Jörn-Marc Schmidt Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks.

Slides:



Advertisements
Similar presentations
Mobile Computing and Commerce And Pervasive Computing
Advertisements

Radiofrequency Identification for movable heritage management Central International Archive of Art Objects Member of Albert Canals – General Director AICOA.
RFID – Lessons Learned July 22, 2004 Russ Brown. Agenda vRFID Basics vRFID Vision vRFID Upside vRFID Concerns vRFID Lessons Learned vRFID Future State.
Streamlining rail operations with RFID Jarkko Miettinen Vice President of Sales, Confidex Radio frequency identification in rail operations.
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
A lightweight mutual authentication protocol for RFID networks 2005 IEEE Authors : Zongwei Luo, Terry Chan, Jenny S. Li Date : 2006/3/21 Presented by Hung.
RFID Radio Frequency IDentification By Özcan Tunalılar 27 th March 2008.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
RFID (Radio Frequency Identification) Jonathan Green, Kevin Thornberg, Erica Jennings May 16, 2007.
Researcher aims to secure RFID tags By: Guillermo Zuniga CSCE 390 Assignment 08 April 20, 2010.
Retail Article “ Tell-Tale Tags - radio frequency identification equipment usage for retail” Andrea Holcom & Andrea Boitano.
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
RFID: The Reward is Worth the Risk With Government Intervention By Alex Johnson.
Radio frequency identification technology (RFID) Dominic Payne Janna Thomson Kevin Mackay.
Equipment Selection RFID vs. UPC EGR 403 August 22, 2005 Team 3 Saul Barbosa – Equipment Research Ross Nichols – Organizer Chih-Yun Sun – Cost Analysis.
10/23/06 Bell Work Reading/Writing What are RFIDsWhat are RFIDs Mathematics If a RFID receivers can read tags every second. How many tags can you.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
URI ROBINSON CSC 495 NOVEMBER 9 TH, 2007 RFID Tags (Radio Frequency Identification)
Business Driven Technology Unit 4 Building Innovation Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without.
RFID tagging Stephanie Allen, Gina Calcaterra, Michael Gray, Rahul Nair, Sumit Pahwa, Edward Robertson MGT 6772.
Copyright © 2003, Cap Gemini Ernst & Young Business Dimension Functional Excellence Integration Silo Organization Departmental Performance Cost Decision.
Technical Issues in Library RFID Privacy David Molnar UC-Berkeley Computer Science.
Chapter CHAPTER SEVEN OVERVIEW SECTION NETWORKS AND TELECOMMUNICATIONS  Network Basics  Voice over IP  Networking Businesses  Increasing.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
Radio Frequency Identification Annemarie Wegley and Emily Woesle.
RFID and LMS: improving interoperability Mick Fortune, 2CQR.
What’s Happening with RFID? Faith Lamprey Aurora Technologies (401) NEMUG November, 2009.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
CS556 Idris Khames. What is RFID? RFID stands for radio frequency identification. It is one of automated systems which used to collect data The beginning.
RFID and RFID tags. Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using.
IN-STORE COMMUNICATION
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
Trends in apparel supply chain management. Supply chain Supply chain consists of all the parties involved directly or indirectly in fulfilling a customers.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Chapter 7 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Networks, Telecommunications, and Mobile Technology.
RFID Privacy: An Overview of Problems and Proposed Solutions Maxim Kharlamov (mkha130, #13) S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Wal-Mart leads RFID adoption Prepared by: Rayma Figueroa Olesya Tkachenko Olya Elfimova.
RFID W HAT IS RFID Radio Frequency Identification A technology that allows data held on a microchip to be.
Business Driven Technology Unit 5 Transforming Organizations Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
Ignite Presentation: Near Field Communication Harry Yang.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Overall: 9/10. GOODWORK ON  Good information  Very detailed  Nice Introduction  RFID has many similarities with barcoding but with the unique characteristics.
CHAPTER TWELVE OVERVIEW
ICC Module 3 Lesson 5 – IT Security 1 / 4 © 2015 Ph. Janson Information, Computing & Communication Security – Clip 0 – Introduction School of Computer.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Radio Frequency Identification (RFID)
Integration with WebEOC - the standard of EM software - support and security Recording & Tracking of Assets - bar-coding/RFID - mapping - asset information.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Radio Frequency Tags Chandler Allen. The use of a wireless non-contact system that uses radio frequency electromagnetic fields to transfer data from a.
CONTACTLESS SMART CARD Betty Yu. What is contactless smart card? A contactless smart card is a contactless MHz credential whose dimensions are credit-card.
Ubiquitous means ‘everywhere’
Created by: Samantha Conrad.  What is an RFID?  Where did they come from?  Active tags vs. Passive tags  RFID Systems  Who uses these?  What’s in.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
RFID(Radio Frequency Identification) Vs Barcode Software.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Technology in Retail.
English for Advance Learners I
Mobile Commerce and the Internet of Things
یا حقّ.
Europe’s Perspective on Radio Frequency IDentification
Radio Frequency Identification
Security and Privacy in Pervasive/Ubiquitous Computing Systems
IoTs (Internet of Things)
RFID (Radio-Frequency Identification)
Presentation transcript:

Jörn-Marc Schmidt

Social Networks Computer / Notebook Localization Smart Phone Identification Tracking ??? RFID Social Networks Computer / Notebook Localization Smart PhoneRFID Privacy & Mobile Devices No Choice & Consent

Wal-Mart, the nation's largest retailer, has declared war on our privacy. The giant retailer has announced it will begin placing item-level RFID (Radio Frequency IDentification) tracking tags on clothing sold in its stores. (July, 2010, Wal-Mart, the nation's largest retailer, has declared war on our privacy. The giant retailer has announced it will begin placing item-level RFID (Radio Frequency IDentification) tracking tags on clothing sold in its stores. (July, 2010,

Requires no line of sight Readable from a distance Unique Identifier

RFID tag in each product Used inside the stores Cheaper than conventional theft protection Deactivated at point of sales

Lifecycle of a Tag Transport Retail Trash Usage Tag killed

Protection Methods Randomized UIDs (Mutual) Authentication Configurable Access Other Concepts like – Group Signatures (DAA)

Security Requirements and Costs VS

Balance Benefit & Risk