Automatic Vehicle Identification
|
|
- Prudence Barber
- 7 years ago
- Views:
Transcription
1 Automatic Vehicle Identification Public BU Security and Connectivity
2 Content Automatic Vehicle Identification Introduction Identifying the problem to address Benefits of AVI Applications of AVI AVI technologies review Inductive loops Optical systems Active RFID Passive RFID Secure passive RFID solutions from NXP for AVI: UCODE DNA UCODE DNA product review Benefits for AVI systems Form factors NXP and partners support Wrap up 2
3 AUTOMATIC VEHICLE IDENTIFICATION INTRODUCTION
4 The problem we want to address is: HOW TO RELIABLY COST-EFFECTIVELY and SECURELY IDENTIFY vehicles in various traffic situations. 4
5 Why are these four factors important? RELIABLITY every car, every time, in every condition COST-EFFECTIVENESS benefits are great, but not at any cost SECURITY $ is often involved, so we need to be sure IDENTIFICATION not to bill A for something B needs to pay not to give A a privilege which should go to B 5
6 Where would this be of benefit to us? There are number of traffic-related use cases where reliable, cost-effective and secure identification of vehicles comes in very handy: electronic toll collection access control (e.g. at parking facilities) classification and processing (e.g. at border crossings) law enforcement (e.g. speed control, red light control) asset tracking (e.g. for fleet management) 6
7 Vehicle registration related fraud causes huge income loss for governments worldwide In the US the noncompliance rate is estimated to be between 5-10% ($750M to $1.5 billion in fees remain uncollected by the states yearly) Other nations around the world have significantly higher levels of noncompliance (exceeding 30% in some nations) Source: Frost & Sullivan White Paper: The importance of tamper evident RFID tags in Electronic Vehicle Registration (EVR) solutions 7
8 AUTOMATIC VEHICLE IDENTIFICATION TECHNOLOGY REVIEW
9 What technologies do we have as options? Inductive Loops Small metallic loops embedded in the road (below the asphalt) Optical systems High resolution cameras, coupled with image recognition software, and computer HW for processing and storing data. They rely on vehicle license plates. RFID Readers and antennas installed above, below or on the side of the road, coupled with a tag attached to the vehicle (windshield label, transponder, elicense Plate). 9
10 Inductive Loops are reliable and inexpensive but can only detect and not identify Inductive Loops Comments Reliable Cost-Effective Secure Identification Works very well even in bad weather conditions. Loops are inexpensive to produce and control; but installation needed during road construction, otherwise they can get very expensive. No security mechanisms implemented; only simple physical metal detection. You can sense that a vehicle is present, but cannot distinguish one vehicle from another. 10
11 Optical systems have lots of pros but also many cons, mainly around cost and reliability Pros Optical systems Cons Reliable Cost-Effective Secure Identification Sophisticated image recognition software is available. None. Images normally saved and available for later verification. Even if optical system fails, the human eye often can still read it. Weather, dirt, damage all big obstacles. Rates as low as 45%. * Very high start-up costs. High maintenance costs as well. ** Poor quality image does not help. Fake license plates. Image can be very bad even for the human eye; automation benefit lost. *Source: Russian Government agency. ** few tens of thousands USD per read point. 11
12 RFID offers reliable secure identification while keeping system costs reasonable RFID Comments Reliable Cost-Effective Secure Identification Needs no line of sight, resistant to dirt and weather; 95%+ rates easily achieved. By far, less expensive start-up costs compared to optical systems, plus practically no maintenance costs. * Offers anti-cloning functionality based on software and hardware cryptography. RFID is ALL about IDENTIFICATION Unique ID Number on every tag deployed in the market. *few thousand USD per read point. 12
13 RFID is the only technology that meets all AVI requirements Inductive Loops Optical Systems RFID Reliable Cost-Effective Secure Identification 13
14 Not all RFID has been created equal Passive UHF* Harvests energy from RF field. Needs no battery. Standardized. Extended lifetime. Small form factor. Cost-efficient. Active Uses a battery to boost its operating range. Not standardized. Limited lifetime. Bulky Expensive *LF and HF do not meet read range requirement. 14
15 From the perspective of AVI requirements, the picture was not complete until recently Active RFID Passive UHF RFID Reliable Cost-Effective 30$ transponders Secure SW implementation Identification 15
16 From the perspective of AVI requirements, the picture was not complete until recently Active RFID Passive UHF RFID Reliable Cost-Effective Secure 30$ transponders SW implementation As a leader in passive RFID Identification and as a leader in security. 16
17 NXP now offers secure passive UHF RFID meeting all AVI requirements Active RFID Passive UHF Secure passive UHF Reliable Cost-Effective Secure HW implementation Identification 17
18 SECURE PASSIVE RFID SOLUTIONS FROM NXP FOR AVI: UCODE DNA
19 NXP presents: Passive UHF tag IC with cryptographic authentication world-leading long range contactless performance cutting-edge security implementation for tag authentication All based on international standards * GS1 (EPCglobal Inc.) UHF RFID Generation-2 Version 2.0 ** ISO/IEC for proof of origin based on AES (Advanced Encryption Standard) 19
20 Cutting edge security implementation means cryptographic authentication The meaning of security is much clearer now Simple electronic protection Digital Signatures Encrypted UM Proprietary Protocols Custom Commands Passwords Unique tag IDs Cryptographic authentication Dynamic computation-based unique in every transaction with secrets which never leave protected security vault embedded inside the IC 20
21 Benefits for all parts of the eco-system End users Governments System Integrators Reliable Convenience Less congestion Higher adoption Higher degree of automation. Lower operating costs Cost-Effective Low starting cost Higher adoption (not only commercial but all vehicles). Lower system costs. Drive adoption. Secure Peace of mind Privacy** Fraud reduction Fraud reduction Identification* Convenience Less congestion Higher adoption Happy customer Higher adoption *Remember: from afar, with no line of sight requirement, without slowing down. **Through special secure features of UCODE DNA. 21
22 The right performance (i.e. meeting all requirements) at an overall acceptable system cost level will drive adoption! 22
23 Higher adoption, even at lower price, means more value. 100 thousand 30USD per active onboard unit vs 1 million 5USD per passive tag 23
24 All system components are available and deployed in projects already RFID system includes RFID Tags RFID-enabled license plates RFID-enabled windshield stickers Mobile/handheld RFID readers Stationary RFID readers RFID reader antennas RFID road curtains RFID gates RFID totems Backend SW solutions Some active AVI projects China India Turkey Thailand Brazil Peru Mexico Russia Nigeria 24
25 There are multiple ways passive secure RFID can be attached to the vehicle OPTION 1 OPTION 2 elicense Plates Integrated RFID tag Entire metal plate serves as the antenna -> better read range and more reliable Possibility to combine optical and RF identification Drawback: potential removal from one vehicle to another Windshield Stickers Integrated RFID inlay Less removal risk since it is inside the vehicle Self destruction if removal is attempted Drawback: lower RF performance due to smaller antenna size For maximum protection and best read reliability, use of license plate in combination with windshield sticker is recommended. 25
26 License plate: government-issued document It is not a piece of paper It is not a plastic card or a booklet Nevertheless, even though it is a metallic plate... still a government-issued document establishes identity it is linked to various obligations and benefits there is monetary value associated with it 26
27 Overview of overall System Costs Tag Reader Backend Optical Systems - $$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$ Active RFID $$$ $$$$$$$ $$$$$$$ Passive RFID $ $$$$$$$ $$$$$$$ 27
28 Additional benefits of RFID Once integrated into a license plate, RFID tag with crypto functionality can be use for authentication of license plate as a government issued document RFID systems can also be used for instantaneous speed measurements additional use case Once widely deployed (e.g. for tolling or for license plate auth.) easy extension to other applications such as parking access, law enforcement 28
29 RFID enables many use cases for governmental and commercial entities Speed control Red light control Vehicle Tracking Toll fee collection Access control Plate & car matching Check if registration expired Check if technical inspection is done And much more Illustration from: 29
30 WRAP UP
31 Conclusions Of all the available AVI technologies, only RFID meets all requirements Among RFID options, only secure passive UHF meets all AVI needs and can drive adoption All system components are available and deployed in various projects Combination of elicense Plates & Windshield Stickers gives best results NXP leads the market with secure contactless technologies and is a trusted partner for many governments, financial and other institutions 31
32 MobileKnowledge Thank you for your attention We are a global competence team of hardware and software technical experts in all areas related to contactless technologies and applications. Our services include: Application and system Design Engineering support Project Management Technological Consulting Advanced Technical services We address all the exploding identification technologies that include NFC, secure micro-controllers for smart cards and mobile applications, reader ICs, smart tags and labels, MIFARE family and authentication devices. For more information Eric Leroux eric.leroux@themobileknowledge.com
33 Automatic Vehicle Identification Carlos Paternain (Speaker) / Eric Leroux (Host) Thank you for your kind attention! Please remember to fill out our evaluation survey (pop-up) Check your for material download and on-demand video addresses Please check NXP and MobileKnowledge websites for upcoming webinars and training sessions
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationRFID for Managed Parking Lots
RFID for Managed Parking Lots RFID technology can provide independent, non stop systems for security, parking, and access control. Our RFID technology provides businesses and communities with hands free
More informationrf Technology to automate your BUsiness
Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,
More informationHow To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
More informationNFC Reader Design: How to build your own reader
NFC Reader Design: How to build your own reader Public MobileKnowledge February 2015 Agenda Introduction to RFID and NFC Contactless reader design: Initial considerations and architecture Illustrative
More informationTraining MIFARE SDK. Public. MobileKnowledge June 2015
MIFARE SDK Public MobileKnowledge June 2015 Agenda Overview of MIFARE SDK related technologies NFC Technology (Read/Write mode) MIFARE, NTAG and ICODE products NFC in Android MIFARE SDK Introduction to
More informationRAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA
RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs Matt Robshaw and Tyler Williamson Impinj Seattle, USA Overview RAIN RFID The product and standardization landscape Security, performance,
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationEfficient Asset Tracking: From Manual to Automated
White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationVON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
More informationNFC Reader Design: Antenna design considerations
NFC Reader Design: Antenna design considerations Public MobileKnowledge February 2015 Agenda Introduction to RFID and NFC Contactless reader design: Initial considerations and architecture Illustrative
More informationRFID market value vs tag cost : Reality vs Dream. Figure 3.2 Examples of RFID applications and potential applications at different tag prices
28 Figure 3.1 Potential markets for RFID smart labels RFID market value vs tag cost : Reality vs Dream Figure 3.2 Examples of RFID applications and potential applications at different tag prices Fast Locate,
More informationSOURCE ID RFID Technologies and Data Capture Solutions
SOURCE ID RFID Technologies and Data Capture Solutions RFID - a vital link for streamlining in-store inventory and supply chain management Source ID believes that worldwide demand for RFID based technology
More informationNFC Application Mobile Payments
NFC Application Mobile Payments Public MobileKnowledge June 2014 Agenda Introduction to payments Card based payments Mobile based payments NFC based payments mpos solutions NXP Product portfolio Successful
More informationVON BRAUN LABS. News WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO. Greetings from Dario S. Thober - CEO
WWW.VONBRAUNLABS.COM News VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO Greetings from Dario S. Thober - CEO Find out about our complete solutions Learn more about our
More informationW.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
More informationHow To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
More informationCHAPTER 3 AVI TRAVEL TIME DATA COLLECTION
CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION 3.1 - Introduction Travel time information is becoming more important for applications ranging from congestion measurement to real-time travel information. Several
More informationAn Introductory and Elementary Study on RFID & Its Applications
An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract
More informationRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
More informationGemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
More informationCSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity
CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics
More informationRFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
More informationImplementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
More informationDesign And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
More informationRFID Tags - Advantages, Disadvantages and Solutions
RFID Takes Time, Risk and Cost Out of Satisfying IT Asset Tracking Requirements RFID is the tool for the times to efficiently meet today s IT asset tracking requirements. Manual and bar codebased asset
More informationProminent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM
Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM Automated security, parking and access control system Accurate identification of authorized vehicles Automated entry/exit
More informationSmart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
More informationRFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
More informationSMARTRAC TECHNOLOGY GROUP ALL RIGHTS RESERVED
Company Overview Overview Facts, Vision and Mission Portfolio, Markets and Capabilities Quality and Certifications SMART COSMOS Internet of Things SMARTRAC TECHNOLOGY GROUP ALL RIGHTS RESERVED January
More informationRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
More informationRFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd.
RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd. About Us NeoTechID is a provider of Business Automation Solutions based on AIDC technologies such as RFID, bar-code scanning,
More informationStrengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
More informationAutomated Identification Technologies
Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT
More informationEnhancing everyday products with NFC Welcome to the Internet of Things. www.nxp.com/nfc
Enhancing everyday products with NFC Welcome to the Internet of Things www.nxp.com/nfc Index The Internet of Things and NFC NFC tagged products What they are How they work Typical applications Brand engagement
More informationInnovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions
Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions Innovative Wafer & Interconnect Technologies Outline Low cost RFID Tags & Labels Standard applications and
More informationSelf-Check-In Hotels Using RFID. Technology
Self-Check-In Hotels Using RFID Technology David H. Miller December 5, 2007 MAE 295C, Professor R. Gadh Contents I. The Need. 2 II. The Solution 2 III. The RFID Tag. 3 IV. The RFID Reader.... 5 V. Middleware.
More informationIntroductions 1 min 4
1 2 1 Minute 3 Introductions 1 min 4 5 2 Minutes Briefly Introduce the topics for discussion. We will have time for Q and A following the webinar. 6 Randy - EMV History / Chip Cards /Terminals 5 Minutes
More informationSECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior
More informationMilitary Usage of Passive RFID 1
Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationISO 27000 Information Security Management Systems Professional
ISO 27000 Information Security Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. A single framework of business continuity plans should be maintained to ensure
More informationOffering you the New Age of Vending and Micro Markets The Most Technologically Advanced System in the World!
Offering you the New Age of Vending and Micro Markets The Most Technologically Advanced System in the World! MICROTRONIC US has been in business for over 30 years and is the Major Cashless supplier around
More informationSimplifying IT Management and Data Security with RFID
Simplifying IT Management and Data Security with RFID IT asset management is a fundamental discipline to contribute to the growth and sustainability of the enterprise. Chief information officers have to
More informationThe use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes.
Introduction Fixed Asset Tracking has traditionally been a labour-intensive and paper based process while Radio Frequency Identification (RFID) has been reserved for the billing of traffic along toll-ways
More informationAn Avery Dennison White Paper. Tracking Reusable Metal Shipping Containers Using Passive RFID
An Avery Dennison White Paper Tracking Reusable Metal Shipping Containers Using Passive RFID July 5, 2007 Contents Background 3 Scope 3 Test Setup 3 Background Our evaluation focused on tracking large
More informationRadio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
More information2015 MicroDoc GmbH, München www.microdoc.com. Java and IoT from a MicroDoc perspective
Java and IoT from a MicroDoc perspective MicroDoc Profile Founded in 1991 Privately owned software engineering company Offices in Munich, Berlin, Stuttgart International, cross industry, customer base
More informationadvant advanced contactless smart card system
LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and
More informationIntermec RFID Tags & Media
Manufacturing Operations Warehouse Operations Supply Chain Operations In-Transit Visibility Store Operations Field Service Intermec RFID Tags & Media Meeting the scalable RFID challenge How To Determine
More informationA Secure and Open Solution for Seamless Transit Systems
A Secure and Open Solution for Seamless Transit Systems Today s Proprietary Fare Collection Systems Transit operators must combat growing security threats while identifying new revenue sources and enhancing
More informationPROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM
PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria
More informationRFID TECHNOLOGIES - RFID 101
RFID TECHNOLOGIES - RFID 101 Prepared for the American Fencing Association by: Douglas Cram, President Transponder and Reader Engineered Systems, Inc. doug@tresrfsolutions.com - (770) 529-1040 RFID TECHNOLOGIES
More informationLarge residential complex adopts RFID-based VEHICLE TRACKING SYSTEM
Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM Independent, non-stop system for security, parking and access control Accurate identification of authorized vehicles Automated entry
More informationPreventing fraud in epassports and eids
Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,
More informationRadio Frequency Identification (RFID) Vs Barcodes
Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want
More informationRFIDs and European Policies
ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit gerald.santucci@ec.europa.eu European Commission Directorate
More informationLaydown Yard Asset Tracking for Heavy Civil Construction
Laydown Yard Asset Tracking for Heavy Civil Construction Linda Chase HCC-6559 Customer Problem Areas Can t find laydown yard assets in yard or job sites? Some companies spend up to $2,500 a week on lost
More informationRFID-Based Asset Management for Space Habitats
RFID-Based Asset Management for Space Habitats Patrick W. Fink, Ph.D. NASA JSC Deputy Chief, Antenna and Wireless Systems Branch 2101 NASA Parkway Houston, TX 77058 USA (+1) 281-483-0973 patrick.w.fink@nasa.gov
More informationfleischhauer tickets RFID
fleischhauer tickets RFID RFID solutions tailor-made Tickets for Public Transport Tickets in Motion RFID ticketing revolutionises access systems for mass transit facilities worldwide. Public transport
More informationWe are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in
We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in the market at competitive prices. - Profile - Digital
More informationRF Attendance System Framework for Faculties of Higher Education
RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,
More informationPayments: POS, mpos & Mobile payments Gorka Hernando (Speaker) / Eric Leroux (Host)
Payments: POS, mpos & Mobile payments Gorka Hernando (Speaker) / Eric Leroux (Host) Webinar Instructions Audio settings: You are in listen only mode due to possible background noise Set Mic & Speakers
More informationPUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
More informationEvangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Network Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 2 Collaboration with Frank Akujobi
More informationWhat is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
More informationA guide to access control for manufacturing sites
A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round
More informationSecure Semi-Passive RFID Tags Prototype and Analysis
Building Radio frequency IDentification for the Global Environment Secure Semi-Passive RFID Tags Prototype and Analysis Authors: Manfred Aigner (TU Graz), Thomas Plos (TU Graz), Antti Ruhanen (Confidex),
More informationSecurity/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan
Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global
More informationHARTING Auto-ID System Integration
HARTING Auto-ID System Integration HARTING integrated Auto-ID solutions Mobile Reader Business Application Framework Enterprise Service Bus Auto-ID Transponder Middleware Backend System Stationary Reader
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationeseals RFID Internet of things «Technical experiences, innovative projects and EU pilots» for a smart supply chain digitalization
eseals RFID Internet of things «Technical experiences, innovative projects and EU pilots» for a smart supply chain digitalization Luca Abatello Technical Manager for Innovative Projects and EU Pilots July,
More informationExercise 1: Set up the Environment
RFID Lab Gildas Avoine, 2014 Contact: gildas.avoine@irisa.fr Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader
More informationAccess Control, Ticketing and Booking System for Sports Halls
Access Control, Ticketing and Booking System for Sports Halls SDD Information Technology Group has developed system for ticketing, booking and access control for sport objects. The system is based on contact
More informationWHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
More informationOpen Payment Fare Systems Save money through operational efficiencies.
Open Payment Fare Systems Save money through operational efficiencies. Open Payment Fare Systems Save money and allow transit agencies to focus on their core mission. Like many businesses worldwide, transit
More informationTransport Ticketing. Driving multi-application & transport ticketing on open standards. www.infineon.com/transport-ticketing
Transport Ticketing Driving multi-application & transport ticketing on open standards www.infineon.com/transport-ticketing Rapidly Growing Market Every day, millions and millions of people around the world
More informationIdentiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.
About Identiv Identiv is a global security technology company that establishes trust in the connected world, including premises, information, and everyday items. Global organizations in the government,
More informationConCERTO Secure Solutions for Converged Systems
ConCERTO Secure Solutions for Converged Systems Distribution for Switzerland: insinova ag www.insinova.ch Jens Albrecht Email: jens.albrecht@insinova.ch Phone: +41 41 748 72 05 September 2011 SCM Microsystems
More informationEnabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals
Enabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals executive summary Identity management and verification depend on trusted credentialing technologies.
More informationEmpowering the Eco-System of Connected Things
Empowering the Eco-System of Connected Things smartrac-group.com SMARTRAC is the world s leading developer, manufacturer and supplier of RFID inlays and tags that make a broad variety of physical objects
More information1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
More informationSecure Hardware PV018 Masaryk University Faculty of Informatics
Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators
More informationOriginally viewed as essentially remotely-readable
Editors: Ramaswamy Chandramouli, mouli@nist.gov Tim Grance, tim.grance@nist.gov Rick Kuhn, kuhn@nist.gov Susan Landau, susan.landau@sun.com Security Standards for the RFID Market Originally viewed as essentially
More informationTraining. NFC in Android. Public. MobileKnowledge October 2015
NFC in Android Public MobileKnowledge October 2015 Index Android mobile Operating System Market share Brief history Programing in Android NFC in Android Communicating my Android phone with NFC Readers
More informationSecurity in RFID Networks and Protocols
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 425-432 International Research Publications House http://www. irphouse.com /ijict.htm Security
More informationRadio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
More informationTime & Access System An RFID based technology
Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.
More informationApplying RFID in traffic junction monitoring
Second Conference of Junior Researchers in Civil Engineering 11 Applying RFID in traffic junction monitoring Nikol Krausz BME Department of Photogrammerty and Geoinformatics, e-mail: krausz@mail.bme.hu
More informationSmart Card Solutions: Bringing Value to Citizens
Smart Card Solutions: Bringing Value to Citizens by Thomas Röder The focus of modern smart card applications, especially in the electronic identity card landscape, has shifted from an approach purely driven
More informationOT PRODUCTS & SOLUTIONS TRANSPORT
OT PRODUCTS & SOLUTIONS TRANSPORT TOWARDS TRUE MOBILITY TRANSPORT OPERATORS AND TODAY, CONTACTLESS INTEGRATORS ARE FACING TRANSPORT SYSTEMS STRATEGIC CHALLENGES LACK INTEROPERABILITY, WHILST A FULL RANGE
More informationHacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT renaud.lifchitz@bt.com Hackito Ergo Sum 2012 April 12,13,14 Paris, France
Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT renaud.lifchitz@bt.com Hackito Ergo Sum 2012 April 12,13,14 Paris, France Speaker's bio French computer security engineer working at
More informationParking. Management System: Our Strengths are: Advanced Technology Excellent Versatility Great Simplicity Wide Range Local Maintenance
Parking Management Systems For more than 20 years Somfy SACS has car park automation. We design and produce advanced systems for automatic management of all types of car parks offering end to end services.
More informationToll Revenue Management and Maintenance Program (TRMMP) October 22, 2015
Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015 I-PASS Lane Technology In Action Electronic Tolling Overview Antenna Camera Axle Count: 2 Camera 2 AVI Reader Lane Controller Power
More informationMIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
More informationNACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
More information