RFID Privacy & Security

Size: px
Start display at page:

Download "RFID Privacy & Security"

Transcription

1 1October 2008 RFID Privacy & Security What is RFID? Here's a plain-english explanation of what radio frequency identification is and why it's suddenly become an important technology. Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. It's grouped under the broad category of automatic identification technologies. Auto-ID technologies include bar codes, optical character readers and some biometric technologies, such as retinal scans. The auto-id technologies have been used to reduce the amount of time and labor needed to input data manually and to improve data accuracy. Some auto-id technologies, such as bar code systems, often require a person to manually scan a label or tag to capture the data. RFID is designed to enable readers to capture data on tags and transmit it to a computer system without needing a person to be involved. Antennas read passive tags on cases stacked on a pallet A typical RFID tag consists of a microchip attached to a radio antenna mounted on a substrate. (For more detail and for information about tags that don t use silicon chips, read The Basics of RFID Technology. ) The chip can store as much as 2 kilobytes of data. For example, information about a product or shipment date of manufacture, destination and sell-by date can be written to a tag. To retrieve the data stored on an RFID tag, you need a reader. A typical reader is a device that has one or more antennas that emit radio waves and receive signals back from the tag. The reader then passes the information in digital form to a computer system. RFID technology has been used by thousands of companies for a decade or more. (RFID Business Applications spells out some of the ways the technology has been and will be used.)

2 The technology is not new (see The History of RFID), so why is it taking off now? Until recently, the cost of RFID has limited its use. For many applications, such as tracking parts for just-in-time manufacturing, companies could justify the cost of tags a dollar or more per tag by the savings an RFID system could generate. And when RFID was used to track assets or reusable containers within a company s own four walls, the tags could be reused. But for tracking goods in open supply chains, where RFID tags are put on cases and pallets of products by one company and read by another, cost has been a major obstacle to adoption. Tags must, in effect, be disposable because the company putting them on cannot recycle them. They get thrown out with the box. (Tags built into pallets could be reused, and some companies are looking to develop ways to recycle tags on corrugated cases.) The Auto-ID Center In 1999, the Uniform Code Council and EAN International teamed with Gillette and Procter & Gamble to fund the Auto-ID Center at the Massachusetts Institute of Technology. The center changed the equation by working with private industry to develop an RFID tag that would be very low cost (the goal was five cents) when manufactured in high volumes. That way, companies could put tags on everything they own and then connect them to the Internet through a secure network. The center eventual gained the backing of the U.S. Department of Defense and some 100 global companies, including Kimberly-Clark, Metro, Target, Tesco, Unilever, Wal- Mart. These companies were attracted to RFID because it held out the potential of offering perfect supply chain visibility the ability to know the precise location of any product anywhere in the supply chain at any time. The 5-cent tag is still several years away. Today tags cost from 20 to 40 cents, depending on their features and packaging. (For more on this, see RFID Costs and Components). The Auto- ID Center's contribution went beyond trying to create an inexpensive tag. It developed the Electronic Product Code (EPC), a numbering scheme that makes it possible to put a unique serial number on every item manufactured. It developed a way for tags and readers to communicate (the air interface protocol) and designed a network infrastructure that stores information in a secure Internet database. A virtually unlimited amount of data associated with a tag s serial number can be stored online, and anyone with access privileges can retrieve it. The Auto-ID Center handed off its technology to a non-profit organization called EPCglobal, which has created a second-generation air interface protocol and is developing the network infrastructure now called the EPCglobal Network to enable companies to share data in real time. Here's how it will work. When Company A ships a pallet full of soft drink, the tags on the cases and pallet are scanned as the shipment leaves, and software is used to automatically let Company B know the shipment has left the warehouse. Company B can look up data associated with the serial numbers on the shipment and learn what's coming, when it will arrive and so on. When Company B receives the shipment, it scans the tags automatically, and a message can be immediately sent to Company A to let it know the shipment arrived.

3 The potential efficiencies created by this visibility are enormous. Companies would be able to reduce inventories while ensuring product is always in the right place at the right time. And because no humans would have to scan the tags, labor costs and errors would also be greatly reduced. The grand vision is to ultimately flip the supply chain around. Today, companies make goods based on a monthly forecast. They then push the goods out into the supply chain and hope they sell. If demand is greater than they forecast, they lose sales. If it is less than forecast, they have excess goods that are sold at a loss or thrown away. The goal is to use RFID to track goods through the supply chain It would be much more efficient if goods could be pulled through the supply chain based on real-time demand. RFID readers on shelves would monitor how many products are being sold. They would signal the backroom when the shelves get low and request more inventory be brought out. When inventory in the backroom gets low, readers there would signal the warehouse to send more product. When inventory in the warehouse gets low, readers would signal the manufacturer to send more product. And so on back through the manufacturer's suppliers. It's not clear if this vision can ever be fully achieved. The biggest obstacle is the cost of the tags. The Auto-ID Center did research suggesting the price of tags could fall to 5 cents when 30 billion tags are consumed annually. But 30 billion tags will never be consumed if the tags cost 25 cents or more. So the industry faces a chicken-and-egg problem tags won't get cheap until a lot of people use them, but a lot of people won't use them until they get cheap. Wal-Mart was the first retailer to require suppliers to put tags on cases and pallets of goods. In June 2003, it told its top 100 suppliers that they would need to begin putting tags on shipments in January One reason Wal-Mart chose this approach was to solve the chicken-and-egg problem. If the giant retailer's top suppliers began buying tags, that would begin to drive the price down. Lower prices would enable more companies to use the technology. Then volumes would increase and prices would fall further. Why RFID Is Hot Wal-Mart's push to use RFID in the open supply chain is a big reason why the technology is hot today. But it's not the only reason. Several important factors have come together around the same time. One is the advances in ultra-high frequency RFID systems. UHF systems are able to deliver the read range needed for supply chain applications, such as scanning tags on products as pallets are moved through a dock door or scanning cases on a high shelf in a warehouse.

4 Another factor was the efforts by the Auto-ID Center to develop a system that is low cost and based on open standards. These are prerequisites for the use of RFID in open supply chains, where a company puts a tag on a product, and it's read by other companies in the supply chain. And finally the ubiquity of the Internet is an important (and often overlooked factor). The Auto-ID Center realized that the Internet could be used to enable companies to share information about the location of products within the supply chain. Before the Auto-ID Center proposed the EPCglobal Network, there was no way (other than manually phoning, faxing or ing) for Company A to let Company B know that it has shipped something, and there was no way for Company B to let Company A know that the product has arrived. With the network, companies can not only identify products in the supply chain, they can share information about the location of goods. Company A, for instance, could let Company B see in real time what is in Company A's warehouse. Or Company A could let Company B know automatically that goods were scanned leaving the warehouse and will arrive at Company B's facility the next day. It is this ability to share information about the location of products anywhere in the supply chain that makes RFID a potentially powerful technology. Working with Boeing and Endwave Defense Systems, companies like Omnitrol Networks have now extended this capability to produce applications such as Real-Time, Work-in-Process for integrated visibility of manufacturing operations. What are the Major Components of an RFID System? Deploying a radio frequency identification system that delivers true business value involves much more than purchasing the right tags and installing the right readers. To get business value from the all of the information collected, companies also need middleware to filter the collected raw tag data. Customers typically want the entire system supplied by a specialized System Integrator on a total solution, turn-key basis. This makes sense to ensure effective integration of many different components and different RFID vendor products and avoid any finger-pointing in such implementations. Tags and Readers Tags and readers are the main components of an RFID system. There are two basic types of tags, active and passive. Active RFID tags have a transmitter and their own power source (typically a battery). The power source is used to run the microchip's circuitry and to broadcast a signal to a reader (the way a cell phone transmits signals to a base station). Passive tags have no battery. Instead, they draw power from the reader, which sends out electromagnetic waves that induce a current in the tag's antenna. Semi-passive tags use a battery to run the chip's circuitry, but communicate by reflecting power from the reader.

5 Readers can house internal or external antennas. Readers with external antennas can have one or more ports for connecting additional antennas. Readers can also have input/output ports for connecting to external devices. An input port might be connected to an electric eye that activates the reader when something passes through its field of view. An output port might connect to a programmable logic controller, conveyor sorter or other device controlled by the reader. Readers also have ports for connecting to a computer or network. Middleware Middleware is a generic term used to describe software that resides between the RFID reader and enterprise applications. The middleware takes raw data from the reader (which might read the same tag 100 times per second), filters it and passes on the useful event data to back-end systems. Middleware can play a key role in getting the right information to the right application at the right time. Significant enterprise value is created by the application of customer-defined business rules to the sea of data constantly flowing from all the tags, sensors and readers. The automated actions taken from the implementation of those business rules creates the real-time enterprise and assures management that the enterprise is consistently being run to pre-defined guidelines 7x24x365. In order for the immense volume of RFID data not to burden corporate networks and business management systems, it is considered highly desirable to maximize the use and action on those data as close to the enterprise network edge as possible. Due to their high costs and lengthy lead times, It is also highly desirable to avoid having to contract changes to existing enterprise middleware. With its self-contained middleware and built-in adapters for systems such as SAP, Omnitrol s industry-leading edge appliance does exactly this function. What are Active RFID Systems? Active tags may be broadly operated in one of two operational modes: as transponders and/or as beacons. Active transponders are awakened when they receive a signal from a reader. Popular applications are in toll payment collection, checkpoint control and other choke-point systems. For example when a car with an active transponder approaches a tollbooth, a reader at the booth sends out a signal that activates the transponder on the car windshield. The transponder then transmits its unique ID to the reader. In this manner, transponders conserve battery life by enabling the tag to send a signal only when it is within range of a reader. Active beacons are utilized in real-time locating systems (RTLS) that cannot accommodate choke points. A beacon emits a signal with its unique identifier at pre-set intervals, for example, once every second, every minute, every hour, or several times per day, depending on the urgency of the location tracking application. Active tags can be read reliably because they transmit (rather than reflect) a signal to the reader. Read ranges of 100 meters (greater than 300-feet) is common, but range

6 often depends on the antenna type, environmental factors, and regulatory constraints. Active tags can cost from $10 to a few hundred dollars, depending on their capability, amount of memory, battery life, and integrated sensor functionality. Bringing some order to this technology explosion EPCglobal maintains the electronic-product-code database, which identifies a manufacturer, product, and version and serial number; provides middleware specifications for data exchange; and administers the Object Name Service for matching an electronic product code to information about the associated item. Securing RFID Tags From Eavesdropping Businesses and vendors alike acknowledge that security is a key consideration for all RFID deployments. Security breaches can happen at the RFID tag, RFID Reader, network, or data level. Unsecured wireless networks present opportunities for eavesdropping on data. To serve as a successful alternative to barcodes, RFID tags must be very inexpensive. While more expensive RFID tags for special environments can do cryptography, affordable tags lack the resources to do sophisticated computing, and certainly cannot perform the standard cryptographic operations necessary to offer privacy and security. Securing basic RFID tags therefore presents a considerable challenge. All of the good security tools developed over the last 20 years won't fit into the hardware that's available on most of these RFID tags. The continued march of Moore s Law and computing power has also required ever stronger encryption algorithms to prevent easy cracking. Strong encryption on a tag, for instance, would chew up too much of a tag's processing power, as well as add extra cost to tags that need to be lightweight and inexpensive for companies to keep costs in line. But scientists and researchers have come up with techniques that have potential for privacy and security.

7 Protecting RFID Tags from Eavesdropping in Enterprises For enterprises, eavesdropping on RFID readers is a major threat. It can be a highly effective and profitable form of corporate or military espionage. RFID readers themselves can broadcast RFID tag data over long distances often up to hundreds of meters away. It is difficult to shield the radio emissions of readers effectively without impeding their use. This means that an eavesdropper with an antenna and some basic receiving equipment can gather the same RFID tag information that is compiled by your enterprise s own warehouse! Scientists have proposed two different techniques for addressing the enterprise eavesdropping problem. One, proposed by researchers at MIT, is known as silent treewalking. Silent tree-walking involves a modification to the basic reading protocol for RFID tags that eliminates reader broadcast of tag data. A second technique, proposed by RSA Laboratories, involves the use of pseudonyms. In this proposal, tags carry multiple identifiers, and emit different identifiers at different times. Thus the appearance of a tag is changeable. Legitimate readers are capable of recognizing different identifiers belonging to a single RFID tag. An eavesdropper, however, is not. Pseudonyms can prevent an adversary from unauthorized tracking of RFID-tagged objects. Despite the questions that revolve around security, you can't ignore the fact that RFID ultimately provides a tremendous security boost. "If you look at most supply chains today, truth be told, it's almost security by obscurity," says Arvind Parthasarathi, director of product management at supply-chain software vendor i2 Technologies Inc. "Bad things are more likely to happen in the dark, and, in some sense, [with RFID] you're reducing the amount of darkness out there." RFID's ability to pinpoint the exact location of an item in inventory lowers the risk of insider theft, because workers will know the inventory is carefully tracked and up to date. "If you know for certain that the TV arrived at a warehouse at a specific time, and then it ends up missing there," he says, "that's a great deterrent."

8 The Tag Such a tiny tag. So much potential for mischief. For starters, RFID tags can be manipulated easily by hackers, shoplifters, or disgruntled employees. That's what Lukas Grunwald, a consultant with DN-Systems Enterprise Internet Solutions GmbH demonstrated at the 2004 Black Hat security conference earlier this year. Using a small program he helped develop, dubbed RFDump, Grunwald showed how the tags could be read, altered, and even deleted. RFDump requires nothing more than an inexpensive plug-in tag reader attached to a handheld, notebook, or desktop system running Windows or Linux. The software shows how anyone could potentially destroy all RFID tag information, change the price of an RFID-tagged item for sale, or even switch data, which could lead to retailers having to do time-consuming manual inventories to have an accurate count of their goods. Most passive tags supporting EPCglobal standards are write-once, but RFID tags that support other standards, such as ISO, provide multiple write-to capabilities, and, by next spring, the market will be flooded with EPCglobal UHF generation 2 protocol RFID tags that also support multiple-write features. Because they're not write-protected, passive tags can be changed or written to "a couple of thousand times," Grunwald says. Tire manufacturer Michelin North America Inc., which is embedding RFID tags in tires' sidewalls to help auto manufacturers and auto-parts retailers identify them, says chip reprogrammability is a concern. It needs to be "managed appropriately," says Pat King, Michelin North America Inc.'s global electronics strategist. King also is a member of the RFID Expert Group within the AIM Global Standards Action Group, a global trade association concerned with managing the collection and integration of data with information-management systems. "Companies shouldn't assume or depend on keeping the data that resides in that reprogrammable space on the tag secure. If you doubt the validity of that information, you can always go back to the secure information on the chip and verify it with data stored in a database." The lack of support for point-to-point encryption (which is available using existing standards such as ISO 14443/DESFire) and a PKI key exchange contribute to tag vulnerability, according to IT advisory services firm The Advisory Council. In an article on InformationWeek's RFIDinsights.com site (informationweek.com/1011/tac_rfid.htm), The Advisory Council also identifies other ways tags could be exploited. "Rumors within law enforcement have reported that hijackers of cargo trucks are already using RFID readers to help determine which shipping pallets are worth stealing," The Advisory Council writes. EPCglobal is a joint venture between EAN International (Europe) and UCC (USA) aiming at developing industry RFID standards. Since EPCglobal unifies the two biggest organizations responsible for Barcode technology, it has the potential to influence the standard for RFID technology at the global scale. One of the most important standards

9 proposed by EPC global is the EPCglobal Class-1 Gen-2 RFID specification which defines the functionality and operation of a RFID tag. Unfortunately, the EPCGlobal Class-1 Gen-2 RFID specification pays little attention to the security and privacy issues mentioned earlier. More specifically, RFID tag uses a very naive method to authenticate RFID reader by sending out a random number and requiring the reader to acknowledge that number. After that, a tag backscatters the associated EPC in clear text to the reader. This protocol obviously enables any malicious reader conforming to the standard to perform a skimming attack to capture the EPC stored in the tag's memory. Everything from the reader back is very standard Internet infrastructure. So you have all the same security issues and opportunities that you have with the Internet. That includes having a rogue reader introduced by a competitor or intruder onto an unsecured network and shipping all the data it scans off to that person, says Forrester analyst Laura Koetzle. "Another place to worry is having the data taken in by your readers hijacked between the readers and the repository of that data, she stated. The solution is to make sure all the readers on your network are authenticated before they can pass on any information to middleware that feeds enterprise systems and that the data traffic between the reader and the back-end system is encrypted. "There are some very sensible measures that should be taken when deploying RFID readers to make sure that they authenticate themselves properly to the corporate network and also that they're not broadcasting meaningful, useful information through the air that could be subject to eavesdropping by other people. For those countries implementing RFID Passports, Passport data on RFID chips is signed with a digital certificate belonging to the country to which the passport was issued. E-passport systems are intended to verify that certificate when scanning a passport. All countries issuing e-passports are supposed to upload their digital certificate to the Public Key Directory (PKD), a database that should be queried to ensure the certificate is correct On 3 October 2008, California followed Washington State's footsteps to become the second U.S. state outlawing so-called Radio Frequency Identification Device skimming. Skimmers can easily pilfer information from non-encrypted RFID tags that are growing commonplace. California's bill was adopted and signed by Gov. Arnold after a demonstration showed that personal information skimmed from entry-card badges from statehouse workers allowed hackers access to secured areas of government offices. The legislation came a year after the hacking of the RFID-enabled Dutch passport, and the successful hacks of the Exxon Mobile key fob and the exposed VeriChip human RFID implant

10 Still, California's measure and the one Washington State adopted in March, don't mandate any RFID encryption. So the vulnerabilities of the Golden State statehouse's entry system remains.

RFID BASED VEHICLE TRACKING SYSTEM

RFID BASED VEHICLE TRACKING SYSTEM RFID BASED VEHICLE TRACKING SYSTEM Operating a managed, busy parking lot can pose significant challenges, especially to a government organization that also owns some of the vehicles in the lot. The parking

More information

Radio Frequency Identification (RFID) An Overview

Radio Frequency Identification (RFID) An Overview Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for

More information

RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region

RFID SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region RFID SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

Asset Management Services. White Paper

Asset Management Services. White Paper Asset Management Services White Paper Asset Management Solutions provide a comprehensive and systematic method for managing equipment and intelligence in complex IT infrastructure environments. Through

More information

How To Understand The Power Of An Freddi Tag (Rfid) System

How To Understand The Power Of An Freddi Tag (Rfid) System Radio Frequency Identification Done by: Haitham Habli. Table of contents Definition of RFID. Do they need license? RFID vs other identification systems. Classification of RFID systems. Emerge of passive

More information

Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda

Security Issues in RFID systems. By Nikhil Nemade Krishna C Konda Security Issues in RFID systems By Nikhil Nemade Krishna C Konda Agenda Introduction to an RFID System Possible Application Areas Need for Security Vulnerabilities of an RFID system Security Measures currently

More information

RFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium.

RFID Basics HEGRO Belgium nv - Assesteenweg 25-29 - 1740 Ternat Tel.: +32 (0)2/582.31.97 Fax : +32 (0)2/582.11.24 email : info@hegrobelgium. RFID Basics RFID Basics Introduction Radio Frequency Identification (RFID) technology has been attracting considerable attention with the expectation of improved supply chain visibility for both suppliers

More information

entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200

entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200 entigral whitepaper Understanding RFID and Barcode Differences www.entigral.com 877.822.0200 Understanding RFID and Barcode Differences Don t misuse RFID with applications built for Barcodes Radio Frequency

More information

RFID Applications in the Healthcare and Pharmaceutical Industries

RFID Applications in the Healthcare and Pharmaceutical Industries RFID Applications in the Healthcare and Pharmaceutical Industries White Paper Revolutionizing Asset Management and the Supply Chain Document Revision: 1.0 Release Date: February 7, 2005 Written by: Johnny

More information

Why Has the Development in RFID Technology Made Asset Management More Urgent?

Why Has the Development in RFID Technology Made Asset Management More Urgent? E-ISG Asset Intelligence, LLC Why Has the Development in RFID Technology Made Asset Management More Urgent? 3500 Boston Street Suite 316 Baltimore, MD 21224 Phone: 866.845.2416 Website: www.e-isg.com May,

More information

Radio Frequency Identification (RFID)

Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/

More information

RF ID Security and Privacy

RF ID Security and Privacy RF ID Security and Privacy EJ Jung 11/15/10 What is RFID?! Radio-Frequency Identification Tag Antenna Chip How Does RFID Work? 02.3DFEX4.78AF51 EasyToll card #816 Radio signal (contactless) Range: from

More information

WHITE PAPER. ABCs of RFID

WHITE PAPER. ABCs of RFID WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,

More information

TECHNOLOGY BRIEF. Business Benefits from Radio Frequency Identification (RFID)

TECHNOLOGY BRIEF. Business Benefits from Radio Frequency Identification (RFID) TECHNOLOGY BRIEF Business Benefits from Radio Frequency Identification (RFID) Executive summary Today the largest government and business enterprises in the world are developing plans to deploy electronic

More information

Data Protection Technical Guidance Radio Frequency Identification

Data Protection Technical Guidance Radio Frequency Identification Data Protection Technical Guidance Radio Frequency Identification This technical guidance note is aimed at those using or contemplating using RFID technology. It gives a brief summary of the technology

More information

W.A.R.N. Passive Biometric ID Card Solution

W.A.R.N. Passive Biometric ID Card Solution W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused

More information

Active RFID Solutions for Asset Tracking and Inventory Management

Active RFID Solutions for Asset Tracking and Inventory Management Active RFID Solutions for Asset Tracking and Inventory Management Introduction RFID (Radio Frequency Identification) technology is fast replacing ScanCode technology for asset tracking and inventory management.

More information

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department

RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES. Alp ÜSTÜNDAĞ. Istanbul Technical University Industrial Engineering Department RFID TECHNOLOGY: A PARADIGM SHIFT IN BUSINESS PROCESSES Alp ÜSTÜNDAĞ Istanbul Technical University Industrial Engineering Department ABSTRACT: Radio Frequency Identification (RFID) is fast becoming an

More information

How To Hack An Rdi Credit Card

How To Hack An Rdi Credit Card RFID Payment Card Vulnerabilities Technical Report Thomas S. Heydt-Benjamin 1, Daniel V. Bailey 2, Kevin Fu 1, Ari Juels 2, and Tom O'Hare 3 Abstract 1: University of Massachusetts at Amherst {tshb, kevinfu}@cs.umass.edu

More information

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda

More information

ACTA UNIVERSITATIS APULENSIS No 9/2005. Burja Lucian and Tanase Mihai

ACTA UNIVERSITATIS APULENSIS No 9/2005. Burja Lucian and Tanase Mihai ACTA UNIVERSITATIS APULENSIS No 9/2005 IMPLEMENTING A DOCUMENT MANAGEMENT SYSTEM USING RFID TECHNOLOGY Burja Lucian and Tanase Mihai Abstract.With strong support in the industry from important players

More information

Simplifying IT Management and Data Security with RFID

Simplifying IT Management and Data Security with RFID Simplifying IT Management and Data Security with RFID IT asset management is a fundamental discipline to contribute to the growth and sustainability of the enterprise. Chief information officers have to

More information

RFID Technology - Potential Of Big Brother

RFID Technology - Potential Of Big Brother The Computer in the Sciences: RFID Technology California State University, Stanislaus Student s Name Professor Dan Bratten CS4000-5 March 30, 2006 Last Name 2 The Computer in the Sciences: RFID Technology

More information

rf Technology to automate your BUsiness

rf Technology to automate your BUsiness Motorola Tech Brief June 2011 Understanding the characteristics of the rfid spectrum: Choosing the Right rf Technology to automate your BUsiness How to choose the right rfid technology for your Identification,

More information

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) ASSET TRACKING USING RFID BY SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3) OBJECTIVE Our main objective is to acquire an asset tracking system. This keeps track of all the assets you

More information

Allwin Initiative for Corporate Citizenship Dartmouth Center for the Advancement of Learning Dickey Center Ethics Institute Institute for Security

Allwin Initiative for Corporate Citizenship Dartmouth Center for the Advancement of Learning Dickey Center Ethics Institute Institute for Security Allwin Initiative for Corporate Citizenship Dartmouth Center for the Advancement of Learning Dickey Center Ethics Institute Institute for Security Technology Studies Leslie Center Rockefeller Center Tucker

More information

Getting Started with TraSer from Requirements to a Solution

Getting Started with TraSer from Requirements to a Solution Project no.: 033512 Project acronym: TraSer Project title: Identity-Based Tracking and Web-Services for SMEs Start date of project: 01.06.2006 Sixth Framework Programme IST Call 5 Fp6-2005-IST-5 ICT for

More information

RFID Technology. by: Mary Ainsworth. Copyright 2007, Faulkner Information Services. All Rights Reserved.

RFID Technology. by: Mary Ainsworth. Copyright 2007, Faulkner Information Services. All Rights Reserved. RFID Technology by: Mary Ainsworth Copyright 2007, Faulkner Information Services. All Rights Reserved. Docid: 00018942 Publication Date: 0711 Publication Type: TUTORIAL Preview Radio Frequency Identification

More information

Military Usage of Passive RFID 1

Military Usage of Passive RFID 1 Military Usage of Passive RFID The Initiative The DoD, which is larger than most of the world s businesses, has an annual budget of almost US$343 billion with logistics accounting for nearly one third

More information

Improving production and operation systems with RFID. Taking manufacturing to the next level: RFID Work-in-Process solutions from IBM

Improving production and operation systems with RFID. Taking manufacturing to the next level: RFID Work-in-Process solutions from IBM Improving production and operation systems with RFID Taking manufacturing to the next level: RFID Work-in-Process solutions from IBM RFID: A proven technology changing the factory floor Today the most

More information

Feature. Security and Privacy Trade-offs in RFID Use. Operational Zone RFID Tag. RFID Reader

Feature. Security and Privacy Trade-offs in RFID Use. Operational Zone RFID Tag. RFID Reader Feature Security and Privacy Trade-offs in RFID Use S. Srinivasan is a professor of computer information systems at the University of Louisville in Kentucky, USA. He can be reached at srini@louisville.edu.

More information

Asset Tracking & Radio Frequency Identification White Paper

Asset Tracking & Radio Frequency Identification White Paper 2012 Asset Tracking & Radio Frequency Identification White Paper National Office Systems, Inc. 7621 Rickenbacker Drive, Suite 400 Gaithersburg, MD 20879 T 301.840.6264 F 301.840.0243 www.nosinc.com info@nosinc.com

More information

Important Considerations for RFID Compliance Tagging 2004 ACCU-SORT SYSTEMS, INC.

Important Considerations for RFID Compliance Tagging 2004 ACCU-SORT SYSTEMS, INC. Important Considerations for RFID Compliance Tagging 2004 ACCU-SORT SYSTEMS, INC. RFID tagging for compliance with retail and military mandates will continue to dominate industry attention on RFID well

More information

Automated Identification Technologies

Automated Identification Technologies Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions Jon@TechSoln.com Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT

More information

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings

RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings RFID 101: Using RFID to Manage School Assets and Achieve Huge Savings Are You Missing Out On Huge Savings through Better Asset Management? Many schools around the country have implemented wireless networking

More information

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits The IT Guide to RFID Solutions for Schools The Technology, Applications, and Benefits Radio frequency identification, or RFID, has become a leading technology in providing automated and reliable location

More information

How To Use Radio Frequency Identification (Rfid) Effectively

How To Use Radio Frequency Identification (Rfid) Effectively RFID Technology Simplifies Asset Management By Michael Beedles, Director Integration Services/NBD, SATO America, Inc. Faced with intense emphasis on profitability, the need to comply with new governmental

More information

Privacy and Security in library RFID Issues, Practices and Architecture

Privacy and Security in library RFID Issues, Practices and Architecture Privacy and Security in library RFID Issues, Practices and Architecture David Molnar and David Wagner University of California, Berkeley CCS '04 October 2004 Overview Motivation RFID Background Library

More information

IBM RFID for Supply Chain and Logistics: Reusable Asset Tracking solution

IBM RFID for Supply Chain and Logistics: Reusable Asset Tracking solution IBM Sensor Solutions IBM RFID for Supply Chain and Logistics: Reusable Asset Tracking solution Highlights Transforms your supply chain by automating and error-proofing business processes Provides real-time

More information

IMPACT OF RFID ON DATA SHARING AND BUSINESS PROCESSES

IMPACT OF RFID ON DATA SHARING AND BUSINESS PROCESSES IMPACT OF RFID ON DATA SHARING AND BUSINESS PROCESSES Jaymeen R. Shah Department of Computer Information System and Quantitative Methods McCoy College of Business Administration Texas State University-San

More information

Tackling Security and Privacy Issues in Radio Frequency Identification Devices

Tackling Security and Privacy Issues in Radio Frequency Identification Devices Tackling Security and Privacy Issues in Radio Frequency Identification Devices Dirk Henrici and Paul Müller University of Kaiserslautern, Department of Computer Science, PO Box 3049 67653 Kaiserslautern,

More information

Using Hybrid RFID for Improved Asset Tracking

Using Hybrid RFID for Improved Asset Tracking Using Hybrid RFID for Improved Asset Tracking Sponsored by: Presented by: Tom O Boyle Director of RFID, Barcoding, Inc. 2015 MHI Copyright claimed for audiovisual works and sound recordings of seminar

More information

Strengthen RFID Tags Security Using New Data Structure

Strengthen RFID Tags Security Using New Data Structure International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University

More information

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08 Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Network Security Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 2 Collaboration with Frank Akujobi

More information

RFID in a nutshell. Colin Jervis, Director, Kinetic Consulting Ltd

RFID in a nutshell. Colin Jervis, Director, Kinetic Consulting Ltd Colin Jervis, Director, Kinetic Consulting Ltd Enthusiasts in healthcare fields suggest that one day a tiny RFID (or radio-frequency identification) tag implanted under your skin could transmit your NHS

More information

whitepaper How RFID Technology Can Enhance Your Asset Management Program

whitepaper How RFID Technology Can Enhance Your Asset Management Program whitepaper How RFID Technology Can Enhance Your Asset Management Program TABLE OF CONTENTS: PAGE Introduction...3 How RFID Technology Works...4 RFID Versus Barcode...6 RFID Technology in Real-world Applications...7

More information

RTLS 101 What It Is and Why You Need It

RTLS 101 What It Is and Why You Need It RTLS 101 What It Is and Why You Need It RTLS 101 WHAT IT IS AND WHY YOU NEED IT In business, knowledge is power, and with it comes efficiency, productivity, safety, and profits. Real Time Locating Systems

More information

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY

REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY Review of the Air Force Academy No 3 (30) 2015 REAL TIME MONITORING AND TRACKING SYSTEM FOR AN ITEM USING THE RFID TECHNOLOGY For the past few years, location systems have become a major studying field,

More information

Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking

Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking RFID Technology Review Practices for Using Passive, Low-Cost RFID for Improved Asset Tracking Sponsored by: Presented by: Shane Snyder President 2014 MHI Copyright claimed as to audiovisual works of seminar

More information

Supply Chain Management

Supply Chain Management PMBA8155 Operations Management Supply Chain Management Learning Objectives Understand Concepts and Issues in Supply Chain Management Supply chain and supply chain management Bullwhip effect Vendor managed

More information

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring A White Paper from the Experts in Business-Critical Continuity TM Executive Summary With continued efforts to reduce overhead,

More information

Best Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail

Best Practices in. Best IT Asset Management through Smart RFID-Enabled Software. Art Barton, Director of RFID Strategies, RFTrail Best Practices in RFID-Enabled Asset Management Best IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail Chief Information Officers, finance managers,

More information

tags Figure D-1 Components of a Passive RFID System

tags Figure D-1 Components of a Passive RFID System Attachment D: RFID Technology Overview The following sections provide an overview to RFID technology, the applications in which they are currently used and other considerations of RFID technology as it

More information

RFID Design Principles

RFID Design Principles RFID Design Principles Harvey Lehpamer ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Introduction 2 2.1 2.1.1 2.1.2 2.1. 2.1.4 2.2 2.2.1 2.2.2 2. 2..1 2..2 2.4 2.4.1 2.4.2 2.5 2.5.1 2.5.2 Comparison

More information

Building Value from Visibility

Building Value from Visibility A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies Building Value from Visibility 2012 Enterprise Internet of Things Adoption Outlook October 2012 Table Of Contents Executive

More information

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS?

WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? WHAT IS RFID & HOW WILL IT IMPACT MY BUSINESS? TABLE OF CONTENTS What is RFID? 1 Will RFID replace Barcodes? 1 How does RFID work? 1 What is an RFID Tag? 3 What are Smart Labels? 4 Why use RFID? 5 Why

More information

Best Practices in Mobilizing IT Asset Management

Best Practices in Mobilizing IT Asset Management make IT mobile White Paper Best Practices in Mobilizing IT Asset Management Executive Summary 1 Mobilizing IT Asset Management as a Process Improvement 2 Determining if RFID is Right for Your ITAM Environment

More information

RFID Penetration Tests when the truth is stranger than fiction

RFID Penetration Tests when the truth is stranger than fiction RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, tomas.rosa@rb.cz Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

SATO RFID White Paper

SATO RFID White Paper SATO RFID White Paper Rev_0710 1 Overview This white paper describes the basic components of a Radio Frequency Identification (RFID) system and explores the technology, applications, and competitive advantages

More information

Improving Supply Chain Traceability Using RFID Technology

Improving Supply Chain Traceability Using RFID Technology Said A. Elshayeb 1, Khalid Bin Hasnan 2 and Chua Yik Yen 3 1 UTHM, saidelshayeb@hotmail.com 2 UTHM, khalid@uthm.edu.my 3 UTHM, saidelshayeb@hotmail.com Abstract One of the major issues in the supply chain

More information

monitor the location and status of not only personnel, equipment and supplies, but also

monitor the location and status of not only personnel, equipment and supplies, but also Radio frequency identification(rfid) enabled Asset Tracking and Inventory Management solutions from FALKEN Secure Networks helps EMS organizations monitor the location and status of not only personnel,

More information

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company

3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company 3M Cogent, Inc. White Paper Beyond Wiegand: Access Control in the 21st Century a 3M Company Unprecedented security features & capabilities Why Wiegand? The Problem with Wiegand In 1970, John Wiegand invented

More information

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard The Impact of Wireless LAN Technology on to the PCI Data Security Standard 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs and PCI Retailers today use computers

More information

3.4 SCS Technologies for Container Integrity: Track/Trace or Positioning technologies

3.4 SCS Technologies for Container Integrity: Track/Trace or Positioning technologies 3.4 SCS Technologies for Container Integrity: Track/Trace or Positioning technologies It seems evident that if authorities are concerned about the potential misuse of containers by criminals or terrorists,

More information

Mobile RFID solutions

Mobile RFID solutions A TAKE Solutions White Paper Mobile RFID solutions small smart solutions Introduction Mobile RFID enables unique RFID use-cases not possible with fixed readers. Mobile data collection devices such as scanners

More information

A. Background. In this Communication we can read:

A. Background. In this Communication we can read: On RFID The Next Step to THE INTERNET OF THINGS Information of the Presidency 2832nd Council meeting, Competitiveness (Internal Market, Industry and Research), Brussels, 22-23 November 2007 A. Background

More information

915MHz RFID State of the Art RFID RFID RADIO FREQUENCY IDENTIFICATION. Asset Management & Accountability

915MHz RFID State of the Art RFID RFID RADIO FREQUENCY IDENTIFICATION. Asset Management & Accountability 915MHz RFID State of the Art RFID RFID RADIO FREQUENCY IDENTIFICATION Asset Management & Accountability Scan Assets with Radio Waves to Rapidly Inventory Issued Assets and Assets in Storage Areas 1 Table

More information

RFID Tags - Advantages, Disadvantages and Solutions

RFID Tags - Advantages, Disadvantages and Solutions RFID Takes Time, Risk and Cost Out of Satisfying IT Asset Tracking Requirements RFID is the tool for the times to efficiently meet today s IT asset tracking requirements. Manual and bar codebased asset

More information

Better Data Center IT Asset Management through. Art Barton, Director of RFID Strategies, RFTrail

Better Data Center IT Asset Management through. Art Barton, Director of RFID Strategies, RFTrail Better Data Center IT Asset Management through Smart RFID-Enabled Software Art Barton, Director of RFID Strategies, RFTrail IT asset managers and facilities managers for Data Centers worldwide are being

More information

The Impact of RFID on IT

The Impact of RFID on IT The Impact of RFID on IT Steve Duplessie Founder & Senior Analyst Enterprise Strategy Group, Inc. Agenda What is RFID? Examples of RFID Impact on IT Data Applications Information security ILM What is RFID?

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

Biometrics in Physical Access Control Issues, Status and Trends White Paper

Biometrics in Physical Access Control Issues, Status and Trends White Paper Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry

More information

RFID in Document Tracking

RFID in Document Tracking Never Lose a File Again RFID in Document Tracking Locating critical files and documents is one of the greatest problems in offices today. Time is wasted chasing misplaced files, deadlines are missed while

More information

Security in RFID Networks and Protocols

Security in RFID Networks and Protocols International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 425-432 International Research Publications House http://www. irphouse.com /ijict.htm Security

More information

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER

Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Industrial Track and Trace: Choosing the Technology that Measures Up to Your Application Demands A WHITE PAPER Published 10/29/2012 I ndustries are facing fierce market competition, making more data about

More information

White Paper: RFID s Role in Tracking Medical Assets

White Paper: RFID s Role in Tracking Medical Assets White Paper: RFID s Role in Tracking Medical Assets Introduction RFID technology is used successfully around the world in thousands of applications. Long removed from its days as a high-priced science

More information

An Overview of RFID Security and Privacy threats

An Overview of RFID Security and Privacy threats An Overview of RFID Security and Privacy threats Maxim Kharlamov mkha130@ec.auckland.ac.nz The University of Auckland October 2007 Abstract Radio Frequency Identification (RFID) technology is quickly deploying

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council

Best Practices for the Use of RF-Enabled Technology in Identity Management. January 2007. Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity Management January 2007 Developed by: Smart Card Alliance Identity Council Best Practices for the Use of RF-Enabled Technology in Identity

More information

OI-TECH Asset Management

OI-TECH Asset Management OI-TECH Asset Management Service Today with the Solutions for Tomorrow www.oi-tech.com OI Tech Asset Management RFID Technology - Overview RFID (Radio Frequency Identification) is a technology for identifying

More information

Using RFID for Supply Chain Management

Using RFID for Supply Chain Management DÉPARTEMENT D INFORMATIQUE / DEPARTEMENT FÜR INFORMATIK Information Systems Research Group Electronic Business course Using RFID for Supply Chain Management Project work Written by Fabien Ropraz Student

More information

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In

More information

CHAPTER 1 Introduction 1

CHAPTER 1 Introduction 1 Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation

More information

What is the ROI of RFID?

What is the ROI of RFID? What is the ROI of RFID? Smart Label Solutions, Inc. White Paper What is the ROI of RFID? What is RFID? Radio Frequency Identification (RFID) is a method using tags or transponders to enable automatic,

More information

How To Attack A Key Card With A Keycard With A Car Key (For A Car)

How To Attack A Key Card With A Keycard With A Car Key (For A Car) Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car

More information

Efficient Asset Tracking: From Manual to Automated

Efficient Asset Tracking: From Manual to Automated White Paper Efficient Asset Tracking: From Manual to Automated Asset Tracking Overview: Asset Tracking Basics: The Fixed Asset Register Managing a Fixed Asset Register Asset Identification Technologies

More information

The Place of Emerging RFID Technology in National Security and Development

The Place of Emerging RFID Technology in National Security and Development The Place of Emerging RFID Technology in National Security and Development Akintola K.G. Boyinbode O.K. Computer Science Department, Computer Science Department, University of Houston-Victoria, University

More information

Radio Frequency Identification (RFID) Vs Barcodes

Radio Frequency Identification (RFID) Vs Barcodes Radio Frequency Identification (RFID) Vs Barcodes Which one to choose? Which one is the better technology? Why choose one over the other? Answer: It really depends on the application, and what you want

More information

RFID Security and Privacy. Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005

RFID Security and Privacy. Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005 RFID Security and Privacy Simson L. Garfinkel, Ph.D. Center for Research on Computation and Society Harvard University October 5, 2005 1 RFID: The Industry s Vision. Distribution Center Consumer Docks

More information

RFID the next step in consumer-product relations or Orwellian nightmare?

RFID the next step in consumer-product relations or Orwellian nightmare? RFID the next step in consumer-product relations or Orwellian nightmare? Nordic Consumer Policy Research Conference 2007 TOWARDS A NEW CONSUMER? TOWARDS A NEW CONSUMER POLICY? Helsinki, October 3-5, 2007

More information

Inventory & Location System

Inventory & Location System PATENT HALO01-1 IN THE UNITED STATES PATENT AND TRADEMARK OFFICE Application for United States Letters Patent Inventory & Location System CERTIFICATE OF MAILING BY U.S.P.S. EXPRESS MAIL Mailing Label Number

More information

Real-time Visibility for SAP in Supply Chain & Logistics:

Real-time Visibility for SAP in Supply Chain & Logistics: for SAP in Supply Chain & Logistics: Cost Savings from Real-World Deployments Andres Botero Senior Director Supply Chain Execution Solutions SAP Dan Ahearn Director, Market Development OATSystems, Inc.

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,

More information