A Look Inside Today's Embedded RFID. Chris Diorio CTO, Impinj Inc.
|
|
- David Hensley
- 6 years ago
- Views:
Transcription
1
2 A Look Inside Today's Embedded RFID Chris Diorio CTO, Impinj Inc. 2
3 What is Embedded RFID? Definition Incorporating UHF RFID technology into another device for the purposes of configuration, authentication, or enablement Key feature: Unpowered communications Configure an unpowered electronic device Authenticate an unpowered consumable Passively enable a service
4 Configuring an Electronic Device Key applications Locked in transit Theft deterrence/disablement Location-dependent usage policies Configuration/upselling at retail point-of-sale Long-Range Antenna Short-Range Antenna Data Bus
5 Operational Model Today EPC / TID Network knows microprocessor s cryptographic key Reader reads tag s EPC and/or TID and sends to network Network computes token; reader writes token to Monza X Tablet power up, reads/decrypts token, operates per the token
6 The Enabler: Monza X I2C interface for µp read/write memory access 400 kbps I2C data rate Wake-on-write I2C interrupt Large user memory Monza X 2k: 2176 bits Monza X 8k: 8192 bits Monza (industry leading) read and write sensitivity 2 greater read range with DCI Identical read and write range with DCI True3D antenna technology QT security and privacy
7 Authenticating Consumables Key applications Verify authenticity Ensure quality control Store information about consumable
8 Operational Model Today EPC / TID, etc Indy reader reads tag information Tag identification (TID, EPC, any data in user memory) Freestyle verifies correct information then operates Proper Monza tag, correct cartridge type, etc. Freestyle bundles data for transfer to network
9 The Enabler: Monza 4 QT Industry-leading performance >3000 tag/min encoding speed 13m single-dipole read range Industry-leading features 128-bit EPC 96-bit total TID 512 bits user memory Impinj QT, FastID, TagFocus True3D antenna technology Dual, independent antenna ports allow redundant antennas for maximum read reliability 90º 180º 0º 270º Both antennas functional Still functions with one antenna damaged
10 Enabling a Service Key applications Convenience Fraud detection/prevention Fraud in diesel filling today is 5% of sales or $1.8Bn annually
11 Operational Model Today EPC / TID, etc Enable pump Speedway reader reads Monza tag information Tag identification (TID, EPC, any data in user memory) Network verifies truck information then enables pump
12 Operational Model Tomorrow EPC, TID, VIN, fuel, odometer, OBD Enable pump Monza X interfaces to truck CAN BUS Tag identification (EPC, TID, any data in user memory) VIN, fuel level, odometer reading, on-board diagnostics Network verifies EPC, TID, VIN, fuel, odometer, enables pump Also checks for vehicle faults
13 The Enabler: Monza X Wired link to truck controlled-areanetwork (CAN) bus Allows network to monitor vehicle, fuel, usage, diagnostics DCI increases Monza X read range 2 greater than passive operation >25m read and write range Passive Read Passive Write 18dBm 14dBm DC-Power Read DC-Power Write 24dBm 24dBm
14 Future of Embedded RFID Embedded RFID has enormous potential today Configure an unpowered electronic device Authenticate an unpowered consumable Passively enable a service The next-generation UHF Gen2 protocol, G2, will make embedded RFID even better Fully backward compatible with UHF Gen
15 G2 Protocol Functionality Gen2 Today Select Inventory Access G2 Enhancements Anticounterfeiting Security File Management Untraceability Loss Prevention Definition Select a population of tags Inventory selected tags; get their EPCs Read/write/lock tag memory; kill the tag Definition Authenticate a tag as genuine Modify tag information securely Create files and assign access privileges Hide tag data to protect consumer privacy Use a tag for EAS In today s UHF Gen2 protocol New in UHF Gen2 V2 protocol = G
16 G2 for Cryptographic Anticounterfeiting Today s Gen2 RFID TID Future G2 RFID Key Read TID Challenge (RN) Response Reader reads static TID from tag memory Counterfeiter can clone tag by copying TID Tag computes response from reader s random challenge and tag s secret key Counterfeiter cannot clone tag without knowing secret key
17 G2 for Cryptographic Security Command Challenge Authenticate AuthComm SecureComm KeyUpdate FilePrivilege TagPrivilege Function Challenges multiple tags simultaneously Performs tag, reader, or mutual authentication Authenticates a tag message with a MAC Encrypts a tag message Updates a tag s stored key Alters a reader s privileges to a file Alters a reader s privileges to the tag
18 Device Configuration with G2 New Token EPC / TID Everything we had before plus Tag cryptographically verifies network is genuine Authenticated network can revoke or update a token
19 Consumables Authentication with G2 EPC/TID, challenge, response Everything we had before plus Indy cryptographically challenges tag Tag computes and sends cryptographic response to Indy Freestyle bundles data for later transfer to network Network verifies that tag s cryptographic response matches challenge
20 Service Enablement with G2 EPC/TID, VIN, OBD, fuel, odometer, challenge, response Enable pump Everything we had before plus Reader cryptographically challenges tag then sends challenge and response to network Network verifies that tag s cryptographic response matches challenge then enables pump
21 G2 Status GS1 EPCglobal has finalized the protocol Passed community review In the final stages of IP review EPCglobal will ratify the protocol in 2013 ISO is standardizing the crypto suites 9 crypto suites submitted to date Present, ECC, AES( 2), Grain, CryptoGPS, XOR, RAMON, ECDSA-ECDH ISO will ratify the first crypto suites in
22 Chris Diorio
UHF RFID Embedded in Electronic Devices. Chris Diorio CTO, Impinj Inc.
UHF RFID Embedded in Electronic Devices Chris Diorio CTO, Impinj Inc. 2 2012 UHF RFID Applications Today Supply-Chain Tracking Asset/Returns Management Retail Inventory Pharmaceuticals Authentication Consumables
More informationIntel and the Future of Consumer Electronics. Shahrokh Shahidzadeh Sr. Principal Technologist
1 Intel and the Future of Consumer Electronics Shahrokh Shahidzadeh Sr. Principal Technologist Legal Notices and Disclaimers INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS.
More informationEasily add high-performance UHF RFID and bar code capture to the mobile devices
AT RFD 8500 Series Easily add high-performance UHF RFID and bar code capture to the mobile devices With the RFD8500 compatible third-party mobile devices, tablets and smart phones with enterprise-class
More informationDatasheet IMPINJ MONZA DURA DATASHEET IPJ-P6005-X2AT X-8K. Version , Impinj, Inc.
Datasheet IMPINJ MONZA DURA DATASHEET IPJ-P6005-X2AT X-8K Version 4.0 2016, Impinj, Inc. www.impinj.com OVERVIEW Monza X-8K Dura is a UHF Gen2 RFID IC product with 8192 bits of user Non Volatile Memory
More informationUHF RFID tag IC with cryptographic authentication
SPECIFICATION 1 FEATURES SMIC EEPROM CMOS 180 nm Operating temperature range -40 +65 C Passive operation no battery needed Operating frequency 860-960 MHz EPC Class 1 Generation 2 compliant 352 bit memory
More informationRX Reader. User Manual UHF RFID. Version 1.0
UHF RFID RX Reader User Manual Version 1.0 2016 unitech Electronics Co., Ltd. All rights reserved. unitech is a registered trademark of unitech Electronics Co., Ltd. Preface About This Manual This manual
More informationNew Delhi India. Ph: (+91) , Identium Tech Solutions
RFID Inlay Catalogue 2017 New Delhi India Email: tags@identags.com Ph: (+91) 7827944632, 9711863861 INTRODUCTION: ID X40 IS A WIDE BAND EPC CLASS 1 GEN 2 MULTIPURPOSE TAG HAVING EXCELLENT READ PERFORMANCE
More informationSecure UHF Tags with Strong Cryptography Development of ISO/IEC Compatible Secure RFID Tags and Presentation of First Results
Development of ISO/IEC 18000-63 Compatible Secure RFID Tags and Presentation of First Results Walter Hinz, Klaus Finkenzeller, Martin Seysen Barcelona, February 19 th, 2013 Agenda Motivation for Secure
More informationSecurity and Privacy in RFID Evolving Application Spaces for Edge Security
1 Security and Privacy in RFID Evolving Application Spaces for Edge Security Chris Hanebeck, VP Product Management & Marketing Revere Security First, Allow Me to Scare Everyone And It Gets Worse Lockheed
More informationImpinj Monza X-8K Dura Datasheet Rev 1.1 September 10, 2013
Part Order #: IPJ-P6005-X2AT Impinj Monza X-8K Dura Datasheet Rev 1.1 September 10, 2013 Monza X-8K Dura is a UHF Gen2 RFID IC product with 8192 bits of user Non Volatile Memory (NVM) and an I2C interface.
More informationHibiki Project and Secure RFID Project
Hibiki Project and Secure RFID Project October 22, 2007 Hitachi, Ltd. Yo Nakajima Hitachi, Ltd. 2007. All rights reserved. 0 1. About Hitachi 2. Hibiki Project / Secure RFID Project 3. Cases in Japan 4.
More informationFLYchip 2kbit User Guide
Product range FLYchip 2kbit Reference 12312 Document Technical bulletin FLYchip 2kbit User Guide Copyright 2004-2013 MAINtag RFID & Tracing Technologies. 8 rue Edouard 94100 Saint-Maur des Fossés Registration
More informationImpinj Monza X-2K Dura Datasheet
Part Order #: IPJ-P6001-Q2AT Impinj Monza X-2K Dura Datasheet Rev 1.31 October 4, 2012 Monza X-2K Dura is a UHF Gen2 RFID IC product with 2176 bits of Non Volatile Memory (NVM) and an I2C interface. As
More informationIndy Reader Chip Family
UHF Gen 2 RFID Transceivers Indy Reader Chip Family Indy Reader Chip Family Performance and Flexibility Key Building Blocks Address All Market Segments The Impinj UHF RFID product line includes the Indy
More informationAdvanPay-160 High power desktop RFID reader with hard tag detacher and keyboard wedge
Product overview AdvanPay-160 is a high power RFID desktop reader with hard tag detacher that increases the speed of payment at cash registers. AdvanPay-160 merges 2 processes: 1.Hard tag detachment 2.Product
More informationRFID Tag. Catalogue New Delhi India. Ph: (+91) , Identium Tech Solutions
RFID Tag Catalogue 2017 New Delhi India Email: tags@identags.com Ph: (+91) 7827944632, 9711863861 HF RFID TAGS INTRODUCTION: ID HDL38IS A HIGH MEMORY HF RFID INLAY WITH IK MEMORY SIZE FEATURES : Ø FAST
More informationNFC FOR CONSUMABLES AND ACCESSORIES
NFC FOR CONSUMABLES AND ACCESSORIES JORDI JOFRE NFC READERS NFC EVERYWHERE 22/02/2018 WEBINAR SERIES: HOW TO DEVELOP NFC APPLICATIONS PUBLIC Agenda NFC for product authentication & identification NFC portfolio
More informationACOS 3 Contact Card. Functional Specification. Subject to change without prior notice
ACOS 3 Contact Card Functional Specification Subject to change without prior notice Table of Contents 1.0. Introduction... 3 1.1. Features...3 1.2. Technical Specifications...3 1.2.1. Electrical...3 1.2.2.
More informationInteractive Gen2 Bridging the Gap between Passive RFID, Sensors and Electronics
Interactive Gen2 Bridging the Gap between Passive RFID, Sensors and Electronics Victor Vega Marketing Director, RFID Solutions 28 July 2011 Agenda AGENDA Intro Traditional & Next Gen RFID Sensor Supporting
More informationAsReader Desktop Demo Reference Guide v1.2
AsReader Desktop Demo Reference Guide v1.2 Asterisk, Inc. 2018-11-5 Revision History No. Version Modified Content Date Reviser 1 1.1 Initial version 2018/10/18 Zhen Liu 2 1.2 1. The mask, tag lock, tag
More informationAdvanPay-110 High power desktop RFID reader with keyboard wedge
Product overview AdvanPay-110 is a high power RFID UHF desktop reader that integrates: An antenna with a highly confined reading area Keyboard emulation by hardware. It s not needed to install any software
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More informationLightweight Cryptography for RFID Systems
Lightweight Cryptography for RFID Systems Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA G. Gong (University of Waterloo)
More informationTHE BEST OF BOTH WORLDS. Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security. By Mahdi Mekic, NXP Semiconductors
THE BEST OF BOTH WORLDS Dual-frequency RAIN RFID cards add flexibility while increasing smarts and security By Mahdi Mekic, NXP Semiconductors A new generation of contactless smartcards, built to support
More informationPaul A. Karger
Privacy and Security Threat Analysis of the Federal Employee Personal Identity Verification (PIV) Program Paul A. Karger karger@watson.ibm.com Outline Identify specific problem with FIPS 201 Problem of
More informationRFID Authentication: Security, Privacy and the Real World
RFID Authentication: Security, Privacy and the Real World ESC 2013 Jens Hermans KU Leuven - COSIC 15 January 2013 Introduction Cryptography in Daily Life RFID Introduction Cryptography in Daily Life Security
More informationEnhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning
All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to
More informationUHF RFID Reader AsReader Box
UHF RFID Reader AsReader Box Command Reference Ver.1.14 Asterisk, Inc. Contents 1 Interface specification... 1 2 Protocol Description... 1 3 Formats of data frames... 2 3.1 Command Frame Format (From HOST)...
More informationSystem LSI Research Center, Grad. Sch.. Information Science & Electrical Engineering, Kyushu Univ., Japan
RFID Privacy Using User-controllable Uniqueness Sozo INOUE, Hiroto YASUURA System LSI Research Center, Grad. Sch.. Information Science & Electrical Engineering, Kyushu Univ., Japan Suppose: Ad.: Super
More informationNXP G2 CUSTOM COMMANDS VERSION
NXP G2 CUSTOM COMMANDS VERSION 103012 M 9 N X P G 2 C o m m a n d s P a g e 2 TABLE OF CONTENTS 1 Overview... 3 1.1 Required Reading... 3 1.2 Document Scope... 3 1.3 Tag Information... 3 2 Enable EAS...
More informationVela Desktop Reader User Guide
Vela Desktop Reader User Guide Disclaimer Star Systems International and the Star Systems International logo are trademarks of Star Systems International Ltd. in Hong Kong and other countries. Microsoft,
More informationSecure Card Reading and PIN Solutions
Secure Card Reading and PIN Solutions When it comes to Card Reader security and reliability MagneSafe Secure Card Readers & PIN Pads Merchants and retailers both online and in-store rely on MagTek. MagTek
More informationOctane LLRP Version
Version 5.12.3 Copyright 2012-2017 Impinj, Inc. All rights reserved http://www.impinj.com Impinj, Octane, Speedway, xspan and xarray are either registered trademarks or trademarks of Impinj, Inc. Visit
More informationManufacturer Type/Model Name Frequency Description Standard/Notes Security
Alien Technology Inpinj Higgs 2 860~960 MHz EPC up to 192, TID 64 ISO18000-6c - EPC Gen2?? Higgs 3 860~960 MHz EPC up to 480, TID 64 ISO18000-6c - EPC Gen2 Dynamic Authentication - Enhanced IC security
More informationA Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function
sensors Article A Lightweight RFID Mutual Authentication Protocol Based on Physical Unclonable Function He Xu 1,2, * ID, Jie Ding 1,2, Peng Li 1,2 ID, Feng Zhu 1,2 and Ruchuan Wang 1,2 1 School of Computer
More informationiclass SE Platform Solutions The New Standard in Access Control
iclass SE Platform Solutions The New Standard in Access Control iclass SE Platform iclass SE SOLUTIONS Next generation access control solutions for increased security, adaptability, and enhanced performance.
More informationRPT100. Bluetooth UHF RFID & Barcode Reader
RPT100 Bluetooth UHF RFID & Barcode Reader Intro The RPT100 is Bluetooth UHF RFID & barcode reader, compatible with any host devices using Android, ios and Windows (Mobile, CE, PC). Unlike typical gun-type
More informationSpeedway Reader IPJ-R1000 for Gen 2 UHF RFID
Overview The EPCglobal -certified Speedway IPJ-R1000 is a fixed Gen 2 UHF RFID tag reader that provides network connectivity between tag data and enterprise system software. A key element of Impinj's GrandPrix
More informationST25TV product presentation. June 2018
ST25TV product presentation June 2018 ST25TV512 / 02K Product 2 The ST25TV chip belongs to ST25 NFC / RFID Tags & Readers family ST25TV is the natural evolution of LRI2K series The ST25TV512 / ST25TV02K
More informationEfficient RFID authentication scheme for supply chain applications
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 Efficient RFID authentication scheme for supply chain applications
More informationPIONEER a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag
PIONEER a Prototype for the Internet of Things based on an Extendable EPC Gen2 RFID Tag Hannes Gross 1, Erich Wenger 1, Honorio Martín 2, and Michael Hutter 1 1 Institute for Applied Information Processing
More informationDEFCON 26 - Playing with RFID. by Vanhoecke Vinnie
DEFCON 26 - Playing with RFID by Vanhoecke Vinnie 1. Contents 2. Introduction... 3 3. RFID Frequencies... 3 Low frequency... 3 High frequency... 3 Ultra-high frequency... 3 4. MIFARE... 4 MIFARE Classic...
More informationSPSXM001FOM. Smart Passive Sensor for Direct Moisture Sensing
Smart Passive Sensor for Direct Moisture Sensing Description The is a battery free wireless sensor for moisture level detection on non metal surfaces. Smart Passive Sensors use the Magnus S2 Sensor IC
More informationANDROID UHF API. Bright Alliance Technology Limited
ANDROID UHF API Bright Alliance Technology Limited 1 Import Package and library to project UHF function is in the uhf.jar - com.android.hdhe.uhf.reader.uhfreader 2 Functions 2.0.1 getinstance() Function:
More informationWHAT FUTURE FOR CONTACTLESS CARD SECURITY?
WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues
More informationProduct catalogue. for TagMaster long range RFID products
Product catalogue for TagMaster long range RFID products TagMaster RFID Products TagMaster develops and markets high quality RFID products that are flexible to use as well as efficient and reliable. TagMaster
More informationDUAL FREQUENCY NFC TYPE 2 & EPC GEN2 V2 TRANSPONDER IC
EM MICROELECTRONIC - MARIN SA em echo / EM4423 DUAL FREQUENCY NFC TYPE 2 & EPC GEN2 V2 TRANSPONDER IC Description em echo corresponds to the latest generation of EM Microelectronic contactless devices,
More informationS P O N S O R E D B Y
S P O N S O R E D B Y Audio Requirements Log in using the link in the email you received after you registered Click on the triangle next to the word Audio on the tool palette Choose use Telephone or Mic
More informationSIC4340 with 3x Potentiometer for Action Figure Toy Ultra-FDX Transponder IC SIC7888 SIC7888 is a read/write low frequency FDX RFID microchip intentionally designed to maximize the read range.
More informationDUAL FREQUENCY RAINFC TRANSPONDER IC
DUAL FREQUENCY RAINFC TRANSPONDER IC DESCRIPTION em echo corresponds to the latest generation of EM Microelectronic contactless devices, bringing innovative features to the NFC and EPC TM worlds. The chip
More informationSKYEWARE PROTOCOL V3 REFERENCE GUIDE VERSION
SKYEWARE PROTOCOL V3 REFERENCE GUIDE VERSION 040218 SkyeWare Protocol V3 Reference Guide P a g e 2 COPYRIGHT INFORMATION: Copyright 2018 Novanta Corporation. All rights reserved. Version 040218 This product
More informationWeaknesses in Two Recent Lightweight RFID Authentication Protocols
Weaknesses in Two Recent ightweight RFID Authentication Protocols Pedro Peris-opez 1, Julio C. Hernandez-Castro 2, Juan.E. Tapiador 3, Tieyan i 4, and Jan C.A. van der ubbe 1 1 Department of Information
More informationAVL-2000PLUS - Advanced Vehicle Auto Data Server. Solutions
AVL-2000PLUS - Advanced Vehicle Auto Data Server Solutions Low Power Consumption and High Performance with Intel Atom Z510 Processor The AVL-2000PLUS features an Intel Atom Z510 processor and Intel System
More informationA Novel Approach to RFID Authentication: The Vera M4H Unclonable RFID IC
A Novel Approach to RFID Authentication: The Vera M4H Unclonable RFID IC Presenter: Vivek Khandelwal, Vice President of Marketing & Business Development 1 Agenda» Company Overview» PUF Technology Overview»
More informationNC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER
NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER Nebula Systems has created the first dedicated controller for use in Telematics embedded systems, enabling companies in the Connected Car space to access
More informationAuthentication Technologies
Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something
More informationSpoofing Attack Against an EPC Class One RFID System
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2009 Spoofing Attack Against an EPC Class One RFID System Christopher
More informationConfidex UHF RFID and NFC Hard Tags and Labels for Smart Industries
Confidex UHF RFID and NFC Hard Tags and Labels for Smart Industries Confidex links everything Intelligently. Data to Knowledge enabling Industrial Digitalization since 2005 Confidex is the world s leading
More informationPlatino Handheld Reader User Guide
Platino Handheld Reader User Guide Reader Overview 1. ENTER 2. READ 3. SETTING 4. POWER 5. DIRECTIONS (UP, DOWN, LEFT, RIGHT) 6. NUMBER PAD (1,2,3 0,*,#) 7. FUNCTION 1 (F1) 8. FUNCTION 2 (F2) 9. FUNCTION
More informationIPJ-RS500-GX, IPJ-RS500-EU Electrical, Mechanical, & Thermal Specification Indy RS500 Overview
Indy RS500 Datasheet, Electrical, Mechanical, & Thermal Specification Indy RS500 Overview Indy RS500 is a completely integrated RAIN RFID reader module. It can be easily added to an embedded system, requiring
More informationSecuring Pharmaceutical and High-Value Products Against Tag Reapplication Attacks Using NFC Tags
Securing Pharmaceutical and HighValue Products Against Tag Reapplication Attacks Using NFC Tags Nirupama Bulusu Portland State University, Portland OR, USA nbulusu@pdx.edu Naif Alzahrani Portland State
More informationUM2268 User manual. ST25RU3993-EVAL board software. Introduction
User manual ST25RU3993-EVAL board software Introduction This document describes the graphical user interface (GUI) software (STSW-ST25RU001) for the ST25RU3993-EVAL board. The ST25RU3993-EVAL board is
More informationMaxReader Development Kit
MaxReader Development Kit Capture, transmit and store more data with F-RAM high-performance wireless memory EPC Gen2 Wireless Protocol (860MHz 960MHz) Quick Reference Guide Quick Reference Guide MaxReader
More informationData Synchronization Specification
Data Synchronization Specification Shigeya Suzuki, Mark Harrison Auto-ID Lab Japan, Keio University, Japan, Auto-ID Lab, University of Cambridge, UK Auto-ID Labs White Paper WP-BIZAPP-034 Report Abstract:
More informationJMY600 Series IC Card Module
MIFARE & ISO14443A & ISO14443B & ISO7816 & ISO15693 IC CARD MODULE JMY600 Series IC Card Module MIFARE Plus Card Operation Guide (Revision 1.00) Jinmuyu Electronics Co., LTD April 7, 2015 Please read this
More informationSL2S General description ICODE DNA. 1.1 Contactless energy and data transfer. 1.2 Anticollision. 1.3 Security and privacy aspects
374730 1. General description The is a leading-edge HF tag IC targeting brand protection tagging applications which require HF long read range as well as cryptographic authentication check.the security
More informationRVU - Update Programming For Catalytic Converter System (IC)
26 07 01 May 11, 2007 2010066/3 Supersedes Technical Service Bulletin Group 26 number 05-03 dated July 20, 2005 due to addition of Saga warranty data, change in VIN range, and reformatting RVU - Update
More informationSUBJECT: P/N 8291xxx e-stroke Disc Low Lining Clearance Fault Detection
1.0 PURPOSE To notify e-stroke GEN 3 system customers that firmware version V3.25 supports disc caliper low lining clearance detection. 2.0 BACKGROUND P/N 8291xxx series CCM s are used with all S-CAM /
More informationDESIGN AND DEVELOPMENT OF A STATE TRANSITION TABLE FOR THE EPCGLOBAL UHF CLASS1 GEN2 RFID STANDARD. Akram Kamrani
DESIGN AND DEVELOPMENT OF A STATE TRANSITION TABLE FOR THE EPCGLOBAL UHF CLASS1 GEN2 RFID STANDARD by Akram Kamrani B.S., Sharif University of Technology, 2007 Submitted to the Graduate Faculty of Swanson
More informationCELLULAR-BASED READER & GATEWAY APPLICATIONS
Developer Note CELLULAR-BASED READER & GATEWAY APPLICATIONS INSTRUCTIONAL GUIDANCE Version 1.0 2017, Impinj, Inc. www.impinj.com The following article aims to help systems integrators implement business
More informationLeveraging the full potential of NFC to reinvent physical access control. Friday seminar,
Leveraging the full potential of NFC to reinvent physical access control Wireless@KTH Friday seminar, 2012-08-31 NFC (Near Field Communication) A new radio communication technology for mobile phones Uses
More informationToward Practical Public Key Anti-Counterfeiting for Low-Cost EPC Tags
Toward Practical Public Key Anti-Counterfeiting for Low-Cost EPC Tags Alex Arbit, Yossef Oren and Avishai Wool Computer and Network Security Lab, School of Electrical Engineering Tel-Aviv University, Ramat
More informationSecure Card Reader Authenticators
Secure Card Reader Authenticators The Evolution of Card Reading Technology: MagneSafe technology has evolved exponentially from its inception in 2006 when it delivered the industry s first secure card
More informationCard Issuance/Encoding & PIN Pads
Card Issuance/Encoding & PIN Pads From Card Issuance to Card Security Card Issuance/Encoding & PIN Pads Card issuers know they can put their trust in Mag- Tek. Whether meeting the growing need for instant,
More informationETSI Standardization for (RF)ID-Systems. ETSI RFID Workshop, February 25th,
ETSI Standardization for (RF)ID-Systems ETSI RFID Workshop, February 25th, 2008 1 TCAM Statement At its 21 st meeting, Oct. 2006 TCAM stated that RFID Readers / Writers, RFID Tags active and passive fall
More informationAbout TagMaster. Application Areas
Product catalogue About TagMaster TagMaster develops and markets high quality RFID products that are efficient, reliable and flexible to use. The philosophy of TagMaster products is characterized of long
More informationFunctional Specification
Functional Specification ACOS5 Cryptographic Smart Card Advanced Card Systems Ltd. Website : www.acs.com.hk Email : info@acs.com.hk A C O S 5 S h o r t R e f e r e n c e M a n u a l CONTENTS 1.0. INTRODUCTION...
More informationPRESENTATION PRESENTER / DATE:
PRESENTATION PRESENTER / DATE: THE COMPANY COMPETENCES & EXPERIENCE OFFERED PRODUCTS & SERVICES THE COMPANY ARE CON is a sales, service and consulting organization within the smart card industry, targeting
More informationSYRDBT. SYRIS Handheld bluetooth RFID Reader
SYRDBT SYRIS Handheld bluetooth RFID Reader V0200 SYRIS Technology Corp. Address: 12F., No.16, Sec. 2, Taiwan Blvd., West Dist., Taichung City 403, Taiwan TEL: +886-4-2207-8888 FAX: +886-4-2207-9999 E-Mail:
More informationProgramming Manual RFID (Radio Frequency Identification) SLP-TX403R.
Programming Manual RFID (Radio Frequency Identification) Rev. 1.00 SLP-TX400R SLP-TX403R http://www.bixolon.com Table of Contents 1. Manual Information... 3 2. Basic Theory... 3 2-1 RFID Printer... 3 2-2
More informationHardware Implementation of RFID Collaberal Affirmation Protocol
Hardware Implementation of RFID Collaberal Affirmation Protocol 1 Murali Krishna Bathula, M.Tech student,kiet, murali.ece713@gmail.com 2 B.Ratna Raju, Assoc.Prof,KIET, ratna_rit@yahoo.com 3 Dr.G.N.Swamy,
More informationSecure Card Reader Authenticators
Secure Card Reader Authenticators When it comes to card reading security and reliability Merchants, retailers and financial institutions rely on MagTek. Secure card reader authenticators (SCRAs) capture
More informationAlternative Electronic Fare Media For Regional Integration
Alternative Electronic Fare Media For Regional Integration Michael Veltri Port Authority of Allegheny County Pittsburgh, Pennsylvania Alternative Electronic Fare Media For Regional Integration Port Authority
More informationTAMPER-EVIDENT DUAL FREQUENCY RAINFC TRANSPONDER IC
TAMPER-EVIDENT DUAL FREQUENCY RAINFC TRANSPONDER IC DESCRIPTION em echo-t corresponds to the latest generation of EM Microelectronic contactless devices, bringing innovative features to the NFC and EPC
More informationSymmetric Encryption based Privacy using Lightweight Cryptography
Date of Acceptance: Grade: Instructor: Symmetric Encryption based Privacy using Lightweight Cryptography for RFID tags Raviteja Sudulaganti Master Thesis UNIVERSITY OF HELSINKI Department of Computer Science
More informationBEAWebLogic RFID. Edge Server. Using the Reader Simulator
BEAWebLogic RFID Edge Server Using the Reader Simulator Version 2.1 Revised: June 29, 2006 Copyright Copyright 1995-2006 BEA Systems, Inc. All Rights Reserved. Restricted Rights Legend This software is
More informationSECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview
SECURITY CRYPTOGRAPHY Cryptography Overview Brochure Cryptography Overview DPA-resistant and Standard Cryptographic Hardware Cores DPA (Differential Power Analysis) Resistant Hardware Cores prevent against
More informationRFID SECURITY USING LIGHTWEIGHT MUTUAL AUTHENTICATION AND OWNERSHIP TRANSFER PROTOCOL
RFID SECURITY USING LIGHTWEIGHT MUTUAL AUTHENTICATION AND OWNERSHIP TRANSFER PROTOCOL Amol Bandal 1 and Shankar Nawale 2 1 Department of Computer Engineering, Sinhgad Institute, Lonavala, Maharashtra,
More informationAn Authentication Framework for Integrating RFID Systems
An Authentication Framework for Integrating RFID Systems Sungbae Ji, Hyunrok Lee, Sungjune Yoon, and Kwangjo Kim Auto-ID Lab, ICU, Korea Auto-ID Labs White Paper WP-SWET-025 Software & Network Summary
More informationFare Media: Past, Present and Future. Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010
Fare Media: Past, Present and Future Hassan Tavassoli APTA Fare Collection Workshop San Diego, California March 29, 2010 Evolution of Transit Fare Media Other Form Factors (contactless tokens and tags,
More informationCompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals
CompTIA Security+ (Exam SY0-401) Course 01 Security Fundamentals This course contains copyrighted material used by permission of Logical Operations, Inc. Slide 1 Course 01: Security Fundamentals The Information
More informationPIN Entry & Management
PIN Entry & Management From PIN selection to PIN verification Card issuers and merchants know they can put their trust in MagTek. Whether meeting the growing need for instant, in-branch card and PIN issuance
More informationHID Proximity Credentials
HID Proximity Credentials ProxCard II Value priced 125 khz proximity card Base Part Number 1326 Price competitive with all other card technologies Thin enough to carry in a wallet or purse ISOProx II 125
More informationDUAL FREQUENCY NFC TYPE 2 & EPC GEN2 V2 TRANSPONDER IC
EM MICROELECTRONIC - MARIN SA DUAL FREQUENCY NFC TYPE 2 & EPC GEN2 V2 TRANSPONDER IC Description corresponds to the latest generation of EM Microelectronic contactless devices, bringing innovative features
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationH1PROT.PDF 14 Pages Last Revised 02/11/06. Micro RWD H1/S Protocol
Data Sheet H1PROT.PDF 14 Pages Last Revised 02/11/06 Micro RWD H1/S Protocol The MicroRWD H1/S version is a complete reader and tag acceptance solution for Hitag 1 RF transponders (including Hitag S256
More informationUHF RFID serial Interface protocol V2.2
YR903 UHF RFID serial Interface protocol V2.2 1 SPECIFICATION OF THE DATA PACKET 3 1.1 RS-232 CONFIGURATION 3 1.2 DATA PACKET DEFINITION 3 1.2.1 HOST COMMAND DATA PACKET DEFINITION 3 1.2.2 RESPONSE PACKET
More informationPerformance Evaluation of a Secure Low Level Reader Protocol (LLRP) Connection
40 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.3, March 2009 Performance Evaluation of a Secure Low Level Reader Protocol (LLRP) Connection Sana Qadir and Mohammad Umar
More informationOverview RFID-Systems
Overview RFID-Systems MSE, Rumc, RFID, 1 References [1] Klaus Finkenzeller, RFID-Handbuch, 5. Auflage, Hanser, 2008. [2] R. Küng, M. Rupf, RFID-Blockkurs, ergänzende MSE-Veranstaltung, ZHAW, 2009. [3]
More informationAtmel Trusted Platform Module June, 2014
Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four
More information