Mobile Computing. What is RFID? RFID 9/30/14. CSE 40814/60814 Fall Radio Frequency Iden=fica=on
|
|
- Silvia Mary Perkins
- 7 years ago
- Views:
Transcription
1 Mobile Computing CSE 40814/60814 Fall 2014 What is RFID? Radio Frequency Iden=fica=on Who Are You? I am Product X RFID RFID is an ADC (automated data collec=on) technology that uses radio- frequency waves to transfer data between a reader and a movable item to iden=fy, categorize, track... RFID is fast, reliable, and does not require physical sight or contact between reader/ scanner and the tagged item A close cousin to sensor network technology Generally, RFID tags are cheaper, but less intelligent than sensor nodes As things evolve the line between the two technologies is blurring 1
2 Historical Background Identification Friend or Foe (IFF) Used by Allied bombers during World War II In 1948, concept of passive RFID systems introduced by Harry Stockman In 1972, Kriofsky and Kaplan designed and patented an inductively coupled transmitter-responder (2 antennas) In 1979, Beigel designed/patented identification device which combined both antennas into one In the 1970s, a group of scientists at the Lawrence Livermore Laboratory (LLL) build a handheld receiver stimulated by RF power for secure access to nuclear facilities RFID Systems Main components: Tags (transponders) - microchip & antenna Tag reader decoder & antenna the RFID reader sends a pulse of radio energy to the tag and listens for the tag s response to instruc=ons RFID readers are either con=nuously on or they send the radio pulse only in a response to an external event Tags Varia=ons: Memory Size (16 bits Kbytes) Read- Only, Read/Write or WORM Arbitra=on (An=- collision) Ability to read/write one or many tags at a =me Frequency 125KHz GHz Price ($0.10 to $250) Physical Dimensions Thumbnail to Brick sizes 2
3 Mission Impossible Tiny Tags 2007 Hitachi produced RFID device measuring mm, and thin enough to be embedded in a sheet of paper. The data contained on them can be extracted from as far away as a few hundred metres. Human hair comparison. Active versus Passive Active RFID Passive RFID Tag Power Source Internal to tag Energy transferred using RF from reader Tag Battery Yes No Required signal strength Very Low Very High Range Up to 100m Up to 3-5m, usually less Multi-tag reading 1000 s of tags recognized up to 100mph Few hundred within 3m of reader, about 3 sec per read => at most 3 mph. Data Storage Up to 512 KB 16 bits 1 KB 3
4 Active Tag Passive Tag Frequency Ranges 4
5 9/30/14 Low Frequency: Load Modulation Computer Science and Engineering - University of Notre Dame High-Frequency: Backscatter Modulation Computer Science and Engineering - University of Notre Dame Codes RFID tag Bar code Computer Science and Engineering - University of Notre Dame 5
6 Bar Code EPC: Electronic Product Code Creating EPCs Transmitting EPCs EPC 6
7 Communication and Collisions Very simple packet formats General structure: Sync Header Command Data CRC Usually reader- to- tag and tag- to- reader format somewhat different. Typically 2 byte CRC Collisions When mul=ple tags receive a query from the reader, they will all respond. => Responses will collide at the reader Many readers feature simultaneous read capabili=es Must resolve collisions Basic link layer problem (e.g., Ethernet) But here the algorithm must be very simple Problem in wireless in general: collision detec=on at sender not possible Problem in RFID: no carrier sense of tag possible Collision Resolution for RFID Two common approaches: Sloned Aloha (with back- off) Binary tree algorithm (reader polls tags bit by bit ) 7
8 9/30/14 Application Scenarios Track the movement of consumer product goods Animal iden=fica=on/tracking/coun=ng Toll collec=on Implanta=on of RFID chips into people, e.g., Alzheimer pa=ents Computer Science and Engineering - University of Notre Dame Applications Keyless entry Proximity cards Supply chain management Computer Science and Engineering - University of Notre Dame Implants It is the most controversial application Small glass cylinders approximately 2 or 3mm wide and between 1 and 1.5cm long Consists of a microchip, a coiled antenna, and a capacitor Implanted typically under the skin of arm or the back of the neck Computer Science and Engineering - University of Notre Dame 8
9 Concerns Clandes=ne tracking Inventorying Benetton Controversy (2003) Walmart Controversy (2003) 9
10 Instant Checkout Chip to remove shopping blues " Post-Courier, January 1994! 1.5 electronic bar code announced " San Francisco Chronicle!! Tiny microchip identifies groceries in seconds.! Chicago Tribune!! Scanning range of four yards " NY Times!! Checkout in one minute " The Times, London!! The Hype Cycle Peak of Inflated Expectations Visibility Plateau of Productivity Slope of Enlightenment RFID Today! Technology Trigger Trough of Disillusionment Time Walmart In 2003, Walmart made the retail industry's ini=al steps with a Radio Frequency Iden=fica=on (RFID) supplier requirement when it announced a pallet and case level tagging ini=a=ve. Currently, over 600 suppliers are par=cipa=ng in the ini=a=ve. Today, Walmart requires that its top suppliers must be RFID compliant, at the pallet and outer case level. Many suppliers have already been no=fied regarding their target compliance dates. As =me progresses RFID benefits will con=nue to surface as well as the technology will become cheaper and easier to integrate. 10
11 Case Studies AIRBUS A- 380 The world s largest passenger aircrap has been equipped with 10,000 radio frequency tags which will help speed up maintenance and improve safety. The double- decker plane which accommodates 555 passengers has passive RFID chips on removable parts such as seats, life jackets, brakes and other parts, which are subject to rou=ne service or replacement. RFID tagging will make the checking of these parts quicker and more accurate and provide a database of informa=on about each item. Case Studies Volkswagen Volkswagen is Europe's largest producer of cars, and the fourth largest in the world, and each year over 35,000 vehicles are displayed at and collected from the company's unique Autostadt (Auto City) facility at Wolfsburg in Germany. When Volkswagen wanted a way to quickly locate a car in the holding lot and then track its progress through pre- delivery, it was decided to adopt a system using RFID tags. All tasks involved in the delivery process are recorded and stored on the tag, which is hung from the rear view mirror. Every =me the car moves through a process sta=on, workers know its loca=on and current status automa=cally. Near-Field Communication (NFC) NFC, is one of the latest wireless communication technologies. As a shortrange wireless connectivity technology, NFC offers safe yet simple communication between electronic devices. It enables exchange of data between devices over a distance of 4 cm or less. NFC operates at MHz and rates ranging from 106 kbit/s to 848 kbit/s
12 How NFC Works NFC is based on RFID technology that uses magnetic field induction between electronic devices in close proximity. For two devices to communicate using NFC, one device must have an NFC reader/writer and one must have an NFC tag. The tag is essentially an integrated circuit containing data, connected to an antenna, that can be read or written by the reader. NFC The technology is a simple extension of the ISO/IEC14443 proximity- card standard (contactless card, RFID) that combines the interface of a smartcard and a reader into a single device. An NFC device can communicate with both exis=ng ISO/ IEC14443 smartcards and readers, as well as with other NFC devices, and is thereby compa=ble with contactless infrastructure already in use for public transporta=on and payment. NFC is primarily aimed at usage in mobile phones. By 2013, one in five phones will have NFC (predicted by Juniper Research). Japan is early adopter of NFC. 34 Uses and Applications There are currently three main uses of NFC: Card emulation: The NFC device behaves like an existing contactless card. Reader mode: The NFC device is active and reads a passive RFID tag, for example for interactive advertising. P2P mode: Two NFC devices communicating together and exchanging information. 12
13 NFC Applications Mobile ticketing in public transport: an extension of the existing contactless infrastructure, such as Mobile Phone Boarding Pass. Mobile payment, electronic money. Smart poster: the mobile phone is used to read RFID tags on outdoor billboards. Electronic =cke=ng. Travel card, iden=ty documents. Electronic keys: replacements for physical car keys, house/office keys, hotel room keys, etc. NFC can be used to configure and initiate other wireless network connections such as Bluetooth, Wi- Fi or Ultra-wideband. 36 Comparison with Bluetooth NFC and Bluetooth are both short-range communication technologies which are integrated into mobile phones. To avoid a complicated configuration process, NFC can be used for the set-up of wireless technologies, such as Bluetooth. NFC sets up faster than standard Bluetooth, but is not much faster than Bluetooth low energy. With NFC, instead of performing manual configurations to identify devices, the connection between two NFC devices is automatically established quickly in less than a tenth of a second. The maximum data transfer rate of NFC (424 kbit/s) is slower than that of Bluetooth V2.1 (2.1 Mbit/s). 13
14 With a maximum working distance of less than 20 cm, NFC has a shorter range, which reduces the likelihood of unwanted interception. That makes NFC particularly suitable for crowded areas where correlating a signal with its transmitting physical device (and by extension, its user) becomes difficult. In contrast to Bluetooth, NFC is compatible with existing passive RFID (13.56 MHz ISO/IEC ) infrastructures. NFC requires comparatively low power, similar to the Bluetooth V4.0 low energy protocol. However, when NFC works with an unpowered device (e.g. on a phone that may be turned off, a contactless smart credit card, a smart poster, etc.), the NFC power consumption is greater than that of Bluetooth V4.0 Low Energy. Activation of the passive tag needs extra power. Security Unauthorized Reading: Compe=tors can scan closed boxes and find out what is inside Someone can read your RFID enabled credit card Metal foil used in US passport to avoid reading when closed Unauthorized Wri=ng: Can change UPC/price of an item Can kill a tag Solu=on: Reader authen=ca=on: Passwords can be sniffed. RFID Zapper: Can burn a tag by overcurrent RSA Blocker Tag: placed near another RFID, it prevent is reading Privacy What can you do to prevent others from reading your RFID aper you purchase the item? Kill the tag. Need authen=ca=on. Put the tag to sleep. Used for reusable tags. Libraries. Authen=ca=on to put to sleep and to awaken. Re- label: Customer can overwrite customer specific informa=on. Manufacturer specific informa=on can remain. Dual Labeling: One tag with customer specific informa=on. One with manufacturer specific informa=on. PIN: The reader needs to provide a PIN. The user can change the PIN. Distance- Sensi=ve: Tag is designed so that the informa=on provided depends upon the distance Blocker: A device that generates random signal and prevents others from reading your RFIDs. 14
15 Range of Attacks Nominal reading range: Standard power reader Rogue reading range: More powerful readers can read from longer distance Tag- to- Reader Eavesdropping Range: Passively listen to response with a more sensi=ve receiver Reader- to- tag Eavesdropping Range: Passively listen to query with a more sensi=ve receiver. Can do this from very far. Detec=on Range: Can just detect the presence of a tag or a reader. Important in defense applica=ons where important weapons or targets are tagged. Types of Attacks Sniffing and eavesdropping: Passively listening with very sensi=ve readers. Compe==on can find what you are shipping/receiving Spoofing: Copy tag for use on other items Replay: Unauthorized access by recording and replaying the response. Garage door openers. Denial of Service: Frequency jamming Blocking: Aluminum foils Future Devices and Use On November 15, 2010 Eric Schmidt announced at the Web 2.0 Summit that Android will support NFC starting from version 2.3 ("Gingerbread"). The first Android handset which supports this technology is the Nexus S. On January 25, 2011, Bloomberg published a report stating that Apple was actively pursuing development of a mobile payment system employing NFC. New generations of iphone, ipod and ipad products would reportedly be equipped with NFC capability which would enable small-scale monetary transactions. 15
16 New Trend: Mobile Payments mybanktracker.com katu.com iranmobin.com tomnoyes.wordpress.com paymentscouncil.org.uk Predicted Mobile Spending Types of Mobile Payments Mobile-to-mobile payments Mobile devices as credit card processors Mobile devices used as credit cards 16
17 Mobile-to-Mobile Payments n Merchant applica=ons allowing instantaneous transfer of funds from one account to another via smartphone n Examples: n Paypal Bump n Bump phones together to receive account info n Or enter address to download appropriate account info n 1.9% - 2.9% + $0.30 transac=on fee Mobile Devices as Credit Card Processors allaexpression.com Square, Inc. Device acts a mini credit card reader inputting pertinent transaction information into the phone through Square App Cost: 2.75% + $0.15/card swiped; 3.5% +$0.15/ card keyed in Intuit Mobile credit card reader Cost Low Volume: $0/month, 2.7% + $0.15/swipe, 3.7% + $0.15/keyed in High Volume: $12.95/month, 1.7% + $0.30/swipe, 2.7% + $0.30/keyed in *Also additional fees for non-qualified transactions Mobile Devices as Credit Cards Near Field Communication (NFC) Technology Allows consumers to wave their mobile phone over a point of sale terminal to purchase retail items Thought to threaten the existence of the wallet Companies set to launch pilot programs: Wells Fargo Google ISIS (partnership between AT&T, Verizon Wireless, T-Mobile, Discover Financial Services and Barclays) Costs: Approximately $200/reader Phones with microchips would cost an additional $10 to $15 Transaction fees? news.softpedia.com 17
18 Adoptability of NFC Technology Multiple transaction systems (like with credit cards) would need to be put into place before the technology would work Banks, merchants, phone makers, and wireless carriers would need to agree on transaction fees and technical specifications Security threats May be useful for small transactions (fast food, transit costs, etc.), but not predicted to be used for big purchases 18
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
More informationRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationCHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
More informationRFID Design Principles
RFID Design Principles Second Edition Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents CHAPTER 1 Introduction CHAPTER 2 Short-Range Communications Systems 2.1 Radio-Frequency Spectrum
More informationGemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
More informationEvolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
More informationRecent Developments in Mobile Financial Services Solutions December 12, 2012
Recent Developments in Mobile Financial Services Solutions December 12, 2012 www.schnader.com 1 Introduction Mobile Financial Services Technology Issues Regulatory Issues www.schnader.com 2 Mobile Financial
More informationNear Field Communication in Cell Phones
Near Field Communication in Cell Phones Annika Paus 24.07.2007 Seminararbeit Ruhr-Universität Bochum Chair for Communication Security Prof. Dr.-Ing. Christof Paar Contents 1 Introduction 1 2 Standards
More informationNFC Based Equipment Management Inventory System
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang
More informationNFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What
More informationRFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
More informationRadio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
More informationRFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
More informationRFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium.
RFID Basics RFID Basics Introduction Radio Frequency Identification (RFID) technology has been attracting considerable attention with the expectation of improved supply chain visibility for both suppliers
More informationHow Does It Work? Internet of Things
Intermec UAP-2100 What is RFID? 18-759: Wireless Networks Lecture 14: RFID Peter Steenkiste and Hedda R. Schmidtke Departments of Computer Science and Electrical and Computer Engineering Spring Semester
More informationRFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
More informationNFC. Technical Overview. Release r05
Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those
More informationData Protection Technical Guidance Radio Frequency Identification
Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology
More informationRadio Frequency Identification (RFID) Vs Barcodes
Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want
More informationFrequently Asked Questions
Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication
More informationWhy Has the Development in RFID Technology Made Asset Management More Urgent?
E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,
More informationRFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
More informationHow To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
More informationENERGY HARVESTED ELECTRONIC SHELF LABEL
ENERGY HARVESTED ELECTRONIC SHELF LABEL Ranajay Mallik, Jitendra Jain, Neha Kochhar, STMicroelectronics - IMS Systems Lab and Technical Marketing Abstract: This article explains the concept of electronic
More informationWHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
More informationRFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department
RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an
More informationAbracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas
Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas WWW.ABRACON.COM ANFCA Series Flexible Peel & Stick NFC Antennas Purpose To introduce ANFCA Series, Flexible Peel & Stick NFC
More informationSecurity & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
More informationASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)
ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you
More informationMobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center
Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? About the
More informationThe Place of Emerging RFID Technology in National Security and Development
The Place of Emerging RFID Technology in National Security and Development Akintola K.G. Boyinbode O.K. Computer Science Department, Computer Science Department, University of Houston-Victoria, University
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationInnovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions
Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions Innovative Wafer & Interconnect Technologies Outline Low cost RFID Tags & Labels Standard applications and
More informationDesign And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
More informationLocation-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,
More informationNACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
More informationREAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY
Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,
More informationNFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO
NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months
More informationIf you are interested in Radio Frequency Identification technology, then this is the best investment that you can make today!
If you are interested in Radio Frequency Identification technology, then this is the best investment that you can make today! Here s Here's a training course on on RFID technology, with which CERTIFICATION
More informationSecurity in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com
More informationSecurity Issues in RFID systems. By Nikhil Nemade Krishna C Konda
Security Issues in RFID systems By Nikhil Nemade Krishna C Konda Agenda Introduction to an RFID System Possible Application Areas Need for Security Vulnerabilities of an RFID system Security Measures currently
More informationMIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
More informationIMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
More informationContactless Payments with Mobile Wallets. Overview and Technology
Contactless Payments with Mobile Wallets Overview and Technology History of Contactless Systems Upass (smartcard) a pre-paid card for the transportation system in Seoul and its suburbs, first used in
More informationNFC Hacking: The Easy Way
DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! New site live: blackwinghq.com! We re always
More informationTHE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4
CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY
More informationRFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008
RFID Tags Prasanna Kulkarni Motorola ILT Workshop Smart Labels USA February 21, 2008 Agenda RFID tags Brief overview Roadmap of key attribute needs Existing tag technologies Emerging tag technologies Critical
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationThe Drug Quality & Security Act
The Drug Quality & Security Act Drug Traceability & Interoperable Exchange of Transaction Information, History & Statement Mujadala Abdul-Majid 3E Company February 20, 2014 About 3E Company About 3E Supply
More informationTime & Access System An RFID based technology
Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.
More informationAutomated Identification Technologies
Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT
More informationFinancial industry Solutions. Redefining Micro Location for the Financial industry in a Mobile World
Financial industry Solutions Redefining Micro Location for the Financial industry in a Mobile World Company Overview Founded in 2011, strong expertise in location tracking and information security technologies
More informationStore Logistics and Payment with Near Field Communication
with www.stolpan.com Store Logistics and Payment with Near Field Communication Hagenberg, Hagenberg, March March 20. 2007 20. 2007. Dr. László Kutor, Dr. BMF László Kutor, BMF 19/1 StoLPaN Project Summary
More informationCloud RFID UHF Gen 2
Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system
More informationPrivacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
More information915MHz RFID State of the Art RFID
915MHz RFID State of the Art RFID LIBRARY BOOK / MEDIA MANAGEMENT and RFID TRACKING SYSTEM Executive Overview More and more libraries worldwide are utilizing RFID to automate the issue and return of books,
More informationRFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
More informationInfinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010
Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010 RFID, GPS, sensor, and other auto-id technologies promise to revolutionize enterprise asset
More informationDevelopment of Hybrid Radio Frequency Identification and Biometric Security Attendance System
International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi
More informationWhat is our purpose?
Who we are? Since 1995 we have become one of the largest suppliers of electronic automotive accessories and telemetry devices in the Baltic States. Baltic Car Equipment is investing extensively into R&D
More informationTraining. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
More informationRFID Radio Frequency Identification
RFID Radio Frequency Identification 11 February 2004 Dr. Bradley J. Bazuin Assistant Professor, ECE Dept. With material from the ECE 481 & 482 project by Shen-Ping Lee, Young-Sun Kim, and Pradeep Kannan
More informationCHAPTER 7. Wireless Technologies and the Modern Organization
CHAPTER 7 Wireless Technologies and the Modern Organization CHAPTER OUTLINE 7.1 Wireless Technologies 7.2 Wireless Computer Networks and Internet Access 7.3 Mobile Computing and Mobile commerce 7.4 Pervasive
More informationMF1 IC S50. 1. General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy
Rev. 5.2 15 January 2007 Product data sheet 001052 PUBLIC 1. General description NXP has developed the Mifare to be used in contactess smart cards according to ISO/IEC 14443A. The communication layer (
More informationINTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors
INTEGRATED CIRCUITS I CODE SLI Smart Label IC SL2 ICS20 Product Specification Revision 3.1 February July 2005 2001 Public Philips Semiconductors CONTENTS 1 FEATURES...4 1.1 I CODE SLI RF Interface (ISO/IEC
More informationtags Figure D-1 Components of a Passive RFID System
Attachment D: RFID Technology Overview The following sections provide an overview to RFID technology, the applications in which they are currently used and other considerations of RFID technology as it
More informationrf Technology to automate your BUsiness
Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,
More informationInternational Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
More informationNFC APPLICATIONS IN THE TRACKING SYSTEMS
Advanced Logistic Systems, Vol. 7, No. 2 (2013), pp. 41 48. NFC APPLICATIONS IN THE TRACKING SYSTEMS TAMÁS HARTVÁNYI 1 CSABA I. HENCZ 2 Abstract: Radio Frequency Identification (RFID) and a Near Field
More informationBest Practices for Integrating Mobile into the Access Control Architecture
Best Practices for Integrating Mobile into the Access Control Architecture Merging Security and Convenience with Mobile Mobile Access Using a mobile device to gain access to different buildings is not
More informationBluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB
Bluetooth in Automotive Applications Lars-Berno Fredriksson, KVASER AB ABSTRACT There is a potential for 50-400 million per year Bluetooth nodes within the car market if Bluetooth can be integrated into
More informationTowards an Internet of Things: Android meets NFC. Dipartimento di Scienze dell Informazione Università di Bologna
Towards an Internet of Things: Android meets NFC Luca Bedogni Marco Di Felice Dipartimento di Scienze dell Informazione Università di Bologna Outline Internet of Things: History Internet of Things: Definition
More informationBluetooth Pairing Guide For iphone
Bluetooth Pairing Guide For iphone Pairing is the first step in connec@ng with your Uconnect system for hands- free calling and for Via Mobile audio streaming. This pairing process is quick and easy: all
More informationMobile Near-Field Communications (NFC) Payments
Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments
More informationRF ID Security and Privacy
RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from
More informationMichael I. Shamos, Ph.D., J.D. School of Computer Science Carnegie Mellon University
Michael I. Shamos, Ph.D., J.D. School of Computer Science Carnegie Mellon University Background Ph.D., Yale University (computer science, 1978) J.D., Duquesne University (law, 1981) Carnegie Mellon computer
More informationSecurity and Privacy Issues of Wireless Technologies
Security and Privacy Issues of Wireless Technologies Collin Mulliner http://www.cs.ucsb.edu/~mulliner/ Agenda Introduction Issues Technology specific issues Wi Fi Bluetooth RFID
More informationAtmel Innovative Silicon RFID IDIC Solutions
Atmel Innovative Silicon RFID IDIC Solutions 2 2013 / www.atmel.com Table of Contents Atmel: The Expert with Long-term Know-how....4 The Technology.... 4-5 Passive RFID....4 Active RFID....5 RFID Applications....
More informationChip Card & Security ICs Mifare NRG SLE 66R35
Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information
More informationSINGLE DEVICE FOR MULTIPLE TASKS
ViZRO s BioMate M043 SINGLE DEVICE FOR MULTIPLE TASKS Datasheet ViZRO S BioPad Vizro Technologies www.vizro.net INDEX 1. Introduction 2. Main Application Area 3.Technical Specifications 4.Product Picture
More informationa leap ahead in analog
EMV Contactless Payment Systems based on AS3911 Overview and System Simulations Giuliano Manzi, PhD Mannheim, May 23 25, 2012 CST EUROPEAN USER CONFERENCE 2012 a leap ahead in analog OUTLINE AS3911 OVERVIEW
More informationContents. I. 3G Mobile Patent. II. 4G LTE Patent. III. RFID Patent. IV. NFC Patent. 2012 TechIPm, LLC All Rights Reserved
Mobile / Wireless Patents in Litigation 1Q 2012 2012 TechIPm, LLC All Rights Reserved www.techipm.com Contents I. 3G Mobile Patent II. 4G LTE Patent III. RFID Patent IV. NFC Patent 2012 TechIPm, LLC All
More informationNFC Hacking: The Easy Way
DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! We re always looking for cool security projects!
More informationBest Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council
Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity
More informationHow To Use Radio Frequency Identification (Rfid) Effectively
RFID Technology Simplifies Asset Management By Michael Beedles, Director Integration Services/NBD, SATO America, Inc. Faced with intense emphasis on profitability, the need to comply with new governmental
More informationRFID market value vs tag cost : Reality vs Dream. Figure 3.2 Examples of RFID applications and potential applications at different tag prices
28 Figure 3.1 Potential markets for RFID smart labels RFID market value vs tag cost : Reality vs Dream Figure 3.2 Examples of RFID applications and potential applications at different tag prices Fast Locate,
More informationDT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch
DT3: RF On/Off Remote Control Technology Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch Agenda Radio Frequency Overview Frequency Selection Signals Methods Modulation Methods
More informationTrackability Technologies supporting Business
Trackability Technologies supporting Business 17/11/2011 Alessandro Dandolo Company profile Alfaproject.net, was born in 2000 as a Start Up Incubator company of Milan Politecnico, specialized in Supply
More informationRFID Technology - Potential Of Big Brother
The Computer in the Sciences: RFID Technology California State University, Stanislaus Student s Name Professor Dan Bratten CS4000-5 March 30, 2006 Last Name 2 The Computer in the Sciences: RFID Technology
More informationMOBILE PAYMENT SECURITY: BLE OR NFC
NEW SCIENCE TRANSACTION SECURITY ARTICLE MOBILE PAYMENT SECURITY: BLE OR NFC SUMMER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction security
More informationLibRFID: Automation Software for Library Management System Using RFID Technology
LibRFID: Automation Software for Library Management System Using RFID Technology Amar Michael Sequeira 1 Lecturer, Department of Computer Science, Bhandarkars Arts and Science College, Kundapura, Udupi,
More informationYour Mobile Phone as a Ticket (NFC)
Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.
More informationYour Digital Dollars Online & Mobile Banking
Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding
More informationOBID RFID by FEIG ELECTRONIC. OBID classic / OBID classic-pro. RFID Reader Technology for Security Applications
OBID RFID by FEIG ELECTRONIC OBID classic / OBID classic-pro RFID Reader Technology for Security Applications OBID RFID Reader Technologies RFID Readers from the number 1 manufacturer FEIG ELECTRONIC specialized
More informationfleischhauer tickets RFID
fleischhauer tickets RFID RFID solutions tailor-made Tickets for Public Transport Tickets in Motion RFID ticketing revolutionises access systems for mass transit facilities worldwide. Public transport
More information