Data Protection Technical Guidance Radio Frequency Identification
|
|
|
- Brianne O’Brien’
- 9 years ago
- Views:
Transcription
1 Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology and its usage before looking at how the Data Protection Act 1998 ( the Act ) applies to its use. 1. Technical summary Radio frequency identification (RFID) tags provide a means of identifying and locating items using radio signals. An RFID system consists of: a radio-transmitter tag (or transponder ), including a microchip and antenna, and a reader, or interrogator, with an antenna. The reader emits radio frequency waves, which are received by the tag s antenna. When scanned by a reader, the tag communicates information from its memory in analogue form, and this is then converted to digital data by the reader. Information can be stored both on the tag itself and in a back-end computer system to which the tag refers. Tags may be active or passive. An active tag has its own battery supply to power its communication with the reader; a passive tag uses the power created by the reader. For this reason passive tags can be very small, but their read range is reduced. Larger, more expensive active tags are likely to be used for tracking high value goods that require long-range scanning, for example during transit by rail. The operating range of RFID tags depends on the frequency used, varying from a few centimetres for low frequency tags to over a hundred metres for microwave tags. Currently the cost of RFID tags is prohibitively high for many potential users, but industry experts anticipate that prices will fall as take-up of the technology becomes more widespread. RFID tags overcome some of the limitations of barcodes. Barcodes are read using a close range optical barcode scanner, and typically provide information only at the generic product level, but RFID tags ascribe a unique identifier to each individual item, and these can be read out of the line of sight. RFID tags can also supply more data than a barcode, either using a pre-loaded readonly memory or a static random access memory. In typical supply chain and consumer packaging applications a tag s memory will contain only an electronic product code (EPC), but this code can be associated with data in an online database. The EPC is a globally unique reference number found on an RFID tag. It is divided into numbers which identify the manufacturer, product type and unique item. Industry standards for the EPC are being developed by EPCglobal, a not-for-profit organization that works with companies to encourage the adoption of EPC technologies.
2 2. Current usage The principal use of RFID at present is in supply chain management. RFID tags are used to track vehicles between depots and pallets of goods from warehouses to stores. Tagging at item level has been deployed by major retailers and manufacturers to monitor stocks that are running low. RFID is becoming more frequent in prepaid travel cards, such as the Oystercard used for London s transport system. Each Oystercard has a unique identity number linked to the registered owner, and records the routes and times of each journey for which the card is used. This application has developed into a widespread contactless payment system. Customers need only move their card or phone over a reader for it to register payment and automatically deduct the price or fare from the customer s account, or check that it is within a prepaid limit. Payment by RFID-enabled smart card, credit card and even mobile phone has been introduced in points of sale in several countries. The US State Department has announced that passports issued after October 2006 will be embedded with RFID chips storing personal data including biometric information. Other current and developing uses of RFID tags include the tracking of livestock, monitoring of passenger baggage at airports, and unique identification of drugs and event tickets to prevent counterfeiting. Pilots of RFID include a scheme in Seattle where tags triggered readers to broadcast marketing messages tailored to the tag holder s preconfigured profile, and a Japanese trial of tagged bracelets designed to make children s school journeys safer. In a few cases, individuals have chosen to have RFID tags implanted in their skin, for example, to access VIP services at a nightclub. It has been suggested that such subcutaneous tags might help to track hospital patients with mental health conditions. There is some debate as to how prevalent RFID will become. There seems little doubt that its use in supply chain applications will continue to increase in the next few years. But opinion is divided on whether RFID technology in retail will ever extend to a tag on every consumer item purchased. For this to happen, prices must continue to fall, and many believe that until the cost of a single tag is very low, few retailers will be able to achieve a return on investment with RFID on any but the most valuable products. Nevertheless, some in the industry anticipate a future where everyday objects and appliances are connected to the internet, and each other, via RFID tags. This so-called internet of things will enable people to interact more with their environment, and their belongings with each other. For example, smart fridges could automatically reorder products that they registered as running low, intelligent watches could prompt users who leave the house without their keys and hotels could have smart mini-bars which automatically bill customers when drinks are removed.
3 3. How does the Data Protection Act apply? The Data Protection Act 1998 concerns the processing of personal data. Any electronically held information relating to an identified or identifiable individual is personal data. It is not easy to define exactly when an individual is identified, but identifying someone does not necessarily mean being able to ascribe a name and address to them. If a person is uniquely distinguished from all others within a relevant group, he will be identified. There are two ways in which personal data might be processed using RFID. First, personal data may be stored on the tags themselves, or linked to a database containing personal data. Second, if tags on individual items can be used to identify the individual associated with the item, they will be personal data. Scenario 1: Tag stores or is linked to personal data In applications where personal data is stored using RFID, the Act will apply. For example, contactless payment cards carry a link to the holder s personal account information. Similarly, smartcards used for travel might be linked to information about the holder s recent journeys, and passports or identity cards to biometric information. Scenario 2: Tag does not store personal data but individuals are identified by it In some applications people will be identified by RFID tags. For example, in the Japanese program to make children s school journeys safer, pupils wore bracelets containing an active tag. Software was used to locate each child within a given area based on the tag s signal strength. The purpose of the system was to uniquely identify each child by the number of his tag. But people might also be identified by RFID even where this was not the original intention. If someone always wore a watch that carried an RFID tag, the serial number for the watch s tag could also serve as a serial number for the wearer. While RFID tags on individual products will not constitute personal data in a customer s shopping basket, they could become personal data in circumstances where they enable the identification of individuals. A tag could also be associated with an identified individual if product data was subsequently combined with personal data from, for example, supermarket loyalty cards. This could be done at points of sale or if customers use cards to access special services, such as listening to CDs or viewing product information. In other situations, there will be no data protection implications. In most of the current applications of RFID, there are few data protection concerns because the tags do not store or communicate personal data, and are not linked to an identifiable individual. For example, the tags used currently in the retail sector
4 contain only an EPC and are not commonly found at item level so consumers will rarely come into contact with them. It is recommended that RFID users do not collect or store personal data if it is not necessary to do so. Keeping track of the popularity of products, for example, will not necessarily require the recording of data about specific shoppers buying habits. Users will need to be aware that where it may be possible to identify someone using data from RFID systems coupled with information available elsewhere, personal data will be processed. For example, RFID tags have been used in supermarkets to generate data about how often certain products are removed from shelves. Usually this data will be general and not relate to individuals. If such information were linked to identified individuals, however, it would constitute personal data. This might be done, for example, by combining data from RFID tags with individuals images captured on CCTV. Where personal data is collected, generated or disclosed using RFID either directly or indirectly, the Act will apply. RFID users will have to give special consideration to the data protection principles: Fair processing In order to comply with the fair processing requirements of the Act, those collecting personal data with RFID will have to give notice of the presence of RFID tags on products and of readers, and explain the implications. They will have to tell consumers what personal information is being collected, by whom, and for what purpose. The Act also requires them to consider what other information would need to be provided. It is likely that disclosures of information outside normal expectations would need to be explained. In some circumstances it might also be necessary to tell customers how to disable or remove tags, for example if a tag has been left on a product after purchase. RFID users must also tell individuals if tag serial numbers were to be linked with personal information and thus become personal data. Use limitation Personal information should only be collected for specified legitimate purposes, so companies using RFID should be wary of any function creep in their deployment. Data quality Users of RFID need to ensure that any personal data is accurate and kept up to date. Personal information beyond that necessary for the purpose of the system should not be collected. Data retention Personal information should not be kept for longer than is necessary for its specified purpose.
5 Security Users of RFID will need to ensure the security of any personal data stored on them or linked to them. Data controllers will have to consider the logistics of compliance with the Act before adopting the technology. In a world of ubiquitous computing, security and privacy safeguards should be built into the architecture of RFID systems, rather than added on later. 4. Specific data protection concerns Security It will be the responsibility of RFID users to prevent any unauthorised access to personal information. One concern is a practice that has become known as skimming. Since a transponder s signal can be picked up by any compatible reader, it is possible for RFID tags to be read by unauthorised readers, which could access personal information stored on them. Users can guard against skimming by using passwords. The EPCglobal Class 1 Generation 2 RFID specification enables the use of a password for accessing a tag s memory. However, these are not immune to hacking. Most RFID systems require a short distance between tag and reader, making it difficult for rogue readers to scan tags but this could nevertheless be done in a situation where people are naturally at close range, for example, on a crowded train. The nominal read range of some tags can also be extended by the use of more powerful readers. It is also possible to read part of a tag s number by eavesdropping merely on a reader s communication with a tag. Readers, with a much higher power output than tags, can be read at much greater distances. While some RFID applications might not need communication between tag and reader to be encrypted, others that process personal and especially sensitive personal data will need an adequate level of encryption to safeguard the data being processed. In most cases skimmers would also need a way of accessing the external database containing the personal data, but in some cases inferences might be made about someone from information which in itself does not relate directly to him. If a person leaves a store having purchased items carrying RFID tags that have not been disabled, he carries with him a potential inventory of his possessions. This would enable someone with a suitable reader and knowledge of EPC references to discover what items he was carrying at a given time. Sensitive personal data about a person s illness, for example, might be unknowingly revealed by him via the EPC referring to the medication in his pocket. An insufficiently secure RFID chip could also be cloned. By copying personal data stored on the RFID chip of an identification card, a person could for
6 practical purposes steal the identity of the cardholder. If the information on the database (e.g., a fingerprint) is checked only against the information on the card, rather than directly against the person himself, a criminal would not need to access the information stored on the database. Cryptography has been suggested as a way to combat skimming. A tag could communicate not just one number, but several pseudonyms in rotation. An authorised reader would store the full set of pseudonyms in advance, recognising each as a communication from a single tag. An unauthorised reader could not correlate different appearances of the same tag. Monitoring People s movements Travel smartcards such as the Oystercard collect information about people s journeys which is then stored on a linked database. This information is used to tie together the journeys made on an individual travel card and improve journey planning. People s movements should not be tracked in this manner without a legitimate reason: for example, the personal data collected from a travel card should be relevant and proportionate to the needs of journey planning and customer service. Anyone who is subject to such tracking with RFID should be informed of this, and consent will be needed for any tracking that goes beyond what people would expect for a given legitimate purpose. Employees work The technology has been used by employers in Japan to monitor the efficiency of their employees. Workers carry mandatory RFID tags whose data is analysed to show how much each individual contributes to production. While such a system might raise concerns about trust between employer and employees, the data protection issue is whether employers have a legitimate reason for such monitoring and whether their use of personal data is proportionate to the interests it serves. Employers should refer to the Employment Practices Code for more detailed guidance on monitoring at work. Profiling RFID can enable stores to build up individual profiles of their customers shopping habits. For example, tagged tokens for operating shopping trolleys have been given to customers that allow the monitoring of their purchases. This may or may not involve personal data, because valuable consumer information could be created without associating details with identified individuals. If individual profiles were constructed by stores in this way they could be used to target marketing directly to people whose preferences had been ascertained. For stores to adhere to the fair processing requirements of the Act in these cases they would have to inform customers not only that
7 consumer profiling is taking place, but also that profiles might be used for direct marketing. They would also have to provide customers with a means of opting out of such direct marketing. It is important that any similar use of RFID in retail that involves the personal data of customers is done openly, and that customers understand how their information is being used. Any use that lies outside the normal expectations of customers will not be fair. If tags remained on a person s purchases after leaving a shop, for example, other stores might also be able to scan these for the direct marketing of similar products. While customers might expect stores to scan their own RFID tags for anti-theft purposes, they are unlikely to expect purchases from other shops to be scanned, or for this information to be used for marketing. 5. Technical solutions The simplest way of addressing privacy concerns about RFID is to ensure that any tags on individual items are removed or disabled at the point of purchase. While the removal of a tag is a more visible process from the buyer s point of view, it also removes the possibility of using the tag if the product is returned. The predominant privacy mechanism for RFID is the kill command. When a reader transmits the command with an associated password, the tag switches to a state in which it is permanently unable to respond to interrogation. Like the option of removing the tag, this mechanism rules out future use of the tag even for the consumer s benefit, for example for the purposes of a guarantee or refund. Kill commands generally use a 32-bit password, the simplicity of which some have argued makes tags too susceptible to sabotage. For these reasons other methods of disabling tags have been proposed. These include: blocker tags, which send a confusing response to a reader s signal, making meaningful reading of genuine tags impossible; clipped tags, involving the temporary removal of the tag s antenna, which preserve the tag s functionality while drastically reducing its read range, and radio frequency shielding, such as will be used to prevent the new US passport being read unless it is opened. The technical solution adopted should take into account the nature of the data and the harm that is likely to result from any misuse.
Enabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
RF ID Security and Privacy
RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Evolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
WHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
RFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium.
RFID Basics RFID Basics Introduction Radio Frequency Identification (RFID) technology has been attracting considerable attention with the expectation of improved supply chain visibility for both suppliers
RECOMMENDATIONS COMMISSION
16.5.2009 Official Journal of the European Union L 122/47 RECOMMENDATIONS COMMISSION COMMISSION RECOMMENDATION of 12 May 2009 on the implementation of privacy and data protection principles in applications
COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION. of 12.5.2009
COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 12.5.2009 C(2009) 3200 final COMMISSION RECOMMENDATION of 12.5.2009 on the implementation of privacy and data protection principles in applications supported
How To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
RFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam [email protected] 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
The Drug Quality & Security Act
The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
Cloud RFID UHF Gen 2
Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system
RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID)
DOC NO. INTERNET-31-05 DATE ISSUED: APRIL, 2005 RESOLUTION ON RADIO-FREQUENCY IDENTIFICATION (RFID) Introduction The Trans Atlantic Consumer Dialogue (TACD) believes action is urgently needed to address
ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)
ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you
How To Hack An Rdi Credit Card
RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
Active RFID Solutions for Asset Tracking and Inventory Management
Active RFID Solutions for Asset Tracking and Inventory Management Introduction RFID (Radio Frequency Identification) technology is fast replacing ScanCode technology for asset tracking and inventory management.
FAQs Electronic residence permit
FAQs Electronic residence permit General 1) When was the electronic residence permit introduced? Since 1 September 2011, foreigners in Germany have been issued with the new electronic residence permit
AN INTRODUCTION TO THE GLOBAL DOCUMENT TYPE IDENTIFIER (GDTI) TABLE OF CONTENTS
TABLE OF CONTENTS What Is a Global Document Type Identifier?... 3 What Is a GDTI Used For?... 3 Key Attributes of the GDTI... 3 Business Benefits of Using GDTIs... 4 How Is the GDTI Formed?... 4 Frequently
RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
Code of Practice on the Identity Card Number and other Personal Identifiers Compliance Guide for Data Users
Code of Practice on the Identity Card Number and other Personal Identifiers Compliance Guide for Data Users INTRODUCTION What does the code of practice cover? The code of practice gives practical guidance
Efficient Asset Tracking: From Manual to Automated
White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies
A Guide to Contactless Cards
A Guide to Contactless Cards 1 Guide to Contactless Cards Ever since they were first introduced to the UK market over 50 years ago, credit cards have been in a constant state of evolution, as card issuers
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Towards a Transparent Proactive User Interface for a Shopping Assistant
Towards a Transparent Proactive User Interface for a Shopping Assistant Michael Schneider Department of Computer Science, Saarland University, Stuhlsatzenhausweg, Bau 36.1, 66123 Saarbrücken, Germany [email protected]
SOURCE ID RFID Technologies and Data Capture Solutions
SOURCE ID RFID Technologies and Data Capture Solutions RFID - a vital link for streamlining in-store inventory and supply chain management Source ID believes that worldwide demand for RFID based technology
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
Privacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
Implementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
RFID TECHNOLOGY: ELEVATING OPERATIONAL EFFICIENCY INTEGRATING TRACKING AND INVENTORY SOLUTIONS
RFID TECHNOLOGY: ELEVATING OPERATIONAL EFFICIENCY INTEGRATING TRACKING AND INVENTORY SOLUTIONS SECURE ASSET TRACKING IN YOUR HANDS The RFID System is designed with two basic parts a transponder tag that
An Overview of Approaches to Privacy Protection in RFID
An Overview of Approaches to Privacy Protection in RFID Jimmy Kjällman Helsinki University of Technology [email protected] Abstract Radio Frequency Identification (RFID) is a common term for technologies
RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department
RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda
Security Issues in RFID systems By Nikhil Nemade Krishna C Konda Agenda Introduction to an RFID System Possible Application Areas Need for Security Vulnerabilities of an RFID system Security Measures currently
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
Security and privacy in RFID
Security and privacy in RFID Jihoon Cho ISG PhD Student Seminar 8 November 2007 Outline 1 RFID Primer 2 Passive RFID tags 3 Issues on Security and Privacy 4 Basic Tags 5 Symmetric-key Tags 6 Conclusion
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
ACTA UNIVERSITATIS APULENSIS No 9/2005. Burja Lucian and Tanase Mihai
ACTA UNIVERSITATIS APULENSIS No 9/2005 IMPLEMENTING A DOCUMENT MANAGEMENT SYSTEM USING RFID TECHNOLOGY Burja Lucian and Tanase Mihai Abstract.With strong support in the industry from important players
An Overview of RFID Security and Privacy threats
An Overview of RFID Security and Privacy threats Maxim Kharlamov [email protected] The University of Auckland October 2007 Abstract Radio Frequency Identification (RFID) technology is quickly deploying
LibRFID: Automation Software for Library Management System Using RFID Technology
LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi,
An Introductory and Elementary Study on RFID & Its Applications
An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract
A. Background. In this Communication we can read:
On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER
Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Published 10/29/2012 I ndustries are facing fierce market competition, making more data about
Small Tech, Big Issues
Small Tech, Big Issues How It Works Advantages of RFID History of the RFID Proposed Uses Identification Medical Records Immigration Security Authentication Ethical Issues Purchase tracking Lack of encryption
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
Information Security Group (ISG) Core Research Areas. The ISG Smart Card Centre. From Smart Cards to NFC Smart Phone Security
Information Security Group (ISG) From Smart Cards to NFC Smart Phone Security Information Security Group Activities Prof. Keith and Mayes Research From the Information Security Group ACE-CSR at Royal Holloway
RFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, [email protected] Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
NOT ALL CODES ARE CREATED EQUAL
NOT ALL CODES ARE CREATED EQUAL Why some serial numbers are better than others. Verify Brand 3033 Campus Drive, Minneapolis MN 55441 [email protected] (763) 235-1400 EXECUTIVE SUMMARY Serial numbers
Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}
Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} John Soldatos Associate Professor, Athens Information Technology
Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs
Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs CHALLENGE Logistics networks across the world depend on millions of returnable transport items (RTIs) to keep goods
MOBILE PAYMENT SECURITY: BLE OR NFC
NEW SCIENCE TRANSACTION SECURITY ARTICLE MOBILE PAYMENT SECURITY: BLE OR NFC SUMMER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction security
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
Data protection. Wi-Fi location analytics
Data protection Wi-Fi location analytics ICO lo Wi-Fi location analytics Data Protection Act Contents Introduction... 2 Overview... 2 What the DPA says... 2 What is Wi-Fi analytics?... 3 Conduct a privacy
PopimsCard. Franck GUIGAN [email protected] +33 6 14 63 93 36. The magic card. February 16. 2016
PopimsCard The magic card February 16. 2016 Franck GUIGAN [email protected] +33 6 14 63 93 36 We all need to identify other persons, but official documents are not safe: Authenticating an ID card
RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title
RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
NEW TECHNOLOGY. Figure 1. Simplified view of data transfer in low-frequency passive RFID tags (the tag is enlarged for clarity).
RFID offers tantalizing benefits for supply chain management, inventory control, and many other applications. Find out whether your company could benefit. Ron Weinstein RFID: A Technical Overview and Its
Military Usage of Passive RFID 1
Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third
RFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES
ACCEPTABLE USE OF COMPUTERS IN WILTSHIRE LIBRARIES Policy Statement Introduction 1. Wiltshire Libraries provide access to the Internet and other computer facilities to support the educational, recreational
Better Data Center IT Asset Management through. Art Barton, Director of RFID Strategies, RFTrail
Better Data Center IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail IT asset managers and facilities managers for Data Centers worldwide are being
Using QR codes to track and identify counterfeit products
perspective Using QR codes to track and identify counterfeit products Abstract The development of a new product or technology always comes with the risk of counterfeiting, something that could affect company
PAP: A Privacy and Authentication Protocol for Passive RFID Tags
PAP: A Privacy and Authentication Protocol for Passive RFID s Alex X. Liu LeRoy A. Bailey Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824-1266, U.S.A. {alexliu,
FAQs - New German ID Card. General
FAQs - New German ID Card General 1) How to change from the old ID card to the new one? The new Law on Identification Cards came into effect on 1 November 2010. Since then, citizens can apply for the new
What is the ROI of RFID?
What is the ROI of RFID? Smart Label Solutions, Inc. White Paper What is the ROI of RFID? What is RFID? Radio Frequency Identification (RFID) is a method using tags or transponders to enable automatic,
a GAO-05-551 GAO INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters May 2005 INFORMATON SECURITY Radio Frequency Identification Technology in the Federal Government a GAO-05-551 Accountability
Getting Started with TraSer from Requirements to a Solution
Project no.: 033512 Project acronym: TraSer Project title: Identity-Based Tracking and Web-Services for SMEs Start date of project: 01.06.2006 Sixth Framework Programme IST Call 5 Fp6-2005-IST-5 ICT for
WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?
WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? TABLE OF CONTENTS What is RFID? 1 Will RFID replace Barcodes? 1 How does RFID work? 1 What is an RFID Tag? 3 What are Smart Labels? 4 Why use RFID? 5 Why
Using Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200
entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200 Understanding RFID and Barcode Differences Don t misuse RFID with applications built for Barcodes Radio Frequency
TOP TRUMPS Comparisons of how to pay for goods and services online
Cash Cash is legal tender in the form of bank notes and coins Small value purchases e.g. cafes, shops Pocket money Repaying friends Cash is physically transferred from one person to the next, usually face-to-face
RFID Applications in the Healthcare and Pharmaceutical Industries
RFID Applications in the Healthcare and Pharmaceutical Industries White Paper Revolutionizing Asset Management and the Supply Chain Document Revision: 1.0 Release Date: February 7, 2005 Written by: Johnny
Various Attacks and their Countermeasure on all Layers of RFID System
Various Attacks and their Countermeasure on all Layers of RFID System Gursewak Singh, Rajveer Kaur, Himanshu Sharma Abstract RFID (radio frequency identification) system is one of the most widely used
