server and Gx000 Authentication. Configuration Notes. Revision 1.0 February 6, 2003

Configuring Microsoft RADIUS Server and Gx000 Authentication. Configuration Notes. Revision 1.0 February 6, 2003 Configuring Microsoft RADIUS Server and Gx000 Authentication Configuration Notes Revision 1.0 February 6, 2003 Copyright 2002 Gemtek Systems Holding BV www.gemtek-systems.com Notice Gemtek Systems reserves

More information

Embedded Security System using RFID & GSM

Embedded Security System using RFID & GSM Embedded Security System using RFID & GSM Kulkarni Amruta M., Taware Sachin S. Abstract The petroleum products are one of the valuable and rare creations of the nature. The proper use and distribution

More information

International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA)

International Conference on Web Services Computing (ICWSC) 2011 Proceedings published by International Journal of Computer Applications (IJCA) Issues and Challenges in Ensuring Trust, Security, Performance and Scalability in a Common Multi-Banking Solution Sree Rekha.G Research Assistant, CORI, PESIT, Bangalore. V.K.Agrawal, Director, CORI, PESIT,

More information

Vehicle Tracking System for Security and Analyzing Transportation Vehicle Information

Vehicle Tracking System for Security and Analyzing Transportation Vehicle Information 1 Vehicle Tracking System for Security and Analyzing Transportation Vehicle Information A Complete Documentation on Vehicle Tracking System Prepared By:- Udham Singh Kumar Anubhav Rashid Chaudhary 2 Table

More information

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection? FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...

More information

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives Main Line / Date / Etc. June May 2008 2nd Line 80-11-01583 xx-xx-xxxx Revision 1.0 Tagline Here Table of Contents

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

R-Win. Smart Wireless Communication Management System

R-Win. Smart Wireless Communication Management System Smart Wireless Communication Management System General R-Win is a smart communications adapter for management of wireless communications in a SCADA/Distributed Control System. The R-Win system includes

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

Clearswift Information Governance

Clearswift Information Governance Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration

More information

Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology.

Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology. Glossary Acceptable Use Policy (AUP): Policy which provides rules governing use of district technology. Access Fees: Fee charged to user for usage of services. Application: A program written to perform

More information

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices

More information

Administrator s User Manual for OrangeHRM Version 3.0

Administrator s User Manual for OrangeHRM Version 3.0 Administrator s User Manual for OrangeHRM Version 3.0 All Rights Reserved. Published in the United States of America. This publication is protected by copyright, and permission must be obtained from the

More information

IriScene Remote Manager. Version 4.8 FRACTALIA Software

IriScene Remote Manager. Version 4.8 FRACTALIA Software IriScene Remote Manager Version 4.8 FRACTALIA Software 2 A. INTRODUCTION...3 B. WORKING DESCRIPTION...3 C. PLATFORM MANUAL...3 1. ACCESS TO THE PLATFORM...3 2. AUTHENTICATION MODES...5 3. AUTHENTICATION

More information

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

Exploring the Remote Access Configuration Utility

Exploring the Remote Access Configuration Utility Exploring the Remote Access Configuration Utility in Ninth-Generation Dell PowerEdge Servers The Remote Access Configuration Utility supports local and remote server management in ninth-generation Dell

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information