RFID Use In Humans Dionne Johnson and Jenna Seagraves COMP38012/06/06.

Slides:



Advertisements
Similar presentations
PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
Advertisements

Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
RFID Jenna Nash MJ Ko Katie Stange Kennedy Carruthers RADIO FREQUENCY IDENTIFICATION.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
1 14 October 2003medXchange© Private & Confidential Dental Implant Register & Patient Dental Profile.
Embedded Wireless Sensors Tony Arous Vincent Yu. Introduction  Sensors help to easily keep track of various information PeoplePeople ProductsProducts.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
Beyond the Barcode RFIDs Radio Frequency Identification.
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
RFID l. goetzinger ● m. lines ● c. mclaughlin ● c. sailer ● m. schwab Presented to the Class of BA 457.
SHERA USHER RFID in Humans. Brief History of RFID RFID can be traced back to WWII Sir Robert Alexander Watson-Watt developed the first active.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
RFID passports How does is work? Step by step By: Einav Mimram.
RFID Inventory System Shaun Duncan, Thomas Keaten, Auroop Roy.
THE STATE OF HEALTHCARE SECURITY Past, Present, and Future Jeff Aldridge, CEO Security Assessments International June 16, 2005.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
RFID in Healthcare: A Physician’s View Michael Meistrell, MD IEEE RFID World March 27, 2007.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
Presented by Allyson Medina, RN
MICROCHIP IMPLANT NEGATIVE SIDES OF RADIO FREQUENCY IDENTIFICATION CHIPS.
Angelica Salcedo Rodriguez Ingl 3202 Prof. Larry Myers.
IPM Asset Solutions: Where Innovation Meets Experience.
RFID in the Military Rana, Mohammed,Trandel, Ahmed.
GEORGE MILLER BLUE TEAM CS 410 Mobile Digital Signatures A Mobile Access Defense Health System (MADHS)
Overview  What is RFID?  How to use it?  Relevant links  Future Trends  Bibliography.
Radio Frequency Identification (RFID) Presenter: Victoria Raskovich.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Personal Health Information Management - PHIM. A relevant example for information sharing  CaringBridge.org --
AOI: Health Adel Aleali, Khalifa Al marri, Dana Sheikhali.
Opportunities in M-Commerce Standards & Applications Nour El Kadri University of Ottawa.
A PowerPoint Presentation by Helen Chelan Johnson.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Trackstar Navigations Pvt. Ltd. Presenting New Generation GPS Tracking System.
Red Flag Rules Identity Theft Prevention Tips for Ambulance Personnel -
ICT in Healthcare. Electronic prescription service GPs and nurses can send electronic prescriptions to a dispenser (pharmacy) of the patients choice.
Have you ever lost a pet? It wont happen to you, right? By Zaida A. Rendon.
Student Attendance Monitor (SAM) By: Nathan Aldrich.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
All schools should have metal detectors By: Hassan Ashaif.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
RFID Source Tracking Tim Durkin PPD. Legislation The Ionising Radiations Regulations act Applicable to industry, research, military, civil service.
RFID Technology Lecture for week 5 Dhruba Sen
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
Ubiquitous means ‘everywhere’
Advancements of RFID in the Healthcare System Jesse A. Evans 3/25/07.
RFID TAG READER TAG READER Abdullah Al-Faifi ) ) ) ) )
 Counterfeiting of Products It’s effect and Prevention Rolando Molina MECH 3620 – Advanced Manufacturing Processes Fall 2013.
Cook Children’s 1 Theresa Meadows, RN, MS, CHCIO Senior Vice President and CIO Co-Chair HHS Health Care Cyber Security Task Force July 2016 Cybersecurity:
Microchips IN Health Practices
RFID enabled Solutions
RFID Trigger Lock By: Mike Jastrzebski.
Crime in the United States
Chapter 12 Accessing Databases
RADIO FREQUENCY IDENTIFICATION
Team 7 Technical Presentation
Presented by Jeannette Wallett RN
SOLUTION ID CARDS AND DRIVER’S LICENSES
Crime in the United States
Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.
What Parents Should Know
Presentation transcript:

RFID Use In Humans Dionne Johnson and Jenna Seagraves COMP38012/06/06

RFID -“Radio Frequency Identification” -The idea for implanting a chip in humans came from the Sept. 11 terrorist attacks to help identify firefighters if they were to become disfigured or trapped

RFID (cont’d) - implanted in fatty tissue of the arm - near rear of triceps - chip last at least 10 years - safe in MRI scans - no risk of allergic reactions - encased in non-reactive medical-grade glass coating - Cost: $125, not including implantation - Passive vs. Active chips

VeriChip -First FDA-approved human implantable RFID device (2002) -about the size of a grain of rice - Read range is about 6 to 18 inches -responds with a unique 16 digit number -approximately 2000 implanted in humans worldwide

SECURITY ISSUES

PROS: - ensures only authorized personnel enter into secure buildings - harder to replicate compared to social security cards - no current GPS capabilities - can not track in real time - chip contains no information, only a number - only authorized personnel access database where information is stored - consumers choose what information to include in the database

CONS: -”spychips” -government is able to monitor someone's movement against their will -track and monitor both citizens and visitors -government could access information they can’t legally obtain as of now -insecure-unencrypted -identity theft -lead to safety issues -more criminal activity -more kidnappings, attacks, or murders to obtain chip

MEDICAL ISSUES

PROS: - access to medical information if patient can not respond - ensures doctors receive accurate and updated information - Could track patients in hospital and send alerts if they collapsed - When used with an active chip and an antenna

CONS: -potential health risks -security issues -reliability issues -threat to medical confidentiality

Uses - Currently used in: - Federal buildings in Mexico - Clubs in Barcelona, Spain - Prisons in the United States - Hospitals in the U.S.

Scenarios - A child is found roaming the streets and cannot give information on how to find home… - Someone is badly injured and has no identification on them, how can you get in touch with family or retrieve their health information? - A power outage causes the medical database to crash and all your information is in the system, what do you do? - Someone is able to steal your RFID chip number, how can they be stopped from accessing your information?

More Things to Think About… - Should there be a separate RFID chip for medical and security use? - Should the chip’s number match the National Identification Card number?