Electronic Vehicle Registration in Sao Paulo, Brazil
|
|
- Allen Townsend
- 7 years ago
- Views:
Transcription
1 Electronic Vehicle Registration in Sao Paulo, Brazil Technical tools in use to a controlled and secure Mass-Implementation Dr. Dario Sassi Thober, President / Director Wernher von Braun Center for Advanced Research
2 EVR in Sao Paulo State, Brazil Pay-per-Use concept ( Point-to-Point System ): Several Multi-Lane Free-Flow Portals on State Highways Cost-effective OBU that allows installation in up to 80% of the State s Fleet Highly-secured OBU to allow Public and Private services to grow around it Vehicle Classification and OCR also included (trucks / cargo represent a significant percentage of toll-collection events) System developed and implemented by Von Braun Labs in two Sao Paulo State Highways in a Pilot-Program
3 SP075 Santos Dumont Highway
4 Ponto a Ponto System: Santos Dumont Highway in Sao Paulo State, Brazil Multi-Lane Free-Flow Portal based on 915MHz with AES128 technology + OCR
5 Another Ponto-a- Ponto site Itatiba Jundiaí in the State of Sao Paulo, Brazil: Toll-Plaza and Free-Flow Portal
6 Providers Allowed Other SLTs BackOffice (Sao Paulo State) Multiple Service- Service- Operator Reader * Tag initialization Local access to connect OCR+Vehicle Class+BlackList Credit * Same architecture as SLT s Remote connection to update new IDs, Keys and Tag status across SLTs in the system. Validates each SLT Controller SLT Antenna Tag w. AES128
7 Tag initialization Gov BackOffice Direct, Secure and Private connection with State s BackOffice to issue tags either at the customerservice site or at the tag s factory
8 Key elements of the Brazilian AVI Vehicles Electronic ID must generate secure, reliable information if services (public or private) affect end-users bank-accounts / pre-paid credits or legal situation Which technology allows secure read/write commands under an internationally recognized standard implemented on passive, battery-less platform similar to 6C operations? Which hardware platforms are based on well-known industrial solutions to mass-deployment?
9 Key elements of the Brazilian AVI Interoperability Based on International Standards (GS1/ISO C) Well established Physical Layer (well-know commercial Reader hardware platforms) Security and Cost Implementation on 6C standard with secure custom commands based on AES128 mechanism Costs similar to 6C implementations within reach
10 It s Based on SINIAV SINIAV is the National System for Automated Vehicle Identification (Sistema Nacional de Identificação Automática de Veículos), which is currently being implemented and deployed throughout the national territory in Brazil. SINIAV was initiated by the Ministry of the Cities (Ministério das Cidades, MC), the Ministry of Science and Technology (Ministério da Ciência e Tecnologia, MCT), and the National Traffic Committee (Conselho Nacional De Trânsito, CONTRAN) in Brazil, based on Resolutions Nr. 212 issued on November 13, 2006, and Resolution Nr. 338 issued on December 17, 2010, by CONTRAN [RES:212:2006, RES:338:2009]. SINIAV foresees the mandatory electronic registration of all vehicles in the country, including passenger cars, trucks, motorbikes, etc. The official deployment phase of SINIAV starts on June 30, 2011, to be completed by June 30, /08/
11 EVR + Vehicle Classification Implementation made by Von Braun Labs to Sem- Parar of a EVR+Vechicle Class system: non installation of any sensor on/in the pavement
12 Implementation made by Von Braun Labs to Sem-Parar of a EVR+Vehicle Class system: non installation of any sensor on/in the pavement
13 Demonstration at highspeed that 915MHz/AES128 tags are not affected either by other 6C Tags or 5.8GHz Transponders in the field of the same reader 6C Tags are easily bought in the openmarket if those are placed in the car to cause jamming (reader overload by tags collision), only 6C tags will be affected those with Secure Protocol will be read as usual
14 Tag evolution in oneyear: 1 st implementation
15 Tag evolution in one-year: 2 nd implementation
16 Tag evolution in one-year: 2 nd implementation
17 Example of a Company s Tag More than 3 commercial implementations developed in less than 15 months
18 915MHz/AES128 Passive Tape-out Tag de Blocos do Chip 915MHz com mecanismos de segurança World s First
19 < SHOW VIDEO >
20 Other applications based on the same Tech. Platform DOU n. 211, Seção 3, Pág. 8 de DOU n. 25, Seção 3, Pág. 8 de
21 Peer Entity Authentication Data Origin Authentication Access Control Data Integrity Timeliness of Data Data Confidentiality Non-Repudiation with Proof of Origin Non-Repudiation with Proof of Delivery VonBraunLabs RFID Universe Supp workforce Supp production Supp time to adjust WF production Supp productivity Supp WF adj Stock Supply Stock Supp target WF productivity Supp target prod sales Supp sales Supp target stock coverage target stock Supp urgency Supp coverage stock correction Supp stock correction Systems Integration Pat. Filled USPO 09 High-Eff. Readers Low-Cost Readers workforce workforce adjustment time to adjust WF target WF target production urgency to correct target production Security Services Cryptographic Security Mechanisms Message Digest (Hashing) Message Authentication Code ORT / MLFF Public Key Certificate (Digital Signature) Challenge-Response Authentication Embedded Encipherment Security & Protocol Development Time-variant Parameterization IC -Design (Analog/Digital) Transponders with Both RFID and Image/others-Sensing Back-Office / BI services based on RFID DFSS / DoE Digital Controllers Wernher von Braun Center for Advanced Research Jan 2010 CONFIDENTIAL
22 Dario S. Thober
Interoperability models in Brazil
Dr Dario Sassi Thober, Director WERNHER VON BRAUN LABS thober@vonbraunlabs.org Interoperability models in Brazil IBTTA GENERAL SESSION - INTEROPERABILITY - Plano, TX. May 15 th, 2011 19/03/2014 www.vonbraunlabs.org
More informationVON BRAUN LABS. News WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO. Greetings from Dario S. Thober - CEO
WWW.VONBRAUNLABS.COM News VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO Greetings from Dario S. Thober - CEO Find out about our complete solutions Learn more about our
More informationVON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
More informationRF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationFleet Management Solutions
RFID FOR FLEET MANAGEMENT TagItalia is main solution provider for Fleet Management services and devices for public and private transport companies. High level automation in procedures can be obtained using
More informationCryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
More informationAdvanced Topics in Distributed Systems. Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech
Advanced Topics in Distributed Systems Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Security Introduction Based on Ch1, Cryptography and Network Security 4 th Ed Security Dr. Ayman Abdel-Hamid,
More informationRFID for Managed Parking Lots
RFID for Managed Parking Lots RFID technology can provide independent, non stop systems for security, parking, and access control. Our RFID technology provides businesses and communities with hands free
More informationEvolution of the Brazilian Telematics Space Pre and Post CONTRAN Regulation
Evolution of the Brazilian Telematics Space Pre and Post CONTRAN Regulation Marcio Luz Customer Solution Manager / WirelessCar 1 Content 1. The Volvo Group & Connected services 2. Auto Industry / Brazilian
More informationTable: Security Services (X.800)
SECURIT SERVICES X.800 defines a security service as a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers. Also the
More informationCryptography and Network Security Chapter 1
Cryptography and Network Security Chapter 1 Acknowledgments Lecture slides are based on the slides created by Lawrie Brown Chapter 1 Introduction The art of war teaches us to rely not on the likelihood
More informationIntroduction of Information Security Research Division
Introduction of Information Security Research Division 2005. 5. 13. Kyo-il Chung, Ph. D. Information Security Infrastructure Research Group Contents Overview - Secure u-it KOREA - Organization of ETRI
More informationLecture II : Communication Security Services
Lecture II : Communication Security Services Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 What is Communication
More informationRFID TECHNOLOGY: ELEVATING OPERATIONAL EFFICIENCY INTEGRATING TRACKING AND INVENTORY SOLUTIONS
RFID TECHNOLOGY: ELEVATING OPERATIONAL EFFICIENCY INTEGRATING TRACKING AND INVENTORY SOLUTIONS SECURE ASSET TRACKING IN YOUR HANDS The RFID System is designed with two basic parts a transponder tag that
More informationCryptography and Network Security
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Shinu Mathew John http://shinu.info/ Chapter 1 Introduction http://shinu.info/ 2 Background Information Security requirements
More informationRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
More informationPrivacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
More informationChap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
More informationApplying RFID in traffic junction monitoring
Second Conference of Junior Researchers in Civil Engineering 11 Applying RFID in traffic junction monitoring Nikol Krausz BME Department of Photogrammerty and Geoinformatics, e-mail: krausz@mail.bme.hu
More informationAccenture Mobility Services Mobility for Better Business Outcomes. IBTTA 80 th Annual Meeting & Exhibition
Accenture Mobility Services Mobility for Better Business Outcomes IBTTA 80 th Annual Meeting & Exhibition Mobile Tolling Solution & Demonstration September, 2012 Orlando Accenture, its logo, and High Performance
More informationTime & Access System An RFID based technology
Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.
More informationRFIDs and European Policies
ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit gerald.santucci@ec.europa.eu European Commission Directorate
More informationRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
More informationToll Revenue Management and Maintenance Program (TRMMP) October 22, 2015
Toll Revenue Management and Maintenance Program (TRMMP) October 22, 2015 I-PASS Lane Technology In Action Electronic Tolling Overview Antenna Camera Axle Count: 2 Camera 2 AVI Reader Lane Controller Power
More informationRelay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
More informationInformation System Security
Information System Security Chapter 1:Introduction Dr. Lo ai Tawalbeh Faculty of Information system and Technology, The Arab Academy for Banking and Financial Sciences. Jordan Chapter 1 Introduction The
More informationImplementation of biometrics, issues to be solved
ICAO 9th Symposium and Exhibition on MRTDs, Biometrics and Border Security, 22-24 October 2013 Implementation of biometrics, issues to be solved Eugenijus Liubenka, Chairman of the Frontiers / False Documents
More informationRadio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
More informationInternet of YOUR Things. Stefan Böhler TSP Datacenter
Internet of YOUR Things Stefan Böhler TSP Datacenter Microsoft delivers on the Internet of Things Devices and assets Cloud and infrastructure Analytics Tools Drive Insights Devices A Agent 1010101001100011010101011101001101010101010011011101111011100101010000110101010111010011010
More informationHow To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
More informationTrackability Technologies supporting Business
Trackability Technologies supporting Business 17/11/2011 Alessandro Dandolo Company profile Alfaproject.net, was born in 2000 as a Start Up Incubator company of Milan Politecnico, specialized in Supply
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationHome Automation and Cybercrime
Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7
More informationManufacturing Control Systems {SCADA} Vulnerability and RFID Technologies
Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies DR. O. GEOFFREY EGEKWU and JIM RIDINGS Institute for Infrastructure and Information Assurance (IIIA) James Madison University Functions
More informationBelow are the answers to unanswered questions asked to E-470 Public Highway Authority on the webinar.
Below are the answers to unanswered questions asked to E-470 Public Highway Authority on the webinar. 1. Can you tell us the percent collection at each notice level? (i.e. how much do you collect on LPT1,
More informationMaintain Fleet Management Solutions Using Wide Area Wireless Technology
Maintain Fleet Management Solutions Using Wide Area Wireless Technology Andreas Kohn Sierra Wireless, Inc. August, 2010 1 Introduction Wireless technology can provide a competitive advantage in today s
More informationApplying the NFC Secure Element in Mobile Identity Apps. RANDY VANDERHOOF Executive Director Smart Card Alliance
Applying the NFC Secure Element in Mobile Identity Apps RANDY VANDERHOOF Executive Director Smart Card Alliance Session ID: MBS - 403 Session Classification: Mobile Security Agenda Agenda topics NFC basics:
More informationCSCI 4541/6541: NETWORK SECURITY
1 CSCI 4541/6541: NETWORK SECURITY COURSE INFO CSci 4541/6541 Tuesdays 6:10pm 8:40pm Bell Hall 108 Office Hours: Tuesdays 2:30pm 4:30pm Dr. Nan Zhang Office: SEH 4590 Phone: (202) 994-5919 Email: nzhang10
More informationNetwork Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
More informationRFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd.
RFID-based Vehicle Authentication Solution NeoTech Identity Solutions Pvt. Ltd. About Us NeoTechID is a provider of Business Automation Solutions based on AIDC technologies such as RFID, bar-code scanning,
More informationRF ID Security and Privacy
RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from
More informationMyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia.
About Digital Signature using MyKey Purpose MyKey is the digital signature software governed by Malaysia s Digital Signature Act 1997 & is accepted by the courts of law in Malaysia. A document digitally
More informationPractices for Using Passive, Low-Cost RFID for Improved Asset Tracking
RFID Technology Review Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking Sponsored by: Presented by: Shane Snyder President 2014 MHI Copyright claimed as to audiovisual works of seminar
More informationToll Collection Systems
Presentation Toll Collection Systems Technology Trend Impact on PPP s & Highways Transport Jack Opiola World Bank Washington D.C. 3 April 2006 Contents To describe Toll Collection Systems; To outline the
More informationRadio Frequency Identification (RFID) Vs Barcodes
Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want
More informationBusiness Systems Department Overview
Business Systems Department Overview Business Systems Department Shana Whitehead Chief Kathy Zimmermann Deputy Chief of Business Systems Operations Lauren O Sullivan Executive Secretary Program Controls
More informationINTERNET OF THINGS ARCHITECTURE IN THE CONTEXT OF INTELLIGENT TRANSPORTATION SYSTEMS A CASE STUDY TOWARDS A WEB-BASED APPLICATION DEPLOYMENT
INTERNET OF THINGS ARCHITECTURE IN THE CONTEXT OF INTELLIGENT TRANSPORTATION SYSTEMS A CASE STUDY TOWARDS A WEB-BASED APPLICATION DEPLOYMENT Raul Mariano Cardoso State University of Campinas, Faculty of
More informationDistrict Energy and the Industrial IoT Benefits of a Connected System
District Energy and the Industrial IoT Benefits of a Connected System Presented by: Adam Strynadka Managing Director DeviceLynk What is the Industrial Internet of Things? The Internet of Things (IoT) can
More informationCHAPTER 3 AVI TRAVEL TIME DATA COLLECTION
CHAPTER 3 AVI TRAVEL TIME DATA COLLECTION 3.1 - Introduction Travel time information is becoming more important for applications ranging from congestion measurement to real-time travel information. Several
More informationTABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
More informationSAP Customer Success Story High Tech Alternative Logic. Alternative Logic: Creating an Innovative Remote Workforce Management Platform
Alternative Logic: Creating an Innovative Remote Workforce Management Platform Alternative Logic Limited Industry High tech Software development and consulting Products and Services FieldLogic remote workforce
More informationConnected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.
Connected Vehicles: New Directions and Opportunities AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA N A T I O N A L S E C U R I T Y E N G I N E E R I N G H E A L T H S O L U T I O N S
More informationMultilane Free-Flow and Video-Tolling Full System in the USA
Multilane Free-Flow and Video-Tolling Full System in the USA Innovation in Road Transport: Opportunities for Improving Efficiency Session 2 - Information Technologies and Infrastructure Charging Experience
More informationProminent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM
Prominent Vietnamese company pilot module for a RFID-enabled VEHICLE TRACKING SYSTEM Automated security, parking and access control system Accurate identification of authorized vehicles Automated entry/exit
More informationMCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory. Chapter 11: Active Directory Certificate Services
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 11: Active Directory Certificate Services Objectives Describe the components of a PKI system Deploy the Active Directory
More informationHP Brazil RFID CoE Center of Excellence
HP Brazil RFID CoE Center of Excellence TEST CENTER DESCRIPTION: The RFID Center of Excellence is prepared to aid customers to visualize in their businesses possible RFID applications as well as to observe
More informationStrengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
More informationIBM RFID Solutions Centers: Leveraging IBM business solutions with RFID technology
Providing RFID technology support to help implement your program and succeed IBM RFID Solutions Centers: Leveraging IBM business solutions with RFID technology As business continues to evolve, there are
More informationPlain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
More informationSelf Testing and Product Qualification Processes
GlobalPlatform Self Testing and Product Qualification Processes Version 1.2.1 Public Release May 2013 Document Reference: GPC_PRO_042 Recipients of this document are invited to submit, with their comments,
More informationHARTING Auto-ID System Integration
HARTING Auto-ID System Integration HARTING integrated Auto-ID solutions Mobile Reader Business Application Framework Enterprise Service Bus Auto-ID Transponder Middleware Backend System Stationary Reader
More informationTurn-Key Passive Entry/ Passive Start Solution
Turn-Key Passive Entry/ Passive Start Solution Dr. Jedidi Kamouaa Atmel provides a passive entry/ passive start (PEPS) system with a complete set of basic building blocks, including hardware and software.
More informationAn Introductory and Elementary Study on RFID & Its Applications
An Introductory and Elementary Study on RFID & Its Applications Priyashree Baghel M.Tech Scholar, Electronics & Communication Department, Bhabha Engineering & Research Institute, RGPV, Bhopal, India Abstract
More informationINTEGRATED SOLUTION FOR MOTOTRBO TM THE SMART CHOICE FOR YOUR FUTURE
INTEGRATED SOLUTION FOR MOTOTRBO TM THE SMART CHOICE FOR YOUR FUTURE Integrated Solution for MOTOTRBO TM Networks of any size and topology System infrastructure monitoring and control Bridging for different
More informationUsing BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
More informationSecurity Operation Management Initiatives in Cooperative Vehicle-Infrastructure Systems for Safe Driving
Hitachi Review Vol. 65 (2016), No. 1 747 Featured Articles Security Operation Management Initiatives in Cooperative Vehicle-Infrastructure Systems for Safe Driving Akira Mizutani Mai Kawamura Eriko Ando
More informationPositioned To Be In Control
VEHICLE TRACKING & FLEET MANAGEMENT A GPS tracking device is installed on the vehicle in order to capturedata based on location, speed, direction, mileage, fuel consumption and behavior such as idling,
More informationThe Wireless World - 5G and Beyond. Björn Ekelund Ericsson Research
The Wireless World - 5G and Beyond Björn Ekelund Ericsson Research 9X Mobile data Traffic by 2020 Monthly consumption per device type 2014 2020 4.2 GB 17.3 GB 1.9 GB 8.4 GB 1.0 GB 4.9 GB Ericsson Internal
More informationRFID based Vehicle Tracking & Parking Lot Management System
RFID based Vehicle Tracking & Parking Lot Management System WHITE PAPER Ver 1. (Nov 213) The present day metropolitan areas have seen a burgeoning growth in human population as well as vehicles. With shrinking
More informationSP-2002-10231 - Designing a Microsoft SharePoint 2010 Infrastructure
SP-2002-10231 - Designing a Microsoft SharePoint 2010 Infrastructure Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This 5 day ILT training course
More informationHow To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
More informationIntegration of PTC and Ride Quality Data. Presented by: Wabtec Railway Electronics, I-ETMS PTC Supplier. and
Integration of PTC and Ride Quality Data Presented by: Wabtec Railway Electronics, I-ETMS PTC Supplier and dfuzion, Inc., rmetrix Ride Performance Assessment System Supplier The FRA mandate to implement
More informationAPPFORUM2014. Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10
APPFORUM2014 Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10 NFC OVERVIEW Chuck Bolen Chief Architect Enterprise Mobile Computing APPFORUM2014
More informationSébastien Grazzini - Eutelsat. The SafeTRIP project
Sébastien Grazzini - Eutelsat The SafeTRIP project What is SafeTRIP? Satellite Applications For Emergency handling, Traffic alerts, Road safety and Incident Prevention An integrated project (IP) From user
More informationAPNIC elearning: IPSec Basics. Contact: training@apnic.net. esec03_v1.0
APNIC elearning: IPSec Basics Contact: training@apnic.net esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
More informationElectronic Registration Identification (ERI)
Electronic Registration Identification (ERI) Concept, architecture and current status Murcia, 18th June 2009 Overview The ERI standard User requirements Architecture Current status 2 Electronic Registration
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationTracking metal parts with passive UHF RFID. April 2007
Tracking metal parts with passive UHF RFID April 2007 Confidex in brief Focused in wireless identification, especially on industrial RFID tags on 13,56MHz (HF) and 865-952 MHz (UHF) Main business areas
More informationIdentity: The Key to the Future of Healthcare
Identity: The Key to the Future of Healthcare Chief Medical Officer Anakam Identity Services July 14, 2011 Why is Health Information Technology Critical? Avoids medical errors. Up to 98,000 avoidable hospital
More informationGeneric RFID Software Platform for Any Application
FALKEN Secure Networks Inc. (FSN) has introduced a new paradigm to the RFID industry with its generic software platform to simplify System Integration, drive custom development costs out of system acquisition
More informationIDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation
IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Author: Creation Date: Last Updated: Version: I. Bailey May 28, 2008 March 23, 2009 0.7 Reviewed By Name Organization
More informationInnovation that Matters an IBM story
Dr. Shiva Kumar Vice President, Enterprise Performance and Industry Analytics Innovation that Matters an IBM story IBM Research IBM Research: Global and Vertically Oriented analytics services tools China
More informationHardware & Software Solutions
Hardware & Software Solutions Introduction About Proemion - Overview Capabilities - Customers 1986 RM Michaelides 2002 Proemion 2007 Production plant Introduction About RM Overview Capabilities Customers
More informationConfiguring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router
print email Article ID: 4938 Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router Objective Virtual Private
More informationCertification Service Provider of the Ministry of Employment and Social Securityp. Profile for Electronic seal certificate
SUBSECRETARÍA S.G. DE TECNOLOGÍAS DE LA INFORMACIÓN Y COMUNICACIONES Certification Service Provider of the Ministry of Employment and Social Securityp Profile for Electronic seal certificate sgtic@meyss.es
More informationNFC. Technical Overview. Release r05
Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those
More information7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.
Content 1.Introduction to Data and Network Security. 2. Why secure your Network 3. How Much security do you need, 4. Communication of network systems, 5. Topology security, 6. Cryptosystems and Symmetric
More informationWhat is our purpose?
Who we are? Since 1995 we have become one of the largest suppliers of electronic automotive accessories and telemetry devices in the Baltic States. Baltic Car Equipment is investing extensively into R&D
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationPaul Stam de Jonge March 6th, Brussels. RFID in Asset Management: European Case Studies
Paul Stam de Jonge March 6th, Brussels RFID in Asset Management: European Case Studies Agenda 1. Introduction 2. RFID in Asset Management 3. Case Studies 4. Summary 2 Wireless: inevitable in our society
More informationIntelligent Fleet Management System Using Active RFID
Intelligent Fleet Management System Using Active RFID Ms. Rajeshri Prakash Mane 1 1 Student, Department of Electronics and Telecommunication Engineering, Rajarambapu Institute of Technology, Rajaramnagar,
More informationEvolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
More informationTURPAK Vehicle ID Solution Solution Overview for Oil Companies
TURPAK Vehicle ID Solution Solution Overview for Oil Companies Agenda RFID Wireless Architecture Components Installation Recruiting & Issuing Security Summary RFID Wireless Advantages Proven solution,
More informationEfficient Asset Tracking: From Manual to Automated
White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies
More informationAn Introduction to Cryptography as Applied to the Smart Grid
An Introduction to Cryptography as Applied to the Smart Grid Jacques Benoit, Cooper Power Systems Western Power Delivery Automation Conference Spokane, Washington March 2011 Agenda > Introduction > Symmetric
More informationGEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M
GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions
More informationCryptography and Key Management Basics
Cryptography and Key Management Basics Erik Zenner Technical University Denmark (DTU) Institute for Mathematics e.zenner@mat.dtu.dk DTU, Oct. 23, 2007 Erik Zenner (DTU-MAT) Cryptography and Key Management
More information