RFID Privacy & Security Implementation - Recent topics & Applications in Japan -
|
|
- Gerard Jennings
- 8 years ago
- Views:
Transcription
1 RFID Privacy & Security Implementation - Recent topics & Applications in Japan RYUICHI HATTORI Hitachi, Ltd. Japan Security & Smart ID Solutions Division
2 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Toward the Standardization 6. Summary
3 1-1. Corporate Profile of Hitachi., Ltd. Net Sales: 11,227 Billion Yen (US $ Billion) Total Assets: 10,530 Billion Yen (US $ Billion) Total Employees: 389,752 Number of Subsidiaries: 910 Companies Fortune Global th (2007 Sales in Global Electronics, Electrical Equipment and Computer Industries) Stock Exchange Listings: New York, Amsterdam, Frankfurt, Luxembourg, Paris, Tokyo, Osaka, Nagoya, Fukuoka, Sapporo (As of March 31, 2008) Takashi Kawamura President and Chief Executive Officer Founder s Original Motor Repair Shop, Ibaraki Japan
4 1-2. Hitachi Business Field Information & Telecommunication Systems 22 Financial Services 3 10 FY2007:Ended March 31, 2008 Electronic 10 Devices Sales $112.3 billion 15 Logistics, Services High Functional Materials & &Others Components 28 Power & Industrial Systems 12 Digital Media & Consumer Products 3
5 1-3. Information & Telecommunication Systems Value to Life Value to UbiquitousSociety Information Society Value to Society Consultation Collaboration of New Value for Ubiquitous Information Society with Customers Management Consultation Business Consultation IT Consultation SI/Solution Manufacturing Retail Power/ Transportation Network Bank SI, Outsourcing, Education, Operation, Maintenance Government/ Local Government IT Platform Server Storage Network Middleware Ubiquitous Devices Advanced Technology RFID Security HDD Integration/ Virtualization System Technology 4
6 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Toward the Standardization 6. Summary
7 Ubiquitous RFID Applications 2-1. People expect secure & easy access to Network System from anywhere and anytime Car/Railway Mobile Office SD MMC SIM SD MMC Personal Information DVC STB Intranet Information Internet of Things Game Machine Digital contents Map Information E-Tower TV PC SD MMC Audio DVD Telephone IC Card Home Outdoor Street/Shop 6
8 2-2. EU Recommendations for RFID Privacy European Commission Issues RFID Privacy Recommendations The document, which spells out ways to protect consumers but also allows for flexibility, should help promote greater implementation of RFID technology. May 13, 2009 Industry and consumer organizations around Europe welcomed an official "recommendation on the implementation of privacy and data protection principles in applications supported by radio-frequency identification." Issued this week by the European Commission (EC), the document outlines data privacy objectives suggested for use in the organization's 27 member states. Referenced from RFID Journal 7
9 2-3. RFID Privacy Law in US Washington State Adopts Second RFID Privacy Law The bill, newly signed by the governor, prohibits scanning RFID tags unless they were provided by the business or agency itself. Apr. 17, 2009 Washington State Governor Christine Gregoire has signed into law a bill prohibiting the scanning of an RFID tag by anyone except the business or agency that issued that tag, with certain exceptions. Referenced from RFID Journal 8
10 2-4. An Unscientific Article on RFID and Privacy A renowned U.S. magazine has published an article by a well-known opponent of RFID that presents a one-sided view of the privacy and security issues associated with RFID. Aug. 25, 2008 Scientific American by Katherine Albrecht, founder of Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN). The article, included in an issue of the magazine entitled The Future of Privacy, raises some legitimate issues. Referenced from RFID Journal 9
11 2-5. RFID Privacy Guideline in APAC In Japan, the Ministry of Internal Affairs and Communications (MIC) and the Ministry of Economy, Trade and Industry (METI) have issued a non-binding RFID Privacy Guideline based on the national data protection law. In South Korea, the Ministry of Information and Communication has put forward a similar guideline, which would also be non-binding (see OECD 2006). Referenced from RFID Prospectives for Germany 10
12 2-6. RFID Privacy & Security RFID Privacy & Security Related Topics European Commission Issues New RFID Privacy Recommendations US RFID Privacy Law &Anti-Skimming Law CASPIAN RFID Privacy Guideline in Japan & Korea Common Concern against RFID Privacy & Security from Consumer s Point of View. Urgent Requirement to Provide Solution for the Issue in order to Realize Broad Acceptance of RFID Technology Privacy Protection & Data Security Standard may be Needed 11
13 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Toward the Standardization 6. Conclusion
14 3-1. Hitachi RFID Secure Approach µ-chip series MHz (UHF) µ-chip Hibiki 2.45GHz µ-chip µ-chip Hibiki µ-chip ISO/IEC Type C (EPCglobal Gen2) Security - Privacy protection - Industrial memory area protection Hitachi proprietary protocol ROM & Unique ID Network Based µ-chip and the µ-chip Logo are either registered Trademarks or Trademarks of Hitachi,Ltd.in Japan and in other countries. 13
15 3-2. HIBIKI and Secure RFID Project Target 実 施 体 制 Hibiki Project Secure RFID Project ( Aug 2004 ~July 2006) ( Aug 2006 ~Mar 2007 ) Inexpensive RFID RFID (5-yen (5-yen inlay inlay : : <5cent,100Munit/month) <5cent,100Munit/month) Stable Stable Suply Suply (Volume (Volume of of Production, Production, High High Reliability) Reliability) Formation Apply Apply to to global global business (Global (Global Standard) Standard) Core Company Background Requirement for RFID Privacy and Security from Field Studies Outline RFID apply for Manufacture ~ Logistics ~ Retail ~Recycle Cooperate Company YAGI IBM Retail Recycle Logistics Manufacture Privacy Protection Corporate Data Protection 14
16 3-3. µ-chip HIBIKI Secure Features #1 Global Standard Compliant with EPC Global C1Gen2 / ISO/IEC #2 Large Size Memory Total of 2,112bit Memory Tag Memory Map Reserved bank (Security) 256bit UII bank 272bit TID bank 64 bit User Bank 1,536 bit #3 Security Feature Partitionable User Memory Bank Individual Read/Write Protection USER Area Manufactuere Logistics Wholesale Warehouse Retail Store Read Range Control 3m Selectable 30cm 15
17 3-4. HIBIKI Lightweight Security Concept Manufacture Data Security by password Logistics IC Tag User Bank Area Product Manufacture Logistics Retail Maintenance Retail Privacy Protection IC Tag Control Reading Distance Skimming Control Reading Distance for Privacy Protection customer Recycle Maintenance Lightweight Security enable secure use of RFID in the society and accelerate public acceptance of RFID for SCM/LCM 16
18 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Toward the Standardization 6. Conclusion
19 4-1. RFID Activities in Japanese Industry ~ ~ Consumer Electronics IC Tag Consortium SONY, Panasonic, Hitachi etc Guideline Standard Field Trial Maintenance Proof-of-Concept Field Trial Product Safety, Recycling Goal : Roll Out in 2010 Use Case Closed Loop application (Production Control, Warehouse Management) Roll Out 03/1 IC Tag Study Group Publishing Field Trial Smart Shelf Field Trials Recycle/Logistics Standard Specification of RFID tag for Books RFID in Comics Retail Logistics Future Store Use Case Food Crate Logistics Field Trial Shoes Shop Filed Trial Japan-China-Korea International Logistics Automotive Use Case Returnable Container Basic Study of RFID Usage JAPIA, JAMA Paint & Coating Process, Metal Mold Control, Pallet Control Roll Out 18
20 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Towards Standardization 6. Conclusion
21 5-1. Standardization Activity ISO29167 working group has started compiling DRAFT as security extension to the ISO Type C standard. Hitachi is proposing HIBIKI secure feature for SC31/WG7 activity ~ EPCglobal CE IAG Security Requirement Tag Alteration Hardware AG : Security Specification ISO SC31/WG7 (Security), WG4/SG3 (RFID Air Interface) NP WG7: Security HIBIKI Secure Proposal WG7 AdHoc WG7 Established ISO29167 DRAFT CD Vote FCD Vote FDIS Vote 20
22 1. About Hitachi s ICT 2. RFID Privacy & Security Issue 3. Secure RFID Project & µ-chip Hibiki An practical approach for light weight security 4. RFID Applications in Japan 5. Toward the Standardization 6. Conclusions
23 6-1. Summary RFID Privacy and Security related Activities in world European Commission Issues New RFID Privacy Recommendations US Several States Adopt RFID Privacy Law &Anti- Skimming CASPIAN RFID Privacy Guideline by METI & MIC Japan etc... Practical Approach Lightweight Security Network based Read-only RFID Secure RFID Protocol ISO Standardization kicked-off Application Needs Security International Logistics Consumer Electronics Publishing Industry Automotive Library etc... 22
24 6-2. Conclusion EU-Japan Cooperation RFID Privacy & Security Standardization HIBIKI Secure Protocol Practical Approach 23
25 Thank You!
26
27 Appendix
28 A-1. µ-chip HIBIKI Data Protection USER Bank Memory can be divided into 5 Blocks Each Block Support Block Read/Write Lock ( with Custom Command) Block1 Password USER Bank (total1,536bit) Individual Password Protection for each Memory Block Block5 Password Common Area (256bit) Block1 (256bit) Block2 (256bit) Block3 (256bit) Block4 (256bit) Block5 (256bit) Read lock Write lock Read/Write Lock for each Memory Block 27
29 A-2. Communication Distance Control Communication distance is Selectable with R/W Custom Command. ID:3F1001 3m Communication Distance Normal Read Range Reduce Communication distance Reactivate Short Range ID:3F cm 28
30 A-3. Example : Data Security Write Memory Bank #1 Write Memory Bank #2 Read Memory Bank #1 Read Memory Bank #2 Factory Logistics Wholesale Warehouse Retail Store Reduce Read Distance Consumer Retail Store 製 造 情 報 出 荷 情 報 Manufacturer s Password Memory Bank #1 Memory Bank #2 Memory Bank #3 Memory Bank #4 HIBIKI Memory Mapping Security Bank UII Code Bank Tag Code Bank Manufacturer s Data Area Logistics Data Area Wholesale Data Area Retailer s Data Area Read Dedicated Memory Read /Write Lock control for each memory block Anti-Counterfeit Read Manufacturer s data with provided Password for authentication Unauthorized Seller Data Security Preventing from data skimming by unauthorized seller or personnel 29
Cloud RFID UHF Gen 2
Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system
More informationRadio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
More informationEnabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
More informationTime & Access System An RFID based technology
Time & Access System An RFID based technology OpenWorks TIME Technical Specification V1.0.2 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA.
More informationEPCglobal RFID standards & regulations. Henri Barthel OECD Paris, 5 October 2005
EPCglobal RFID standards & regulations Henri Barthel OECD Paris, 5 October 2005 Roots of EPCglobal Auto ID Center (launched in 1999) Six world-class academia Labs: MIT (US), Cambridge (UK), Adelaide (Australia),
More informationRFIDs and European Policies
ICTSB Seminar on RFID Standardisation CEN/CENELEC Meeting Centre Brussels, Belgium RFIDs and European Policies Gérald SANTUCCI, Head of Unit gerald.santucci@ec.europa.eu European Commission Directorate
More informationPrivacy and Security in library RFID Issues, Practices and Architecture
Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library
More informationMETI s Program for Efficient Distribution and Logistics - focusing on the use of information technology -
METI s Program for Efficient Distribution and Logistics - focusing on the use of information technology - Distribution and Logistics Policy Division Ministry of Economy, Trade and Industry 1 Contents 1.
More information2012 ISO TC46/SC4/WG11 N246
RFID PRIVACY IN EUROPE Implications for Libraries Paul Chartier Convergent Software Ltd CILIP Conference, Nov 2012 ISO TC46/SC4/WG11 N246 Today s Presentation Broad Overview of the EU position A bit of
More informationRFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008
RFID Tags Prasanna Kulkarni Motorola ILT Workshop Smart Labels USA February 21, 2008 Agenda RFID tags Brief overview Roadmap of key attribute needs Existing tag technologies Emerging tag technologies Critical
More informationOn the Security of RFID
On the Security of RFID Hung-Min Sun Information Security Lab. Department of Computer Science National Tsing Hua University slide 1 What is RFID? Radio-Frequency Identification Tag Reference http://glossary.ippaper.com
More informationContactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
More informationA. Background. In this Communication we can read:
On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background
More informationNACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
More informationFOR IMMEDIATE RELEASE
FOR IMMEDIATE RELEASE Introducing "Operational Management Innovation Service", a Service that Improves the Utilization Rate of Factories, Plants, and Public Infrastructure Facilities, while also Achieving
More informationStore Logistics and Payment with Near Field Communication
with www.stolpan.com Store Logistics and Payment with Near Field Communication Hagenberg, Hagenberg, March March 20. 2007 20. 2007. Dr. László Kutor, Dr. BMF László Kutor, BMF 19/1 StoLPaN Project Summary
More informationGS1 EPCglobal Transportation and Logistics Phase 3 Pilot Program Completion PRESS RELEASE
GS1 EPCglobal Transportation and Logistics Phase 3 Pilot Program Completion PRESS RELEASE APRIL 2009 Press Release Transportation and Logistics 3 Pilot Program_V11 1 PRESS RELEASE Transportation and Logistics
More informationWHITE PAPER. ABCs of RFID
WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,
More informationInternet Trading System for Wholesale Flower Markets
JFE TECHNICAL REPORT No. 3 (July 2004) Internet Trading System for Wholesale Flower Markets HISHINUMA Eisuke *1 UJIFUKU Seiji *2 Abstract: JFE Engineering, a leading company in electronic auction systems
More informationUsing RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
More informationNP Collection Benefits RFID in Logistics and Stores. Markus Rosendahl, CEO of Senso Global
NP Collection Benefits RFID in Logistics and Stores Markus Rosendahl, CEO of Senso Global Company Background - Women's clothing brand founded in 1919 in Finland by Aino Rosendahl - Main market areas: Scandinavia,
More informationIT Platforms for Utilization of Big Data
Hitachi Review Vol. 63 (2014), No. 1 46 IT Platforms for Utilization of Big Yasutomo Yamamoto OVERVIEW: The growing momentum behind the utilization of big in social and corporate activity has created a
More informationManufacturing Control Systems {SCADA} Vulnerability and RFID Technologies
Manufacturing Control Systems {SCADA} Vulnerability and RFID Technologies DR. O. GEOFFREY EGEKWU and JIM RIDINGS Institute for Infrastructure and Information Assurance (IIIA) James Madison University Functions
More informationRoad to TSA Certification for Hitachi Explosive Trace Detector and Related Issues. Kazuo Takei, President & CEO Defense Systems Group, Hitachi, Ltd.
Road to TSA Certification for Hitachi Explosive Trace Detector and Related Issues Kazuo Takei, President & CEO Defense Systems Group, Hitachi, Ltd. Contents 1. Outline of Hitachi 2. Hitachi Physical Security
More informationAutomated Identification Technologies
Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT
More informationInstallation Guide: Agentry Device Clients SAP Mobile Platform 2.3
Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3 Windows DOCUMENT ID: DC01954-01-0230-01 LAST REVISED: February 2013 Copyright 2013 by SAP AG or an SAP affiliate company. All rights reserved.
More informationSecure System Solution and Security Technology
Secure System Solution and Security Technology Hitachi Review Vol. 47 (1998), No. 6 245 Chisato Konno, D.Sc. Mitsuhiro Tsunoda Yasushi Kuba Satoru Tezuka OVERVIEW: The and intranet systems are rapidly
More informationEPC C-1 G-2 / ISO 18000-6C RFID IC
EM MICROELECTRONIC - MARIN SA EPC C-1 G-2 / ISO 18000-6C RFID IC Description is a certified EPC TM Class-1 Generation-2 (Gen2) IC and compliant with ISO/IEC 18000-6:2010 Type C. Each chip is manufactured
More informationrf Technology to automate your BUsiness
Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,
More informationPRODUCT DATASHEET. Confidex Ironside Micro CONTENTS
Confidex 2010 1 (6) PRODUCT DATASHEET Confidex Ironside Micro CONTENTS 1. PRODUCT DESCRIPTION... 2 1.1 SPECIFICATION DATA... 2 1.2 DIMENSIONS... 2 1.3 ELECTRICAL PERFORMANCE... 3 1.4 RESISTANCE AGAINST
More informationICT. Overview. The Information and Communications Industry Japan s Largest Industry. Contribution to real GDP by industry (2010)
Overview The Information and Communications Industry Japan s Largest Industry The market size (real GDP) of Japan s information and communications (ICT) industry in 21 was 98.8 trillion yen. The ICT industry
More informationFOR IMMEDIATE RELEASE
FOR IMMEDIATE RELEASE Hitachi Group to Begin Sales of Transformation Support Services, Supporting Companies Fundamental Structural Reforms Provides expertise from the Hitachi Group s Hitachi Smart Transformation
More informationThe use of RFID technology in Asset Tracking is very similar to Asset Tracking using Bar Codes.
Introduction Fixed Asset Tracking has traditionally been a labour-intensive and paper based process while Radio Frequency Identification (RFID) has been reserved for the billing of traffic along toll-ways
More informationDocument and entity information
Document and entity information Company information Company information FASF member mark Mar 2016 Document name Filing date 2016-01-29 KITZ CORPORATIO Company name N Securities code 64980 URL http://www.kitz.co.jp
More informationDocument and entity information Mar 2015 Dec 2014
Company information Company information FASF member mark Document name Document and entity information Mar 2015 3 Filing date 20150205 Company name KONDOTEC INC. Stock exchange listings Tokyo Tokyo 1st
More informationEnhancing the Supply Chain with RFID
Enhancing the Supply Chain with RFID RFID has captured the attention of many leading companies today who are making significant investments of money and time to make this technology feasible in their operations.
More informationApplication of Tracking Technology to Access-control System
Hitachi Review Vol. 53 (2004),. 2 83 Application of Tracking Technology to Access-control System OVERVIEW: An access-control system that applies tracking technology to control the movement of people and
More informationThe Japanese Experience Countering Spam ITU TELECOM WORLD 2006
The Japanese Experience Countering Spam ITU TELECOM WORLD 2006 8th December 2006 Shuji Sakuraba Copyright 2006 Present condition of spam in Japan - I 2004 Media Sent to mobiles 66 % Sent to PCs 34 % 2005
More informationRFID Design Principles
RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison
More informationHistory of Information Systems Usage in Japan
History of Information Systems Usage in Japan Kiyoshi Murata Centre for Business Information Ethics School of Commerce Meiji University CIGREF Workshop Summary of the research project Two year research
More informationThe RFID Revolution: Your voice on the Challenges, Opportunities and Threats. Online Public Consultation Preliminary Overview of the Results
The RFID Revolution: Your voice on the Challenges, Opportunities and Threats Online Public Consultation Preliminary Overview of the Results 16 October 2006 Disclaimer: This document is a working document
More informationHitachi Releases SuperH Mobile Application Processor SH-Mobile for optimum processing of multimedia applications for next-generation mobile phone
Hitachi Releases SuperH Mobile Application Processor SH-Mobile for optimum processing of multimedia applications for next-generation mobile phone Enables smooth processing of multimedia applications for
More informationInnovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions
Innovative Wafer and Interconnect Technologies - Enabling High Volume Low Cost RFID Solutions Innovative Wafer & Interconnect Technologies Outline Low cost RFID Tags & Labels Standard applications and
More informationIBM Solution for Pharmaceutical Track & Trace
Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace The underlying problem: Complexity in the pharmaceutical supply chain At its core, the pharmaceutical industry is about
More informationWHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?
WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? TABLE OF CONTENTS What is RFID? 1 Will RFID replace Barcodes? 1 How does RFID work? 1 What is an RFID Tag? 3 What are Smart Labels? 4 Why use RFID? 5 Why
More informationData Protection Technical Guidance Radio Frequency Identification
Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology
More informationHow China promoting RFID use in logistics. Mr. Wenfeng Wang Senior engineer, IT research center of CESI
How China promoting RFID use in logistics Mr. Wenfeng Wang Senior engineer, IT research center of CESI What is the logistics? The process of planning, implementing, and controlling the efficient, effective
More informationSoftBank Technology Corp. Corporate Profile
SoftBank Technology Corp. Corporate Profile Last update : 2015/11/24 Harnessing the Power of Technology to Build a Brighter Future Information revolution, happiness for everyone The SoftBank group has
More informationJTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security
More information1. IT Industry / Where the Growth is
1. IT Industry / Where the Growth is Technology Stage: Current stage of technology evolution and business opportunities for Japan s IT industry Market Stage: The current market and growth outlook for Japan
More informationManaged Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs
Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs CHALLENGE Logistics networks across the world depend on millions of returnable transport items (RTIs) to keep goods
More informationRFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title
RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference
More informationTHE MOBlLE APP. REVOLUTlON. 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD
THE MOBlLE APP REVOLUTlON 8 STEPS TO BUlLDING MOBlLE APPS FAST ln THE CLOUD People use hand-held devices for everything from communicating and playing games to shopping and surfing the Internet. In fact,
More informationRFID Applications in the Healthcare and Pharmaceutical Industries
RFID Applications in the Healthcare and Pharmaceutical Industries White Paper Revolutionizing Asset Management and the Supply Chain Document Revision: 1.0 Release Date: February 7, 2005 Written by: Johnny
More informationWhy Has the Development in RFID Technology Made Asset Management More Urgent?
E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,
More informationCHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
More informationRFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark
April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for
More informationHow To Understand The Power Of An Freddi Tag (Rfid) System
Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive
More informationCommencement for Smart Community Project in Greater Manchester, UK
FOR IMMEDIATE RELEASE Commencement for Smart Community Project in Greater Manchester, UK Tokyo, March 13, 2014 Hitachi, Ltd. (TSE:6501/ Hitachi ), Daikin Industries, Ltd. (TSE:6367/ Daikin ), and Mizuho
More informationArchive Storage Technologies Supporting Information Lifecycle Management
Archive Storage Technologies Supporting Information Lifecycle Management V Noboru Osada V Kunihiko Kassai (Manuscript received September 16, 2005) A large amount of fixed content has been generated due
More informationKnowledge Emergence Infrastructure by Convergence of Real World and IT
Knowledge Emergence Infrastructure by Convergence of Real World and IT 30 September, 2009 Systems Development Laboratory, Hitachi, Ltd. Akira Maeda Contents 1. Social Innovation Induced by IT 2. KaaS:
More informationTracking metal parts with passive UHF RFID. April 2007
Tracking metal parts with passive UHF RFID April 2007 Confidex in brief Focused in wireless identification, especially on industrial RFID tags on 13,56MHz (HF) and 865-952 MHz (UHF) Main business areas
More informationExpected Social and Economic Impact and Application of Cloud Computing in Japan
OECD/ICCP Foresight Forum Expected Social and Economic Impact and Application of Cloud Computing in Japan October 14, 2009 DR. Makoto Yokozawa Nomura Research Institute Professor of MOIS Labo., Kyoto University
More information*-*-*-*-*-*-*-*-*-*-*-*-*-* STATISTICS Results of 2012 Basic Survey on the Information and Communications Industry (preliminary report)
MIC COMMUNICATIONS NEWS Biweekly Newsletter of the Ministry of Internal Affairs and Communications, Japan International Policy Division, Global ICT Strategy Bureau ISSN 1349-7987 Vol. 23, No. 11, November16,
More informationRadio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
More informationE-Virus in Six Cisco Routers
Name of the Project: e.g. Organization Development By Roland Cheung @HKCERT Agenda Malware Trend Security Risk on Industry Sector Case Study Security Mitigations Malware Trend Reason Fun Profit Direct
More informationIntroducing FUJITSU Software Systemwalker Centric Manager V15.1.1
Introducing FUJITSU Software Centric Manager V15.1.1 < Version 1.0 > May 2015 FUJITSU LIMITED 0 Contents Integrated Monitoring Required in Virtualization/Server Integration Characteristics of Centric Manager
More informationCore Expertise. Certifications. Europe. Korea. CPU Module Optimization Technology (Telemetric embedded Design Technology) CPU Board
ATID Co., Ltd Certifications & Core Expertise Certifications Technologies CPU Board CPU Module Optimization Technology (Telemetric embedded Design Technology) OS (Firmware) Various Module Interface Optimization
More informationRAIN RFID and the Internet of Things: Industry Snapshot and Security Needs. Matt Robshaw and Tyler Williamson Impinj Seattle, USA
RAIN RFID and the Internet of Things: Industry Snapshot and Security Needs Matt Robshaw and Tyler Williamson Impinj Seattle, USA Overview RAIN RFID The product and standardization landscape Security, performance,
More informationIBM WebSphere Premises Server
Integrate sensor data to create new visibility and drive business process innovation IBM WebSphere Server Highlights Derive actionable insights that support Enable real-time location tracking business
More informationWhat Do We Really Mean By Security for RFID
What Do We Really Mean By Security for RFID And How Much Is Enough? March 26, 2008 SecureRF at a glance RFID tag and reader security development and consulting to protect Pharmaceutical Supply Chain and
More informationFujitsu Enterprise Security Architecture
Fujitsu Enterprise Security Architecture V Tetsuo Shiozaki V Masayuki Okuhara V Nobuo Yoshikawa (Manuscript received November 9, 2006) Recently, there has been a growing need for enterprises to respond
More informationSoftware Manual Part IV: FDA 21 CFR part 11. Version 2.20
Software Manual Part IV: FDA 21 CFR part 11 Version 2.20 OPTIMA Software Manual Part IV: FDA 21 CFR part 11 BMG LABTECH This manual was designed to guide OPTIMA users through the software features related
More informationDiffusion of Internet and the New Lifestyle
WTO IT Symposium 2004 Diffusion of Internet and the New Lifestyle Oct. 18, 2004 Oct. 18, 2004 Masaichiro Yoshioka Department Manager Business Solution Systems Division, HITACHI Ltd. Japan 1 Changes in
More informationEvolution of Information Society. after the Mobile Information Society. the emergence of Personal Information Services
Mobile Health Akihisa KODATE, Dr.-Eng. Visiting Associate Professor Global Information and Telecommunication Institute Waseda University, Japan E-mail : akikod@waseda.jp Images of Hertz Handy of Vita phone,
More informationInternational Journal of Engineering Research & Management Technology
International Journal of Engineering Research & Management Technology March- 2015 Volume 2, Issue-2 Radio Frequency Identification Security System Mr. Shailendra Kumar Assistant Professor Department of
More informationRFID Security: Threats, solutions and open challenges
RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)
More informationAVC Networks Company Business Strategy
AVC Networks Company Strategy September 17, 2014 Panasonic Corporation AVC Networks Company President Yoshiyuki Miyabe Notes: 1. This is an English translation from the original presentation in Japanese.
More informationMilitary Usage of Passive RFID 1
Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third
More informationHitachi to Expand Finger Vein Authentication System Business on a Global Basis
FOR IMMEDIATE RELEASE Hitachi to Expand Finger Vein Authentication System Business on a Global Basis Establishes Organizations to Promote Business in North America, Europe, China and Asia, Aspires for
More informationF2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop
F2008-SC-027 Applying Ubiquitous Technologies to PLM of an Automotive Die Shop 1 Park, Yang Ho, 1 Lee, Sang Seok, 1 Kim, Jong Hwan, 1 Joung, Youn-kyoung, 2 Noh, Sang Do 1 Department of Industrial Engineering,
More informationAutomobile industry major implements RFID-based PALLET AND INVENTORY MANAGEMENT SYSTEM
Automobile industry major implements RFID-based PALLET AND INVENTORY MANAGEMENT SYSTEM PLC integration and real-time inventory of panels at each machine in the Press Shop through on-screen grid Automated
More informationImproving production and operation systems with RFID. Taking manufacturing to the next level: RFID Work-in-Process solutions from IBM
Improving production and operation systems with RFID Taking manufacturing to the next level: RFID Work-in-Process solutions from IBM RFID: A proven technology changing the factory floor Today the most
More informationEPSON Scan Server & EPSON TWAIN Pro Network
EPSON Scan Server & EPSON TWAIN Pro Network EPSON Scan Server & EPSON TWAIN Pro Network SCANNER UTILITY PROGRAMS All rights reserved. No part of this publication may be reproduced, stored in a retrieval
More informationTowards Unified Tag Data Translation for the Internet of Things
Towards Unified Tag Data Translation for the Internet of Things Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl To cite this version: Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl. Towards Unified
More informationRF ID Security and Privacy
RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from
More informationFOR IMMEDIATE RELEASE
FOR IMMEDIATE RELEASE Hitachi Group Develops Next-generation Industrial Controllers for IoT and Global Rollout; Sales to Begin Next Spring Achieves high performance and simple configuration with open technologies
More informationNOTICE OF THE 59TH ORDINARY GENERAL MEETING OF SHAREHOLDERS
Note: This document has been translated from a part of the Japanese original for reference purposes only. In the event of any discrepancy between this translated document and the Japanese original, the
More informationSDSD-CPRM: Flexible Protection for Digital Content
SDSD-CPRM Flexible Protection for Digital Content December 2007 Executive Summary SDSD-CPRM is a new extension to the SD Memory Card that addresses the difficulties that authorized sharing of protected
More informationUser Guide Win7Zilla
User Guide Win7Zilla Table of contents Section 1: Installation... 3 1.1 System Requirements... 3 1.2 Software Installation... 3 1.3 Uninstalling Win7Zilla software... 3 Section 2: Navigation... 4 2.1 Main
More informationEthical Use of RFID in for the Surveillance of People and the Tracking of Things in Healthcare Delivery
Ethical Use of RFID in for the Surveillance of People and the Tracking of Things in Healthcare Delivery By Michael J. Wilson M.Sc. ehealth Candidate McMaster University Canadian Bioethics Society Conference
More informationMobile Wallet and Mobile Marketing in Japan
Mobile Wallet and Mobile Marketing in Japan Carl Atsushi HIRANO Market Platform Dynamics CA Mobile, Ltd. June 2007 CA Mobile.Ltd, MPD All Rights Reserved 1 Who am I? Carl Atsushi HIRANO Carl is Senior
More informationSoftware Asset Management with Integrated Asset & Service Management
xassets Asset Management Software Flexible, Affordable, Fast... Software Asset Management with Integrated Asset & Service Management CASE STUDY ABOUT PANASONIC Panasonic Electronic Devices Corporation
More informationTraining Webcast on Contactless Cards for Access Control. January 21, 2004
Training Webcast on Contactless Cards for Access Control January 21, 2004 Your presenters» Perry Garvis Business Development Manager Access Control & Security Products» Kelly Stark TI-RFid Systems Strategic
More informationIPv6 and Facility Management. 2005/02/24 Matsushita Electric Works, Ltd. Noriaki Fujiwara nfujiwar@icrl.mew.co.jp
IPv6 and Facility Management 2005/02/24 Matsushita Electric Works, Ltd. Noriaki Fujiwara nfujiwar@icrl.mew.co.jp Agenda MEW s Profile Review of IPv6 s Features Subject of the Current Facility Management
More informationMonotaRO Co.,Ltd. 3064 Tokyo Stock Exchange First Section
Company Research and Analysis Report FISCO Ltd. http://www.fisco.co.jp * Maintenance, Repair and Operating (MRO) products refers to products used in the manufacturing process such as abrasives, drills,
More informationGreen Software Services From requirements to Business Models
Green Software Services From requirements to Business Models Schahram Dustdar TU Wien Austria Distributed Systems Group dsg.tuwien.ac.at Smart Evolution People, Services,Things Smart Buildings and Energy
More informationRFID BASED VEHICLE TRACKING SYSTEM
RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking
More information