A Look Inside Today's Embedded RFID. Chris Diorio CTO, Impinj Inc.

Size: px
Start display at page:

Download "A Look Inside Today's Embedded RFID. Chris Diorio CTO, Impinj Inc."

Transcription

1

2 A Look Inside Today's Embedded RFID Chris Diorio CTO, Impinj Inc. 2

3 What is Embedded RFID? Definition Incorporating UHF RFID technology into another device for the purposes of configuration, authentication, or enablement Key feature: Unpowered communications Configure an unpowered electronic device Authenticate an unpowered consumable Passively enable a service

4 Configuring an Electronic Device Key applications Locked in transit Theft deterrence/disablement Location-dependent usage policies Configuration/upselling at retail point-of-sale Long-Range Antenna Short-Range Antenna Data Bus

5 Operational Model Today EPC / TID Network knows microprocessor s cryptographic key Reader reads tag s EPC and/or TID and sends to network Network computes token; reader writes token to Monza X Tablet power up, reads/decrypts token, operates per the token

6 The Enabler: Monza X I2C interface for µp read/write memory access 400 kbps I2C data rate Wake-on-write I2C interrupt Large user memory Monza X 2k: 2176 bits Monza X 8k: 8192 bits Monza (industry leading) read and write sensitivity 2 greater read range with DCI Identical read and write range with DCI True3D antenna technology QT security and privacy

7 Authenticating Consumables Key applications Verify authenticity Ensure quality control Store information about consumable

8 Operational Model Today EPC / TID, etc Indy reader reads tag information Tag identification (TID, EPC, any data in user memory) Freestyle verifies correct information then operates Proper Monza tag, correct cartridge type, etc. Freestyle bundles data for transfer to network

9 The Enabler: Monza 4 QT Industry-leading performance >3000 tag/min encoding speed 13m single-dipole read range Industry-leading features 128-bit EPC 96-bit total TID 512 bits user memory Impinj QT, FastID, TagFocus True3D antenna technology Dual, independent antenna ports allow redundant antennas for maximum read reliability 90º 180º 0º 270º Both antennas functional Still functions with one antenna damaged

10 Enabling a Service Key applications Convenience Fraud detection/prevention Fraud in diesel filling today is 5% of sales or $1.8Bn annually

11 Operational Model Today EPC / TID, etc Enable pump Speedway reader reads Monza tag information Tag identification (TID, EPC, any data in user memory) Network verifies truck information then enables pump

12 Operational Model Tomorrow EPC, TID, VIN, fuel, odometer, OBD Enable pump Monza X interfaces to truck CAN BUS Tag identification (EPC, TID, any data in user memory) VIN, fuel level, odometer reading, on-board diagnostics Network verifies EPC, TID, VIN, fuel, odometer, enables pump Also checks for vehicle faults

13 The Enabler: Monza X Wired link to truck controlled-areanetwork (CAN) bus Allows network to monitor vehicle, fuel, usage, diagnostics DCI increases Monza X read range 2 greater than passive operation >25m read and write range Passive Read Passive Write 18dBm 14dBm DC-Power Read DC-Power Write 24dBm 24dBm

14 Future of Embedded RFID Embedded RFID has enormous potential today Configure an unpowered electronic device Authenticate an unpowered consumable Passively enable a service The next-generation UHF Gen2 protocol, G2, will make embedded RFID even better Fully backward compatible with UHF Gen

15 G2 Protocol Functionality Gen2 Today Select Inventory Access G2 Enhancements Anticounterfeiting Security File Management Untraceability Loss Prevention Definition Select a population of tags Inventory selected tags; get their EPCs Read/write/lock tag memory; kill the tag Definition Authenticate a tag as genuine Modify tag information securely Create files and assign access privileges Hide tag data to protect consumer privacy Use a tag for EAS In today s UHF Gen2 protocol New in UHF Gen2 V2 protocol = G

16 G2 for Cryptographic Anticounterfeiting Today s Gen2 RFID TID Future G2 RFID Key Read TID Challenge (RN) Response Reader reads static TID from tag memory Counterfeiter can clone tag by copying TID Tag computes response from reader s random challenge and tag s secret key Counterfeiter cannot clone tag without knowing secret key

17 G2 for Cryptographic Security Command Challenge Authenticate AuthComm SecureComm KeyUpdate FilePrivilege TagPrivilege Function Challenges multiple tags simultaneously Performs tag, reader, or mutual authentication Authenticates a tag message with a MAC Encrypts a tag message Updates a tag s stored key Alters a reader s privileges to a file Alters a reader s privileges to the tag

18 Device Configuration with G2 New Token EPC / TID Everything we had before plus Tag cryptographically verifies network is genuine Authenticated network can revoke or update a token

19 Consumables Authentication with G2 EPC/TID, challenge, response Everything we had before plus Indy cryptographically challenges tag Tag computes and sends cryptographic response to Indy Freestyle bundles data for later transfer to network Network verifies that tag s cryptographic response matches challenge

20 Service Enablement with G2 EPC/TID, VIN, OBD, fuel, odometer, challenge, response Enable pump Everything we had before plus Reader cryptographically challenges tag then sends challenge and response to network Network verifies that tag s cryptographic response matches challenge then enables pump

21 G2 Status GS1 EPCglobal has finalized the protocol Passed community review In the final stages of IP review EPCglobal will ratify the protocol in 2013 ISO is standardizing the crypto suites 9 crypto suites submitted to date Present, ECC, AES( 2), Grain, CryptoGPS, XOR, RAMON, ECDSA-ECDH ISO will ratify the first crypto suites in

22 Chris Diorio

UHF RFID Embedded in Electronic Devices. Chris Diorio CTO, Impinj Inc.

UHF RFID Embedded in Electronic Devices. Chris Diorio CTO, Impinj Inc. UHF RFID Embedded in Electronic Devices Chris Diorio CTO, Impinj Inc. 2 2012 UHF RFID Applications Today Supply-Chain Tracking Asset/Returns Management Retail Inventory Pharmaceuticals Authentication Consumables

More information

Intel and the Future of Consumer Electronics. Shahrokh Shahidzadeh Sr. Principal Technologist

Intel and the Future of Consumer Electronics. Shahrokh Shahidzadeh Sr. Principal Technologist 1 Intel and the Future of Consumer Electronics Shahrokh Shahidzadeh Sr. Principal Technologist Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.

More information

Easily add high-performance UHF RFID and bar code capture to the mobile devices

Easily add high-performance UHF RFID and bar code capture to the mobile devices AT RFD 8500 Series Easily add high-performance UHF RFID and bar code capture to the mobile devices With the RFD8500 compatible third-party mobile devices, tablets and smart phones with enterprise-class

More information

Datasheet IMPINJ MONZA DURA DATASHEET IPJ-P6005-X2AT X-8K. Version , Impinj, Inc.

Datasheet IMPINJ MONZA DURA DATASHEET IPJ-P6005-X2AT X-8K. Version , Impinj, Inc. Datasheet IMPINJ MONZA DURA DATASHEET IPJ-P6005-X2AT X-8K Version 4.0 2016, Impinj, Inc. www.impinj.com OVERVIEW Monza X-8K Dura is a UHF Gen2 RFID IC product with 8192 bits of user Non Volatile Memory

More information

UHF RFID tag IC with cryptographic authentication

UHF RFID tag IC with cryptographic authentication SPECIFICATION 1 FEATURES SMIC EEPROM CMOS 180 nm Operating temperature range -40 +65 C Passive operation no battery needed Operating frequency 860-960 MHz EPC Class 1 Generation 2 compliant 352 bit memory

More information

RX Reader. User Manual UHF RFID. Version 1.0

RX Reader. User Manual UHF RFID. Version 1.0 UHF RFID RX Reader User Manual Version 1.0 2016 unitech Electronics Co., Ltd. All rights reserved. unitech is a registered trademark of unitech Electronics Co., Ltd. Preface About This Manual This manual

More information

New Delhi India. Ph: (+91) , Identium Tech Solutions

New Delhi India.   Ph: (+91) , Identium Tech Solutions RFID Inlay Catalogue 2017 New Delhi India Email: tags@identags.com Ph: (+91) 7827944632, 9711863861 INTRODUCTION: ID X40 IS A WIDE BAND EPC CLASS 1 GEN 2 MULTIPURPOSE TAG HAVING EXCELLENT READ PERFORMANCE

More information

Secure UHF Tags with Strong Cryptography Development of ISO/IEC Compatible Secure RFID Tags and Presentation of First Results

Secure UHF Tags with Strong Cryptography Development of ISO/IEC Compatible Secure RFID Tags and Presentation of First Results Development of ISO/IEC 18000-63 Compatible Secure RFID Tags and Presentation of First Results Walter Hinz, Klaus Finkenzeller, Martin Seysen Barcelona, February 19 th, 2013 Agenda Motivation for Secure

More information

Security and Privacy in RFID Evolving Application Spaces for Edge Security

Security and Privacy in RFID Evolving Application Spaces for Edge Security 1 Security and Privacy in RFID Evolving Application Spaces for Edge Security Chris Hanebeck, VP Product Management & Marketing Revere Security First, Allow Me to Scare Everyone And It Gets Worse Lockheed

More information

Impinj Monza X-8K Dura Datasheet Rev 1.1 September 10, 2013

Impinj Monza X-8K Dura Datasheet Rev 1.1 September 10, 2013 Part Order #: IPJ-P6005-X2AT Impinj Monza X-8K Dura Datasheet Rev 1.1 September 10, 2013 Monza X-8K Dura is a UHF Gen2 RFID IC product with 8192 bits of user Non Volatile Memory (NVM) and an I2C interface.

More information

Hibiki Project and Secure RFID Project

Hibiki Project and Secure RFID Project Hibiki Project and Secure RFID Project October 22, 2007 Hitachi, Ltd. Yo Nakajima Hitachi, Ltd. 2007. All rights reserved. 0 1. About Hitachi 2. Hibiki Project / Secure RFID Project 3. Cases in Japan 4.

More information

FLYchip 2kbit User Guide

FLYchip 2kbit User Guide Product range FLYchip 2kbit Reference 12312 Document Technical bulletin FLYchip 2kbit User Guide Copyright 2004-2013 MAINtag RFID & Tracing Technologies. 8 rue Edouard 94100 Saint-Maur des Fossés Registration

More information

Impinj Monza X-2K Dura Datasheet

Impinj Monza X-2K Dura Datasheet Part Order #: IPJ-P6001-Q2AT Impinj Monza X-2K Dura Datasheet Rev 1.31 October 4, 2012 Monza X-2K Dura is a UHF Gen2 RFID IC product with 2176 bits of Non Volatile Memory (NVM) and an I2C interface. As

More information

Indy Reader Chip Family

Indy Reader Chip Family UHF Gen 2 RFID Transceivers Indy Reader Chip Family Indy Reader Chip Family Performance and Flexibility Key Building Blocks Address All Market Segments The Impinj UHF RFID product line includes the Indy

More information

AdvanPay-160 High power desktop RFID reader with hard tag detacher and keyboard wedge

AdvanPay-160 High power desktop RFID reader with hard tag detacher and keyboard wedge Product overview AdvanPay-160 is a high power RFID desktop reader with hard tag detacher that increases the speed of payment at cash registers. AdvanPay-160 merges 2 processes: 1.Hard tag detachment 2.Product

More information

RFID Tag. Catalogue New Delhi India. Ph: (+91) , Identium Tech Solutions

RFID Tag. Catalogue New Delhi India.   Ph: (+91) , Identium Tech Solutions RFID Tag Catalogue 2017 New Delhi India Email: tags@identags.com Ph: (+91) 7827944632, 9711863861 HF RFID TAGS INTRODUCTION: ID HDL38IS A HIGH MEMORY HF RFID INLAY WITH IK MEMORY SIZE FEATURES : Ø FAST

More information

NFC FOR CONSUMABLES AND ACCESSORIES

NFC FOR CONSUMABLES AND ACCESSORIES NFC FOR CONSUMABLES AND ACCESSORIES JORDI JOFRE NFC READERS NFC EVERYWHERE 22/02/2018 WEBINAR SERIES: HOW TO DEVELOP NFC APPLICATIONS PUBLIC Agenda NFC for product authentication & identification NFC portfolio

More information

ACOS 3 Contact Card. Functional Specification. Subject to change without prior notice

ACOS 3 Contact Card. Functional Specification.   Subject to change without prior notice ACOS 3 Contact Card Functional Specification Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Features...3 1.2. Technical Specifications...3 1.2.1. Electrical...3 1.2.2.

More information

Interactive Gen2 Bridging the Gap between Passive RFID, Sensors and Electronics

Interactive Gen2 Bridging the Gap between Passive RFID, Sensors and Electronics Interactive Gen2 Bridging the Gap between Passive RFID, Sensors and Electronics Victor Vega Marketing Director, RFID Solutions 28 July 2011 Agenda AGENDA Intro Traditional & Next Gen RFID Sensor Supporting

More information

AsReader Desktop Demo Reference Guide v1.2

AsReader Desktop Demo Reference Guide v1.2 AsReader Desktop Demo Reference Guide v1.2 Asterisk, Inc. 2018-11-5 Revision History No. Version Modified Content Date Reviser 1 1.1 Initial version 2018/10/18 Zhen Liu 2 1.2 1. The mask, tag lock, tag

More information

AdvanPay-110 High power desktop RFID reader with keyboard wedge

AdvanPay-110 High power desktop RFID reader with keyboard wedge Product overview AdvanPay-110 is a high power RFID UHF desktop reader that integrates: An antenna with a highly confined reading area Keyboard emulation by hardware. It s not needed to install any software

More information

Security in NFC Readers

Security in NFC Readers Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic

More information

Lightweight Cryptography for RFID Systems

Lightweight Cryptography for RFID Systems Lightweight Cryptography for RFID Systems Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA G. Gong (University of Waterloo)

More information

THE BEST OF BOTH WORLDS. Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security. By Mahdi Mekic, NXP Semiconductors

THE BEST OF BOTH WORLDS. Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security. By Mahdi Mekic, NXP Semiconductors THE BEST OF BOTH WORLDS Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security By Mahdi Mekic, NXP Semiconductors A new generation of contactless smartcards, built to support

More information

Paul A. Karger

Paul A. Karger Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger karger@watson.ibm.com Outline Identify specific problem with FIPS 201 Problem of

More information

RFID Authentication: Security, Privacy and the Real World

RFID Authentication: Security, Privacy and the Real World RFID Authentication: Security, Privacy and the Real World ESC 2013 Jens Hermans KU Leuven - COSIC 15 January 2013 Introduction Cryptography in Daily Life RFID Introduction Cryptography in Daily Life Security

More information

Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning

Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to

More information

UHF RFID Reader AsReader Box

UHF RFID Reader AsReader Box UHF RFID Reader AsReader Box Command Reference Ver.1.14 Asterisk, Inc. Contents 1 Interface specification... 1 2 Protocol Description... 1 3 Formats of data frames... 2 3.1 Command Frame Format (From HOST)...

More information

System LSI Research Center, Grad. Sch.. Information Science & Electrical Engineering, Kyushu Univ., Japan

System LSI Research Center, Grad. Sch.. Information Science & Electrical Engineering, Kyushu Univ., Japan RFID Privacy Using User-controllable Uniqueness Sozo INOUE, Hiroto YASUURA System LSI Research Center, Grad. Sch.. Information Science & Electrical Engineering, Kyushu Univ., Japan Suppose: Ad.: Super

More information

NXP G2 CUSTOM COMMANDS VERSION

NXP G2 CUSTOM COMMANDS VERSION NXP G2 CUSTOM COMMANDS VERSION 103012 M 9 N X P G 2 C o m m a n d s P a g e 2 TABLE OF CONTENTS 1 Overview... 3 1.1 Required Reading... 3 1.2 Document Scope... 3 1.3 Tag Information... 3 2 Enable EAS...

More information

Vela Desktop Reader User Guide

Vela Desktop Reader User Guide Vela Desktop Reader User Guide Disclaimer Star Systems International and the Star Systems International logo are trademarks of Star Systems International Ltd. in Hong Kong and other countries. Microsoft,

More information

Secure Card Reading and PIN Solutions

Secure Card Reading and PIN Solutions Secure Card Reading and PIN Solutions When it comes to Card Reader security and reliability MagneSafe Secure Card Readers & PIN Pads Merchants and retailers both online and in-store rely on MagTek. MagTek

More information

Octane LLRP Version

Octane LLRP Version Version 5.12.3 Copyright 2012-2017 Impinj, Inc. All rights reserved http://www.impinj.com Impinj, Octane, Speedway, xspan and xarray are either registered trademarks or trademarks of Impinj, Inc. Visit

More information

Manufacturer Type/Model Name Frequency Description Standard/Notes Security

Manufacturer Type/Model Name Frequency Description Standard/Notes Security Alien Technology Inpinj Higgs 2 860~960 MHz EPC up to 192, TID 64 ISO18000-6c - EPC Gen2?? Higgs 3 860~960 MHz EPC up to 480, TID 64 ISO18000-6c - EPC Gen2 Dynamic Authentication - Enhanced IC security

More information

A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function

A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function sensors Article A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function He Xu 1,2, * ID, Jie Ding 1,2, Peng Li 1,2 ID, Feng Zhu 1,2 and Ruchuan Wang 1,2 1 School of Computer

More information

iclass SE Platform Solutions The New Standard in Access Control

iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.

More information

RPT100. Bluetooth UHF RFID & Barcode Reader

RPT100. Bluetooth UHF RFID & Barcode Reader RPT100 Bluetooth UHF RFID & Barcode Reader Intro The RPT100 is Bluetooth UHF RFID & barcode reader, compatible with any host devices using Android, ios and Windows (Mobile, CE, PC). Unlike typical gun-type

More information

Speedway Reader IPJ-R1000 for Gen 2 UHF RFID

Speedway Reader IPJ-R1000 for Gen 2 UHF RFID Overview The EPCglobal -certified Speedway IPJ-R1000 is a fixed Gen 2 UHF RFID tag reader that provides network connectivity between tag data and enterprise system software. A key element of Impinj's GrandPrix

More information

ST25TV product presentation. June 2018

ST25TV product presentation. June 2018 ST25TV product presentation June 2018 ST25TV512 / 02K Product 2 The ST25TV chip belongs to ST25 NFC / RFID Tags & Readers family ST25TV is the natural evolution of LRI2K series The ST25TV512 / ST25TV02K

More information

Efficient RFID authentication scheme for supply chain applications

Efficient RFID authentication scheme for supply chain applications University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 Efficient RFID authentication scheme for supply chain applications

More information

PIONEER a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag

PIONEER a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag PIONEER a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag Hannes Gross 1, Erich Wenger 1, Honorio Martín 2, and Michael Hutter 1 1 Institute for Applied Information Processing

More information

DEFCON 26 - Playing with RFID. by Vanhoecke Vinnie

DEFCON 26 - Playing with RFID. by Vanhoecke Vinnie DEFCON 26 - Playing with RFID by Vanhoecke Vinnie 1. Contents 2. Introduction... 3 3. RFID Frequencies... 3 Low frequency... 3 High frequency... 3 Ultra-high frequency... 3 4. MIFARE... 4 MIFARE Classic...

More information

SPSXM001FOM. Smart Passive Sensor for Direct Moisture Sensing

SPSXM001FOM. Smart Passive Sensor for Direct Moisture Sensing Smart Passive Sensor for Direct Moisture Sensing Description The is a battery free wireless sensor for moisture level detection on non metal surfaces. Smart Passive Sensors use the Magnus S2 Sensor IC

More information

ANDROID UHF API. Bright Alliance Technology Limited

ANDROID UHF API. Bright Alliance Technology Limited ANDROID UHF API Bright Alliance Technology Limited 1 Import Package and library to project UHF function is in the uhf.jar - com.android.hdhe.uhf.reader.uhfreader 2 Functions 2.0.1 getinstance() Function:

More information

WHAT FUTURE FOR CONTACTLESS CARD SECURITY?

WHAT FUTURE FOR CONTACTLESS CARD SECURITY? WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues

More information

Product catalogue. for TagMaster long range RFID products

Product catalogue. for TagMaster long range RFID products Product catalogue for TagMaster long range RFID products TagMaster RFID Products TagMaster develops and markets high quality RFID products that are flexible to use as well as efficient and reliable. TagMaster

More information

DUAL FREQUENCY NFC TYPE 2 & EPC GEN2 V2 TRANSPONDER IC

DUAL FREQUENCY NFC TYPE 2 & EPC GEN2 V2 TRANSPONDER IC EM MICROELECTRONIC - MARIN SA em echo / EM4423 DUAL FREQUENCY NFC TYPE 2 & EPC GEN2 V2 TRANSPONDER IC Description em echo corresponds to the latest generation of EM Microelectronic contactless devices,

More information

S P O N S O R E D B Y

S P O N S O R E D B Y S P O N S O R E D B Y Audio Requirements Log in using the link in the email you received after you registered Click on the triangle next to the word Audio on the tool palette Choose use Telephone or Mic

More information

SIC4340 with 3x Potentiometer for Action Figure Toy Ultra-FDX Transponder IC SIC7888 SIC7888 is a read/write low frequency FDX RFID microchip intentionally designed to maximize the read range.

More information

DUAL FREQUENCY RAINFC TRANSPONDER IC

DUAL FREQUENCY RAINFC TRANSPONDER IC DUAL FREQUENCY RAINFC TRANSPONDER IC DESCRIPTION em echo corresponds to the latest generation of EM Microelectronic contactless devices, bringing innovative features to the NFC and EPC TM worlds. The chip

More information

SKYEWARE PROTOCOL V3 REFERENCE GUIDE VERSION

SKYEWARE PROTOCOL V3 REFERENCE GUIDE VERSION SKYEWARE PROTOCOL V3 REFERENCE GUIDE VERSION 040218 SkyeWare Protocol V3 Reference Guide P a g e 2 COPYRIGHT INFORMATION: Copyright 2018 Novanta Corporation. All rights reserved. Version 040218 This product

More information

Weaknesses in Two Recent Lightweight RFID Authentication Protocols

Weaknesses in Two Recent Lightweight RFID Authentication Protocols Weaknesses in Two Recent ightweight RFID Authentication Protocols Pedro Peris-opez 1, Julio C. Hernandez-Castro 2, Juan.E. Tapiador 3, Tieyan i 4, and Jan C.A. van der ubbe 1 1 Department of Information

More information

AVL-2000PLUS - Advanced Vehicle Auto Data Server. Solutions

AVL-2000PLUS - Advanced Vehicle Auto Data Server. Solutions AVL-2000PLUS - Advanced Vehicle Auto Data Server Solutions Low Power Consumption and High Performance with Intel Atom Z510 Processor The AVL-2000PLUS features an Intel Atom Z510 processor and Intel System

More information

A Novel Approach to RFID Authentication: The Vera M4H Unclonable RFID IC

A Novel Approach to RFID Authentication: The Vera M4H Unclonable RFID IC A Novel Approach to RFID Authentication: The Vera M4H Unclonable RFID IC Presenter: Vivek Khandelwal, Vice President of Marketing & Business Development 1 Agenda» Company Overview» PUF Technology Overview»

More information

NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER

NC1701  ENHANCED VEHICLE COMMUNICATIONS CONTROLLER NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER Nebula Systems has created the first dedicated controller for use in Telematics embedded systems, enabling companies in the Connected Car space to access

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

Spoofing Attack Against an EPC Class One RFID System

Spoofing Attack Against an EPC Class One RFID System Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2009 Spoofing Attack Against an EPC Class One RFID System Christopher

More information

Confidex UHF RFID and NFC Hard Tags and Labels for Smart Industries

Confidex UHF RFID and NFC Hard Tags and Labels for Smart Industries Confidex UHF RFID and NFC Hard Tags and Labels for Smart Industries Confidex links everything Intelligently. Data to Knowledge enabling Industrial Digitalization since 2005 Confidex is the world s leading

More information

Platino Handheld Reader User Guide

Platino Handheld Reader User Guide Platino Handheld Reader User Guide Reader Overview 1. ENTER 2. READ 3. SETTING 4. POWER 5. DIRECTIONS (UP, DOWN, LEFT, RIGHT) 6. NUMBER PAD (1,2,3 0,*,#) 7. FUNCTION 1 (F1) 8. FUNCTION 2 (F2) 9. FUNCTION

More information

IPJ-RS500-GX, IPJ-RS500-EU Electrical, Mechanical, & Thermal Specification Indy RS500 Overview

IPJ-RS500-GX, IPJ-RS500-EU Electrical, Mechanical, & Thermal Specification Indy RS500 Overview Indy RS500 Datasheet, Electrical, Mechanical, & Thermal Specification Indy RS500 Overview Indy RS500 is a completely integrated RAIN RFID reader module. It can be easily added to an embedded system, requiring

More information

Securing Pharmaceutical and High-Value Products Against Tag Reapplication Attacks Using NFC Tags

Securing Pharmaceutical and High-Value Products Against Tag Reapplication Attacks Using NFC Tags Securing Pharmaceutical and HighValue Products Against Tag Reapplication Attacks Using NFC Tags Nirupama Bulusu Portland State University, Portland OR, USA nbulusu@pdx.edu Naif Alzahrani Portland State

More information

UM2268 User manual. ST25RU3993-EVAL board software. Introduction

UM2268 User manual. ST25RU3993-EVAL board software. Introduction User manual ST25RU3993-EVAL board software Introduction This document describes the graphical user interface (GUI) software (STSW-ST25RU001) for the ST25RU3993-EVAL board. The ST25RU3993-EVAL board is

More information

MaxReader Development Kit

MaxReader Development Kit MaxReader Development Kit Capture, transmit and store more data with F-RAM high-performance wireless memory EPC Gen2 Wireless Protocol (860MHz 960MHz) Quick Reference Guide Quick Reference Guide MaxReader

More information

Data Synchronization Specification

Data Synchronization Specification Data Synchronization Specification Shigeya Suzuki, Mark Harrison Auto-ID Lab Japan, Keio University, Japan, Auto-ID Lab, University of Cambridge, UK Auto-ID Labs White Paper WP-BIZAPP-034 Report Abstract:

More information

JMY600 Series IC Card Module

JMY600 Series IC Card Module MIFARE & ISO14443A & ISO14443B & ISO7816 & ISO15693 IC CARD MODULE JMY600 Series IC Card Module MIFARE Plus Card Operation Guide (Revision 1.00) Jinmuyu Electronics Co., LTD April 7, 2015 Please read this

More information

SL2S General description ICODE DNA. 1.1 Contactless energy and data transfer. 1.2 Anticollision. 1.3 Security and privacy aspects

SL2S General description ICODE DNA. 1.1 Contactless energy and data transfer. 1.2 Anticollision. 1.3 Security and privacy aspects 374730 1. General description The is a leading-edge HF tag IC targeting brand protection tagging applications which require HF long read range as well as cryptographic authentication check.the security

More information

RVU - Update Programming For Catalytic Converter System (IC)

RVU - Update Programming For Catalytic Converter System (IC) 26 07 01 May 11, 2007 2010066/3 Supersedes Technical Service Bulletin Group 26 number 05-03 dated July 20, 2005 due to addition of Saga warranty data, change in VIN range, and reformatting RVU - Update

More information

SUBJECT: P/N 8291xxx e-stroke Disc Low Lining Clearance Fault Detection

SUBJECT: P/N 8291xxx e-stroke Disc Low Lining Clearance Fault Detection 1.0 PURPOSE To notify e-stroke GEN 3 system customers that firmware version V3.25 supports disc caliper low lining clearance detection. 2.0 BACKGROUND P/N 8291xxx series CCM s are used with all S-CAM /

More information

DESIGN AND DEVELOPMENT OF A STATE TRANSITION TABLE FOR THE EPCGLOBAL UHF CLASS1 GEN2 RFID STANDARD. Akram Kamrani

DESIGN AND DEVELOPMENT OF A STATE TRANSITION TABLE FOR THE EPCGLOBAL UHF CLASS1 GEN2 RFID STANDARD. Akram Kamrani DESIGN AND DEVELOPMENT OF A STATE TRANSITION TABLE FOR THE EPCGLOBAL UHF CLASS1 GEN2 RFID STANDARD by Akram Kamrani B.S., Sharif University of Technology, 2007 Submitted to the Graduate Faculty of Swanson

More information

CELLULAR-BASED READER & GATEWAY APPLICATIONS

CELLULAR-BASED READER & GATEWAY APPLICATIONS Developer Note CELLULAR-BASED READER & GATEWAY APPLICATIONS INSTRUCTIONAL GUIDANCE Version 1.0 2017, Impinj, Inc. www.impinj.com The following article aims to help systems integrators implement business

More information

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar,

Leveraging the full potential of NFC to reinvent physical access control. Friday seminar, Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses

More information

Toward Practical Public Key Anti-Counterfeiting for Low-Cost EPC Tags

Toward Practical Public Key Anti-Counterfeiting for Low-Cost EPC Tags Toward Practical Public Key Anti-Counterfeiting for Low-Cost EPC Tags Alex Arbit, Yossef Oren and Avishai Wool Computer and Network Security Lab, School of Electrical Engineering Tel-Aviv University, Ramat

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators The Evolution of Card Reading Technology: MagneSafe technology has evolved exponentially from its inception in 2006 when it delivered the industry s first secure card

More information

Card Issuance/Encoding & PIN Pads

Card Issuance/Encoding & PIN Pads Card Issuance/Encoding & PIN Pads From Card Issuance to Card Security Card Issuance/Encoding & PIN Pads Card issuers know they can put their trust in Mag- Tek. Whether meeting the growing need for instant,

More information

ETSI Standardization for (RF)ID-Systems. ETSI RFID Workshop, February 25th,

ETSI Standardization for (RF)ID-Systems. ETSI RFID Workshop, February 25th, ETSI Standardization for (RF)ID-Systems ETSI RFID Workshop, February 25th, 2008 1 TCAM Statement At its 21 st meeting, Oct. 2006 TCAM stated that RFID Readers / Writers, RFID Tags active and passive fall

More information

About TagMaster. Application Areas

About TagMaster. Application Areas Product catalogue About TagMaster TagMaster develops and markets high quality RFID products that are efficient, reliable and flexible to use. The philosophy of TagMaster products is characterized of long

More information

Functional Specification

Functional Specification Functional Specification ACOS5 Cryptographic Smart Card Advanced Card Systems Ltd. Website : www.acs.com.hk Email : info@acs.com.hk A C O S 5 S h o r t R e f e r e n c e M a n u a l CONTENTS 1.0. INTRODUCTION...

More information

PRESENTATION PRESENTER / DATE:

PRESENTATION PRESENTER / DATE: PRESENTATION PRESENTER / DATE: THE COMPANY COMPETENCES & EXPERIENCE OFFERED PRODUCTS & SERVICES THE COMPANY ARE CON is a sales, service and consulting organization within the smart card industry, targeting

More information

SYRDBT. SYRIS Handheld bluetooth RFID Reader

SYRDBT. SYRIS Handheld bluetooth RFID Reader SYRDBT SYRIS Handheld bluetooth RFID Reader V0200 SYRIS Technology Corp. Address: 12F., No.16, Sec. 2, Taiwan Blvd., West Dist., Taichung City 403, Taiwan TEL: +886-4-2207-8888 FAX: +886-4-2207-9999 E-Mail:

More information

Programming Manual RFID (Radio Frequency Identification) SLP-TX403R.

Programming Manual RFID (Radio Frequency Identification) SLP-TX403R. Programming Manual RFID (Radio Frequency Identification) Rev. 1.00 SLP-TX400R SLP-TX403R http://www.bixolon.com Table of Contents 1. Manual Information... 3 2. Basic Theory... 3 2-1 RFID Printer... 3 2-2

More information

Hardware Implementation of RFID Collaberal Affirmation Protocol

Hardware Implementation of RFID Collaberal Affirmation Protocol Hardware Implementation of RFID Collaberal Affirmation Protocol 1 Murali Krishna Bathula, M.Tech student,kiet, murali.ece713@gmail.com 2 B.Ratna Raju, Assoc.Prof,KIET, ratna_rit@yahoo.com 3 Dr.G.N.Swamy,

More information

Secure Card Reader Authenticators

Secure Card Reader Authenticators Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture

More information

Alternative Electronic Fare Media For Regional Integration

Alternative Electronic Fare Media For Regional Integration Alternative Electronic Fare Media For Regional Integration Michael Veltri Port Authority of Allegheny County Pittsburgh, Pennsylvania Alternative Electronic Fare Media For Regional Integration Port Authority

More information

TAMPER-EVIDENT DUAL FREQUENCY RAINFC TRANSPONDER IC

TAMPER-EVIDENT DUAL FREQUENCY RAINFC TRANSPONDER IC TAMPER-EVIDENT DUAL FREQUENCY RAINFC TRANSPONDER IC DESCRIPTION em echo-t corresponds to the latest generation of EM Microelectronic contactless devices, bringing innovative features to the NFC and EPC

More information

Symmetric Encryption based Privacy using Lightweight Cryptography

Symmetric Encryption based Privacy using Lightweight Cryptography Date of Acceptance: Grade: Instructor: Symmetric Encryption based Privacy using Lightweight Cryptography for RFID tags Raviteja Sudulaganti Master Thesis UNIVERSITY OF HELSINKI Department of Computer Science

More information

BEAWebLogic RFID. Edge Server. Using the Reader Simulator

BEAWebLogic RFID. Edge Server. Using the Reader Simulator BEAWebLogic RFID Edge Server Using the Reader Simulator Version 2.1 Revised: June 29, 2006 Copyright Copyright 1995-2006 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software is

More information

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview

SECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview SECURITY CRYPTOGRAPHY Cryptography Overview Brochure Cryptography Overview DPA-resistant and Standard Cryptographic Hardware Cores DPA (Differential Power Analysis) Resistant Hardware Cores prevent against

More information

RFID SECURITY USING LIGHTWEIGHT MUTUAL AUTHENTICATION AND OWNERSHIP TRANSFER PROTOCOL

RFID SECURITY USING LIGHTWEIGHT MUTUAL AUTHENTICATION AND OWNERSHIP TRANSFER PROTOCOL RFID SECURITY USING LIGHTWEIGHT MUTUAL AUTHENTICATION AND OWNERSHIP TRANSFER PROTOCOL Amol Bandal 1 and Shankar Nawale 2 1 Department of Computer Engineering, Sinhgad Institute, Lonavala, Maharashtra,

More information

An Authentication Framework for Integrating RFID Systems

An Authentication Framework for Integrating RFID Systems An Authentication Framework for Integrating RFID Systems Sungbae Ji, Hyunrok Lee, Sungjune Yoon, and Kwangjo Kim Auto-ID Lab, ICU, Korea Auto-ID Labs White Paper WP-SWET-025 Software & Network Summary

More information

Fare Media: Past, Present and Future. Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010

Fare Media: Past, Present and Future. Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010 Fare Media: Past, Present and Future Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010 Evolution of Transit Fare Media Other Form Factors (contactless tokens and tags,

More information

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals

CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals This course contains copyrighted material used by permission of Logical Operations, Inc. Slide 1 Course 01: Security Fundamentals The Information

More information

PIN Entry & Management

PIN Entry & Management PIN Entry & Management From PIN selection to PIN verification Card issuers and merchants know they can put their trust in MagTek. Whether meeting the growing need for instant, in-branch card and PIN issuance

More information

HID Proximity Credentials

HID Proximity Credentials HID Proximity Credentials ProxCard II Value priced 125 khz proximity card Base Part Number 1326 Price competitive with all other card technologies Thin enough to carry in a wallet or purse ISOProx II 125

More information

DUAL FREQUENCY NFC TYPE 2 & EPC GEN2 V2 TRANSPONDER IC

DUAL FREQUENCY NFC TYPE 2 & EPC GEN2 V2 TRANSPONDER IC EM MICROELECTRONIC - MARIN SA DUAL FREQUENCY NFC TYPE 2 & EPC GEN2 V2 TRANSPONDER IC Description corresponds to the latest generation of EM Microelectronic contactless devices, bringing innovative features

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

H1PROT.PDF 14 Pages Last Revised 02/11/06. Micro RWD H1/S Protocol

H1PROT.PDF 14 Pages Last Revised 02/11/06. Micro RWD H1/S Protocol Data Sheet H1PROT.PDF 14 Pages Last Revised 02/11/06 Micro RWD H1/S Protocol The MicroRWD H1/S version is a complete reader and tag acceptance solution for Hitag 1 RF transponders (including Hitag S256

More information

UHF RFID serial Interface protocol V2.2

UHF RFID serial Interface protocol V2.2 YR903 UHF RFID serial Interface protocol V2.2 1 SPECIFICATION OF THE DATA PACKET 3 1.1 RS-232 CONFIGURATION 3 1.2 DATA PACKET DEFINITION 3 1.2.1 HOST COMMAND DATA PACKET DEFINITION 3 1.2.2 RESPONSE PACKET

More information

Performance Evaluation of a Secure Low Level Reader Protocol (LLRP) Connection

Performance Evaluation of a Secure Low Level Reader Protocol (LLRP) Connection 40 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.3, March 2009 Performance Evaluation of a Secure Low Level Reader Protocol (LLRP) Connection Sana Qadir and Mohammad Umar

More information

Overview RFID-Systems

Overview RFID-Systems Overview RFID-Systems MSE, Rumc, RFID, 1 References [1] Klaus Finkenzeller, RFID-Handbuch, 5. Auflage, Hanser, 2008. [2] R. Küng, M. Rupf, RFID-Blockkurs, ergänzende MSE-Veranstaltung, ZHAW, 2009. [3]

More information

Atmel Trusted Platform Module June, 2014

Atmel Trusted Platform Module June, 2014 Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four

More information