NFC-based Asset Management for Medical Equipment

Size: px
Start display at page:

Download "NFC-based Asset Management for Medical Equipment"

Transcription

1 NFC-based Asset Management for Medical Equipment Nikhil Shetty, Hani Ragab-Hassen School of Mathematical and Computer Sciences Heriot-Watt University {ns323, Abstract Asset management is important to all modern organizations. It becomes critical when assets are equipment on which lives depend. The development of communication and wireless technologies, such as the new Near Field Communication (NFC) has opened new doors for efficient asset management. Store managers and keepers can now use mobile lightweight devices for asset management. In this paper, we propose and implement the first NFC-based mobile asset management solution for medical equipment. Our solution provides a unique security feature that allows immediate detection of tampering with any equipment s description. Furthermore, we critically review existing works and compare them to our solution and show its efficiency. Keywords NFC; Asset Management; RFID. I. INTRODUCTION The British Standard Institute defines Asset Management System (AMS) as a systematic and coordinated activity and practices through which an organization optimally manages its assets and their associated performance, risk and expenditures over their lifecycle for the purpose of achieving organization strategic plan [1]. A survey conducted by Katicic et al. reviewed the asset management practices in nine organizations [2]. It revealed that only one out of the nine organizations had embraced asset management systems. It was also noticed that none of the companies had an asset management system in place. They also stated that an asset management system is important to an organization not only for decision making but also to improve the life span of the asset. Asset management can improve the performance of the asset as well as increase the organization s revenue [3]. Traditionally, assets were managed using registers that comprise lists of all the details of a certain asset and the registers were maintained by the finance department. This assists an organization to track the whereabouts of an asset. Modernizing these registers was a tedious task [4], [5]. With the evolution of technology and the increased importance of asset management, several new technologies have been introduced in asset management, including Radio-frequency identification (RFID) and Near field communication (NFC). In this paper, we review the use of RFID and NFC technologies for Asset Management Systems (AMS). Then, we present and discuss the design and implementation of a new NFC-based solution. Our solution allows storekeepers to track and monitor medical equipment using an NFC reader that can communicate with NFC tags placed on the equipment. Our solution also implements a unique security feature, based on asymmetric cryptography, that detects any malicious or accidental tampering with the equipment s tags. We implemented the proposed asset management system as an android application, so users can manage assets using an android smartphone. The application architecture defines three main components: NFC readers, used by system users (store manager, or storekeepers); NFC tags, placed on equipment (and the equipment can be borrowed by employees/custodians); and a database that stores information about equipment, storekeepers, and custodians. The NFC reader we used during the development of our application is an android smart phone. The application implements several operations such as adding a new asset, deleting an asset, looking up an asset s information (by scanning it and looking up its records in the database), checking-out an asset (when borrowed), checkingin an asset (when returned), adding storekeepers, and adding custodians. The application also offers two security features, namely asset integrity check and secure login. Asset integrity check allows a storekeeper to make sure that a tag has not been tampered with. Storekeepers have to login using their username/password before they can start performing any action. This paper is organized as follows: section II reviews important asset management proposals, and we present our system in section III. In section IV, we critically review the existing systems and compare them to our proposal. Section V concludes our work and gives future directions to improve it. II. RELATED WORKS Most of the asset management systems rely on either RFID (sometimes combined with barcodes) or NFC. In this section, we review the basics of RFID and NFC technologies and how they were implemented in asset management proposals. It is important to note that all the proposals, except one, were proposed for non-medical applications, which shows the importance of our work. Radio Frequency identification or RFID enables users to identify objects using radio waves. There are three types of RFID tags: passive, active and semi-passive. Passive tags do not require their own power source, therefore reading of assets /15/$ IEEE 254

2 is limited to short distances. Active tags on the other hand have their own power source, thus increasing the range of reading active tags. These tags also cost more than passive tags [6]. Semi-passive tags combine the features of active and passive tags. NFC was designed by Sony and NXP (Philips Semiconductors) [7]. An NFC device has two communication modes, namely passive mode and active mode. In passive mode, an NFC device generates a magnetic field that powers up an NFC tag or card [8]. The speed at which data are transferred ranges from 106 kilobyte/second to 424 kilobyte/second at a distance of 10cm [9]. In the active mode, both NFC devices have their own power sources to power up the respective NFC modules [8]. An advantage that active mode has over passive mode is that an active NFC device can operate at a distance of 20cm and the speed of data transfer is more than 1 megabyte/second [9]. The introduction of NFC on mobile devices has opened new business opportunities like mobile payment, smart media and transport ticketing and improved end-users experience [10]. In the rest of this section, we review important RFID and NFC-based asset management systems, both theoretical proposals and implemented commercial solutions. Carmel et al. proposed an asset management system that uses Active RFID tags to track assets and 2D barcodes to manage assets [11]. The system was developed to improve patients safety in hospitals. The system used Active RFID tags to monitor the movements of the assets using a web console. The concern with this system is that 2D barcode should be manually tracked using a 2D barcode reader. Liu et al. [12] proposed an asset management system for medical laboratory devices. The system uses Ultra High Frequency (UHF) RFID. UHF RFID readers can read an RFID tag at a distance of 3m. This system focused on managing equipments in laboratories to reduce human errors when tracking equipment. The system uses a Fixed RFID reader and a mobile RFID reader. RiBOMs is an object management system that was proposed by Iraola et al. [13]. The system uses a smart glove to track objects. The smart glove has an RFID reader and a Bluetooth chip which transfers the object identity to an android device. The android device provides the user with information about the object along with its location. When the user wants to add a new asset, they place an R Tag (RFID tag) on the asset and, with the help of the android application, they enter the name, followed by the picture of the asset as well as its location. This information is then assigned an object Identifier and stored in an XML file on a smartphone. The object identifier is passed onto the smart glove which writes it to the R Tag. The XML file can be edited manually if need be. In [14], Crowl proposed a low cost RFID Asset Management System which allows users to track assets using a pocket PC. The system allows users to manage assets, which includes features like adding, retrieving, and searching assets using the Pocket PC. The system stores all the information of the assets in a MySQL database. This implementation was not successful due to technical issues. MiQ is a system that uses RFID and GPS to track assets locations [15]. The system also uses different sensors combined with RFID to inspect the asset condition. MiQ was demonstrated in a food supply outlet that delivers lunch boxes. Each lunch box has a sensor that provides updates related to the lunch box like its temperature and location. The status of the lunch box is retrieved by scanning the RFID tag using a PDA. This allows the end user who receives the lunch box to identify when the food was deemed unfit. Since this system uses active RFIDs the power of the battery tag will be drained as it used by different sensors. Redbeam asset tracking software [16] allows users to track fixed assets using both RFID and barcode with the aid of a desktop PC. Information related to the asset such as the barcode ID, the location of the asset, and the date the asset was purchased are stored in a central database. The assets can be tracked by the user either with the aid of a barcode device connected to a desktop, a Mobile Scanner, or RFID Reader. Redbeam synchronizes the database between the PC and the Mobile Scanner or the RFID Reader. Wasp [17] is an android based asset management system that uses barcode technology. The application allows users to scan barcodes in order to track the assets. It also allows to take pictures of an asset and store it in a in a centralized database. This system is similar to RedBeam. RadiantRFID [18] is an RFID asset management system that uses RFID readers or RFID based stations for tracking assets. The solution can use both active and passive RFID tags. Some of the features supported by the system are asset monitoring and reporting. This system can also be accessed from a smart phone device. Additionally the system can be integrated into an ERP system. RFID4U is a solution provider who proposed an RFID asset management system that uses RFID and barcode for tracking assets [19]. The system allows a user to track multiple RFID tags at once; it notifies the user when an asset is moved. The system can be accessed by a mobile device to monitor the location of an asset. AssetTrack is an asset tracking solution that allows users to track assets in real time [20]. The system makes use of RFID and barcode to track assets. The system integrates Google maps, allowing users to track the location of an asset. Alerts are provided to users through whenever an asset is moved. MapYourTag [21] is a cloud based asset management system that allows users to track and manage assets either by barcode, NFC or QR code. The system uses google maps to identify the location of the asset. The system can also be accessed using a smart phone to provide regular updates of the assets; this is only possible in the presence of Wifi or 3G connection. Alternatively, the user can track an asset by barcode and QR code by simply scanning its sticker using the smartphone camera. Ginstr provides an asset Location manager solution that uses barcode, QR code and NFC for tacking assets [22]. The application allows users to track the whereabouts of the asset and also provides the location of the asset using GPS. The system can be accessed from a smartphone or a desktop PC. The location management system is monitored to detect 255

3 database tampering. Users must be authenticated before being able to use the system. inviu NFC-tracker allows users to track assets using a single smartphone [23]. The user will need to enter their user name and password to access a remote server. The remote server hosts the asset tracking and management software. Users have to register their smartphones with the remote server before they can use them. There are a few NFC-based asset management proposals compared to RFID. This is mainly due to the fact that NFC is a very recent technology. In the next section we present our NFC-based solution. A. Description III. OUR PROPOSAL We propose a new NFC-based asset management system for medical equipment. The system was developed after investigating several asset management systems, both commercial products and theoretical works. Our system implements the following operations: 1) Add/delete/update assets: a storekeeper can perform these operations using their handheld NFC reader. Additions and modifications of assets are automatically replicated to a central database. 2) Lookup an asset s data: gives the storekeeper the possibility to retrieve an asset s data from the database by simply scanning its tag. 3) Checkout/Issue equipment: storekeepers can lend equipment to medical staff (custodians) and record this to the database using their NFC reader. 4) Check-in/Return equipment: a custodian can return an item to a storekeeper. The storekeeper records this to the database. 5) Detect tampering with asset tags: storekeepers can scan NFC tags and detect any modifications of its content. 6) Secure login: storekeepers have to login from the NFC reader (smart phone) before they can perform any of the above operations. In the rest of this section we describe our system. In III.B, we describe the design of the security features of our system. In III.C, we define the different entities in our system and how they interact to carry out the operations described above. We briefly describe some of the important implementation details of our system in III.D. B. Security Tampering with tag data is a major threat to any asset management system. Indeed, modifying the tag data of an expensive piece of equipment (e.g. by substituting its description by a cheaper item s one) would lead to substantial financial losses. In the case of medical equipment, data tampering could have deadly effects as modifying an item s description would lead to misuses that could results in deaths. This is why our system provides a data integrity feature that prevents modifications of tag data. We use digital signatures to detect any modification of tag data. Digital signatures are based on asymmetric cryptographic encryption. Asymmetric encryption uses two mathematically related keys: a private key held by the key pair owner, and a public key shared with everyone the key owner wants to communicate with. When either key is used to encrypt, only the other one can be used to decrypt. In our design, the private key is held by the central database machine, and the public key is installed on each NFC reader. A digital signature of a document is the result of encrypting its hash using the private key of the signer (database). The verification of a signature can be done by anyone who has the public key (NFC reader). Verification consists in decrypting the signature and comparing decrypted hash to a fresh hash computed on the document. We use digital signatures as follows: before storing a new asset s tag data into the database, the data will be signed using the database s private key. Then the signature will be stored in the new asset s record in the database. A copy of this record (including the signature) is stored on the NFC tag. A similar process is triggered each time an asset s data has to be modified. When a storekeeper wants to check the data integrity of a tag, they scan the tag, get the tag s data and the signature on them, and then verify the signature as explained previously. This would detect any data tampering. Another possible threat is swapping NFC tags (e.g. between an expensive and a cheap item). We prevent this threat by adding a picture and a description of the item to its stored data. The picture and description are digitally signed with the rest of the asset s data; modifications of them are easily detected. Our system provides a secure login feature as well. Secure login will described in the next section. C. System Architecture Figure 1 depicts our system architecture. Our system defines several entities and defines their interactions. The entities are: Custodian (Employee): is an individual who wants to borrow an asset (e.g. some medical equipment) from a store. Storekeeper (User): is someone who is authorized by the store manager to perform operations on the assets; this is our system s user. A storekeeper can perform activities like add, view, and lookup asset details. NFC reader: this is the device used by the storekeeper to scan NFC tags and write to them. In our implementation, we used an Android smartphone. Database: Is where the details of assets, storekeepers, and custodians are stored. It also keeps record of custodians who borrowed an asset. Assets: are the resources that are managed by our system. A storekeeper can hand an asset over to a custodian for their use. The asset details are stored in the database. 256

4 Fig. 2. Adding an Asset Fig. 1. Architecture of Our System Tags: are used to identify an asset. These tags are placed on the equipment. An asset has one and only one tag. Now that we have identified the system entities, let s discuss how they interact in order to perform different operations. Our system allows storekeepers to perform the following activities: 1) Adding an Asset: A storekeeper can input a new asset s information into the system. The storekeeper has an interface where they can input the data then save it to the database. The storekeeper adds the details of the assets using the NFC reader as shown in figure 2. The data is saved to the database and a digital signature is associated with the asset as explained in III.B. The digital signature is then stored to the NFC tag. The signature allows the detection of any modification of the tag. 2) Looking up an Asset: A storekeeper can get the information of an equipment by scanning its tag as indicated in figure 3. The storekeeper can lookup an asset by passing their smartphone over the NFC tag. On doing so it will read an asset identifier which is then queried from the database. On successful completion, the storekeeper will be provided with the asset s information such as its description, its picture, when it was purchased, and to whom it was handed over to. 3) Deleting an Asset: Allows a storekeeper to remove an asset from the system. When an asset is deemed nonfunctional, the storekeeper can delete the asset from the system using an interface on their NFC reader. 4) Issuing (Checking out) an Asset: Using this operation, a storekeeper can record that an asset has been borrowed by a particular custodian. As shown in figure 4, the storekeeper scans the tag to get its data. These are automatically sent Fig. 3. Lookhing up an Asset to the database and checked for data integrity, and then the storekeeper inputs the identity of the employee (custodian) who borrows the item, then sends it to the database. 5) Returning (Checking in) an Asset: This operation informs the database that a borrowed asset has been returned. 6) Integrity Check: This is a security feature. It allows a storekeeper to check that an asset s tag has not been tampered with by scanning it. 7) Adding a Storekeeper (User): this operations happens at the back-end database by the database administrator without the intervention of the NFC reader. A new storekeeper is added and their data entered, including a user name and a password they use later whenever they want to connect to the database from an NFC reader. 8) Secure Login: This is a security feature. It allows a storekeeper to securely connect to the database using their user name and password. The login process is shown in figure 5. The storekeeper s user name and a hash of the password are sent encrypted using 257

5 We developed our system using Android Studio with JAVA, XML, and MySQL for the database. We used NTAG213 NFC tags and placed them on the assets. NTAG213 tags are compatible with most smartphones, which widens the range of devices that could be used as NFC readers. Fig. 4. Issuing an Asset the public key of the database so only the database can decrypt the storekeeper s information. A timestamp is sent along with the user name and password to prevent replay attacks. Fig. 5. Storekeeper Login 9) Adding a Custodian (Employee): This allows a storekeeper to enter the details of a custodian on their NFC reader. Custodians can be directly added by the database administrator as well. D. Implementation We implemented our system as an Android mobile native application. A mobile application, aka app, is a piece of software that runs on a mobile device, such as a smartphones [24]. A native app is an applications that works on a specific mobile platform and takes advantage of the built-in resources available on the platform, such as camera, Bluetooth, GPS (Global Positioning System), native application have the ability to run offline. Native apps are developed in Java, Objective-C or C# [25]. Native mobile applications can be acquired from the play store for the Android, Apple store for iphone and windows marketplace for the Windows phone [25]. IV. DISCUSSION After reviewing several asset management systems, we found out that most of them used active RFID to identify assets. The systems we analysed were mostly for large enterprises, and some of them used RFID base stations to track assets. These base stations required additional configuration to coexist with the systems in place. The main concern with RFID systems would be their relatively higher cost. For example, in [14], the authors stated that the cost per one of their RFID readers was $2199. NFC readers on the other hand cost a few hundred dollars. But after reviewing the existing works we realized that very few used NFC despite the fact that NFC readers are being massively produced and shipped inside most of new high-end smartphones. This phenomenon could be justified by the fact that NFC is quite new and also the fact that is has a limited range compared to RFID. We chose to use NFC passive tags as they are considered safer than active ones (and all the other NFC-based solutions we mentioned used NFC passive tags too). We used the NTAG213 model as it is known to be compatible with all smartphone devices [26]. By critically analysing the security of existing systems we realized that the tags they use (both RFID and NFC) can be tampered with using an appropriate device. Furthermore, a few proposals used pictures, which could have prevented tag swapping [13], [16], [17]. But this is not the case as the tag itself is not tamper-proof and if the picture of the asset is stored on the tag, then it can be replaced by another picture and go undetected. If the picture is stored in a central file or database, it might still be possible to modify it if it is not properly protected. In RiBOMs for example [13], not only the tag can be modified, but even the XML file that serves as a database of assets does not have its own protection (which is not the case of our database as it requires administrator information before being able to access and modify its data), and it can be easily modified by a malicious person. In addition to asset, storekeeper, and custodian management, and as far as we are aware of, our system is the only one that provides an advanced integrity check feature that detects modifications of tags and database records. It is also the first NFC-based system for medical equipment management. V. CONCLUSION In this paper, we proposed a new NFC-based asset management system for medical equipment. We implemented the required operations for asset management as well as staff management. We discussed some similar works and showed their security flaws that could allow malicious individuals to modify equipment descriptions, and implemented a unique security feature that would detect such modifications. 258

6 This is the first proposal for using NFC tags for asset management in medical organization, and many things can be done to improve it. Future works can add access control to our system. Access control would request certain privileges from storekeepers before they check-out equipment, e.g. storekeeper of store 1 would not be able to issue an asset that is in store 2. Another possible direction to investigate is the integration of our system into ERP systems used by medical organizations. REFERENCES [1] B. PAS, 55-1: Asset management. part 1: Specification for the optimized management of physical assets, British Standards Institution, [2] L. Katicic and Z. Lovrincevic, Corporate asset management and survey in croatian companies, in Asset Management Conference 2012, IET IAM, Nov 2012, pp [3] M. Shoab, K. Jain, and M. Shashi, Development and implementation of web service for logging and retrieving real time train location information, IJSCE) ISSN, pp , Nov [4] B. Yang and P. Liu, Value added on integrated solution of rfid enhanced asset traceability system, in Service Operations and Logistics and Informatics (SOLI), 2010 IEEE International Conference on, July 2010, pp [5] R. Best, C. A. Langston, and G. De Valence, Workplace strategies and facilities management. Routledge, [6] S. Shekhar and H. Xiong, Encyclopedia of GIS. Springer Science & Business Media, [7] Nfc-world.com, NFC Portal site About NFC, , [Online; accessed 28- Jun- 2015]. [8] T. Igoe, D. Coleman, and B. Jepson, Beginning NFC: Near Field Communication with Arduino, Android, and PhoneGap. O Reilly Media, Inc., [9] H. Kunkat, NFC Development & Consulting, , [Online; accessed 30- Jun-2015]. [10] Nfc is the double-click in the internet of the things, in RFID Systems and Technologies (RFID SysTech), rd European Workshop on, June 2007, pp [11] I. Mun, A. Kantrowitz, P. Carmel, K. Mason, and D. Engels, Active rfid system augmented with 2d barcode for asset management in a hospital setting, in RFID, IEEE International Conference on, March 2007, pp [12] Z. Liu, J. Yi, C. Chen, C. Gu, and T. Fan, Development of a management system of laboratory equipment based on uhf rfid, in Information Science and Engineering (ICISE), nd International Conference on, Dec 2010, pp [13] H. Iraola, J. Schafer, X. Yu, G. Mullett, and A. Ganz, Riboms: Rfid-based object management system for home environments, in Engineering in Medicine and Biology Society, EMBC, 2011 Annual International Conference of the IEEE, Aug 2011, pp [14] S. Crowl, Low cost radio frequency identification asset management, in Engineering Management Conference, 2007 IEEE International, July 2007, pp [15] T. Zhang, Z. Luo, F. Zhou, and X. Yang, Developing a trusted system for tracking asset on the move, in Young Computer Scientists, ICYCS The 9th International Conference for, Nov 2008, pp [16] Asset Tracking Asset Management Software from RedBeam, , [Online; accessed 30-Jun-2015]. [17] Fixed Asset Tracking Software - Asset Management Systems - Wasp Barco, , [Online; accessed 30-Jun-2015]. [18] RFID Solutions - Radiant RFID, , [Online; accessed 30-Jun-2015]. [19] Asset tracking - asset tracking solution rfid pos system, , [Online; accessed 30-Jun-2015]. [20] TrackX RFID Solutions for Asset Tracking and Supply Chain Management, , [Online; accessed 30-Jun-2015]. [21] MapYourTag Asset Tracking Software from your smartphone, , [Online; accessed 30-Jun-2015]. [22] Ginstr Asset Location Manager mobile business app, , [Online; accessed 30-Jun-2015]. [23] inviu NFC-tracker, Dateien/pdf/Datenblatt/nfc-tracker/englisch/inViu NFCtracker data sheet.pdf, 2015, [Online; accessed 30-Jun-2015]. [24] Techopedia, What is a Mobile Application? , [Online; accessed 28- Jun- 2015]. [25] R. Budiu, Mobile: Native Apps, Web Apps, and Hybrid Apps, , [Online; accessed 10- Mar- 2015]. [26] NFC Tags Mifare Classic Compatibility Issue - Nexus 4, Galaxy S4, , [Online; accessed 18- Jun- 2015]. 259

Degree Certificate Authentication using QR Code and Smartphone

Degree Certificate Authentication using QR Code and Smartphone Degree Certificate Authentication using and Smartphone Ankit Singhal M.Tech Computer Science Faculty of Science, Dayalbagh Educational Institute, Dayalbagh, Agra, U.P, India R.S Pavithr Assistant Professor

More information

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,

More information

NFC Based Equipment Management Inventory System

NFC Based Equipment Management Inventory System Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang

More information

E-commerce: Competing the Advantages of a Mobile Enterprise

E-commerce: Competing the Advantages of a Mobile Enterprise Addressing the Challenges of Going Mobile Mobile Data Collection Using COMMANDmobile Table of Contents Introduction... 3 Challenges of Going Mobile... 4 Existing Infrastructures... 4 Configuration Management...

More information

Cloud RFID UHF Gen 2

Cloud RFID UHF Gen 2 Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system

More information

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for

More information

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved. Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password

More information

Team 23 Design Document. Customer Loyalty Program for Small Businesses

Team 23 Design Document. Customer Loyalty Program for Small Businesses Team 23 Design Document Customer Loyalty Program for Small Businesses Clients - Jay Namboor Adviser - Dr. Govindarasu Members: Christopher Waters Van Nguyen William Tran 1 Loyalty Program Contents System

More information

Securing Data on Microsoft SQL Server 2012

Securing Data on Microsoft SQL Server 2012 Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

Financial industry Solutions. Redefining Micro Location for the Financial industry in a Mobile World

Financial industry Solutions. Redefining Micro Location for the Financial industry in a Mobile World Financial industry Solutions Redefining Micro Location for the Financial industry in a Mobile World Company Overview Founded in 2011, strong expertise in location tracking and information security technologies

More information

That Point of Sale is a PoS

That Point of Sale is a PoS SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits The IT Guide to RFID Solutions for Schools The Technology, Applications, and Benefits Radio frequency identification, or RFID, has become a leading technology in providing automated and reliable location

More information

Significance of Tokenization in Promoting Cloud Based Secure Elements

Significance of Tokenization in Promoting Cloud Based Secure Elements Significance of Tokenization in Promoting Cloud Based Secure Elements Busra O zdenizci 1, Vedat Coskun 1*, Kerem Ok 1 and Turgay Karlidere 2 1 NFC Lab - Istanbul, Department of Information Technologies,

More information

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford

More information

How To Use Titanium Studio

How To Use Titanium Studio Crossplatform Programming Lecture 3 Introduction to Titanium http://dsg.ce.unipr.it/ http://dsg.ce.unipr.it/?q=node/37 alessandro.grazioli81@gmail.com 2015 Parma Outline Introduction Installation and Configuration

More information

RFID System Description for Logistics & Inventory

RFID System Description for Logistics & Inventory RFID System Description for Logistics & Inventory 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and evolve with them.

More information

Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images

Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images Awase-E: Image-based Authentication for Mobile Phones using User s Favorite Images Tetsuji TAKADA 1 and Hideki KOIKE 2 1 SONY Computer Science Laboratories Muse Bldg. 3-14-13 Higashigotanda, Shinagawa-ku,

More information

ISO 27001 COMPLIANCE WITH OBSERVEIT

ISO 27001 COMPLIANCE WITH OBSERVEIT ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk

More information

Location Based Asset Management Application for Railway: AMS-R

Location Based Asset Management Application for Railway: AMS-R Location Based Asset Management Application for Railway: AMS-R Mohd Shoab*, Kamal Jain*, M. Shashi** * Department of Civil Engineering, Indian Institute of Technology Roorkee. ** Department of Civil Engineering,

More information

F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop

F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop 1 Park, Yang Ho, 1 Lee, Sang Seok, 1 Kim, Jong Hwan, 1 Joung, Youn-kyoung, 2 Noh, Sang Do 1 Department of Industrial Engineering,

More information

How To Use Uniflow

How To Use Uniflow One platform for all your print, scan and device management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in

More information

Asset Tracking System

Asset Tracking System Asset Tracking System System Description Asset & Person Tracking 1. General The Vizbee platform is a flexible rule based solution for RFID based applications that can adapt to the customer s needs and

More information

NFC. Technical Overview. Release r05

NFC. Technical Overview. Release r05 Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those

More information

One Platform for all your Print, Scan and Device Management

One Platform for all your Print, Scan and Device Management One Platform for all your Print, Scan and Device Management Manage all Printing & Scanning with one single Platform. Incorporating uniflow into your document processes will lead to real improvements in

More information

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings Are You Missing Out On Huge Savings through Better Asset Management? Many schools around the country have implemented wireless networking

More information

Mobile Application Security Sharing Session May 2013

Mobile Application Security Sharing Session May 2013 Mobile Application Security Sharing Session Agenda Introduction of speakers Mobile Application Security Trends and Challenges 5 Key Focus Areas for an mobile application assessment 2 Introduction of speakers

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

Product Overview. For a more detailed overview of the SafeTime system please view our video via our website: www.safe-time.co.uk

Product Overview. For a more detailed overview of the SafeTime system please view our video via our website: www.safe-time.co.uk Presentation for Product Overview The SafeTime inspection device has been designed with collaboration in mind, ensuring that everyone has access to the latest inspection information. This critical information

More information

A Proxy-Based Data Security Solution in Mobile Cloud

A Proxy-Based Data Security Solution in Mobile Cloud , pp. 77-84 http://dx.doi.org/10.14257/ijsia.2015.9.5.08 A Proxy-Based Data Security Solution in Mobile Cloud Xiaojun Yu 1,2 and Qiaoyan Wen 1 1 State Key Laboratory of Networking and Switching Technology,

More information

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics

More information

Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0

Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0 Encryption Mechanism Software Requirement Specifications changed to Dokumentation Version 1.3.0 Page 1 of 13 Table of Contents 1. Introduction... 3 2. System work flow and terminology... 3 3. User Descriptions...

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

Grid-In-Hand Mobile Grid Revised 1/27/15

Grid-In-Hand Mobile Grid Revised 1/27/15 Grid-In-Hand Mobile Grid Revised 1/27/15 Grid-In-Hand provides a mobile solution framework by coupling your mobile scanner to your ios or Android device. Use Mobile Grid for inventory, asset management,

More information

MS-55096: Securing Data on Microsoft SQL Server 2012

MS-55096: Securing Data on Microsoft SQL Server 2012 MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary

More information

TRACKING CANCER PATIENTS MEDICAL HISTORY USING WIRELESS EMERGING TECHNOLOGY : NEAR FIELD COMMUNICATION

TRACKING CANCER PATIENTS MEDICAL HISTORY USING WIRELESS EMERGING TECHNOLOGY : NEAR FIELD COMMUNICATION TRACKING CANCER PATIENTS MEDICAL HISTORY USING WIRELESS EMERGING TECHNOLOGY : NEAR FIELD COMMUNICATION ABSTRACT Shivang Bhagat, Darshana Upadhyay and Parita Oza Department of Computer Science and Engineering

More information

Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010

Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010 Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010 RFID, GPS, sensor, and other auto-id technologies promise to revolutionize enterprise asset

More information

Mobile Driver s License Solution

Mobile Driver s License Solution Mobile Driver s License Solution Secure, convenient and more efficient Improved identity protection through secure mobile driver s licenses The introduction of a mobile driver s license is a huge opportunity

More information

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags

Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags Seyed Mohammad Alavi 1, Karim Baghery 2 and Behzad Abdolmaleki 3 1 Imam Hossein Comprehensive University Tehran, Iran

More information

BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION

BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION BIG DATA: CRYPTOGRAPHICALLY ENFORCED ACCESS CONTROL AND SECURE COMMUNICATION 1 AKASH GUPTA, 2 ALOK SHUKLA, 3 S. VENKATESAN 1,2,3 Indian Institute of Information Technology, Allahabad Abstract The evolution

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

Active RFID Solutions for Asset Tracking and Inventory Management

Active RFID Solutions for Asset Tracking and Inventory Management Active RFID Solutions for Asset Tracking and Inventory Management Introduction RFID (Radio Frequency Identification) technology is fast replacing ScanCode technology for asset tracking and inventory management.

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment

Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment , pp.18-22 http://dx.doi.org/10.14257/astl.2013.42.05 Cloud-based Distribute Processing of User-Customized Mobile Interface in U-Sensor Network Environment Changhee Cho 1, Sanghyun Park 2, Jadhav Yogiraj

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What

More information

NFC APPLICATIONS IN THE TRACKING SYSTEMS

NFC APPLICATIONS IN THE TRACKING SYSTEMS Advanced Logistic Systems, Vol. 7, No. 2 (2013), pp. 41 48. NFC APPLICATIONS IN THE TRACKING SYSTEMS TAMÁS HARTVÁNYI 1 CSABA I. HENCZ 2 Abstract: Radio Frequency Identification (RFID) and a Near Field

More information

Document Management Getting Started Guide

Document Management Getting Started Guide Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

Oil & Gas Inventory Management System

Oil & Gas Inventory Management System Oil & Gas Inventory Management System WHITE PAPER EVA ZEISEL Copyright Statement Copyright 2016 RFID4U. All Rights Reserved. This document and other documents on the RFID4U web site (www.rfid4u.com) are

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

A Layered Signcryption Model for Secure Cloud System Communication

A Layered Signcryption Model for Secure Cloud System Communication Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086

More information

ONE PLATFORM FOR ALL YOUR PRINT, SCAN, AND DEVICE MANAGEMENT

ONE PLATFORM FOR ALL YOUR PRINT, SCAN, AND DEVICE MANAGEMENT ONE PLATFORM FOR ALL YOUR PRINT, SCAN, AND DEVICE MANAGEMENT MANAGE ALL PRINTING & SCANNING WITH ONE SINGLE PLATFORM Incorporating uniflow into your document processes will lead to real improvements in

More information

User's Guide. [Home Network] app. Model No.

User's Guide. [Home Network] app. Model No. User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it

More information

LIBRARY ACCESS SYSTEM SMARTPHONE APPLICATION USING ANDROID

LIBRARY ACCESS SYSTEM SMARTPHONE APPLICATION USING ANDROID Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption

E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Journal of Computer Science 6 (7): 723-727, 2010 ISSN 1549-3636 2010 Science Publications E-Visas Verification Schemes Based on Public-Key Infrastructure and Identity Based Encryption Najlaa A. Abuadhmah,

More information

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System International Journal of Applied Science and Technology Vol. 4, No. 5; October 2014 Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System Z.K Adeyemo O. J. Oyeyemi

More information

Iknaia Asset and Personnel Tracking Management System for the Construction Industry

Iknaia Asset and Personnel Tracking Management System for the Construction Industry Iknaia Asset and Personnel Tracking Management System for the Construction Industry Introduction The UK construction industry accounts for over 7%* of the UK s Gross Domestic Product and employs over two

More information

Key & Data Storage on Mobile Devices

Key & Data Storage on Mobile Devices Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner johannes.feichtner@iaik.tugraz.at Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography

More information

Smartphone Enterprise Application Integration

Smartphone Enterprise Application Integration WHITE PAPER MARCH 2011 Smartphone Enterprise Application Integration Rhomobile - Mobilize Your Enterprise Overview For more information on optimal smartphone development please see the Rhomobile White

More information

Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,

Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, Mobile Testing Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. A mobile application

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Mobile Operating Systems. Week I

Mobile Operating Systems. Week I Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone

More information

A mobile monitoring and alert SMS system with remote configuration A case study for android and the fused location provider

A mobile monitoring and alert SMS system with remote configuration A case study for android and the fused location provider A mobile monitoring and alert SMS system with remote configuration A case study for android and the fused location provider By Tiago Coelho, Sara Paiva Instituto Politécnico de Viana do Castelo, Viana

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Computer/IT Project LIST. Contact: 9860171201 8796142757

Computer/IT Project LIST. Contact: 9860171201 8796142757 Computer/IT Project LIST Contact: 9860171201 8796142757 1. Detecting E Banking Phishing Websites Using Associative Classification 2. Vehicle Tracking Using Driver Mobile Gps Tracking 3. Sentiment Analysis

More information

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM Jakub Nantl 1 1 Silesian University in Opava, School of Business Administration in Karvina, Univerzitní nám. 1934/3, 733 40 Karviná Email:

More information

Mobile Device Security

Mobile Device Security Mobile Device Security Presented by Kelly Wilson Manager of Information Security, LCF Research New Mexico Health Information Collaborative (NMHIC) and the New Mexico Health Information Technology Regional

More information

RFID Security: Threats, solutions and open challenges

RFID Security: Threats, solutions and open challenges RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)

More information

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is

More information

Loyalty Systems over Near Field Communication (NFC)

Loyalty Systems over Near Field Communication (NFC) Loyalty Systems over Near Field Communication (NFC) Diogo Simões IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal diogo.simoes@tagus.ist.utl.pt Abstract.

More information

INTEGRATING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN ACADEMIC MANAGEMENT SYSTEM

INTEGRATING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN ACADEMIC MANAGEMENT SYSTEM Journal of Computer Science 10 (2): 361-365, 2014 ISSN: 1549-3636 2014 doi:10.3844/jcssp.2014.361.365 Published Online 10 (2) 2014 (http://www.thescipub.com/jcs.toc) INTEGRATING RADIO FREQUENCY IDENTIFICATION

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity

More information

Quick Start Guide. Rev. 1.0

Quick Start Guide. Rev. 1.0 Quick Start Guide Rev. 1.0 WARNING TO PREVENT SERIOUS INJURY OR DEATH FROM MOVING GARAGE DOORS OR GATES: DO NOT let children use the Gogogate product and app without adult supervision. ONLY operate your

More information

A Secure Authenticate Framework for Cloud Computing Environment

A Secure Authenticate Framework for Cloud Computing Environment A Secure Authenticate Framework for Cloud Computing Environment Nitin Nagar 1, Pradeep k. Jatav 2 Abstract Cloud computing has an important aspect for the companies to build and deploy their infrastructure

More information

Mobile Field Service Engineer Application

Mobile Field Service Engineer Application International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-04, Issue-02 E-ISSN: 2347-2693 Mobile Field Service Engineer Application Akash Budholia 1, Rishit Mehta 2*,

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.

More information

Android Tablet GIS Solution Transforms Well Inspection for Bucks County Health Department

Android Tablet GIS Solution Transforms Well Inspection for Bucks County Health Department Android Tablet GIS Solution Transforms Well Inspection for Bucks County Health Department A Case Study Problem Statement The Bureau of Environmental Health (BEH) within the Bucks County Health Department

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

AirPatrol WiFi Full Manual V1.0

AirPatrol WiFi Full Manual V1.0 AirPatrol WiFi Full Manual V1.0 Index What AirPatrol WiFi does? 3 Lights and buttons 4 WiFi Network 5 Installing AirPatrol Wifi 6 Quick Setup steps 7 AirPatrol WiFi setup 8 Sending commands (Low heat mode)

More information

Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies

Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 3, March 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Hospital

More information

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System

Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System Rfid Authentication Protocol for security and privacy Maintenance in Cloud Based Employee Management System ArchanaThange Post Graduate Student, DKGOI s COE, Swami Chincholi, Maharashtra, India archanathange7575@gmail.com,

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry

Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry July 2014 Introduction Trying to find your way around a large hospital or locating a high-value medical device such as

More information

Automated Security System using ZigBee

Automated Security System using ZigBee IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/

More information

Hvor går RFID forskning og utvikling?

Hvor går RFID forskning og utvikling? Technology for a better society Enabling the Real Time Enterprise Hvor går RFID forskning og utvikling? Ovidiu Vermesan, SINTEF IKT og Edvin Holsæter, Telenor Iris Plan for presentasjonen RFID segmenter

More information

Multi-Factor Authentication Job Aide

Multi-Factor Authentication Job Aide To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please

More information

On the Security of RFID

On the Security of RFID On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com

More information

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com Frequently Asked Questions 2013 SSLPost Page 1 of 31 support@sslpost.com Table of Contents 1 What is SSLPost Cloud? 3 2 Why do I need SSLPost Cloud? 4 3 What do I need to use SSLPost Cloud? 5 4 Which Internet

More information