Automatic Vehicle Identification

Size: px
Start display at page:

Download "Automatic Vehicle Identification"

Transcription

1 Automatic Vehicle Identification Public BU Security and Connectivity

2 Content Automatic Vehicle Identification Introduction Identifying the problem to address Benefits of AVI Applications of AVI AVI technologies review Inductive loops Optical systems Active RFID Passive RFID Secure passive RFID solutions from NXP for AVI: UCODE DNA UCODE DNA product review Benefits for AVI systems Form factors NXP and partners support Wrap up 2

3 AUTOMATIC VEHICLE IDENTIFICATION INTRODUCTION

4 The problem we want to address is: HOW TO RELIABLY COST-EFFECTIVELY and SECURELY IDENTIFY vehicles in various traffic situations. 4

5 Why are these four factors important? RELIABLITY every car, every time, in every condition COST-EFFECTIVENESS benefits are great, but not at any cost SECURITY $ is often involved, so we need to be sure IDENTIFICATION not to bill A for something B needs to pay not to give A a privilege which should go to B 5

6 Where would this be of benefit to us? There are number of traffic-related use cases where reliable, cost-effective and secure identification of vehicles comes in very handy: electronic toll collection access control (e.g. at parking facilities) classification and processing (e.g. at border crossings) law enforcement (e.g. speed control, red light control) asset tracking (e.g. for fleet management) 6

7 Vehicle registration related fraud causes huge income loss for governments worldwide In the US the noncompliance rate is estimated to be between 5-10% ($750M to $1.5 billion in fees remain uncollected by the states yearly) Other nations around the world have significantly higher levels of noncompliance (exceeding 30% in some nations) Source: Frost & Sullivan White Paper: The importance of tamper evident RFID tags in Electronic Vehicle Registration (EVR) solutions 7

8 AUTOMATIC VEHICLE IDENTIFICATION TECHNOLOGY REVIEW

9 What technologies do we have as options? Inductive Loops Small metallic loops embedded in the road (below the asphalt) Optical systems High resolution cameras, coupled with image recognition software, and computer HW for processing and storing data. They rely on vehicle license plates. RFID Readers and antennas installed above, below or on the side of the road, coupled with a tag attached to the vehicle (windshield label, transponder, elicense Plate). 9

10 Inductive Loops are reliable and inexpensive but can only detect and not identify Inductive Loops Comments Reliable Cost-Effective Secure Identification Works very well even in bad weather conditions. Loops are inexpensive to produce and control; but installation needed during road construction, otherwise they can get very expensive. No security mechanisms implemented; only simple physical metal detection. You can sense that a vehicle is present, but cannot distinguish one vehicle from another. 10

11 Optical systems have lots of pros but also many cons, mainly around cost and reliability Pros Optical systems Cons Reliable Cost-Effective Secure Identification Sophisticated image recognition software is available. None. Images normally saved and available for later verification. Even if optical system fails, the human eye often can still read it. Weather, dirt, damage all big obstacles. Rates as low as 45%. * Very high start-up costs. High maintenance costs as well. ** Poor quality image does not help. Fake license plates. Image can be very bad even for the human eye; automation benefit lost. *Source: Russian Government agency. ** few tens of thousands USD per read point. 11

12 RFID offers reliable secure identification while keeping system costs reasonable RFID Comments Reliable Cost-Effective Secure Identification Needs no line of sight, resistant to dirt and weather; 95%+ rates easily achieved. By far, less expensive start-up costs compared to optical systems, plus practically no maintenance costs. * Offers anti-cloning functionality based on software and hardware cryptography. RFID is ALL about IDENTIFICATION Unique ID Number on every tag deployed in the market. *few thousand USD per read point. 12

13 RFID is the only technology that meets all AVI requirements Inductive Loops Optical Systems RFID Reliable Cost-Effective Secure Identification 13

14 Not all RFID has been created equal Passive UHF* Harvests energy from RF field. Needs no battery. Standardized. Extended lifetime. Small form factor. Cost-efficient. Active Uses a battery to boost its operating range. Not standardized. Limited lifetime. Bulky Expensive *LF and HF do not meet read range requirement. 14

15 From the perspective of AVI requirements, the picture was not complete until recently Active RFID Passive UHF RFID Reliable Cost-Effective 30$ transponders Secure SW implementation Identification 15

16 From the perspective of AVI requirements, the picture was not complete until recently Active RFID Passive UHF RFID Reliable Cost-Effective Secure 30$ transponders SW implementation As a leader in passive RFID Identification and as a leader in security. 16

17 NXP now offers secure passive UHF RFID meeting all AVI requirements Active RFID Passive UHF Secure passive UHF Reliable Cost-Effective Secure HW implementation Identification 17

18 SECURE PASSIVE RFID SOLUTIONS FROM NXP FOR AVI: UCODE DNA

19 NXP presents: Passive UHF tag IC with cryptographic authentication world-leading long range contactless performance cutting-edge security implementation for tag authentication All based on international standards * GS1 (EPCglobal Inc.) UHF RFID Generation-2 Version 2.0 ** ISO/IEC for proof of origin based on AES (Advanced Encryption Standard) 19

20 Cutting edge security implementation means cryptographic authentication The meaning of security is much clearer now Simple electronic protection Digital Signatures Encrypted UM Proprietary Protocols Custom Commands Passwords Unique tag IDs Cryptographic authentication Dynamic computation-based unique in every transaction with secrets which never leave protected security vault embedded inside the IC 20

21 Benefits for all parts of the eco-system End users Governments System Integrators Reliable Convenience Less congestion Higher adoption Higher degree of automation. Lower operating costs Cost-Effective Low starting cost Higher adoption (not only commercial but all vehicles). Lower system costs. Drive adoption. Secure Peace of mind Privacy** Fraud reduction Fraud reduction Identification* Convenience Less congestion Higher adoption Happy customer Higher adoption *Remember: from afar, with no line of sight requirement, without slowing down. **Through special secure features of UCODE DNA. 21

22 The right performance (i.e. meeting all requirements) at an overall acceptable system cost level will drive adoption! 22

23 Higher adoption, even at lower price, means more value. 100 thousand 30USD per active onboard unit vs 1 million 5USD per passive tag 23

24 All system components are available and deployed in projects already RFID system includes RFID Tags RFID-enabled license plates RFID-enabled windshield stickers Mobile/handheld RFID readers Stationary RFID readers RFID reader antennas RFID road curtains RFID gates RFID totems Backend SW solutions Some active AVI projects China India Turkey Thailand Brazil Peru Mexico Russia Nigeria 24

25 There are multiple ways passive secure RFID can be attached to the vehicle OPTION 1 OPTION 2 elicense Plates Integrated RFID tag Entire metal plate serves as the antenna -> better read range and more reliable Possibility to combine optical and RF identification Drawback: potential removal from one vehicle to another Windshield Stickers Integrated RFID inlay Less removal risk since it is inside the vehicle Self destruction if removal is attempted Drawback: lower RF performance due to smaller antenna size For maximum protection and best read reliability, use of license plate in combination with windshield sticker is recommended. 25

26 License plate: government-issued document It is not a piece of paper It is not a plastic card or a booklet Nevertheless, even though it is a metallic plate... still a government-issued document establishes identity it is linked to various obligations and benefits there is monetary value associated with it 26

27 Overview of overall System Costs Tag Reader Backend Optical Systems - $$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$ $$$$$$$$$$$$$$$$$$$$$$$$ Active RFID $$$ $$$$$$$ $$$$$$$ Passive RFID $ $$$$$$$ $$$$$$$ 27

28 Additional benefits of RFID Once integrated into a license plate, RFID tag with crypto functionality can be use for authentication of license plate as a government issued document RFID systems can also be used for instantaneous speed measurements additional use case Once widely deployed (e.g. for tolling or for license plate auth.) easy extension to other applications such as parking access, law enforcement 28

29 RFID enables many use cases for governmental and commercial entities Speed control Red light control Vehicle Tracking Toll fee collection Access control Plate & car matching Check if registration expired Check if technical inspection is done And much more Illustration from: 29

30 WRAP UP

31 Conclusions Of all the available AVI technologies, only RFID meets all requirements Among RFID options, only secure passive UHF meets all AVI needs and can drive adoption All system components are available and deployed in various projects Combination of elicense Plates & Windshield Stickers gives best results NXP leads the market with secure contactless technologies and is a trusted partner for many governments, financial and other institutions 31

32 MobileKnowledge Thank you for your attention We are a global competence team of hardware and software technical experts in all areas related to contactless technologies and applications. Our services include: Application and system Design Engineering support Project Management Technological Consulting Advanced Technical services We address all the exploding identification technologies that include NFC, secure micro-controllers for smart cards and mobile applications, reader ICs, smart tags and labels, MIFARE family and authentication devices. For more information Eric Leroux eric.leroux@themobileknowledge.com

33 Automatic Vehicle Identification Carlos Paternain (Speaker) / Eric Leroux (Host) Thank you for your kind attention! Please remember to fill out our evaluation survey (pop-up) Check your for material download and on-demand video addresses Please check NXP and MobileKnowledge websites for upcoming webinars and training sessions

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015 MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

RFID for Managed Parking Lots

RFID for Managed Parking Lots RFID for Managed Parking Lots RFID technology can provide independent, non stop systems for security, parking, and access control. Our RFID technology provides businesses and communities with hands free

More information

rf Technology to automate your BUsiness

rf Technology to automate your BUsiness Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

NFC Reader Design: How to build your own reader

NFC Reader Design: How to build your own reader NFC Reader Design: How to build your own reader Public MobileKnowledge February 2015 Agenda Introduction to RFID and NFC Contactless reader design: Initial considerations and architecture Illustrative

More information

Training MIFARE SDK. Public. MobileKnowledge June 2015

Training MIFARE SDK. Public. MobileKnowledge June 2015 MIFARE SDK Public MobileKnowledge June 2015 Agenda Overview of MIFARE SDK related technologies NFC Technology (Read/Write mode) MIFARE, NTAG and ICODE products NFC in Android MIFARE SDK Introduction to

More information

RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA

RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs Matt Robshaw and Tyler Williamson Impinj Seattle, USA Overview RAIN RFID The product and standardization landscape Security, performance,

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Efficient Asset Tracking: From Manual to Automated

Efficient Asset Tracking: From Manual to Automated White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

NFC Reader Design: Antenna design considerations

NFC Reader Design: Antenna design considerations NFC Reader Design: Antenna design considerations Public MobileKnowledge February 2015 Agenda Introduction to RFID and NFC Contactless reader design: Initial considerations and architecture Illustrative

More information

RFID market value vs tag cost : Reality vs Dream. Figure 3.2 Examples of RFID applications and potential applications at different tag prices

RFID market value vs tag cost : Reality vs Dream. Figure 3.2 Examples of RFID applications and potential applications at different tag prices 28 Figure 3.1 Potential markets for RFID smart labels RFID market value vs tag cost : Reality vs Dream Figure 3.2 Examples of RFID applications and potential applications at different tag prices Fast Locate,

More information

SOURCE ID RFID Technologies and Data Capture Solutions

SOURCE ID RFID Technologies and Data Capture Solutions SOURCE ID RFID Technologies and Data Capture Solutions RFID - a vital link for streamlining in-store inventory and supply chain management Source ID believes that worldwide demand for RFID based technology

More information

NFC Application Mobile Payments

NFC Application Mobile Payments NFC Application Mobile Payments Public MobileKnowledge June 2014 Agenda Introduction to payments Card based payments Mobile based payments NFC based payments mpos solutions NXP Product portfolio Successful

More information

VON BRAUN LABS. News WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO. Greetings from Dario S. Thober - CEO

VON BRAUN LABS. News WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO. Greetings from Dario S. Thober - CEO WWW.VONBRAUNLABS.COM News VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO Greetings from Dario S. Thober - CEO Find out about our complete solutions Learn more about our

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

How To Attack A Key Card With A Keycard With A Car Key (For A Car) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car

More information

CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION

CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION 3.1 - Introduction Travel time information is becoming more important for applications ranging from congestion measurement to real-time travel information. Several

More information

An Introductory and Elementary Study on RFID & Its Applications

An Introductory and Elementary Study on RFID & Its Applications An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

CSC 474 -- Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity CSC 474 -- Network Security Topic 6.2 User Authentication CSC 474 Dr. Peng Ning 1 User Authentication Basics CSC 474 Dr. Peng Ning 2 Authentication and Identity What is identity? which characteristics

More information

RFID Penetration Tests when the truth is stranger than fiction

RFID Penetration Tests when the truth is stranger than fiction RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker

More information

RFID Tags - Advantages, Disadvantages and Solutions

RFID Tags - Advantages, Disadvantages and Solutions RFID Takes Time, Risk and Cost Out of Satisfying IT Asset Tracking Requirements RFID is the tool for the times to efficiently meet today s IT asset tracking requirements. Manual and bar codebased asset

More information

Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM

Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM Automated security, parking and access control system Accurate identification of authorized vehicles Automated entry/exit

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for

More information

SMARTRAC TECHNOLOGY GROUP ALL RIGHTS RESERVED

SMARTRAC TECHNOLOGY GROUP ALL RIGHTS RESERVED Company Overview Overview Facts, Vision and Mission Portfolio, Markets and Capabilities Quality and Certifications SMART COSMOS Internet of Things SMARTRAC TECHNOLOGY GROUP ALL RIGHTS RESERVED January

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience

More information

RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd.

RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd. RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd. About Us NeoTechID is a provider of Business Automation Solutions based on AIDC technologies such as RFID, bar-code scanning,

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Automated Identification Technologies

Automated Identification Technologies Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT

More information

Enhancing everyday products with NFC Welcome to the Internet of Things. www.nxp.com/nfc

Enhancing everyday products with NFC Welcome to the Internet of Things. www.nxp.com/nfc Enhancing everyday products with NFC Welcome to the Internet of Things www.nxp.com/nfc Index The Internet of Things and NFC NFC tagged products What they are How they work Typical applications Brand engagement

More information

Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions

Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions Innovative Wafer & Interconnect Technologies Outline Low cost RFID Tags & Labels Standard applications and

More information

Self-Check-In Hotels Using RFID. Technology

Self-Check-In Hotels Using RFID. Technology Self-Check-In Hotels Using RFID Technology David H. Miller December 5, 2007 MAE 295C, Professor R. Gadh Contents I. The Need. 2 II. The Solution 2 III. The RFID Tag. 3 IV. The RFID Reader.... 5 V. Middleware.

More information

Introductions 1 min 4

Introductions 1 min 4 1 2 1 Minute 3 Introductions 1 min 4 5 2 Minutes Briefly Introduce the topics for discussion. We will have time for Q and A following the webinar. 6 Randy - EMV History / Chip Cards /Terminals 5 Minutes

More information

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT

SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior

More information

Military Usage of Passive RFID 1

Military Usage of Passive RFID 1 Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

ISO 27000 Information Security Management Systems Professional

ISO 27000 Information Security Management Systems Professional ISO 27000 Information Security Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. A single framework of business continuity plans should be maintained to ensure

More information

Offering you the New Age of Vending and Micro Markets The Most Technologically Advanced System in the World!

Offering you the New Age of Vending and Micro Markets The Most Technologically Advanced System in the World! Offering you the New Age of Vending and Micro Markets The Most Technologically Advanced System in the World! MICROTRONIC US has been in business for over 30 years and is the Major Cashless supplier around

More information

Simplifying IT Management and Data Security with RFID

Simplifying IT Management and Data Security with RFID Simplifying IT Management and Data Security with RFID IT asset management is a fundamental discipline to contribute to the growth and sustainability of the enterprise. Chief information officers have to

More information

The use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes.

The use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes. Introduction Fixed Asset Tracking has traditionally been a labour-intensive and paper based process while Radio Frequency Identification (RFID) has been reserved for the billing of traffic along toll-ways

More information

An Avery Dennison White Paper. Tracking Reusable Metal Shipping Containers Using Passive RFID

An Avery Dennison White Paper. Tracking Reusable Metal Shipping Containers Using Passive RFID An Avery Dennison White Paper Tracking Reusable Metal Shipping Containers Using Passive RFID July 5, 2007 Contents Background 3 Scope 3 Test Setup 3 Background Our evaluation focused on tracking large

More information

Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/

More information

2015 MicroDoc GmbH, München www.microdoc.com. Java and IoT from a MicroDoc perspective

2015 MicroDoc GmbH, München www.microdoc.com. Java and IoT from a MicroDoc perspective Java and IoT from a MicroDoc perspective MicroDoc Profile Founded in 1991 Privately owned software engineering company Offices in Munich, Berlin, Stuttgart International, cross industry, customer base

More information

advant advanced contactless smart card system

advant advanced contactless smart card system LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and

More information

Intermec RFID Tags & Media

Intermec RFID Tags & Media Manufacturing Operations Warehouse Operations Supply Chain Operations In-Transit Visibility Store Operations Field Service Intermec RFID Tags & Media Meeting the scalable RFID challenge How To Determine

More information

A Secure and Open Solution for Seamless Transit Systems

A Secure and Open Solution for Seamless Transit Systems A Secure and Open Solution for Seamless Transit Systems Today s Proprietary Fare Collection Systems Transit operators must combat growing security threats while identifying new revenue sources and enhancing

More information

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM By HEAD OFFICE ADDRESS: Last Floor, Ofures Place Complex, KM6, No. 162 Benin-Sapele Road Benin City, Edo State, Nigeria

More information

RFID TECHNOLOGIES - RFID 101

RFID TECHNOLOGIES - RFID 101 RFID TECHNOLOGIES - RFID 101 Prepared for the American Fencing Association by: Douglas Cram, President Transponder and Reader Engineered Systems, Inc. doug@tresrfsolutions.com - (770) 529-1040 RFID TECHNOLOGIES

More information

Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM

Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM Large residential complex adopts RFID-based VEHICLE TRACKING SYSTEM Independent, non-stop system for security, parking and access control Accurate identification of authorized vehicles Automated entry

More information

Preventing fraud in epassports and eids

Preventing fraud in epassports and eids Preventing fraud in epassports and eids Security protocols for today and tomorrow by Markus Mösenbacher, NXP Machine-readable passports have been a reality since the 1980s, but it wasn't until after 2001,

More information

Radio Frequency Identification (RFID) Vs Barcodes

Radio Frequency Identification (RFID) Vs Barcodes Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want

More information

RFIDs and European Policies

RFIDs and European Policies ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit gerald.santucci@ec.europa.eu European Commission Directorate

More information

Laydown Yard Asset Tracking for Heavy Civil Construction

Laydown Yard Asset Tracking for Heavy Civil Construction Laydown Yard Asset Tracking for Heavy Civil Construction Linda Chase HCC-6559 Customer Problem Areas Can t find laydown yard assets in yard or job sites? Some companies spend up to $2,500 a week on lost

More information

RFID-Based Asset Management for Space Habitats

RFID-Based Asset Management for Space Habitats RFID-Based Asset Management for Space Habitats Patrick W. Fink, Ph.D. NASA JSC Deputy Chief, Antenna and Wireless Systems Branch 2101 NASA Parkway Houston, TX 77058 USA (+1) 281-483-0973 patrick.w.fink@nasa.gov

More information

fleischhauer tickets RFID

fleischhauer tickets RFID fleischhauer tickets RFID RFID solutions tailor-made Tickets for Public Transport Tickets in Motion RFID ticketing revolutionises access systems for mass transit facilities worldwide. Public transport

More information

We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in

We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in We are one of the distinguished suppliers of a Wide range of Access Controllers. These are procured from the reliable vendors and are available in the market at competitive prices. - Profile - Digital

More information

RF Attendance System Framework for Faculties of Higher Education

RF Attendance System Framework for Faculties of Higher Education RF Attendance System Framework for Faculties of Higher Education Ms. Unnati A. Patel 1 Dr. Swaminarayan Priya R 2 1 Asst. Professor, M.Sc(IT) Department, ISTAR, V.V.Nagar-388120, India 2 Head & ProfessorHH,

More information

Payments: POS, mpos & Mobile payments Gorka Hernando (Speaker) / Eric Leroux (Host)

Payments: POS, mpos & Mobile payments Gorka Hernando (Speaker) / Eric Leroux (Host) Payments: POS, mpos & Mobile payments Gorka Hernando (Speaker) / Eric Leroux (Host) Webinar Instructions Audio settings: You are in listen only mode due to possible background noise Set Mic & Speakers

More information

PUF Physical Unclonable Functions

PUF Physical Unclonable Functions Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication

More information

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Network Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 2 Collaboration with Frank Akujobi

More information

What is a Smart Card?

What is a Smart Card? An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes Keith.Mayes@rhul.ac.uk Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types

More information

A guide to access control for manufacturing sites

A guide to access control for manufacturing sites A guide to access control for manufacturing sites What is access control? Access control provides the ability to control, monitor and restrict the movement of people, assets or vehicles, in, out and round

More information

Secure Semi-Passive RFID Tags Prototype and Analysis

Secure Semi-Passive RFID Tags Prototype and Analysis Building Radio frequency IDentification for the Global Environment Secure Semi-Passive RFID Tags Prototype and Analysis Authors: Manfred Aigner (TU Graz), Thomas Plos (TU Graz), Antti Ruhanen (Confidex),

More information

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

Security/Privacy Models for Internet of things: What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan 1 Internet of Things (IoT) CASAGRAS defined that: A global

More information

HARTING Auto-ID System Integration

HARTING Auto-ID System Integration HARTING Auto-ID System Integration HARTING integrated Auto-ID solutions Mobile Reader Business Application Framework Enterprise Service Bus Auto-ID Transponder Middleware Backend System Stationary Reader

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

eseals RFID Internet of things «Technical experiences, innovative projects and EU pilots» for a smart supply chain digitalization

eseals RFID Internet of things «Technical experiences, innovative projects and EU pilots» for a smart supply chain digitalization eseals RFID Internet of things «Technical experiences, innovative projects and EU pilots» for a smart supply chain digitalization Luca Abatello Technical Manager for Innovative Projects and EU Pilots July,

More information

Exercise 1: Set up the Environment

Exercise 1: Set up the Environment RFID Lab Gildas Avoine, 2014 Contact: gildas.avoine@irisa.fr Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader

More information

Access Control, Ticketing and Booking System for Sports Halls

Access Control, Ticketing and Booking System for Sports Halls Access Control, Ticketing and Booking System for Sports Halls SDD Information Technology Group has developed system for ticketing, booking and access control for sport objects. The system is based on contact

More information

WHITE PAPER. ABCs of RFID

WHITE PAPER. ABCs of RFID WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,

More information

Open Payment Fare Systems Save money through operational efficiencies.

Open Payment Fare Systems Save money through operational efficiencies. Open Payment Fare Systems Save money through operational efficiencies. Open Payment Fare Systems Save money and allow transit agencies to focus on their core mission. Like many businesses worldwide, transit

More information

Transport Ticketing. Driving multi-application & transport ticketing on open standards. www.infineon.com/transport-ticketing

Transport Ticketing. Driving multi-application & transport ticketing on open standards. www.infineon.com/transport-ticketing Transport Ticketing Driving multi-application & transport ticketing on open standards www.infineon.com/transport-ticketing Rapidly Growing Market Every day, millions and millions of people around the world

More information

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE.

Identiv is a publicly traded company and its common stock is listed on the NASDAQ Capital Market in the U.S. under the symbol INVE. About Identiv Identiv is a global security technology company that establishes trust in the connected world, including premises, information, and everyday items. Global organizations in the government,

More information

ConCERTO Secure Solutions for Converged Systems

ConCERTO Secure Solutions for Converged Systems ConCERTO Secure Solutions for Converged Systems Distribution for Switzerland: insinova ag www.insinova.ch Jens Albrecht Email: jens.albrecht@insinova.ch Phone: +41 41 748 72 05 September 2011 SCM Microsystems

More information

Enabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals

Enabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals Enabling Security, Compliance and Efficiency: Achieve Your Federal Identification Credentialing Goals executive summary Identity management and verification depend on trusted credentialing technologies.

More information

Empowering the Eco-System of Connected Things

Empowering the Eco-System of Connected Things Empowering the Eco-System of Connected Things smartrac-group.com SMARTRAC is the world s leading developer, manufacturer and supplier of RFID inlays and tags that make a broad variety of physical objects

More information

1.1.1 Introduction to Cloud Computing

1.1.1 Introduction to Cloud Computing 1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the

More information

Secure Hardware PV018 Masaryk University Faculty of Informatics

Secure Hardware PV018 Masaryk University Faculty of Informatics Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators

More information

Originally viewed as essentially remotely-readable

Originally viewed as essentially remotely-readable Editors: Ramaswamy Chandramouli, mouli@nist.gov Tim Grance, tim.grance@nist.gov Rick Kuhn, kuhn@nist.gov Susan Landau, susan.landau@sun.com Security Standards for the RFID Market Originally viewed as essentially

More information

Training. NFC in Android. Public. MobileKnowledge October 2015

Training. NFC in Android. Public. MobileKnowledge October 2015 NFC in Android Public MobileKnowledge October 2015 Index Android mobile Operating System Market share Brief history Programing in Android NFC in Android Communicating my Android phone with NFC Readers

More information

Security in RFID Networks and Protocols

Security in RFID Networks and Protocols International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 425-432 International Research Publications House http://www. irphouse.com /ijict.htm Security

More information

Radio Frequency Identification (RFID) An Overview

Radio Frequency Identification (RFID) An Overview Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify

More information

Time & Access System An RFID based technology

Time & Access System An RFID based technology Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.

More information

Applying RFID in traffic junction monitoring

Applying RFID in traffic junction monitoring Second Conference of Junior Researchers in Civil Engineering 11 Applying RFID in traffic junction monitoring Nikol Krausz BME Department of Photogrammerty and Geoinformatics, e-mail: krausz@mail.bme.hu

More information

Smart Card Solutions: Bringing Value to Citizens

Smart Card Solutions: Bringing Value to Citizens Smart Card Solutions: Bringing Value to Citizens by Thomas Röder The focus of modern smart card applications, especially in the electronic identity card landscape, has shifted from an approach purely driven

More information

OT PRODUCTS & SOLUTIONS TRANSPORT

OT PRODUCTS & SOLUTIONS TRANSPORT OT PRODUCTS & SOLUTIONS TRANSPORT TOWARDS TRUE MOBILITY TRANSPORT OPERATORS AND TODAY, CONTACTLESS INTEGRATORS ARE FACING TRANSPORT SYSTEMS STRATEGIC CHALLENGES LACK INTEROPERABILITY, WHILST A FULL RANGE

More information

Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT renaud.lifchitz@bt.com Hackito Ergo Sum 2012 April 12,13,14 Paris, France

Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT renaud.lifchitz@bt.com Hackito Ergo Sum 2012 April 12,13,14 Paris, France Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT renaud.lifchitz@bt.com Hackito Ergo Sum 2012 April 12,13,14 Paris, France Speaker's bio French computer security engineer working at

More information

Parking. Management System: Our Strengths are: Advanced Technology Excellent Versatility Great Simplicity Wide Range Local Maintenance

Parking. Management System: Our Strengths are: Advanced Technology Excellent Versatility Great Simplicity Wide Range Local Maintenance Parking Management Systems For more than 20 years Somfy SACS has car park automation. We design and produce advanced systems for automatic management of all types of car parks offering end to end services.

More information

Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015

Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015 Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015 I-PASS Lane Technology In Action Electronic Tolling Overview Antenna Camera Axle Count: 2 Camera 2 AVI Reader Lane Controller Power

More information

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.

More information

NACCU 2013. Migrating to Contactless: 2013 1

NACCU 2013. Migrating to Contactless: 2013 1 NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise

More information