Hard protection of words

Slides:



Advertisements
Similar presentations
©Contrinex JDC PPT_LF_Fieldbus Fieldbus J.-D. Chatelain.
Advertisements

COMMONWEALTH OF AUSTRALIA Copyright Regulations 1969 WARNING This material has been reproduced and communicated to you by or on behalf of Monash University.
CS 153 Design of Operating Systems Spring 2015 Lecture 19: Page Replacement and Memory War.
File System Implementation
©Contrinex JDC PPT_XF_easyRFID J.-D. Chatelain.
Chapter 1 Performance of Passive UHF RFID Systems in Practice RFID Systems: Research Trends and Challenges Slides prepared by Dr. Miodrag Bolic.
Advanced Inheritance Concepts. In this chapter, we will cover: Creating and using abstract classes Using dynamic method binding Creating arrays of subclass.
©Contrinex JDC PPT_XF_CTX Interfaces Contrinex interfaces J.-D. Chatelain.
©Contrinex JDC PPT_LF_Interfaces Low frequency RS485 interfaces J.-D. Chatelain.

TERMINATE-AND-STAY-RESIDENT TSR IS A SOFTWARE PROGRAM THAT REMAINS IN MEMORY UNTIL IT IS NEEDED, AND THEN PERFORMS SOME FUNCTION. AN GOOD EXAMPLE OF A.
ORANGE COUNTY HUMAN RIGHTS ORDINANCE Chapter 22 of the Orange County Code Presented to the Board of County Commissioners November 23, 2010.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
©Contrinex JDC PPT_XF_BinHexDecASCII Encoding information J.-D. Chatelain.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
©Contrinex JDC PPT_HF_Anticollision Anticollision algorithm J.-D. Chatelain.
©Contrinex JDC PPT_LF_TestList Test list J.-D. Chatelain.
PPT_HF_AFI ©Contrinex JDC PPT_HF_ISO15693 ISO/IEC standard J.-D. Chatelain.
© copyright NTT Information Sharing Platform Laboratories Cryptographic Approach to “Privacy-Friendly” Tags Miyako Ohkubo, Koutarou Suzuki, and Shingo.
Introduction to RFID Technology By: Vahid Bagher Poor 1.
How ZIP Codes Work Zone Improvement Plan. How To Address An Envelope.
©Contrinex JDC PPT_LF_MonitoringRWMs Different ways to monitor RWMs J.-D. Chatelain.
Sub. :- Mathematics Divisibility Std. :- 5 th Chapter no. 5.
©Contrinex JDC PPT_HF_POWERLINK Contrinex RFID J.-D. Chatelain.
Group 9. Exploiting Software The exploitation of software is one of the main ways that a users computer can be broken into. It involves exploiting the.
©Contrinex JDC PPT_XF_RFID SystemOperation Functioning of RFID systems J.-D. Chatelain.
©Contrinex JDC PPT_HF_RWMTAGCommands HF RWM and TAG Commands J.-D. Chatelain HF RWM Commands HF TAG Commands.

©Contrinex JDC PPT_XF_RFIDvsBarcode Advantages of RFID versus non-RFID technologies RFID versus Barcode J.-D. Chatelain NON-RFID VS RFID.
©Contrinex JDC PPT_HF_Status STATUS command J.-D. Chatelain.
©Contrinex JDC PPT_LF_CTX MetalTechnology Advantages of CONTRINEX technology Advantages of CONTRINEX technology J.-D. Chatelain.
Chapter 6 Protecting Your Files
Virtual Memory Chapter 7.4.
Protecting Memory What is there to protect in memory?
Review Deleting an Element from a Linked List Deletion involves:
Protecting Memory What is there to protect in memory?
versus non-RFID technologies
200 mm Light L8H For emergency light arrows
By Quentin Lively Notorious Viruses.
RFID - EN Encoding information Encoding information J.-D. Chatelain.
Benefits of RFID J.-D. Chatelain.
Amendments to N.J.A.C. 6A:5 Regulatory Equivalency and Waiver
RFID in a production line
RFID - EN Transponders (TAG) Transponders (TAG) J.-D. Chatelain.
PRIME AND COMPOSITE NUMBERS
מפגש 2 חשיבה תוצאתית שמעיה דוד
Discussion Session Week 10
LF - EN Memory EM4056 Memory EM4056 and its security J.-D. Chatelain.
RFID operating principle
Physical address Logical address Bootload
Programming a painting line via transponders
Hundreds Chart
/GS Switch in Visual Studio
Memory Management & Virtual Memory
RFID - EN Transponders (TAG) Transponders (TAG) J.-D. Chatelain.
O.
Protection codes and Comparison J.-D. Chatelain LF - EN
Properties of Functions
Chapter 1: Introduction
CGS 3763 Operating Systems Concepts Spring 2013
MANAGING YOUR FLOOD RISK All stakeholders contribute to risk reduction
L1-3 Notes: Prime Factors
01 Telephone Entry System 01.
Advanced Inheritance Concepts
Dynamic Memory And Objects
starter Open books & add a new title:
Chemical Reactions Chapter 2.4.
Chapter 8 Rotational Equilibrium and Dynamics
WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
Монголын даатгалын зах зээлийн бодлогын асуудлууд
Presentation transcript:

Hard protection of words LF - EN Hard protection of words Hard protection of words J.-D. Chatelain

It is not possible to remove a LF - EN Hard protection of words Hard protection of words WARNING It is not possible to remove a hard protection! Write protection Read protection One memory word Contrinex RFID systems RFID systems Contrinex RFID systems RFID systems Contrinex Contrinex Contrinex 1 1 1 Without protection: it is possible to read the word and to overwrite it With a read protection, it is not possible to read the word but it is possible to overwrite it With a write protection, it is possible to read the word but it is not possible to overwrite it With a read and write protection, it is neither possible to read the word nor to overwrite it Code 00 Code 02 Code 04 Code 06

00: no protection 02: read protection 04: write protection 06: read and write protection

Result of reading a zone containing protected words. Words at addresses 61 to 63, with protection code 2, have a hard protection against reading. The result of reading is always <FFFF>. Words at addresses 64 and 65, with protection code 4, has a hard protection against writing. It is not possible to overwrite this word, but it is still possible to read it.

Hard protection of words End of this chapter LF - EN Hard protection of words Hard protection of words End of this chapter J.-D. Chatelain