RFID Privacy & Security Implementation - Recent topics & Applications in Japan -

Size: px
Start display at page:

Download "RFID Privacy & Security Implementation - Recent topics & Applications in Japan -"

Transcription

1 RFID Privacy & Security Implementation - Recent topics & Applications in Japan RYUICHI HATTORI Hitachi, Ltd. Japan Security & Smart ID Solutions Division

2 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Toward the Standardization 6. Summary

3 1-1. Corporate Profile of Hitachi., Ltd. Net Sales: 11,227 Billion Yen (US $ Billion) Total Assets: 10,530 Billion Yen (US $ Billion) Total Employees: 389,752 Number of Subsidiaries: 910 Companies Fortune Global th (2007 Sales in Global Electronics, Electrical Equipment and Computer Industries) Stock Exchange Listings: New York, Amsterdam, Frankfurt, Luxembourg, Paris, Tokyo, Osaka, Nagoya, Fukuoka, Sapporo (As of March 31, 2008) Takashi Kawamura President and Chief Executive Officer Founder s Original Motor Repair Shop, Ibaraki Japan

4 1-2. Hitachi Business Field Information & Telecommunication Systems 22 Financial Services 3 10 FY2007:Ended March 31, 2008 Electronic 10 Devices Sales $112.3 billion 15 Logistics, Services High Functional Materials & &Others Components 28 Power & Industrial Systems 12 Digital Media & Consumer Products 3

5 1-3. Information & Telecommunication Systems Value to Life Value to UbiquitousSociety Information Society Value to Society Consultation Collaboration of New Value for Ubiquitous Information Society with Customers Management Consultation Business Consultation IT Consultation SI/Solution Manufacturing Retail Power/ Transportation Network Bank SI, Outsourcing, Education, Operation, Maintenance Government/ Local Government IT Platform Server Storage Network Middleware Ubiquitous Devices Advanced Technology RFID Security HDD Integration/ Virtualization System Technology 4

6 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Toward the Standardization 6. Summary

7 Ubiquitous RFID Applications 2-1. People expect secure & easy access to Network System from anywhere and anytime Car/Railway Mobile Office SD MMC SIM SD MMC Personal Information DVC STB Intranet Information Internet of Things Game Machine Digital contents Map Information E-Tower TV PC SD MMC Audio DVD Telephone IC Card Home Outdoor Street/Shop 6

8 2-2. EU Recommendations for RFID Privacy European Commission Issues RFID Privacy Recommendations The document, which spells out ways to protect consumers but also allows for flexibility, should help promote greater implementation of RFID technology. May 13, 2009 Industry and consumer organizations around Europe welcomed an official "recommendation on the implementation of privacy and data protection principles in applications supported by radio-frequency identification." Issued this week by the European Commission (EC), the document outlines data privacy objectives suggested for use in the organization's 27 member states. Referenced from RFID Journal 7

9 2-3. RFID Privacy Law in US Washington State Adopts Second RFID Privacy Law The bill, newly signed by the governor, prohibits scanning RFID tags unless they were provided by the business or agency itself. Apr. 17, 2009 Washington State Governor Christine Gregoire has signed into law a bill prohibiting the scanning of an RFID tag by anyone except the business or agency that issued that tag, with certain exceptions. Referenced from RFID Journal 8

10 2-4. An Unscientific Article on RFID and Privacy A renowned U.S. magazine has published an article by a well-known opponent of RFID that presents a one-sided view of the privacy and security issues associated with RFID. Aug. 25, 2008 Scientific American by Katherine Albrecht, founder of Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN). The article, included in an issue of the magazine entitled The Future of Privacy, raises some legitimate issues. Referenced from RFID Journal 9

11 2-5. RFID Privacy Guideline in APAC In Japan, the Ministry of Internal Affairs and Communications (MIC) and the Ministry of Economy, Trade and Industry (METI) have issued a non-binding RFID Privacy Guideline based on the national data protection law. In South Korea, the Ministry of Information and Communication has put forward a similar guideline, which would also be non-binding (see OECD 2006). Referenced from RFID Prospectives for Germany 10

12 2-6. RFID Privacy & Security RFID Privacy & Security Related Topics European Commission Issues New RFID Privacy Recommendations US RFID Privacy Law &Anti-Skimming Law CASPIAN RFID Privacy Guideline in Japan & Korea Common Concern against RFID Privacy & Security from Consumer s Point of View. Urgent Requirement to Provide Solution for the Issue in order to Realize Broad Acceptance of RFID Technology Privacy Protection & Data Security Standard may be Needed 11

13 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Toward the Standardization 6. Conclusion

14 3-1. Hitachi RFID Secure Approach µ-chip series MHz (UHF) µ-chip Hibiki 2.45GHz µ-chip µ-chip Hibiki µ-chip ISO/IEC Type C (EPCglobal Gen2) Security - Privacy protection - Industrial memory area protection Hitachi proprietary protocol ROM & Unique ID Network Based µ-chip and the µ-chip Logo are either registered Trademarks or Trademarks of Hitachi,Ltd.in Japan and in other countries. 13

15 3-2. HIBIKI and Secure RFID Project Target 実 施 体 制 Hibiki Project Secure RFID Project ( Aug 2004 ~July 2006) ( Aug 2006 ~Mar 2007 ) Inexpensive RFID RFID (5-yen (5-yen inlay inlay : : <5cent,100Munit/month) <5cent,100Munit/month) Stable Stable Suply Suply (Volume (Volume of of Production, Production, High High Reliability) Reliability) Formation Apply Apply to to global global business (Global (Global Standard) Standard) Core Company Background Requirement for RFID Privacy and Security from Field Studies Outline RFID apply for Manufacture ~ Logistics ~ Retail ~Recycle Cooperate Company YAGI IBM Retail Recycle Logistics Manufacture Privacy Protection Corporate Data Protection 14

16 3-3. µ-chip HIBIKI Secure Features #1 Global Standard Compliant with EPC Global C1Gen2 / ISO/IEC #2 Large Size Memory Total of 2,112bit Memory Tag Memory Map Reserved bank (Security) 256bit UII bank 272bit TID bank 64 bit User Bank 1,536 bit #3 Security Feature Partitionable User Memory Bank Individual Read/Write Protection USER Area Manufactuere Logistics Wholesale Warehouse Retail Store Read Range Control 3m Selectable 30cm 15

17 3-4. HIBIKI Lightweight Security Concept Manufacture Data Security by password Logistics IC Tag User Bank Area Product Manufacture Logistics Retail Maintenance Retail Privacy Protection IC Tag Control Reading Distance Skimming Control Reading Distance for Privacy Protection customer Recycle Maintenance Lightweight Security enable secure use of RFID in the society and accelerate public acceptance of RFID for SCM/LCM 16

18 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Toward the Standardization 6. Conclusion

19 4-1. RFID Activities in Japanese Industry ~ ~ Consumer Electronics IC Tag Consortium SONY, Panasonic, Hitachi etc Guideline Standard Field Trial Maintenance Proof-of-Concept Field Trial Product Safety, Recycling Goal : Roll Out in 2010 Use Case Closed Loop application (Production Control, Warehouse Management) Roll Out 03/1 IC Tag Study Group Publishing Field Trial Smart Shelf Field Trials Recycle/Logistics Standard Specification of RFID tag for Books RFID in Comics Retail Logistics Future Store Use Case Food Crate Logistics Field Trial Shoes Shop Filed Trial Japan-China-Korea International Logistics Automotive Use Case Returnable Container Basic Study of RFID Usage JAPIA, JAMA Paint & Coating Process, Metal Mold Control, Pallet Control Roll Out 18

20 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Towards Standardization 6. Conclusion

21 5-1. Standardization Activity ISO29167 working group has started compiling DRAFT as security extension to the ISO Type C standard. Hitachi is proposing HIBIKI secure feature for SC31/WG7 activity ~ EPCglobal CE IAG Security Requirement Tag Alteration Hardware AG : Security Specification ISO SC31/WG7 (Security), WG4/SG3 (RFID Air Interface) NP WG7: Security HIBIKI Secure Proposal WG7 AdHoc WG7 Established ISO29167 DRAFT CD Vote FCD Vote FDIS Vote 20

22 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Toward the Standardization 6. Conclusions

23 6-1. Summary RFID Privacy and Security related Activities in world European Commission Issues New RFID Privacy Recommendations US Several States Adopt RFID Privacy Law &Anti- Skimming CASPIAN RFID Privacy Guideline by METI & MIC Japan etc... Practical Approach Lightweight Security Network based Read-only RFID Secure RFID Protocol ISO Standardization kicked-off Application Needs Security International Logistics Consumer Electronics Publishing Industry Automotive Library etc... 22

24 6-2. Conclusion EU-Japan Cooperation RFID Privacy & Security Standardization HIBIKI Secure Protocol Practical Approach 23

25 Thank You!

26

27 Appendix

28 A-1. µ-chip HIBIKI Data Protection USER Bank Memory can be divided into 5 Blocks Each Block Support Block Read/Write Lock ( with Custom Command) Block1 Password USER Bank (total1,536bit) Individual Password Protection for each Memory Block Block5 Password Common Area (256bit) Block1 (256bit) Block2 (256bit) Block3 (256bit) Block4 (256bit) Block5 (256bit) Read lock Write lock Read/Write Lock for each Memory Block 27

29 A-2. Communication Distance Control Communication distance is Selectable with R/W Custom Command. ID:3F1001 3m Communication Distance Normal Read Range Reduce Communication distance Reactivate Short Range ID:3F cm 28

30 A-3. Example : Data Security Write Memory Bank #1 Write Memory Bank #2 Read Memory Bank #1 Read Memory Bank #2 Factory Logistics Wholesale Warehouse Retail Store Reduce Read Distance Consumer Retail Store 製 造 情 報 出 荷 情 報 Manufacturer s Password Memory Bank #1 Memory Bank #2 Memory Bank #3 Memory Bank #4 HIBIKI Memory Mapping Security Bank UII Code Bank Tag Code Bank Manufacturer s Data Area Logistics Data Area Wholesale Data Area Retailer s Data Area Read Dedicated Memory Read /Write Lock control for each memory block Anti-Counterfeit Read Manufacturer s data with provided Password for authentication Unauthorized Seller Data Security Preventing from data skimming by unauthorized seller or personnel 29

Cloud RFID UHF Gen 2

Cloud RFID UHF Gen 2 Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system

More information

Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

Time & Access System An RFID based technology

Time & Access System An RFID based technology Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.

More information

EPCglobal RFID standards & regulations. Henri Barthel OECD Paris, 5 October 2005

EPCglobal RFID standards & regulations. Henri Barthel OECD Paris, 5 October 2005 EPCglobal RFID standards & regulations Henri Barthel OECD Paris, 5 October 2005 Roots of EPCglobal Auto ID Center (launched in 1999) Six world-class academia Labs: MIT (US), Cambridge (UK), Adelaide (Australia),

More information

RFIDs and European Policies

RFIDs and European Policies ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit gerald.santucci@ec.europa.eu European Commission Directorate

More information

2012 ISO TC46/SC4/WG11 N246

2012 ISO TC46/SC4/WG11 N246 RFID PRIVACY IN EUROPE Implications for Libraries Paul Chartier Convergent Software Ltd CILIP Conference, Nov 2012 ISO TC46/SC4/WG11 N246 Today s Presentation Broad Overview of the EU position A bit of

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Privacy and Security in library RFID Issues, Practices and Architecture

Privacy and Security in library RFID Issues, Practices and Architecture Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library

More information

NACCU 2013. Migrating to Contactless: 2013 1

NACCU 2013. Migrating to Contactless: 2013 1 NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise

More information

METI s Program for Efficient Distribution and Logistics - focusing on the use of information technology -

METI s Program for Efficient Distribution and Logistics - focusing on the use of information technology - METI s Program for Efficient Distribution and Logistics - focusing on the use of information technology - Distribution and Logistics Policy Division Ministry of Economy, Trade and Industry 1 Contents 1.

More information

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008 RFID Tags Prasanna Kulkarni Motorola ILT Workshop Smart Labels USA February 21, 2008 Agenda RFID tags Brief overview Roadmap of key attribute needs Existing tag technologies Emerging tag technologies Critical

More information

A. Background. In this Communication we can read:

A. Background. In this Communication we can read: On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background

More information

RFID TECHNOLOGY Great Eastern Impex Pvt. Ltd. India

RFID TECHNOLOGY Great Eastern Impex Pvt. Ltd. India RFID TECHNOLOGY Great Eastern Impex Pvt. Ltd. India RFID: Introduction Radio Frequency Identification or RFID is the new generation Auto ID technology that uses radio or wireless communication to uniquely

More information

Store Logistics and Payment with Near Field Communication

Store Logistics and Payment with Near Field Communication with www.stolpan.com Store Logistics and Payment with Near Field Communication Hagenberg, Hagenberg, March March 20. 2007 20. 2007. Dr. László Kutor, Dr. BMF László Kutor, BMF 19/1 StoLPaN Project Summary

More information

GS1 EPCglobal Transportation and Logistics Phase 3 Pilot Program Completion PRESS RELEASE

GS1 EPCglobal Transportation and Logistics Phase 3 Pilot Program Completion PRESS RELEASE GS1 EPCglobal Transportation and Logistics Phase 3 Pilot Program Completion PRESS RELEASE APRIL 2009 Press Release Transportation and Logistics 3 Pilot Program_V11 1 PRESS RELEASE Transportation and Logistics

More information

Radio Frequency Identification (RFID) Presenter: Dusan Stevanovic April 3, 2007

Radio Frequency Identification (RFID) Presenter: Dusan Stevanovic April 3, 2007 Radio Frequency Identification (RFID) Presenter: Dusan Stevanovic April 3, 2007 Introduction RFID are systems that transmit identity (in the form of a unique serial number) of an object or person wirelessly,

More information

Printed Circuit Board RFID Devices

Printed Circuit Board RFID Devices Printed Circuit Board RFID Devices LXMS Series www.murataamericas.com/rfid Murata s MAGICSTRAP is the latest in UHF RFID chip development, designed to be placed on the printed circuit board (PCB). The

More information

On the Security of RFID

On the Security of RFID On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

IT Platforms for Utilization of Big Data

IT Platforms for Utilization of Big Data Hitachi Review Vol. 63 (2014), No. 1 46 IT Platforms for Utilization of Big Yasutomo Yamamoto OVERVIEW: The growing momentum behind the utilization of big in social and corporate activity has created a

More information

FOR IMMEDIATE RELEASE

FOR IMMEDIATE RELEASE FOR IMMEDIATE RELEASE Introducing "Operational Management Innovation Service", a Service that Improves the Utilization Rate of Factories, Plants, and Public Infrastructure Facilities, while also Achieving

More information

WHITE PAPER. ABCs of RFID

WHITE PAPER. ABCs of RFID WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,

More information

Internet Trading System for Wholesale Flower Markets

Internet Trading System for Wholesale Flower Markets JFE TECHNICAL REPORT No. 3 (July 2004) Internet Trading System for Wholesale Flower Markets HISHINUMA Eisuke *1 UJIFUKU Seiji *2 Abstract: JFE Engineering, a leading company in electronic auction systems

More information

NP Collection Benefits RFID in Logistics and Stores. Markus Rosendahl, CEO of Senso Global

NP Collection Benefits RFID in Logistics and Stores. Markus Rosendahl, CEO of Senso Global NP Collection Benefits RFID in Logistics and Stores Markus Rosendahl, CEO of Senso Global Company Background - Women's clothing brand founded in 1919 in Finland by Aino Rosendahl - Main market areas: Scandinavia,

More information

A UHF RFID Printed Circuit Board Solution

A UHF RFID Printed Circuit Board Solution A UHF RFID Printed Circuit Board Solution Murata s MAGICSTRAP Production tracking, asset tracking, service tracking and counterfeiting prevention at the PCB level. Background Radio Frequency Identification

More information

Document and entity information

Document and entity information Document and entity information Company information Company information FASF member mark Mar 2016 Document name Filing date 2016-01-29 KITZ CORPORATIO Company name N Securities code 64980 URL http://www.kitz.co.jp

More information

Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies

Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies DR. O. GEOFFREY EGEKWU and JIM RIDINGS Institute for Infrastructure and Information Assurance (IIIA) James Madison University Functions

More information

Document and entity information Mar 2015 Dec 2014

Document and entity information Mar 2015 Dec 2014 Company information Company information FASF member mark Document name Document and entity information Mar 2015 3 Filing date 20150205 Company name KONDOTEC INC. Stock exchange listings Tokyo Tokyo 1st

More information

Introduction to RFID Technology

Introduction to RFID Technology Introduction to RFID Technology Athens Information Technology Riding the Time-Machine (1) The AUTO-ID consortium AUTO-ID can track Products, Containers, Vehicles, Animals, as well as their condition 2

More information

Secure System Solution and Security Technology

Secure System Solution and Security Technology Secure System Solution and Security Technology Hitachi Review Vol. 47 (1998), No. 6 245 Chisato Konno, D.Sc. Mitsuhiro Tsunoda Yasushi Kuba Satoru Tezuka OVERVIEW: The and intranet systems are rapidly

More information

EPC C-1 G-2 / ISO 18000-6C RFID IC

EPC C-1 G-2 / ISO 18000-6C RFID IC EM MICROELECTRONIC - MARIN SA EPC C-1 G-2 / ISO 18000-6C RFID IC Description is a certified EPC TM Class-1 Generation-2 (Gen2) IC and compliant with ISO/IEC 18000-6:2010 Type C. Each chip is manufactured

More information

PRODUCT DATASHEET. Confidex Ironside Micro CONTENTS

PRODUCT DATASHEET. Confidex Ironside Micro CONTENTS Confidex 2010 1 (6) PRODUCT DATASHEET Confidex Ironside Micro CONTENTS 1. PRODUCT DESCRIPTION... 2 1.1 SPECIFICATION DATA... 2 1.2 DIMENSIONS... 2 1.3 ELECTRICAL PERFORMANCE... 3 1.4 RESISTANCE AGAINST

More information

Road to TSA Certification for Hitachi Explosive Trace Detector and Related Issues. Kazuo Takei, President & CEO Defense Systems Group, Hitachi, Ltd.

Road to TSA Certification for Hitachi Explosive Trace Detector and Related Issues. Kazuo Takei, President & CEO Defense Systems Group, Hitachi, Ltd. Road to TSA Certification for Hitachi Explosive Trace Detector and Related Issues Kazuo Takei, President & CEO Defense Systems Group, Hitachi, Ltd. Contents 1. Outline of Hitachi 2. Hitachi Physical Security

More information

Automated Identification Technologies

Automated Identification Technologies Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT

More information

The use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes.

The use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes. Introduction Fixed Asset Tracking has traditionally been a labour-intensive and paper based process while Radio Frequency Identification (RFID) has been reserved for the billing of traffic along toll-ways

More information

Lesson Title: History of RFID

Lesson Title: History of RFID Page 1 of 6 Lesson Title: History of RFID 6/22/09 Copyright 2008, 2009 by Dale R. Thompson {d.r.thompson@ieee.org} Rationale Why is this lesson important? Why does the student need this lesson? How does

More information

Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3

Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3 Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3 Windows DOCUMENT ID: DC01954-01-0230-01 LAST REVISED: February 2013 Copyright 2013 by SAP AG or an SAP affiliate company. All rights reserved.

More information

Gen 2 Implications for Smart Label Printing APPLICATION WHITE PAPER

Gen 2 Implications for Smart Label Printing APPLICATION WHITE PAPER Gen 2 Implications for Smart Label Printing APPLICATION WHITE PAPER Copyrights 2005 ZIH Corp. ZebraNet is a Zebra trademark, and Zebra is a registered trademark of ZIH Corp. All rights reserved. Electronic

More information

rf Technology to automate your BUsiness

rf Technology to automate your BUsiness Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,

More information

RFID Design Principles

RFID Design Principles RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison

More information

WIRELESS SENSING AND RFID. Dr. Kaj Nummila

WIRELESS SENSING AND RFID. Dr. Kaj Nummila WIRELESS SENSING AND RFID Dr. Kaj Nummila kaj.nummila@vtt.fi RESEARCH EXCELLENCE IN RFID Key research area at VTT for more than 10 years Extensive interdisciplinary knowledge base and technology platforms

More information

Application of Tracking Technology to Access-control System

Application of Tracking Technology to Access-control System Hitachi Review Vol. 53 (2004),. 2 83 Application of Tracking Technology to Access-control System OVERVIEW: An access-control system that applies tracking technology to control the movement of people and

More information

ICT. Overview. The Information and Communications Industry Japan s Largest Industry. Contribution to real GDP by industry (2010)

ICT. Overview. The Information and Communications Industry Japan s Largest Industry. Contribution to real GDP by industry (2010) Overview The Information and Communications Industry Japan s Largest Industry The market size (real GDP) of Japan s information and communications (ICT) industry in 21 was 98.8 trillion yen. The ICT industry

More information

How China promoting RFID use in logistics. Mr. Wenfeng Wang Senior engineer, IT research center of CESI

How China promoting RFID use in logistics. Mr. Wenfeng Wang Senior engineer, IT research center of CESI How China promoting RFID use in logistics Mr. Wenfeng Wang Senior engineer, IT research center of CESI What is the logistics? The process of planning, implementing, and controlling the efficient, effective

More information

FOR IMMEDIATE RELEASE

FOR IMMEDIATE RELEASE FOR IMMEDIATE RELEASE Hitachi Group to Begin Sales of Transformation Support Services, Supporting Companies Fundamental Structural Reforms Provides expertise from the Hitachi Group s Hitachi Smart Transformation

More information

Hitachi Releases SuperH Mobile Application Processor SH-Mobile for optimum processing of multimedia applications for next-generation mobile phone

Hitachi Releases SuperH Mobile Application Processor SH-Mobile for optimum processing of multimedia applications for next-generation mobile phone Hitachi Releases SuperH Mobile Application Processor SH-Mobile for optimum processing of multimedia applications for next-generation mobile phone Enables smooth processing of multimedia applications for

More information

Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions

Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions Innovative Wafer & Interconnect Technologies Outline Low cost RFID Tags & Labels Standard applications and

More information

SoftBank Technology Corp. Corporate Profile

SoftBank Technology Corp. Corporate Profile SoftBank Technology Corp. Corporate Profile Last update : 2015/11/24 Harnessing the Power of Technology to Build a Brighter Future Information revolution, happiness for everyone The SoftBank group has

More information

Enhancing the Supply Chain with RFID

Enhancing the Supply Chain with RFID Enhancing the Supply Chain with RFID RFID has captured the attention of many leading companies today who are making significant investments of money and time to make this technology feasible in their operations.

More information

CHAPTER 1 Introduction 1

CHAPTER 1 Introduction 1 Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation

More information

Commencement for Smart Community Project in Greater Manchester, UK

Commencement for Smart Community Project in Greater Manchester, UK FOR IMMEDIATE RELEASE Commencement for Smart Community Project in Greater Manchester, UK Tokyo, March 13, 2014 Hitachi, Ltd. (TSE:6501/ Hitachi ), Daikin Industries, Ltd. (TSE:6367/ Daikin ), and Mizuho

More information

THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD

THE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD THE MOBlLE APP REVOLUTlON 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD People use hand-held devices for everything from communicating and playing games to shopping and surfing the Internet. In fact,

More information

The Japanese Experience Countering Spam ITU TELECOM WORLD 2006

The Japanese Experience Countering Spam ITU TELECOM WORLD 2006 The Japanese Experience Countering Spam ITU TELECOM WORLD 2006 8th December 2006 Shuji Sakuraba Copyright 2006 Present condition of spam in Japan - I 2004 Media Sent to mobiles 66 % Sent to PCs 34 % 2005

More information

RFID Applications in the Healthcare and Pharmaceutical Industries

RFID Applications in the Healthcare and Pharmaceutical Industries RFID Applications in the Healthcare and Pharmaceutical Industries White Paper Revolutionizing Asset Management and the Supply Chain Document Revision: 1.0 Release Date: February 7, 2005 Written by: Johnny

More information

Archive Storage Technologies Supporting Information Lifecycle Management

Archive Storage Technologies Supporting Information Lifecycle Management Archive Storage Technologies Supporting Information Lifecycle Management V Noboru Osada V Kunihiko Kassai (Manuscript received September 16, 2005) A large amount of fixed content has been generated due

More information

Tracking metal parts with passive UHF RFID. April 2007

Tracking metal parts with passive UHF RFID. April 2007 Tracking metal parts with passive UHF RFID April 2007 Confidex in brief Focused in wireless identification, especially on industrial RFID tags on 13,56MHz (HF) and 865-952 MHz (UHF) Main business areas

More information

Radio Frequency Identification (RFID) An Overview

Radio Frequency Identification (RFID) An Overview Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify

More information

History of Information Systems Usage in Japan

History of Information Systems Usage in Japan History of Information Systems Usage in Japan Kiyoshi Murata Centre for Business Information Ethics School of Commerce Meiji University CIGREF Workshop Summary of the research project Two year research

More information

The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results

The RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results The RFID Revolution: Your voice on the Challenges, Opportunities and Threats Online Public Consultation Preliminary Overview of the Results 16 October 2006 Disclaimer: This document is a working document

More information

Data Protection Technical Guidance Radio Frequency Identification

Data Protection Technical Guidance Radio Frequency Identification Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology

More information

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? TABLE OF CONTENTS What is RFID? 1 Will RFID replace Barcodes? 1 How does RFID work? 1 What is an RFID Tag? 3 What are Smart Labels? 4 Why use RFID? 5 Why

More information

Core Expertise. Certifications. Europe. Korea. CPU Module Optimization Technology (Telemetric embedded Design Technology) CPU Board

Core Expertise. Certifications. Europe. Korea. CPU Module Optimization Technology (Telemetric embedded Design Technology) CPU Board ATID Co., Ltd Certifications & Core Expertise Certifications Technologies CPU Board CPU Module Optimization Technology (Telemetric embedded Design Technology) OS (Firmware) Various Module Interface Optimization

More information

Fujitsu Enterprise Security Architecture

Fujitsu Enterprise Security Architecture Fujitsu Enterprise Security Architecture V Tetsuo Shiozaki V Masayuki Okuhara V Nobuo Yoshikawa (Manuscript received November 9, 2006) Recently, there has been a growing need for enterprises to respond

More information

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder

JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security

More information

1. IT Industry / Where the Growth is

1. IT Industry / Where the Growth is 1. IT Industry / Where the Growth is Technology Stage: Current stage of technology evolution and business opportunities for Japan s IT industry Market Stage: The current market and growth outlook for Japan

More information

IBM Solution for Pharmaceutical Track & Trace

IBM Solution for Pharmaceutical Track & Trace Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace The underlying problem: Complexity in the pharmaceutical supply chain At its core, the pharmaceutical industry is about

More information

Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs

Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs CHALLENGE Logistics networks across the world depend on millions of returnable transport items (RTIs) to keep goods

More information

Software Asset Management with Integrated Asset & Service Management

Software Asset Management with Integrated Asset & Service Management xassets Asset Management Software Flexible, Affordable, Fast... Software Asset Management with Integrated Asset & Service Management CASE STUDY ABOUT PANASONIC Panasonic Electronic Devices Corporation

More information

RFID Security: Threats, solutions and open challenges

RFID Security: Threats, solutions and open challenges RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)

More information

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference

More information

Why Has the Development in RFID Technology Made Asset Management More Urgent?

Why Has the Development in RFID Technology Made Asset Management More Urgent? E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,

More information

Radio Frequency Identification. Done by: Haitham Habli.

Radio Frequency Identification. Done by: Haitham Habli. Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for

More information

Large Vehicle Scale RFID Is it now viable for use? Antti Permala Technical Research Centre of Finland (VTT) 12 June 2008

Large Vehicle Scale RFID Is it now viable for use? Antti Permala Technical Research Centre of Finland (VTT) 12 June 2008 Large Vehicle Scale RFID Is it now viable for use? Antti Permala Technical Research Centre of Finland (VTT) 12 June 2008 Contents Development during last years Technology Applications Cases 2 Three years

More information

SDSD-CPRM: Flexible Protection for Digital Content

SDSD-CPRM: Flexible Protection for Digital Content SDSD-CPRM Flexible Protection for Digital Content December 2007 Executive Summary SDSD-CPRM is a new extension to the SD Memory Card that addresses the difficulties that authorized sharing of protected

More information

EPSON Scan Server & EPSON TWAIN Pro Network

EPSON Scan Server & EPSON TWAIN Pro Network EPSON Scan Server & EPSON TWAIN Pro Network EPSON Scan Server & EPSON TWAIN Pro Network SCANNER UTILITY PROGRAMS All rights reserved. No part of this publication may be reproduced, stored in a retrieval

More information

Towards Unified Tag Data Translation for the Internet of Things

Towards Unified Tag Data Translation for the Internet of Things Towards Unified Tag Data Translation for the Internet of Things Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl To cite this version: Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl. Towards Unified

More information

MonotaRO Co.,Ltd. 3064 Tokyo Stock Exchange First Section

MonotaRO Co.,Ltd. 3064 Tokyo Stock Exchange First Section Company Research and Analysis Report FISCO Ltd. http://www.fisco.co.jp * Maintenance, Repair and Operating (MRO) products refers to products used in the manufacturing process such as abrasives, drills,

More information

Green Software Services From requirements to Business Models

Green Software Services From requirements to Business Models Green Software Services From requirements to Business Models Schahram Dustdar TU Wien Austria Distributed Systems Group dsg.tuwien.ac.at Smart Evolution People, Services,Things Smart Buildings and Energy

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

FOR IMMEDIATE RELEASE

FOR IMMEDIATE RELEASE FOR IMMEDIATE RELEASE Hitachi Group Develops Next-generation Industrial Controllers for IoT and Global Rollout; Sales to Begin Next Spring Achieves high performance and simple configuration with open technologies

More information

User Guide Win7Zilla

User Guide Win7Zilla User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main

More information

Knowledge Emergence Infrastructure by Convergence of Real World and IT

Knowledge Emergence Infrastructure by Convergence of Real World and IT Knowledge Emergence Infrastructure by Convergence of Real World and IT 30 September, 2009 Systems Development Laboratory, Hitachi, Ltd. Akira Maeda Contents 1. Social Innovation Induced by IT 2. KaaS:

More information

Mobile Wallet and Mobile Marketing in Japan

Mobile Wallet and Mobile Marketing in Japan Mobile Wallet and Mobile Marketing in Japan Carl Atsushi HIRANO Market Platform Dynamics CA Mobile, Ltd. June 2007 CA Mobile.Ltd, MPD All Rights Reserved 1 Who am I? Carl Atsushi HIRANO Carl is Senior

More information

Expected Social and Economic Impact and Application of Cloud Computing in Japan

Expected Social and Economic Impact and Application of Cloud Computing in Japan OECD/ICCP Foresight Forum Expected Social and Economic Impact and Application of Cloud Computing in Japan October 14, 2009 DR. Makoto Yokozawa Nomura Research Institute Professor of MOIS Labo., Kyoto University

More information

Training Webcast on Contactless Cards for Access Control. January 21, 2004

Training Webcast on Contactless Cards for Access Control. January 21, 2004 Training Webcast on Contactless Cards for Access Control January 21, 2004 Your presenters» Perry Garvis Business Development Manager Access Control & Security Products» Kelly Stark TI-RFid Systems Strategic

More information

IPv6 and Facility Management. 2005/02/24 Matsushita Electric Works, Ltd. Noriaki Fujiwara nfujiwar@icrl.mew.co.jp

IPv6 and Facility Management. 2005/02/24 Matsushita Electric Works, Ltd. Noriaki Fujiwara nfujiwar@icrl.mew.co.jp IPv6 and Facility Management 2005/02/24 Matsushita Electric Works, Ltd. Noriaki Fujiwara nfujiwar@icrl.mew.co.jp Agenda MEW s Profile Review of IPv6 s Features Subject of the Current Facility Management

More information

Name of the Project: e.g. Organization Development. By Roland Cheung @HKCERT

Name of the Project: e.g. Organization Development. By Roland Cheung @HKCERT Name of the Project: e.g. Organization Development By Roland Cheung @HKCERT Agenda Malware Trend Security Risk on Industry Sector Case Study Security Mitigations Malware Trend Reason Fun Profit Direct

More information

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network Shin-ichi Kuribayashi 1 and Yasunori Osana 1 1 Department of Computer and Information Science, Seikei University,

More information

TURNING DATA INTO BUSINESS. Leading Companies run Heiler Software

TURNING DATA INTO BUSINESS. Leading Companies run Heiler Software Leading Companies run Heiler Software KRAMP FOCUSES ON LONG TAIL AND EFFICIENT CUSTOMER RESPONSE IN ITS E-COMMERCE STRATEGY Tines, hand tools and hydraulic motors are the order of the day at Kramp. Spare

More information

Introducing FUJITSU Software Systemwalker Centric Manager V15.1.1

Introducing FUJITSU Software Systemwalker Centric Manager V15.1.1 Introducing FUJITSU Software Centric Manager V15.1.1 < Version 1.0 > May 2015 FUJITSU LIMITED 0 Contents Integrated Monitoring Required in Virtualization/Server Integration Characteristics of Centric Manager

More information

RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA

RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs Matt Robshaw and Tyler Williamson Impinj Seattle, USA Overview RAIN RFID The product and standardization landscape Security, performance,

More information

*-*-*-*-*-*-*-*-*-*-*-*-*-* STATISTICS Results of 2012 Basic Survey on the Information and Communications Industry (preliminary report)

*-*-*-*-*-*-*-*-*-*-*-*-*-* STATISTICS Results of 2012 Basic Survey on the Information and Communications Industry (preliminary report) MIC COMMUNICATIONS NEWS Biweekly Newsletter of the Ministry of Internal Affairs and Communications, Japan International Policy Division, Global ICT Strategy Bureau ISSN 1349-7987 Vol. 23, No. 11, November16,

More information

USB Plus+ RFID Reader Setup Guide

USB Plus+ RFID Reader Setup Guide 875-0042-03 RevA USB Plus+ RFID Reader Setup Guide 1 Government Limited Rights Notice: All documentation and manuals were developed at private expense and no part of it was developed using Government funds.

More information

What Do We Really Mean By Security for RFID

What Do We Really Mean By Security for RFID What Do We Really Mean By Security for RFID And How Much Is Enough? March 26, 2008 SecureRF at a glance RFID tag and reader security development and consulting to protect Pharmaceutical Supply Chain and

More information

IBM WebSphere Premises Server

IBM WebSphere Premises Server Integrate sensor data to create new visibility and drive business process innovation IBM WebSphere Server Highlights Derive actionable insights that support Enable real-time location tracking business

More information

OrotonGroup: Fashioning New Trends in Business Operations with SAP ERP

OrotonGroup: Fashioning New Trends in Business Operations with SAP ERP SAP Customer Success Story Retail OrotonGroup 2013 SAP AG or an SAP affiliate company. All rights reserved. OrotonGroup: Fashioning New Trends in Business Operations with SAP ERP Partner OrotonGroup Ltd.

More information

Establishment of Software Development Environment for Multimedia Products

Establishment of Software Development Environment for Multimedia Products Establishment of Software Development Environment for Multimedia Products Yasumasa MASUDA Yoshinori SAKABE Shozo SUZUKI Tetsuhiro NOGUCHI Abstract For the purpose of efficient software development and

More information

Diffusion of Internet and the New Lifestyle

Diffusion of Internet and the New Lifestyle WTO IT Symposium 2004 Diffusion of Internet and the New Lifestyle Oct. 18, 2004 Oct. 18, 2004 Masaichiro Yoshioka Department Manager Business Solution Systems Division, HITACHI Ltd. Japan 1 Changes in

More information