Self-Check-In Hotels Using RFID. Technology

Similar documents
Gemalto Mifare 1K Datasheet

MF1 IC S General description. Functional specification. 1.1 Contactless Energy and Data Transfer. 1.2 Anticollision. Energy

Using RFID Techniques for a Universal Identification Device

Chip Card & Security ICs Mifare NRG SLE 66R35

Security & Chip Card ICs SLE 44R35S / Mifare

MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, Developed by: Smart Card Alliance Identity Council

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

ATLAS. Advanced Technology Lodging Access Solution

AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev October Document information

AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev October Document information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

LibRFID: Automation Software for Library Management System Using RFID Technology

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

International Journal of Engineering Research & Management Technology

Locker Rental Software

INTEGRATED CIRCUITS I CODE SLI. Smart Label IC SL2 ICS20. Functional Specification. Product Specification Revision 3.1 Public. Philips Semiconductors

How To Understand The Power Of An Freddi Tag (Rfid) System

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Time & Access System An RFID based technology

School Management System

RFID based Bill Generation and Payment through Mobile

More effective protection for your access control system with end-to-end security

SMARTair TM. It s time to change!

Efficient Asset Tracking: From Manual to Automated

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

White Paper How are thieves stealing modern vehicles?

ELECTRONIC KEYCARD ACCESS LOCKS

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft

RFID BASED VEHICLE TRACKING SYSTEM

NFC. Technical Overview. Release r05

SALTO Systems I SALTO Carriers. innovation in ID technology. MIFARE DESFire

Evaluation of the world s first pilot using NFC phones for check-in and hotel room keys

Written Information Security Plan (WISP) for. HR Knowledge, Inc. This document has been approved for general distribution.

CHAPTER 1 Introduction 1

Access Control, Ticketing and Booking System for Sports Halls

Access Control in Commercial Applications. Is the future of commercial building security built in, or bolted on? A discussion paper

Measurement and Analysis Introduction of ISO7816 (Smart Card)

Surveillance System Using Wireless Sensor Networks

Using Contactless Smart Cards for Secure Applications

ASSET TRACKING USING RFID SRAVANI.P(07241A12A7) DEEPTHI.B(07241A1262) SRUTHI.B(07241A12A3)

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

EMV in Hotels Observations and Considerations

Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:

Aperio Online System Description

Central Monitoring and Control Software for GRMS & Access Control

How to connect your D200 using Bluetooth. How to connect your D200 using GPRS (SIM Card)

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Development of Hybrid Radio Frequency Identification and Biometric Security Attendance System

MAGICAR M871A. Car alarm with two-way remote User s guide

Radio Frequency Identification (RFID)

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

E-Blocks Easy RFID Bundle

ACCESS CONTROL SOLUTIONS

Opinion and recommendations on challenges raised by biometric developments

ENERGY HARVESTED ELECTRONIC SHELF LABEL

W.A.R.N. Passive Biometric ID Card Solution

Functional Specification Document

In the pursuit of becoming smart

The Design and Construction of an Intelligent Taxi Electronic Payment System Solution

SOURCE ID RFID Technologies and Data Capture Solutions

NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro

UM0853 User manual. 1 Introduction. M24LRxx application software user guide

ELM Security System Electronic Locking & Monitoring

IBM Security Access Manager for Enterprise Single Sign-On Version User Guide IBM SC

Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas

Evolving Bar Codes. Y398 Internship. William Holmes

SL2 ICS53/SL2 ICS General description I CODE SLI-S/I CODE SLI-S HC. 1.1 Anticollision. 1.2 Contactless energy and data transfer

InSync Lock Series SAM RF Software. Key Control Systems for Multihousing

Parking Guidance System

How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone

Tracking metal parts with passive UHF RFID. April 2007

advant advanced contactless smart card system

Turn-Key Passive Entry/ Passive Start Solution

Frequently Asked Questions

Field Service Application

HOME ALARM MONITORING NETWORK GOH SWEE TIAN

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

FUJIFILM Recording Media U.S.A., Inc. LTO Ultrium Technology

CARRIOTS TECHNICAL PRESENTATION

Payment Application Data Security Standard

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Knowledge Base Article. Integrating ISONAS Access Control System with TagMaster LR-series RFID Readers

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

Flexible and secure. acceo tender retail. payment solution. tender-retail.acceo.com

Engineering Graduate Training Scheme "A" Information Engineering. Model Training Guide

NFC Tag Type 5 Specification

Security in Near Field Communication (NFC)

Using RFID Technology to Stop Counterfeiting

The Access Engine. Building Integration System - The Access Engine. Security Systems

GSM ALARM SYSTEM USER MANUAL

Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars

RESEARCH SURVEY ON MIFARE WITH RFID TECHNOLOGY

Loyalty Systems over Near Field Communication (NFC)

Smart Card Security Access Modules in VeriFone Omni 3350 Countertop and Omni 3600 Portable Terminals

Mobile MasterCard PayPass Testing and Approval Guide. December Version 2.0

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals

Mobile and Contactless Payment Security

DESIGN OF SMS ENABLED CAR SECURITY SYSTEM

Transcription:

Self-Check-In Hotels Using RFID Technology David H. Miller December 5, 2007 MAE 295C, Professor R. Gadh

Contents I. The Need. 2 II. The Solution 2 III. The RFID Tag. 3 IV. The RFID Reader.... 5 V. Middleware. 7 VI. Security Issues 8 VII. Difficulties.. 9 VIII. Other Possible Implementations... 11 IX. Conclusion 12 References 13 1

I. The Need More and more travelers are booking their entire trip online to be in total control of air travel, hotel accommodations, rental cars, etc. Not only does online booking allow for optimized travel prices for the customer, it allows the customer to be self-sufficient with no need to rely on travel agents, phone operators, etc. In response to this shift, the travel and hospitality industries have begun to automate many of their processes in order to cut costs and become less intrusive in their customers travels. For example, some companies in the rental car industry have gone as far as to allow their membership customers to arrive at the rental car lot, choose any car in a select group of vehicles, and immediately leave the lot. This method has been very popular with customers because it allows the customer to bypass the wait in line at the check-in desk and even gives them a variety of vehicles to choose from instead of being assigned a single vehicle model. The next logical step is to implement a system like this into the hospitality industry. While making hotel reservations online has been around for some time, selfcheck-in at hotels is still a relatively new concept. Currently, some hotels have implemented self-check-in kiosks where the customer uses a computer kiosk in the hotel lobby to have a room assigned and receive a keycard rather than using a front desk clerk. This has been proven as a rather successful system, but there is still more convenience to be had to truly attract today s travelers. II. The Solution A hotel would implement a self-check-in system using a new or existing membership rewards program. Each member will receive a membership card with an 2

RFID tag embedded in the card. When the member goes online to book a trip, they will make a hotel reservation and choose the self-check-in option, if they wish. When the customer arrives at the hotel on the day their reservation begins, they will proceed to a designated section or floor where the rooms are dedicated to the self-check-in service. The customer will proceed to any vacant room they desire and wave their membership card in front of the door lock equipped with an RFID reader. The reader will cross-check the membership number with the hotel s reservation system to verify the reservation. When the reader verifies this information, it will unlock the door and will continue to unlock the door with this membership card for the length of the customer s reservation. There is no waiting in line, no staff interaction, and no computer kiosks. The customer goes straight from their car to their room in the quickest, most convenient way possible. III. The RFID Tag To implement the system, membership cards must be produced with an embedded RFID tag to act as the member s personal room key. Each member will be assigned a unique ID number that will be the only information stored in the RFID tag. Consequently, a passive embedded tag would be used since the card will require only a minimal amount of memory and require none of the smart features of an active tag. The card will be compliant with the ISO 14443 Type A standard operating at 13.56MHz. The Type A standard was chosen because it is most commonly used for public RFID programs and has been extensively evaluated for public use. Part 1 of the standard defines the size and physical characteristics of the card. The size of the membership card will be the common credit card form factor defined by ISO 7810 ID-1, 3

namely 85.60 53.98 mm, in order not to inconvenience the user. Part 1 also defines the environmental conditions the card must be capable of working in. For example, the card must be capable of operating in a temperature region of 0-50 C. Part 2 of the standard defines the radio-frequency power and signal interface. The tag is capable of transmitting at 106 kbit per second in both directions, which is more than adequate for the very small amount of information required to be transferred from the room key. Part 3 defines the initialization and anti-collision protocols for both Type A and B. Part 4 defines the highlevel data transmission protocols. RFID cards manufactured to ISO 14443 specifications are typically low cost. One technology, MIFARE, is very applicable to the self-check-in hotel concept because of its wide-spread public use today, particularly in public transit where it is used in 80% of the market. 1 Because of this large-scale production, card costs are very low and the technology is known to be reliable. The MIFARE Mini card is a perfect choice for the self-check-in membership card because it is tailored to applications that need only small memory size. It features 320 bytes of electrically-eraseable programmable read-only memory (EEPROM) and a data retention period of 10 years. The embedded RFID tag itself consists of a MF1 IC S20 chip module mass-produced by NXP Semiconductor with a 4-turn wire coil antenna looped about the perimeter of the card. MIFARE Mini RFID cards can be purchased for as low as Figure 1. MIFARE Mini RFID card internal layout ( NXP Semiconductors) 1 http://www.mifare.net/about/ 4

approximately 0.36 USD at a volume of 200,000, with the potential for even lower costs at higher volumes. 2 IV. The RFID Reader The RFID reader must be capable of three main functions for this particular selfcheck-in concept. First, the reader must be capable of reading tags defined by the ISO 14443 Type A specification. Second, the reader must communicate to the room s door lock to unlock the door when approval is given. Third, the reader must be capable of conversing with the hotel s reservations system. While there are many RF door locks on the market today, there are very few that actually meet these three requirements and are of upscale hotel quality. The difficulty is not in meeting the first two requirements but the third requirement. Most RF door locks for the hospitality industry are made to be reprogrammed using a hand-held encoder. This means they must be manually reprogrammed with this encoder each time you want the door lock to recognize a different tag as the key. This is fine for the kiosk-style selfcheck-in where rooms are assigned and RF key cards encoded appropriately to the assigned room. But, this is not an efficient system for the concept at hand. There is one company that is making an RF door lock for the hospitality industry that is capable of being reprogrammed remotely. The Quantum RFID by Saflok coupled with Safelok s Messenger wireless communications system meets all three of the requirements and provides a great foundation to expand upon. The RF reader is capable of reading ISO 14443 tags and unlocking the door when the appropriate key is recognized. The Messenger system allows for communication between the RF reader and 2 MIFARE Mini pricing- http://www.smartcardworld.com/mifaremini.htm 5

the hotel s central operating hub. Messenger can remotely activate and cancel key authorizations, report door lock usage statistics, locate what rooms staff are in, and a variety of other beneficial information. The door lock also comes in a variety of styles and finishes to fit the hotel s current design scheme. In addition to all these features, the lock and the Messenger system are built with open architecture, allowing third parties to design custom Figure 2. Quantum RF door lock by Saflok. ( Saflok) software or hardware to further optimize the system for the particular application. Another feature that will be useful for the self-check-in concept is a small light panel on the outside of the door to inform the new guest whether the room is vacant or occupied. This could be a simple, two-node LED panel with a green light that is lit when the room is vacant and a red light for when the room is occupied. The current Quantum hardware does not offer this feature, but it is something that should be easily configurable due to the open architecture of the Quantum hardware. To keep the RF readers small and energy efficient, the readers will only be required to perform the following tasks: Provide the inductive coupling to the RF membership card. Query the middleware regarding a new membership card being used. Unlock the door when the appropriate card is used. Power the LED panel regarding occupancy of the room. Report low battery warnings 6

These five tasks should keep the reader hardware relatively simple and compact, which is necessary for an aesthetically-pleasing door lock in the hotel industry. V. Middleware The next critical item in the concept would be the implementation of software to allow for the remote query of the door locks to verify reservations in the hotel s reservation system. The customer will make their hotel reservations online, and the reservation information will be sent and stored to the individual hotel s reservation system. When the guest arrives and chooses a self-check-in room, the RF reader must be capable of instantly cross-checking the guest s customer ID number with the reservation system and promptly allowing entry into the room upon verification. While some RF hotel door lock companies offer software for use with their door locks, none offer quite the type of software applicable to this concept. Saflok does offer their System 6000 software to monitor a hotel s network of door locks, encode key cards, etc., but it does not provide quite the same function required in this particular application. Despite this, the reason the Saflok hardware and software was chosen was because of its open architecture to allow for the custom application needed here. The middleware will be tasked with the memory- and power-intensive jobs required of the system, allowing the RF readers on the door locks to remain small and energy efficient as outlined in the previous section. The easiest implementation of middleware would be to create a stand-alone program that queries the existing reservations system and controls and performs audits on the network of RF door locks. This program should therefore be capable of performing the following operations: 7

Receive keycard queries from multiple door locks to verify reservations. Query the reservations system to cross-check customer ID numbers with existing reservations. Write to the reservations system to log check-in time, room number, etc., to the new guest s account. Communicate back to the RF door locks to either grant or deny access to the room. Encode the RF door lock to accept the guest s customer ID card. Monitor reservation periods and re-encode RF door locks once a guest s reserved stay has completed. Additionally, the program could be capable of logging door lock usage data, low battery warnings, whether staff are in the room, and other general audit data. VI. Security Issues Security concerns are kept to a minimum because of the negligible information stored on the card. The fact that only the member s ID number is present on the RFID tag means no personal information can be stolen. The ID number cannot be used by itself except to open an already-reserved room. But this security risk is no different than if someone were to steal a normal room key. The ID cannot be used to make reservations or access personal information online because, like all membership programs, a password is required to access the user s account. The main security concern with RF tags is that a thief with an RF reader can read the membership card and then replicate the signal the tag emits to open the reserved room. 8

This scheme is limited by the short distance the tag is able to be read, approximately 10cm. The MIFARE-type cards have a good level of embedded security, including: Mutual challenge and response authentication (three pass) per ISO/IEC DIS 979802 Data encryption on RF channel with replay attack protection Individual set of two keys per sector (per application) to support multiapplication with key hierarchy Unique serial number for each device These security features seek to prevent simple, fraudulent reads. Also, the thief must know which room the member is staying in since the room number is not memorized by the membership card. If a thief is willing to go to such lengths to get into a member s room, they will always find a way to enter the room whether or not they can crack the built-in security features of the MIFARE Mini card. Therefore, it does not appear to be financially worthwhile to invest in RFID cards that have additional security features if only the membership ID number is stored on the card. VII. Difficulties As with the implementation of any new system, there are some inherent difficulties. Some of these difficulties include: 1) introduction of a new membership program 2) developing the appropriate middleware program 3) installing the new RFID hardware 4) educating staff and customers as to how the system works 9

The introduction of a new membership program will involve updating the hotel s website to discuss the benefits of the new program, purchase the MIFARE Mini membership cards to distribute to new members, and even creating a new marketing campaign. New middleware development will be the most time-consuming operation in the system s implementation. Working with a third-party middleware developer, the hotel managers will have to decide which features, discussed previously, they would like to implement into the system. The program willalso have to be configured to operate with a hotel s existing reservations system. Much time will need to be allotted to prototype testing and debugging before the system could be fully operational. Thanks to the open architecture of the Saflok products, the middleware development time will be drastically reduced compared to if the middleware programmers had to determine the reader s controls themselves. Installation of the new hardware would probably require the most capital investment next to the middleware development. Hotels slated to receive the system would need to determine how many rooms they would devote to self-check-in. The actual installation of the RF door locks should not pose a major problem. The locks themselves follow an industry standard, and the RF reader will require only minimal modifications to the door and can be installed without the door being removed. Not only will RF door locks need to be installed, but a hotel s wireless network capacity may need to be increased depending on the number of RF door locks installed. Additionally, a computer server would most likely need to be dedicated to the operation of the middleware. 10

Educating the staff on the use of the system would take time but should not be too difficult. For the most part, the staff would not play a part in the system except to help customers with questions or to troubleshoot problems. Most likely, a hotel would train just a few employees in the use of the system to create specialists since heavy staff involvement is not required. Additionally, signs would need to be created and posted to inform self-check-in customers where to proceed upon entry into the hotel to find the self-check-in rooms. VIII. Other Possible Implementations Although they are beyond the scope of this report, other areas within the hotel that could be used with these RF membership cards are: Access to guest amenities like the pool and gym Charging the room for guest services like restaurants, gift shops, and massages Access to the hotel s parking garage A kiosk could be set up where the member can wave their card in front of a reader to let the hotel know they would like their room cleaned. These additional ideas could be implemented into the middleware program, as well, so that a complete redesign of the hotel s network software is not required to gain the benefits of these features. 11

IX. Conclusion Today, the idea of self-check-in hotel rooms is becoming a reality through the use of check-in kiosks at select hotels. But today s travelers are looking for even more efficient ways to travel and methods to reduce wait time everywhere they go. The next step in self-check-in hotels is to allow the guest to proceed straight from the curb to their room with no staff or computer interface required. The idea of using RF door locks tied wirelessly to middleware developed to interact with a hotel s existing reservation system means that with a very cheap membership card embedded with a passive RF chip, a guest could achieve the most efficient hotel check-in in the hospitality industry to date. If travelers know of a certain hotel where they can do all the check-in work before they travel, that hotel can be sure to see an increase in its customer base as word of the new system spreads. 12

References 1. ISO 14443: An Introduction to the Contactless Standard for Smart Cards and its Relevance to Customershttp://www.oti.co.il/objects/ISO%2014443%20WP%204.11.pdf 2. MIFARE Mini MF1 IC S20 Functional Specificationhttp://www.nxp.com/acrobat_download/other/identification/m132210.pdf 3. MIFARE General Information- http://www.mifare.net 4. MIFARE Mini Smart Card pricinghttp://www.smartcardworld.com/mifaremini.htm 5. Hotel Security: The Evolving Electronic Lock- http://www.hotelonline.com/news/pressreleases1999_2nd/apr99_electroniclocks.html 6. Saflok: State-of-the-Art Access Management Systems- http://www.saflok.com/ 7. Collignon, Robert. When the Chips Are Down: RFID technology helps the hotel business fight back. Deloitte Executive Report, Jan 2005. 8. VingCard by Elsafe- http://www.vingcard.com 9. Muta, Matt. The Promise and Opportunity of RFID in Hospitality. Microsoft Hospitality, Jul 2006. 10. Albright, Brian. RFID at Your (Guests ) Service. Hotel & Motel Management, Mar 2007. 11. Prasad, C.G. Is Hospitality Being Victimized by IT? Express Hospitality, Nov 2007. 13