Electronic Vehicle Registration in Sao Paulo, Brazil

Size: px
Start display at page:

Download "Electronic Vehicle Registration in Sao Paulo, Brazil"

Transcription

1 Electronic Vehicle Registration in Sao Paulo, Brazil Technical tools in use to a controlled and secure Mass-Implementation Dr. Dario Sassi Thober, President / Director Wernher von Braun Center for Advanced Research

2 EVR in Sao Paulo State, Brazil Pay-per-Use concept ( Point-to-Point System ): Several Multi-Lane Free-Flow Portals on State Highways Cost-effective OBU that allows installation in up to 80% of the State s Fleet Highly-secured OBU to allow Public and Private services to grow around it Vehicle Classification and OCR also included (trucks / cargo represent a significant percentage of toll-collection events) System developed and implemented by Von Braun Labs in two Sao Paulo State Highways in a Pilot-Program

3 SP075 Santos Dumont Highway

4 Ponto a Ponto System: Santos Dumont Highway in Sao Paulo State, Brazil Multi-Lane Free-Flow Portal based on 915MHz with AES128 technology + OCR

5 Another Ponto-a- Ponto site Itatiba Jundiaí in the State of Sao Paulo, Brazil: Toll-Plaza and Free-Flow Portal

6 Providers Allowed Other SLTs BackOffice (Sao Paulo State) Multiple Service- Service- Operator Reader * Tag initialization Local access to connect OCR+Vehicle Class+BlackList Credit * Same architecture as SLT s Remote connection to update new IDs, Keys and Tag status across SLTs in the system. Validates each SLT Controller SLT Antenna Tag w. AES128

7 Tag initialization Gov BackOffice Direct, Secure and Private connection with State s BackOffice to issue tags either at the customerservice site or at the tag s factory

8 Key elements of the Brazilian AVI Vehicles Electronic ID must generate secure, reliable information if services (public or private) affect end-users bank-accounts / pre-paid credits or legal situation Which technology allows secure read/write commands under an internationally recognized standard implemented on passive, battery-less platform similar to 6C operations? Which hardware platforms are based on well-known industrial solutions to mass-deployment?

9 Key elements of the Brazilian AVI Interoperability Based on International Standards (GS1/ISO C) Well established Physical Layer (well-know commercial Reader hardware platforms) Security and Cost Implementation on 6C standard with secure custom commands based on AES128 mechanism Costs similar to 6C implementations within reach

10 It s Based on SINIAV SINIAV is the National System for Automated Vehicle Identification (Sistema Nacional de Identificação Automática de Veículos), which is currently being implemented and deployed throughout the national territory in Brazil. SINIAV was initiated by the Ministry of the Cities (Ministério das Cidades, MC), the Ministry of Science and Technology (Ministério da Ciência e Tecnologia, MCT), and the National Traffic Committee (Conselho Nacional De Trânsito, CONTRAN) in Brazil, based on Resolutions Nr. 212 issued on November 13, 2006, and Resolution Nr. 338 issued on December 17, 2010, by CONTRAN [RES:212:2006, RES:338:2009]. SINIAV foresees the mandatory electronic registration of all vehicles in the country, including passenger cars, trucks, motorbikes, etc. The official deployment phase of SINIAV starts on June 30, 2011, to be completed by June 30, /08/

11 EVR + Vehicle Classification Implementation made by Von Braun Labs to Sem- Parar of a EVR+Vechicle Class system: non installation of any sensor on/in the pavement

12 Implementation made by Von Braun Labs to Sem-Parar of a EVR+Vehicle Class system: non installation of any sensor on/in the pavement

13 Demonstration at highspeed that 915MHz/AES128 tags are not affected either by other 6C Tags or 5.8GHz Transponders in the field of the same reader 6C Tags are easily bought in the openmarket if those are placed in the car to cause jamming (reader overload by tags collision), only 6C tags will be affected those with Secure Protocol will be read as usual

14 Tag evolution in oneyear: 1 st implementation

15 Tag evolution in one-year: 2 nd implementation

16 Tag evolution in one-year: 2 nd implementation

17 Example of a Company s Tag More than 3 commercial implementations developed in less than 15 months

18 915MHz/AES128 Passive Tape-out Tag de Blocos do Chip 915MHz com mecanismos de segurança World s First

19 < SHOW VIDEO >

20 Other applications based on the same Tech. Platform DOU n. 211, Seção 3, Pág. 8 de DOU n. 25, Seção 3, Pág. 8 de

21 Peer Entity Authentication Data Origin Authentication Access Control Data Integrity Timeliness of Data Data Confidentiality Non-Repudiation with Proof of Origin Non-Repudiation with Proof of Delivery VonBraunLabs RFID Universe Supp workforce Supp production Supp time to adjust WF production Supp productivity Supp WF adj Stock Supply Stock Supp target WF productivity Supp target prod sales Supp sales Supp target stock coverage target stock Supp urgency Supp coverage stock correction Supp stock correction Systems Integration Pat. Filled USPO 09 High-Eff. Readers Low-Cost Readers workforce workforce adjustment time to adjust WF target WF target production urgency to correct target production Security Services Cryptographic Security Mechanisms Message Digest (Hashing) Message Authentication Code ORT / MLFF Public Key Certificate (Digital Signature) Challenge-Response Authentication Embedded Encipherment Security & Protocol Development Time-variant Parameterization IC -Design (Analog/Digital) Transponders with Both RFID and Image/others-Sensing Back-Office / BI services based on RFID DFSS / DoE Digital Controllers Wernher von Braun Center for Advanced Research Jan 2010 CONFIDENTIAL

22 Dario S. Thober

Interoperability models in Brazil

Interoperability models in Brazil Dr Dario Sassi Thober, Director WERNHER VON BRAUN LABS thober@vonbraunlabs.org Interoperability models in Brazil IBTTA GENERAL SESSION - INTEROPERABILITY - Plano, TX. May 15 th, 2011 19/03/2014 www.vonbraunlabs.org

More information

VON BRAUN LABS. News WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO. Greetings from Dario S. Thober - CEO

VON BRAUN LABS. News WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO. Greetings from Dario S. Thober - CEO WWW.VONBRAUNLABS.COM News VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO Greetings from Dario S. Thober - CEO Find out about our complete solutions Learn more about our

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Fleet Management Solutions

Fleet Management Solutions RFID FOR FLEET MANAGEMENT TagItalia is main solution provider for Fleet Management services and devices for public and private transport companies. High level automation in procedures can be obtained using

More information

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations. Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely

More information

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech

Advanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,

More information

RFID for Managed Parking Lots

RFID for Managed Parking Lots RFID for Managed Parking Lots RFID technology can provide independent, non stop systems for security, parking, and access control. Our RFID technology provides businesses and communities with hands free

More information

Evolution of the Brazilian Telematics Space Pre and Post CONTRAN Regulation

Evolution of the Brazilian Telematics Space Pre and Post CONTRAN Regulation Evolution of the Brazilian Telematics Space Pre and Post CONTRAN Regulation Marcio Luz Customer Solution Manager / WirelessCar 1 Content 1. The Volvo Group & Connected services 2. Auto Industry / Brazilian

More information

Table: Security Services (X.800)

Table: Security Services (X.800) SECURIT SERVICES X.800 defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. Also the

More information

Cryptography and Network Security Chapter 1

Cryptography and Network Security Chapter 1 Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood

More information

Introduction of Information Security Research Division

Introduction of Information Security Research Division Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI

More information

Lecture II : Communication Security Services

Lecture II : Communication Security Services Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication

More information

RFID TECHNOLOGY: ELEVATING OPERATIONAL EFFICIENCY INTEGRATING TRACKING AND INVENTORY SOLUTIONS

RFID TECHNOLOGY: ELEVATING OPERATIONAL EFFICIENCY INTEGRATING TRACKING AND INVENTORY SOLUTIONS RFID TECHNOLOGY: ELEVATING OPERATIONAL EFFICIENCY INTEGRATING TRACKING AND INVENTORY SOLUTIONS SECURE ASSET TRACKING IN YOUR HANDS The RFID System is designed with two basic parts a transponder tag that

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements

More information

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

Privacy and Security in library RFID Issues, Practices and Architecture

Privacy and Security in library RFID Issues, Practices and Architecture Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

Applying RFID in traffic junction monitoring

Applying RFID in traffic junction monitoring Second Conference of Junior Researchers in Civil Engineering 11 Applying RFID in traffic junction monitoring Nikol Krausz BME Department of Photogrammerty and Geoinformatics, e-mail: krausz@mail.bme.hu

More information

Accenture Mobility Services Mobility for Better Business Outcomes. IBTTA 80 th Annual Meeting & Exhibition

Accenture Mobility Services Mobility for Better Business Outcomes. IBTTA 80 th Annual Meeting & Exhibition Accenture Mobility Services Mobility for Better Business Outcomes IBTTA 80 th Annual Meeting & Exhibition Mobile Tolling Solution & Demonstration September, 2012 Orlando Accenture, its logo, and High Performance

More information

Time & Access System An RFID based technology

Time & Access System An RFID based technology Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.

More information

RFIDs and European Policies

RFIDs and European Policies ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit gerald.santucci@ec.europa.eu European Commission Directorate

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience

More information

Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015

Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015 Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015 I-PASS Lane Technology In Action Electronic Tolling Overview Antenna Camera Axle Count: 2 Camera 2 AVI Reader Lane Controller Power

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In

More information

Information System Security

Information System Security Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The

More information

Implementation of biometrics, issues to be solved

Implementation of biometrics, issues to be solved ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents

More information

Radio Frequency Identification (RFID) An Overview

Radio Frequency Identification (RFID) An Overview Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify

More information

Internet of YOUR Things. Stefan Böhler TSP Datacenter

Internet of YOUR Things. Stefan Böhler TSP Datacenter Internet of YOUR Things Stefan Böhler TSP Datacenter Microsoft delivers on the Internet of Things Devices and assets Cloud and infrastructure Analytics Tools Drive Insights Devices A Agent 1010101001100011010101011101001101010101010011011101111011100101010000110101010111010011010

More information

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

How To Attack A Key Card With A Keycard With A Car Key (For A Car) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car

More information

Trackability Technologies supporting Business

Trackability Technologies supporting Business Trackability Technologies supporting Business 17/11/2011 Alessandro Dandolo Company profile Alfaproject.net, was born in 2000 as a Start Up Incubator company of Milan Politecnico, specialized in Supply

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

Home Automation and Cybercrime

Home Automation and Cybercrime Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7

More information

Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies

Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies DR. O. GEOFFREY EGEKWU and JIM RIDINGS Institute for Infrastructure and Information Assurance (IIIA) James Madison University Functions

More information

Below are the answers to unanswered questions asked to E-470 Public Highway Authority on the webinar.

Below are the answers to unanswered questions asked to E-470 Public Highway Authority on the webinar. Below are the answers to unanswered questions asked to E-470 Public Highway Authority on the webinar. 1. Can you tell us the percent collection at each notice level? (i.e. how much do you collect on LPT1,

More information

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

Maintain Fleet Management Solutions Using Wide Area Wireless Technology Maintain Fleet Management Solutions Using Wide Area Wireless Technology Andreas Kohn Sierra Wireless, Inc. August, 2010 1 Introduction Wireless technology can provide a competitive advantage in today s

More information

Applying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance

Applying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance Applying the NFC Secure Element in Mobile Identity Apps RANDY VANDERHOOF Executive Director Smart Card Alliance Session ID: MBS - 403 Session Classification: Mobile Security Agenda Agenda topics NFC basics:

More information

CSCI 4541/6541: NETWORK SECURITY

CSCI 4541/6541: NETWORK SECURITY 1 CSCI 4541/6541: NETWORK SECURITY COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10

More information

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶 Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course

More information

RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd.

RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd. RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd. About Us NeoTechID is a provider of Business Automation Solutions based on AIDC technologies such as RFID, bar-code scanning,

More information

RF ID Security and Privacy

RF ID Security and Privacy RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from

More information

MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.

MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. About Digital Signature using MyKey Purpose MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. A document digitally

More information

Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking

Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking RFID Technology Review Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking Sponsored by: Presented by: Shane Snyder President 2014 MHI Copyright claimed as to audiovisual works of seminar

More information

Toll Collection Systems

Toll Collection Systems Presentation Toll Collection Systems Technology Trend Impact on PPP s & Highways Transport Jack Opiola World Bank Washington D.C. 3 April 2006 Contents To describe Toll Collection Systems; To outline the

More information

Radio Frequency Identification (RFID) Vs Barcodes

Radio Frequency Identification (RFID) Vs Barcodes Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want

More information

Business Systems Department Overview

Business Systems Department Overview Business Systems Department Overview Business Systems Department Shana Whitehead Chief Kathy Zimmermann Deputy Chief of Business Systems Operations Lauren O Sullivan Executive Secretary Program Controls

More information

INTERNET OF THINGS ARCHITECTURE IN THE CONTEXT OF INTELLIGENT TRANSPORTATION SYSTEMS A CASE STUDY TOWARDS A WEB-BASED APPLICATION DEPLOYMENT

INTERNET OF THINGS ARCHITECTURE IN THE CONTEXT OF INTELLIGENT TRANSPORTATION SYSTEMS A CASE STUDY TOWARDS A WEB-BASED APPLICATION DEPLOYMENT INTERNET OF THINGS ARCHITECTURE IN THE CONTEXT OF INTELLIGENT TRANSPORTATION SYSTEMS A CASE STUDY TOWARDS A WEB-BASED APPLICATION DEPLOYMENT Raul Mariano Cardoso State University of Campinas, Faculty of

More information

District Energy and the Industrial IoT Benefits of a Connected System

District Energy and the Industrial IoT Benefits of a Connected System District Energy and the Industrial IoT Benefits of a Connected System Presented by: Adam Strynadka Managing Director DeviceLynk What is the Industrial Internet of Things? The Internet of Things (IoT) can

More information

CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION

CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION 3.1 - Introduction Travel time information is becoming more important for applications ranging from congestion measurement to real-time travel information. Several

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

SAP Customer Success Story High Tech Alternative Logic. Alternative Logic: Creating an Innovative Remote Workforce Management Platform

SAP Customer Success Story High Tech Alternative Logic. Alternative Logic: Creating an Innovative Remote Workforce Management Platform Alternative Logic: Creating an Innovative Remote Workforce Management Platform Alternative Logic Limited Industry High tech Software development and consulting Products and Services FieldLogic remote workforce

More information

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.

Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved. Connected Vehicles: New Directions and Opportunities AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA N A T I O N A L S E C U R I T Y E N G I N E E R I N G H E A L T H S O L U T I O N S

More information

Multilane Free-Flow and Video-Tolling Full System in the USA

Multilane Free-Flow and Video-Tolling Full System in the USA Multilane Free-Flow and Video-Tolling Full System in the USA Innovation in Road Transport: Opportunities for Improving Efficiency Session 2 - Information Technologies and Infrastructure Charging Experience

More information

Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM

Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM Automated security, parking and access control system Accurate identification of authorized vehicles Automated entry/exit

More information

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services

MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 11: Active Directory Certificate Services Objectives Describe the components of a PKI system Deploy the Active Directory

More information

HP Brazil RFID CoE Center of Excellence

HP Brazil RFID CoE Center of Excellence HP Brazil RFID CoE Center of Excellence TEST CENTER DESCRIPTION: The RFID Center of Excellence is prepared to aid customers to visualize in their businesses possible RFID applications as well as to observe

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

IBM RFID Solutions Centers: Leveraging IBM business solutions with RFID technology

IBM RFID Solutions Centers: Leveraging IBM business solutions with RFID technology Providing RFID technology support to help implement your program and succeed IBM RFID Solutions Centers: Leveraging IBM business solutions with RFID technology As business continues to evolve, there are

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

Self Testing and Product Qualification Processes

Self Testing and Product Qualification Processes GlobalPlatform Self Testing and Product Qualification Processes Version 1.2.1 Public Release May 2013 Document Reference: GPC_PRO_042 Recipients of this document are invited to submit, with their comments,

More information

HARTING Auto-ID System Integration

HARTING Auto-ID System Integration HARTING Auto-ID System Integration HARTING integrated Auto-ID solutions Mobile Reader Business Application Framework Enterprise Service Bus Auto-ID Transponder Middleware Backend System Stationary Reader

More information

Turn-Key Passive Entry/ Passive Start Solution

Turn-Key Passive Entry/ Passive Start Solution Turn-Key Passive Entry/ Passive Start Solution Dr. Jedidi Kamouaa Atmel provides a passive entry/ passive start (PEPS) system with a complete set of basic building blocks, including hardware and software.

More information

An Introductory and Elementary Study on RFID & Its Applications

An Introductory and Elementary Study on RFID & Its Applications An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract

More information

INTEGRATED SOLUTION FOR MOTOTRBO TM THE SMART CHOICE FOR YOUR FUTURE

INTEGRATED SOLUTION FOR MOTOTRBO TM THE SMART CHOICE FOR YOUR FUTURE INTEGRATED SOLUTION FOR MOTOTRBO TM THE SMART CHOICE FOR YOUR FUTURE Integrated Solution for MOTOTRBO TM Networks of any size and topology System infrastructure monitoring and control Bridging for different

More information

Using BroadSAFE TM Technology 07/18/05

Using BroadSAFE TM Technology 07/18/05 Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security

More information

Security Operation Management Initiatives in Cooperative Vehicle-Infrastructure Systems for Safe Driving

Security Operation Management Initiatives in Cooperative Vehicle-Infrastructure Systems for Safe Driving Hitachi Review Vol. 65 (2016), No. 1 747 Featured Articles Security Operation Management Initiatives in Cooperative Vehicle-Infrastructure Systems for Safe Driving Akira Mizutani Mai Kawamura Eriko Ando

More information

Positioned To Be In Control

Positioned To Be In Control VEHICLE TRACKING & FLEET MANAGEMENT A GPS tracking device is installed on the vehicle in order to capturedata based on location, speed, direction, mileage, fuel consumption and behavior such as idling,

More information

The Wireless World - 5G and Beyond. Björn Ekelund Ericsson Research

The Wireless World - 5G and Beyond. Björn Ekelund Ericsson Research The Wireless World - 5G and Beyond Björn Ekelund Ericsson Research 9X Mobile data Traffic by 2020 Monthly consumption per device type 2014 2020 4.2 GB 17.3 GB 1.9 GB 8.4 GB 1.0 GB 4.9 GB Ericsson Internal

More information

RFID based Vehicle Tracking & Parking Lot Management System

RFID based Vehicle Tracking & Parking Lot Management System RFID based Vehicle Tracking & Parking Lot Management System WHITE PAPER Ver 1. (Nov 213) The present day metropolitan areas have seen a burgeoning growth in human population as well as vehicles. With shrinking

More information

SP-2002-10231 - Designing a Microsoft SharePoint 2010 Infrastructure

SP-2002-10231 - Designing a Microsoft SharePoint 2010 Infrastructure SP-2002-10231 - Designing a Microsoft SharePoint 2010 Infrastructure Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This 5 day ILT training course

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

Integration of PTC and Ride Quality Data. Presented by: Wabtec Railway Electronics, I-ETMS PTC Supplier. and

Integration of PTC and Ride Quality Data. Presented by: Wabtec Railway Electronics, I-ETMS PTC Supplier. and Integration of PTC and Ride Quality Data Presented by: Wabtec Railway Electronics, I-ETMS PTC Supplier and dfuzion, Inc., rmetrix Ride Performance Assessment System Supplier The FRA mandate to implement

More information

APPFORUM2014. Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10

APPFORUM2014. Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10 APPFORUM2014 Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10 NFC OVERVIEW Chuck Bolen Chief Architect Enterprise Mobile Computing APPFORUM2014

More information

Sébastien Grazzini - Eutelsat. The SafeTRIP project

Sébastien Grazzini - Eutelsat. The SafeTRIP project Sébastien Grazzini - Eutelsat The SafeTRIP project What is SafeTRIP? Satellite Applications For Emergency handling, Traffic alerts, Road safety and Incident Prevention An integrated project (IP) From user

More information

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0

APNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0 APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations

More information

Electronic Registration Identification (ERI)

Electronic Registration Identification (ERI) Electronic Registration Identification (ERI) Concept, architecture and current status Murcia, 18th June 2009 Overview The ERI standard User requirements Architecture Current status 2 Electronic Registration

More information

Cisco Which VPN Solution is Right for You?

Cisco Which VPN Solution is Right for You? Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2

More information

Tracking metal parts with passive UHF RFID. April 2007

Tracking metal parts with passive UHF RFID. April 2007 Tracking metal parts with passive UHF RFID April 2007 Confidex in brief Focused in wireless identification, especially on industrial RFID tags on 13,56MHz (HF) and 865-952 MHz (UHF) Main business areas

More information

Identity: The Key to the Future of Healthcare

Identity: The Key to the Future of Healthcare Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital

More information

Generic RFID Software Platform for Any Application

Generic RFID Software Platform for Any Application FALKEN Secure Networks Inc. (FSN) has introduced a new paradigm to the RFID industry with its generic software platform to simplify System Integration, drive custom development costs out of system acquisition

More information

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization

More information

Innovation that Matters an IBM story

Innovation that Matters an IBM story Dr. Shiva Kumar Vice President, Enterprise Performance and Industry Analytics Innovation that Matters an IBM story IBM Research IBM Research: Global and Vertically Oriented analytics services tools China

More information

Hardware & Software Solutions

Hardware & Software Solutions Hardware & Software Solutions Introduction About Proemion - Overview Capabilities - Customers 1986 RM Michaelides 2002 Proemion 2007 Production plant Introduction About RM Overview Capabilities Customers

More information

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router print email Article ID: 4938 Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router Objective Virtual Private

More information

Certification Service Provider of the Ministry of Employment and Social Securityp. Profile for Electronic seal certificate

Certification Service Provider of the Ministry of Employment and Social Securityp. Profile for Electronic seal certificate SUBSECRETARÍA S.G. DE TECNOLOGÍAS DE LA INFORMACIÓN Y COMUNICACIONES Certification Service Provider of the Ministry of Employment and Social Securityp Profile for Electronic seal certificate sgtic@meyss.es

More information

NFC. Technical Overview. Release r05

NFC. Technical Overview. Release r05 Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those

More information

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11. Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric

More information

What is our purpose?

What is our purpose? Who we are? Since 1995 we have become one of the largest suppliers of electronic automotive accessories and telemetry devices in the Baltic States. Baltic Car Equipment is investing extensively into R&D

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

Paul Stam de Jonge March 6th, Brussels. RFID in Asset Management: European Case Studies

Paul Stam de Jonge March 6th, Brussels. RFID in Asset Management: European Case Studies Paul Stam de Jonge March 6th, Brussels RFID in Asset Management: European Case Studies Agenda 1. Introduction 2. RFID in Asset Management 3. Case Studies 4. Summary 2 Wireless: inevitable in our society

More information

Intelligent Fleet Management System Using Active RFID

Intelligent Fleet Management System Using Active RFID Intelligent Fleet Management System Using Active RFID Ms. Rajeshri Prakash Mane 1 1 Student, Department of Electronics and Telecommunication Engineering, Rajarambapu Institute of Technology, Rajaramnagar,

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

TURPAK Vehicle ID Solution Solution Overview for Oil Companies

TURPAK Vehicle ID Solution Solution Overview for Oil Companies TURPAK Vehicle ID Solution Solution Overview for Oil Companies Agenda RFID Wireless Architecture Components Installation Recruiting & Issuing Security Summary RFID Wireless Advantages Proven solution,

More information

Efficient Asset Tracking: From Manual to Automated

Efficient Asset Tracking: From Manual to Automated White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies

More information

An Introduction to Cryptography as Applied to the Smart Grid

An Introduction to Cryptography as Applied to the Smart Grid An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric

More information

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions

More information

Cryptography and Key Management Basics

Cryptography and Key Management Basics Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics e.zenner@mat.dtu.dk DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management

More information