Localization System for Roulette and other Table Games

Size: px
Start display at page:

Download "Localization System for Roulette and other Table Games"

Transcription

1 Localization System for Roulette and other Table Games Christoph Ruland 1 1 University of Siegen, Hoelderlinstrasse 3, D Siegen/Germany; christoph.ruland@uni-siegen.de Tel.: ; Fax: Abstract: With many board games, it is desirable to uniquely and electronically identify the position of the game pieces, irrespective of whether the game is played locally or remotely via communication networks. This paper describes a technology which performs an exact localization of game pieces, tokens, jetons or chips on the game board or table. In order to achieve this, antennas which emit independent code sequences are integrated into the board or table. The game pieces, jetons or tokens detect the code sequences and may either use them to determine their position themselves and send this to a controller or only signal to the controller which code sequences they have received, on which basis the controller then calculates the position of the game pieces. This results in alternating localization and data phases. Power to the game pieces can be supplied passively, e.g. by induction, via a power supply layer in the board or table. The methods used are based on proven technologies such as CDMA, RFID or cryptography in order to securely transmit and archive the information. Keywords: Game Piece Localization, Table Games, Online Gaming, Orthogonal Sequences 1. State of the Art Game pieces are used in board games of all kinds, e.g. by party games played for entertainment, games practiced as sport such as chess, or games of chance played for profit. Sometimes game pieces are used which differ more or less in their artistic and valuable design, but also plastic chips of different colors or shapes which each represent a certain win value. While some games are only played by one player, e.g. Solitaire, others involve two players playing against each other, e.g. chess, and some even have several players who all participate in one round at the same time, such as with roulette. Board games may also be played by multiple players over the internet. In some board games, the game pieces or game chips must be placed on a certain number of predefined fields, as with chess, while other table games do not require fixed positions but also permit the selection of intermediate positions, such as on roulette tables on which jetons may also be placed on lines and intersections. It is often hard to determine onto which admissible or inadmissible position a game piece has actually been placed (see Figure 1). This is already difficult when playing locally, but when playing remotely via networks where the game table or board is located at the remote game partner s site and cannot be seen, this is even harder. It is very important in each instance to be able to clearly and consistently determine the actual position of each game piece: does the piece touch a line or does it partly lie on the line? Does the actual position correspond to the intended one? The determination of the actual position prior to the round beginning is important for the players and the game master in order to be able to verify whether the game piece has been placed on the position onto which it was supposed and is allowed to be placed, and following the round, it is important for the game master who then determines the result. Thus,

2 technical means are required which objectively and bindingly determine and reliably record where the game pieces or tokens are located on the game table or board. This requirement applies independently of whether the players are physically present or whether the game is played online, e.g. over the internet. Figure 1: Jetons on a Roulette Tableau 2 A common method applied in casinos is the use of video cameras employed to record the position of the placed jetons so that, when in doubt, the video recordings can be used to verify which player placed which jeton on which position and whether the position is within a field, on a line or probably even on the cross of two lines. This method may also be used for other board games which are, for example, played online and where the players are informed of the position of the other players game pieces by means of a video signal. However, the verification of video recordings always means an interruption of the game and the participants concentration on the game. Moreover, video recordings are often unclear and do not allow for objective decisions. One electronic method by which the position of the game pieces is determined in a wireless manner is known from the game escrabble das intelligente Brettspiel [escrabble the intelligent board game] [1]. This is an integrated circuit board laminated with a game board foil. The wireless transmission of information to identify the player, letter and game piece occurs via RFID at a frequency of MHz, the communication between the game board, casino and laptop occurs via a 2.4 GHz radio interface, see also RFID ortsgenau auslesen [Precise RFID position scanning] [2]. This means that each square is in principle provided with an RFID reader which wirelessly reads the identifier from the placed game piece. 2. Orthogonal Signal Technology The method described in this paper uses orthogonal code sequences transmitted simultaneously via a number of antennas. The technology of orthogonal code sequences is particularly commonly used in wireless transmission. Two signals x(t) and y(t) are orthogonal if their correlation is 0, i.e. if Φ(x(t), y(t)) = xt () ytdt () 0 (1)

3 Orthogonality means that the two signals are independent. In mobile radio communication, e.g. UMTS, these signals are used to simultaneously transmit the signals of different users. Each user is assigned a code sequence which is orthogonal to the code sequences of the other users. Each user spreads and links the data it wants to send to the code sequence assigned to it. If multiple users send data at the same time, this results in an aggregation of signals. Each user can then determine whether the composite signal contains data linked to its code sequence by correlating its code sequence with the composite signal and isolating it from the composite signal. Many textbooks refer to this technique as the CDMA (Code Division Multiple Access) method. The code sequences used are, for example, socalled Walsh codes or Gold codes [3],[4]. Compared to the above, the localization system for board games described here works far more simply as it does not involve spreading of user signals and multiplying with code sequences but only by emitting code sequences to be detected. The localization phase in which the game pieces detect their position is followed by a data phase in which they transmit their information to the controller Localization of Game Pieces by means of Orthogonal Code Sequences The localization of game pieces is carried out with antennas, with each antenna being assigned an orthogonal code sequence. A particular code sequence is only emitted via the assigned antenna. The antennas are spatially distributed, e.g. in a (Cartesian) coordinate system, in parallel or perpendicularly to each other. The number M of antennas chosen depends on the number and accuracy of the game piece positions to be detected and the antenna ranges. For example, the antennas may correspond to boundary lines defining the board or table squares if the transmission range of the antennas is half the width of an individual square. The transmission range of the antennas and the reception range of the receiving antennas in the game pieces are also adjusted accordingly. This is exemplified in Figure 2 for a section of a chess board and a roulette tableau. Each game piece or token contains a receiver, configured to simultaneously receive each of the M code sequences. In other words, the receiver receives the composite signal of several antennas within the range where it is located and then verifies which of the orthogonal code sequences have been received. Thus, the electronic circuit in the pawn on b2 receives the sequences 2, 3, 6 and 7 (Figure 2) and the jeton covering the numbers 32, 33, 35 and 36 receives the sequences 3 and 7. In the electronic circuit of a game piece, a table is stored in which a unique identifier is allocated to each of the M orthogonal code sequences. Based on the identifiers, the electronic circuit in the game piece can derive the position of the piece relative to the M antennas as the identifiers are each assigned to one of the code sequences and therefore to one of the antennas. This means that the game piece position is not determined externally but by the game piece itself. The position detected by the game piece, or the antenna identifiers whose code sequences have been identified, is transmitted via a radio interface, e.g. an RFID, NFC (Near Field Communication), Bluetooth interface or an infrared transmitter.

4 4 Figure 2: Examples of Positions of Game Pieces This information can be transmitted via the same antennas via which the code sequences have been emitted. In this case, localization phases and data transmission phases alternate. The simultaneous reading of the positions of multiple game pieces is facilitated by MAC (Media Access Control) protocols such as those used for reading RFIDs (multi-tag protocols) [5]. If the localization phases are not to be interrupted by the reading phases, e.g. with mobile game pieces or very quick operations, both processes can also take place simultaneously. In order to achieve this, an additional reception system is required for the information emitted by the game pieces, e.g. use of a second frequency band.

5 If, in the future, games are played three-dimensionally, the antennas and game pieces may also be arranged three-dimensionally. Power can be supplied to the electronic circuits of the game pieces by means of induction via the same antennas used to emit the code sequences or, alternatively, of course also via a separate inductive power supply system, e.g. antennas or a power supply layer in the game table. The game pieces would then be considered passive. The game pieces can also be equipped with capacitors or batteries to temporarily store energy, in which case the game pieces are referred to as semi-active Localization System for Roulette Tables The localization method will be described using the roulette table as an example. Figure 3: Transmission Antennas and Code Sequences Figure 3 shows the section of a roulette table in which 6 antennas are installed that mark the boundary lines between the individual squares. The antennas are configured as dipole antennas, their position defining a coordinate system, namely a Cartesian coordinate system. The antennas 3, 4 and 5 extend in the x-direction at the y-coordinates y = 0, y = 1 and y = 2, respectively, whereas the antennas 0, 1 and 2 are in parallel to the y-axis at the x-coordinates x = 0, x = 1 and x = 2, respectively. Each of the antennas is uniquely assigned to an orthogonal code sequence. More specifically, code sequence A is uniquely assigned to the antenna 0 at x = 0, code sequence B to the antenna 1 at x = 1,

6 code sequence C to the antenna 2 at x = 2, code sequence a to the antenna 3 at y = 0, code sequence b to the antenna 4 at y = 1 and code sequence c to the antenna 5 at y = 2. Underneath the game table, there is a transmitter which is connected to the antennas. The purpose of the transmitter is to simultaneously transmit the 6 code sequences during the localization phase. In this process, only the 6 code sequences are transmitted via the respective antennas assigned to the code sequences, i.e. no other useful information is transmitted in addition to the code sequences. Proven RFID technology can be used for the communication between the transmitter via the antennas and the game pieces, i.e. standard modules for RFID readers and RFID tags in the game pieces. In this case, the code sequences are correspondingly encoded and modulated. The RFID technology also ensures that the pieces are supplied with power for the communication [6],[7]. For example, if the game piece receives code sequence a, it is allocated to identifier a by table 1. The same applies to the other code sequences. The game piece can receive all code sequences simultaneously which means that it receives a composite signal resulting from the superimposition of the code sequences emitted by the antennas in the reception range in which the game piece is located. Depending on the position, one, two or more code sequences are simultaneously received via the receiving antenna of the game piece. The electronic circuit determines (by correlation with all admissible code sequences) which code sequences are contained in the received composite signal. The game piece determines the coordinates of the transmitting antennas; and from these its own position, by means of an allocation table. Table 1: Allocation Table Identifier of the Code Sequence Coordinate of the Antenna A x = 0 B x = 1 C x = 2 A y = 0 B y = 1 C y = 2 6 The game piece now knows in which antenna ranges it is located. For example, if the antennas run in parallel at distance A, the range of each antenna would be adjusted to A/2. If the game piece is located at the intersecting point of antennas 1 and 4, i.e. only in the range of these two antennas, as shown in Figure 3, it therefore only receives the code sequences emitted by these two antennas, namely code sequences b and B. The game piece then saves the identifiers of the received code sequences, i.e. 1 and 4, completing the localization phase. In the subsequent reading phase, the game table computer uses the RFID reader to read the storage contents of the game pieces, meaning that, with respect to Figure 4, the identifiers 1 and 4 are received. The program in the game table computer also includes allocation tables and determines the coordinates of the identifiers. For identifier 1, this yields the x-position x = 1, and for identifier 4, the y-position y = 1, at the same time yielding the coordinates and thus the game piece position in the coordinate system defined by the antennas, namely the coordinates x = 1 and y = 1. The game pieces could also perform the localization themselves and transmit the determined coordinates directly in the reading phase.

7 The game piece position detected by the game table computer can then be issued via a user interface, network connection, stored and shown on a display. The localization phase can be performed simultaneously for all game pieces and the reading phase may be quasi-simultaneous as there are anticollision procedures for simultaneous reading of RFIDs [5]. 7 Examples Figure 4 shows, as an example, antennas a and b with their intersecting area of the respective ranges R illustrated as shaded areas. Here, the range R can be significantly smaller than the distance A between the antennas (cf., e.g., Fig. 3) such that the position of the object can only be determined if the object is in the immediate vicinity of or above one of the antennas. Note: in the following, no differentiation is made between the designation of the antenna and the identifier of the assigned code sequence, e.g. antenna a corresponds to identifier a. Figure 4: Intersection of 2 Antennas Figure 5 shows the intersecting area of antennas a and b if a code sequence a is transmitted via antenna a and a code sequence b via antenna b. If the game piece is located in the intersecting area between antennas a and b, it identifies the identifiers a and b. Depending on the position, it may also only transmit identifier a or b or no identifier at all if it is outside of the antennas reception area. Figure 5: Jetons in the Intersection Area of 2 Antennas

8 Figure 6 shows a corresponding illustration for four antennas, e.g. antennas a, b, c and d, with the parallel antennas having the distance A between each other. The antenna ranges R are indicated in Figure 6 as shaded areas: here, each range R is A/2. Figure 6: Overlapping areas of 4 Antennas 8 The possibilities for unique position detections resulting from Figure 6 are shown in Figure 7. For example, if the game piece is located at the intersecting point of antennas a and d, it receives the code sequences with the identifiers a and d. If the game piece is located over antenna d, i.e. between antennas a and b, it receives the code sequences of antennas a and b between which the game piece has been placed in addition to the code sequence d. The illustrated area can be part of a game board or table, e.g. of a roulette tableau. Figure 7: Possible Positions exploiting 4 Antennas If the game piece is located at the center, it is within the range of all antennas a, b, c, d and therefore receives the code sequences with the identifiers a, b, c and d.

9 As can be seen from Figure 7, the game piece thus receives a characteristic combination of identifiers at each of the nine different positions shown, from which the position can be derived. In contrast to Figure 7, Figure 8 shows an additional antenna per coordinate direction. In the case of the design form being considered here, the code sequences a, e, b and c, f, d are transmitted via antennas a, e, b and c, f, d, respectively. The position-dependent combinations of code sequences which can be received by a game piece are shown in Figure 8 for the selected section. Figure 8: Positions using 6 Antennas 9 The above examples only use 2 or 3 parallel antennas per direction and therefore only encompass up to 9 squares. However, a chess board or roulette table consists of many more squares and lines defining those squares. The concept illustrated could therefore be generalized according to the requirements. A corresponding number of antennas and different code sequences would then be required. However, a more effective solution for larger game boards or tables is to group n transmitting antennas (Figure 9). In the y-direction, there are four equidistant parallel antennas emitting code sequences with the identifiers a, b, c and d, respectively. In the x-direction, there are a number of n equidistant parallel antennas transmitting code sequences with the identifiers 1, 2, n. Figure 9: Grouping of Antennas

10 This allocation of code sequences to antennas is repeated per group of antennas extending in the x- direction pursuant to a predetermined spatial pattern as shown in Figure 9. Despite this repetition of code sequences, clear position detection is still possible if the group affiliation is known and the antenna ranges are limited. Also with respect to adjacent antennas of two groups placed next to each other and extending in the x-direction, here the antenna used to transmit code sequence n and the antenna used to transmit code sequence 1, unique position detection is possible as the same sequence from 1 to n has always been chosen in the individual groups regarding the spatial allocation to the antennas of a group. The repetition of groups of antennas may also be applied in the x-direction; but with a roulette tableau, repetition in the y-direction is sufficient (Figure 9). In the localization phase, the N groups may, for example, be selected one after the other in a fixed predefined order to transmit the relevant code sequences. Figure 10 shows a further development of Figure 9 in which the number of antennas has been increased in both the x- and the y-direction in order to enlarge the areas or improve the precision of the position detection. Figure 10: More Positions by Group Sampling 10 Figure 11 illustrates the possibility to use patch antennas for the antennas used to transmit the code sequences. A particular code sequence with an allocated identifier from 1 to 25 is emitted via each of the patch antennas.

11 11 Figure 11: Positioning by Patch Antennas x Figure 12 shows the various positioning options resulting from the superimposition of the emitted code sequences. Figure 12: Positions using Patch Antennas The patch antennas may also be grouped. In this case, the signal distribution ranges need to be taken into account with respect to the repeat distances of the codes in order to avoid superimpositions of two transmissions of the same code by two antennas. In order to increase accuracy even further, panel antennas with several patch antennas on their surface may be used instead of patch antennas. The selection of the antenna type to be used depends on the frequency range (the side length of a patch antenna is typically defined as, wherein is the wavelength), the distances and the accuracy requirements.

12 12 7. Online Gaming and Social Network Gaming The methods presented above are also suitable for board games played online or in social networks. The boards are then not only shown electronically on displays on which the game pieces are also moved electronically but exist in reality, with the real game pieces being moved by hand. Traditional games played on real game boards are combined with new electronic methods in order to make these games even more secure and to be able to play them remotely. This will open up new dimensions for games bound to playing surfaces. 8. Security Aspects The authenticity and integrity of the position data transmitted by the electronic game pieces are particularly important. It must be ensured that they actually originate from the indicated game pieces and cannot be modified. The information must be trustworthy and verifiable. This does not only apply for the moment of position detection but also for transmission and archiving. Moreover, the security functions are particularly important for online and social network gaming. In order to achieve this security, cryptographic and security features must be used which are known from literature, e.g. digital signatures [8][9] or message authentication codes (MAC) [10] or, as an option, encryption for online games [11]. 9. Conclusion and Future Work Further practical studies will have to be conducted, particularly with respect to antenna tuning and design. Moreover, instructions need to be drawn up as to how the signal strength of the transmitting antennas, the reception range of the receiving antennas and the distances between transmitting antennas are to be coordinated with each other in order for each position on the game board or table to be clearly identified. It would also be interesting to test the technology described with a game in which the game pieces are arranged three-dimensionally. References [1] (accessed on ) [2] (accessed on ) [3] J.-R. Ohm, H.D. Lüke, Signalübertragung, Springer-Verlag: Berlin-Heidelberg, Germany, 2002 [4] K. David, T. Benkner, Digitale Mobilfunksysteme, B.G. Teubner: Stuttgart, Germany,1996 [5] K. Finkenzeller, RFID Handbuch, Carl Hanser Verlag: München, Germany, 2008 [6] ISO/IEC 14443: Identification Cards Proximity integrated circuit cards [7] ISO/IEC 15693: Identification Cards Contactless Integrated Circuit Cards Vicinity Cards [8] ISO/IEC 14888: Information Technology Security Techniques Digital Signatures with Appendix [9] ISO/IEC 9796: Information Technology Security Techniques Digital Signatures giving Recovery [10] ISO/IEC 9797: Information Technology Security Techniques Message Authentication Codes [11] ISO/IEC 18033: Information Technology Security Techniques Encryption Algorithms

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

Security in Near Field Communication (NFC)

Security in Near Field Communication (NFC) Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria ernst.haselsteiner@philips.com klemens.breitfuss@philips.com

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

RFID Design Principles

RFID Design Principles RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison

More information

Spectrum and Power Measurements Using the E6474A Wireless Network Optimization Platform

Spectrum and Power Measurements Using the E6474A Wireless Network Optimization Platform Application Note Spectrum and Power Measurements Using the E6474A Wireless Network Optimization Platform By: Richard Komar Introduction With the rapid development of wireless technologies, it has become

More information

RFID Penetration Tests when the truth is stranger than fiction

RFID Penetration Tests when the truth is stranger than fiction RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon

More information

CHAPTER 1 Introduction 1

CHAPTER 1 Introduction 1 Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation

More information

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro miguel-angel_guijarro@agilent.com 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What

More information

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular

More information

GaAs Switch ICs for Cellular Phone Antenna Impedance Matching

GaAs Switch ICs for Cellular Phone Antenna Impedance Matching GaAs Switch ICs for Cellular Phone Antenna Impedance Matching IWATA Naotaka, FUJITA Masanori Abstract Recently cellular phones have been advancing toward multi-band and multi-mode phones and many of them

More information

SPYTEC 3000 The system for GSM communication monitoring

SPYTEC 3000 The system for GSM communication monitoring SPYTEC 3000 The system for GSM communication monitoring The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption

More information

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4

THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4 CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY

More information

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings Are You Missing Out On Huge Savings through Better Asset Management? Many schools around the country have implemented wireless networking

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

Revision of Lecture Eighteen

Revision of Lecture Eighteen Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Mobile and Contactless Payment Security

Mobile and Contactless Payment Security Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.

More information

RFID Design Principles

RFID Design Principles RFID Design Principles Second Edition Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents CHAPTER 1 Introduction CHAPTER 2 Short-Range Communications Systems 2.1 Radio-Frequency Spectrum

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

Planning for 802.11ac Adoption with Ekahau Site Survey 6.0

Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 Planning for 802.11ac Adoption with Ekahau Site Survey 6.0 1 P a g e w w w. e k a h a u. c o m / e s s Introduction to 802.11ac The emerging next generation Wi-Fi standard IEEE 802.11ac aims to break the

More information

RFID Receiver Antenna Project for 13.56 Mhz Band

RFID Receiver Antenna Project for 13.56 Mhz Band RFID Receiver Antenna Project for 13.56 Mhz Band Fatih Eken TE 401 Microwave Course Term Project, Fall 2004 Supervised by Asst. Prof. İbrahim Tekin Telecommunication Program in Faculty of Engineering and

More information

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN)

Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) FHSS vs. DSSS page 1 of 16 Frequency Hopping Spread Spectrum (FHSS) vs. Direct Sequence Spread Spectrum (DSSS) in Broadband Wireless Access (BWA) and Wireless LAN (WLAN) by Sorin M. SCHWARTZ Scope In 1997

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)

Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) COMPATIBILITY BETWEEN INDUCTIVE LF AND HF RFID TRANSPONDER AND OTHER RADIO

More information

Chip Card & Security ICs Mifare NRG SLE 66R35

Chip Card & Security ICs Mifare NRG SLE 66R35 Chip Card & Security ICs Mifare NRG Intelligent 1 Kbyte Memory Chip with Interface for Contactless Transmission according to the Mifare -System Short Product Information April 2007 Short Product Information

More information

Review Paper for Broadband CPW-Fed T-Shape Slot Antenna

Review Paper for Broadband CPW-Fed T-Shape Slot Antenna Review Paper for Broadband CPW-Fed T-Shape Slot Antenna Shahpure Sana 1, Bharate Rajashri 2, Prof. Jadhav D.A. 3 1,2 BE, Dept. of E&TC, Brahmdevdada Mane Institute of Technology, Dist. Solapur (Maharashtra)

More information

Synthetic Sensing: Proximity / Distance Sensors

Synthetic Sensing: Proximity / Distance Sensors Synthetic Sensing: Proximity / Distance Sensors MediaRobotics Lab, February 2010 Proximity detection is dependent on the object of interest. One size does not fit all For non-contact distance measurement,

More information

Antenna Diversity in Wireless Local Area Network Devices

Antenna Diversity in Wireless Local Area Network Devices Antenna Diversity in Wireless Local Area Network Devices Frank M. Caimi, Ph.D. Kerry L. Greer Jason M. Hendler January 2002 Introduction Antenna diversity has been used in wireless communication systems

More information

Mobile Communications TCS 455

Mobile Communications TCS 455 Mobile Communications TCS 455 Dr. Prapun Suksompong prapun@siit.tu.ac.th Lecture 26 1 Office Hours: BKD 3601-7 Tuesday 14:00-16:00 Thursday 9:30-11:30 Announcements Read the following from the SIIT online

More information

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS

IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,

More information

Linksys WAP300N. User Guide

Linksys WAP300N. User Guide User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating

More information

VJ 6040 Mobile Digital TV UHF Antenna Evaluation Board

VJ 6040 Mobile Digital TV UHF Antenna Evaluation Board VISHAY VITRAMON Multilayer Chip Capacitors Application Note GENERAL is a multilayer ceramic chip antenna designed for receiving mobile digital TV transmissions in the UHF band. The target application for

More information

Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide

Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide The specific patents that cover Crestron products are listed at patents.crestron.com. Crestron, the Crestron logo,

More information

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you

More information

Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas

Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas WWW.ABRACON.COM ANFCA Series Flexible Peel & Stick NFC Antennas Purpose To introduce ANFCA Series, Flexible Peel & Stick NFC

More information

Gemalto Mifare 1K Datasheet

Gemalto Mifare 1K Datasheet Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4

More information

Supplement to Gaming Machine Technical Standards Consultation

Supplement to Gaming Machine Technical Standards Consultation Supplement to Gaming Machine Technical Standards Consultation Downloadable, Wireless and Cashless Gaming Machine Systems Consultation paper, September 2006 Introduction 1. This paper is a supplement to

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In

More information

Wireless Medical Telemetry Laboratory

Wireless Medical Telemetry Laboratory Wireless Medical Telemetry Laboratory 0 Introduction The development of wireless medical telemetry has become an increasingly popular application in recent years. As the elderly population continues to

More information

Using ISO 15693 Compliant RFID Tags in an Inventory Control System

Using ISO 15693 Compliant RFID Tags in an Inventory Control System Using ISO 15693 Compliant RFID Tags in an Inventory Control System University: Louisiana State University, Baton Rouge, Louisiana Course: Undergraduate Capstone Project Student Team Members: Joseph Gates,

More information

OI-TECH Asset Management

OI-TECH Asset Management OI-TECH Asset Management Service Today with the Solutions for Tomorrow www.oi-tech.com OI Tech Asset Management RFID Technology - Overview RFID (Radio Frequency Identification) is a technology for identifying

More information

Efficient Asset Tracking: From Manual to Automated

Efficient Asset Tracking: From Manual to Automated White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

Interference Analysis

Interference Analysis Application Note Interference Analysis JD7105A Base Station Analyzer / JD7106A RF Analyzer Introduction This document presents an overview of signal interference in RF wireless networks as well as a brief

More information

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Embedded RF ABSTRACT This application report describes

More information

50 ways to break RFID privacy

50 ways to break RFID privacy 50 ways to break RFID privacy Ton van Deursen 1 University of Luxembourg ton.vandeursen@uni.lu 1 Financial support received from the Fonds National de la Recherche (Luxembourg). RFID privacy 1 / 40 Outline

More information

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

Flexible PCB Antenna with Cable Integration Application Note Version 2

Flexible PCB Antenna with Cable Integration Application Note Version 2 Flexible PCB Antenna with Cable Integration Application Note Version 2 CONTENTS 1. BASICS 2. APPLICATIONS 3. SIZE 4. SHAPE 5. GROUND PLANE SIZE 6. IMPEDANCE 7. BANDWIDTH 8. VSWR 9. GAIN 10. EFFICIENCY

More information

Fig 1 Death rate in the last four years

Fig 1 Death rate in the last four years Accident Prevention via Bluetooth Jyotika Kapur Abstract-In India there has been an increase of 17.4% in the total number of road accidents during the period of 2011-2012.This percentage has raised eyebrows

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

How To Attack A Key Card With A Keycard With A Car Key (For A Car) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

Instructions for - Installation of Satellite Channels

Instructions for - Installation of Satellite Channels ENGLISH Instructions for - Installation of Satellite Channels Updated: March 2011 Experience Reality AQUOS LCD-TVs Spring/Summer 2011 Page - 1 - LE820 - LE822 - LE814 - LE824 - LE914 - LE925 Contents:

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Interference Identification Guide. Table of Contents

Interference Identification Guide. Table of Contents Interference Identification Guide This document is a guide to help IT professionals optimize the performance of wireless networks by using spectrum analysis tools to identify sources of wireless interference.

More information

A Note on the Relay Attacks on e-passports

A Note on the Relay Attacks on e-passports A Note on the Relay Attacks on e-passports The Case of Czech e-passports Martin Hlaváč 1 and Tomáš Rosa 1,2 hlavm1am@artax.karlin.mff.cuni.cz and trosa@ebanka.cz 1 Department of Algebra, Charles University

More information

White Paper. An Analysis of Active RFID for Asset Tracking

White Paper. An Analysis of Active RFID for Asset Tracking White Paper An Analysis of Active RFID for Asset Tracking January 2010 Description of RFID Radio frequency identification (RFID) technology uses radio waves to identify objects. A radio transmitter is

More information

How To Design An Ism Band Antenna For 915Mhz/2.4Ghz Ism Bands On A Pbbb (Bcm) Board

How To Design An Ism Band Antenna For 915Mhz/2.4Ghz Ism Bands On A Pbbb (Bcm) Board APPLICATION NOTE Features AT09567: ISM Band PCB Antenna Reference Design Atmel Wireless Compact PCB antennas for 915MHz and 2.4GHz ISM bands Easy to integrate Altium design files and gerber files Return

More information

COFDM Transmission systems

COFDM Transmission systems COFDM Transmission systems www.vtq.de COFDM Radio Communication Appliance O.R.C.A - Trade Show Highlights Probably the fastest¹ COFDM video transmitter world s The brand new generation of O.R.C.A transmitters

More information

Identification and tracking of persons using RFID-tagged items

Identification and tracking of persons using RFID-tagged items Page 1 of 9 Identification and tracking of persons using RFID-tagged items Abstract ( 1 of 1 ) United States Patent Application 20020165758 Kind Code A1 Hind, John R. ; et al. November 7, 2002 A method

More information

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,

More information

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS

SECTION 2 TECHNICAL DESCRIPTION OF BPL SYSTEMS SECTION 2 TECHNICAL DESCRIPTION OF SYSTEMS 2.1 INTRODUCTION Access equipment consists of injectors (also known as concentrators), repeaters, and extractors. injectors are tied to the backbone via fiber

More information

Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract

Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract This talk presents a brief overview of the ultra-wideband (UWB) RFID system with emphasis on the performance evaluation

More information

ACRS 2.0 User Manual 1

ACRS 2.0 User Manual 1 ACRS 2.0 User Manual 1 FCC Regulatory Information This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference,

More information

Annex to the joint statement: Exposure of the general public to radiofrequency fields

Annex to the joint statement: Exposure of the general public to radiofrequency fields 16 November 2009 Annex to the joint statement: Exposure of the general public to radiofrequency fields 1. Introduction This document presents typical exposure of the general public to radiofrequency (RF)

More information

Radio Frequency Exposure Test Report

Radio Frequency Exposure Test Report Radio Frequency Exposure EN 62311 January 2008 Assessment of electronic and electrical equipment related to human exposure restrictions for electromagnetic fields (0Hz 300GHz) (IEC 62311:2007, modified)

More information

communication over wireless link handling mobile user who changes point of attachment to network

communication over wireless link handling mobile user who changes point of attachment to network Wireless Networks Background: # wireless (mobile) phone subscribers now exceeds # wired phone subscribers! computer nets: laptops, palmtops, PDAs, Internet-enabled phone promise anytime untethered Internet

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Wireless Phone Systems for your Organisation

Wireless Phone Systems for your Organisation Wireless Phone Systems for your Organisation A Plantronics White Paper An Evaluation of the Plantronics CS60 Micro Wireless Headset System Plantronics, Inc. All rights reserved Page 1 of 9 Overview Decision

More information

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse

Cellular Network Organization. Cellular Wireless Networks. Approaches to Cope with Increasing Capacity. Frequency Reuse Cellular Network Organization Cellular Wireless Networks Use multiple low-power transmitters (100 W or less) Areas divided into cells Each served by its own antenna Served by base station consisting of

More information

ENERGY HARVESTED ELECTRONIC SHELF LABEL

ENERGY HARVESTED ELECTRONIC SHELF LABEL ENERGY HARVESTED ELECTRONIC SHELF LABEL Ranajay Mallik, Jitendra Jain, Neha Kochhar, STMicroelectronics - IMS Systems Lab and Technical Marketing Abstract: This article explains the concept of electronic

More information

Why Has the Development in RFID Technology Made Asset Management More Urgent?

Why Has the Development in RFID Technology Made Asset Management More Urgent? E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,

More information

Improving SCADA Operations Using Wireless Instrumentation

Improving SCADA Operations Using Wireless Instrumentation Improving SCADA Operations Using Wireless Instrumentation April 2010 / White paper by Hany Fouda Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 The Evolution of Wireless...

More information

Critical Product Information: VodeOX EMR Protection

Critical Product Information: VodeOX EMR Protection Critical Product Information: VodeOX EMR Protection New Improved EMR Protection for Cellphones, Tablets, ipads, Laptops, and any Electronic Screen/Monitor. Protect yourself from potentially harmful ElectroMagnetic

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

Hybrid system and new business model

Hybrid system and new business model Hybrid system and new business model July 2014 Jérôme DAVID - Strategic Marketing Manager The explosion of data traffic over telecom networks is changing both business rules and network deployment methods

More information

AN2866 Application note

AN2866 Application note Application note How to design a 13.56 MHz customized tag antenna Introduction RFID (radio-frequency identification) tags extract all of their power from the reader s field. The tags and reader s antennas

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Rules for the IEEE Very Small Competition Version 1.0

Rules for the IEEE Very Small Competition Version 1.0 7th LATIN AMERICAN IEEE STUDENT ROBOTICS COMPETITION Joint with JRI 2008 (Brazilian Intelligent Robotic Journey) and SBIA 2008 (19 th Brazilian Symposium on Artificial Intelligence) Rules for the IEEE

More information

Security & Chip Card ICs SLE 44R35S / Mifare

Security & Chip Card ICs SLE 44R35S / Mifare Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info

More information

How To Hack An Rdi Credit Card

How To Hack An Rdi Credit Card RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu

More information

Application Note AN-00126

Application Note AN-00126 Considerations for Operation within the 902-928MHz Band Application Note AN-00126 Introduction This application note is designed to give the reader a basic understanding of the legal and technical considerations

More information

Concierge. Outdoor panels

Concierge. Outdoor panels www.bas- ip.com BAS- IP Intercoms Price Feb 24, 2015 Model Photo Description Retail price, USD Concierge AM- 01 Concierge monitor 9" touch screen, memory (SD cards up to 32 GB), address video intercom.

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Lecture 17: 802.11 Wireless Networking"

Lecture 17: 802.11 Wireless Networking Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion

More information

White Paper: Microcells A Solution to the Data Traffic Growth in 3G Networks?

White Paper: Microcells A Solution to the Data Traffic Growth in 3G Networks? White Paper: Microcells A Solution to the Data Traffic Growth in 3G Networks? By Peter Gould, Consulting Services Director, Multiple Access Communications Limited www.macltd.com May 2010 Microcells were

More information

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Published 10/29/2012 I ndustries are facing fierce market competition, making more data about

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

How To Get A Power Station To Work With A Power Generator Without A Substation

How To Get A Power Station To Work With A Power Generator Without A Substation Wi-Fi Protected Access for Protection and Automation Key Material Authentication Key Presented to: 13 December 2006 Dennis K. Holstein on behalf of CIGRE B5.22 1 The good news and the bad news Who is CIGRE

More information

Secure Automatic Ticketing System

Secure Automatic Ticketing System Secure Automatic Ticketing System MARIUS POPA, CRISTIAN TOMA Department of Computer Science in Economics Academy of Economic Studies Bucharest Romana Square, No. 6, Bucharest ROMANIA marius.popa@ase.ro

More information

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications Patrick McCurdy Product Marketing Manager Phoenix Contact Inc. pmccurdy@phoenixcon.com Ira Sharp Product Specialist Phoenix

More information

The What, Who and Why of Contactless Payments

The What, Who and Why of Contactless Payments The What, Who and Why of Contactless Payments Introduction The mass market introduction of contactless technology is an important event for the payments industry. Contactless payments are already providing

More information

Multiple Access Techniques

Multiple Access Techniques Chapter 8 Multiple Access Techniques Multiple access techniques are used to allow a large number of mobile users to share the allocated spectrum in the most efficient manner. As the spectrum is limited,

More information

Chapter 3: Spread Spectrum Technologies

Chapter 3: Spread Spectrum Technologies Chapter 3: Spread Spectrum Technologies Overview Comprehend the differences between, and explain the different types of spread spectrum technologies and how they relate to the IEEE 802.11 standard's PHY

More information

AC 1200. Wi-Fi Range Extender RE355. Highlights. Description

AC 1200. Wi-Fi Range Extender RE355. Highlights. Description AC 1200 Wi-Fi Range Extender Highlights Superfast Wi-Fi Expanded 300Mbps on 2.4GHz + 867Mbps on 5GHz totals 1200Mbps Wi-Fi speeds Maximum Range Three adjustable external antennas provide optimal Wi-Fi

More information