RFID and privacy - Some industry perspectives (ICC, EICTA)
|
|
- Felicia Perry
- 5 years ago
- Views:
Transcription
1 RFID and privacy - Some industry perspectives (ICC, EICTA) Jeroen Terstegge ICC, EICTA OECD, Paris
2 Identification Technologies: Connecting PEOPLE to Information, Entertainment and Services. Identify and track GOODS. ICC, EICTA Jeroen Terstegge OECD, Paris
3 RFID and Identity RFID has 3 identity types ID linked to Person: direct identification: personal data on chip (biometrics) personal data in database (employee badge) ID linked to Service: In combination with person ID (banking, season cards) Anonymous (one time public transportation paper tickets) ID linked to Object / Product: product information in database (retail products, library books) direct identification (car keys) Combining Object/Product ID with Individual is additional step, covered by existing privacy principles 3
4 Ubiquitous Computing and Electronic Footprints Several technologies involved in leaving footprints Offline and online footprints But ubiquitous computing will increase number of footprints Concerns for the Individual Is my footprint accurate? Does it reflect me? personalization of services, convenience discrimination, social sorting Where are my footprints? And why are they there? OECD Privacy Principles: transparency, purpose Do I have some control over my footprints? Relationship (citizen, employee, consumer), degree of freedom/privacy Notice and choice, access to data Some trade-off between Accuracy and Control Key question: Can we enhance accuracy while maintaining control? 4
5 Privacy-enhancing solutions for RFID (PETs) System-solutions Encryption Tag/Reader Authentication Range reduction Antenna size/design? Consumer-in-Control Solutions Kill-switch Removable tags Blocker tags Shielding User interface (NFC-device).? 4
6 Determining Privacy Risk { Identification (people): low, medium, high { Linkability (information): low, medium, high Observerability: low, medium, high PRIVACY RISK = low, medium, high When Privacy Risk is: High: Medium: Low: use smart cards + PETs use smart cards, smart tag + PETs use smart tag (PETs optional) 5
7 Ways of protecting privacy Privacy by Design (technological) examples: encryption, kill command, read range main actors: technology providers, standardization bodies influencing factors: cost, usability public policy: R&D-funding, Launching customer Privacy by Design (organizational) examples: anonymization, system design, business model main actors: system integrators, end-users (business) influencing factors: business opportunities, customer trust public policy: privacy principles, guidelines, best-practices Rule-based protection examples: self-regulation, law main actors: government, business, stakeholders influencing factors: administrative burdens (cost), market development public policy: compliance verification ( Trust but Verify ) 6
8 Ways of protecting privacy Privacy by Design (technological) examples: encryption, kill command, read range main actors: technology providers, standardization bodies influencing factors: cost, usability public policy: R&D-funding, Launching customer Privacy by Design (organizational) examples: anonymization, system design, business model main actors: system integrators, end-users (business) influencing factors: business opportunities, customer trust public policy: privacy principles, guidelines, best-practices Rule-based protection examples: self-regulation, law main actors: government, business, stakeholders influencing factors: administrative burdens (cost), market development public policy: compliance verification ( Trust but Verify ) 7
9 Contactless Smart Cards and Privacy Data security Personal data (may be) stored in chip s memory Password protection Mutual authentication chip and reader Advanced encryption (3DES, AES, PKI) Extremely short operating range: < 10 cm Advanced system design and sensor technology to prevent tempering Multi-application smart cards Several applications on a single card Exclusivity Clear separation of applications and data (as if different cards were used) Back office and system design Full application of current privacy and data protection laws 8
10 RFID/EPC tags and privacy ICC Principles of Fair RFID/EPC use RFID-use should be legal, honest, decent No personal data stored in RFID-tag Consumer information and choice Labeling How to remove / disable tags Privacy statement including RFID/EPC use What data is collected via RFID Purposes of collection/use Data disclosures (if any) Data security Individual s right of access to data in RFID-enabled IT-system 9
11 Recommendations Do not legislate RFID-technology, but only its applications and use Address privacy risks of the entire system Current OECD Privacy Principles already apply to system design, applications and data collection and management Use Privacy-Enhancing Technologies only where relevant Stimulate R&D, standardization and use/acceptance of PETs RFID is the enabling technology! 10
Presentation Outline
Functional requirements for privacy enhancing systems Fred Carter Senior Policy & Technology Advisor Office of the Information & Privacy Commissioner / Ontario, Canada OECD Workshop on Digital Identity
More informationRFID and Privacy an antagonism?
BERLIN COMMISSIONER FOR DATA PROTECTION AND FREEDOM OF INORMATION, GERMANY RFID and Privacy an antagonism? Dr. Alexander Dix, LL.M. and Freedom of Information Member of the Art.29 Working Party Statement
More informationPrivacy engineering, privacy by design, and privacy governance
CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://
More informationPreface to the Third Edition. List of Abbreviations
Contents Preface to the Third Edition List of Abbreviations 1 Introduction 1 1.1 Automatic Identification Systems 2 1.1.1 Barcode Systems 2 1.1.2 Optical Character Recognition 3 1.1.3 Biometric Procedures
More informationPrivacy by Design: Integrating Technology into Global Privacy Practices
Privacy by Design: Integrating Technology into Global Privacy Practices Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Harvard Privacy Symposium August 23, 2007 Role of the IPC
More informationST25TA product presentation. June 2018
ST25TA product presentation June 2018 ST25TA Product 2 The ST25TA chip belongs to ST25 NFC / RFID Tags & Readers family. The ST25TA product is HF Tag based on ISO14443 & NFC forum standards with following
More informationPan-Canadian Trust Framework Overview
Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document
More information8 Executive summary. Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector
8 Executive summary Intelligent Software Agent Technologies: Turning a Privacy Threat into a Privacy Protector The hectic demands of modern lifestyles, combined with the growing power of information technology,
More informationMOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification
MOBILE COMPUTING CSE 40814/60814 Spring 2017 What is RFID? Radio Frequency IDentification Who Are You? I am Product X RFID ADC (automated data collection) technology that uses radio-frequency waves to
More informationIMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE
IMPLEMENTING HSPD-12: A PROGRAM MANAGER S PERSPECTIVE Smart Card Alliance 2005 Fall Annual Conference Presented by Mike Butler Director of Smart Card Programs and Operations Defense Manpower Data Center
More informationWhere s The Beep? Privacy, Security, & User (Mis)undestandings of RFID
Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID Jennifer King Research Specialist Overview Quick overview of RFID Research Question Context of Inquiry Study + findings Implications
More informationRFID, user identity and the public interest
RFID, user identity and the public interest lara srivastava senior policy analyst international telecommunication union ANEC General Assembly 1 June 2007, Brussels note: the views expressed in this presentation
More informationVictor Vega RFID Solutions Marketing Director NXP Semiconductors San Jose, CA
Victor Vega RFID Solutions Marketing Director NXP Semiconductors San Jose, CA Involved in RFID for 17 years. Responsibilities have ranged from design engineer to marketing director. Prior employment engagements
More informationRFID HANDBOOK THIRD EDITION
RFID HANDBOOK THIRD EDITION RFID HANDBOOK FUNDAMENTALS AND APPLICATIONS IN CONTACTLESS SMART CARDS, RADIO FREQUENCY IDENTIFICATION AND NEAR-FIELD COMMUNICATION, THIRD EDITION Klaus Finkenzeller Giesecke
More informationFinal Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou
Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Radio Frequency IDentification Frequency Distance LF 125khz Few cm HF 13.56Mhz 1m Example Application Auto- Immobilizer
More informationIdentity Management and its impact on the Digital Economy
Identity Management and its impact on the Digital Economy Alejandro Barros 1, Alejandro Pareja 2 October 2016 Contents Introduction... 2 Identity Management... 3 Enrolment in the National Identity System...
More informationPractical Experiences with NFC Security on mobile Phones
Practical Experiences with NFC Security on mobile Phones Gauthier Van Damme Karel Wouters Katholieke Universiteit Leuven ESAT/SCD/IBBT-COSIC Workshop on RFID Security, 2009 ESAT/SCD/IBBT-COSIC (KUL) Practical
More informationStandards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments
Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering
More informationST25DV-PWM product presentation. July 2018
ST25DV-PWM product presentation July 2018 Main ST25DV-PWM Market Segments 2 Smart Industry Smart City Industrial Lighting, Motor control Street Lighting,, building Lighting (offices, museums ) ST25DV-PWM
More informationDermalog Gate. The next generation gate Made in Germany. v_1.0_171012
Dermalog Gate The next generation gate Made in Germany. v_1.0_171012 Contents 03 Welcome to the World of DERMALOG. 02 Welcome to the world of DERMALOG The Biometrics Innovation Leader. As a pioneer in
More informationContents and Preface of the RFID-Handbook
Contents and Preface of the RFID-Handbook RFID-Handbook, Wiley & Sons LTD 1999 Radio-Frequency Identification: Fundamentals and Applications Klaus Finkenzeller, Munich, Germany ISBN 0-471-98851-0 Contents
More informationNorthfleet Technology College Course Outline: Information Technology in a Global Society
Northfleet Technology College Course Outline: Information Technology in a Global Society Equivalent to ½ A level Introduction: What is ITGS Information Technology in a Global Society International refers
More informationMULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID
garfinkel.book Page 275 Thursday, June 2, 2005 11:56 PM Chapter 17 MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID Ari Schwartz 1 Paula Bruening 2 Introduction T he private sector s rollout of RFID at
More informationHuman RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019
Human RFID Implants: The Good And Bad ECE 390 - Engineering Ethics and Professionalism Robert Billette February 12, 2019 BACKGROUND We live in a complex technological universe where it seems a new device
More informationOur position. ICDPPC declaration on ethics and data protection in artificial intelligence
ICDPPC declaration on ethics and data protection in artificial intelligence AmCham EU speaks for American companies committed to Europe on trade, investment and competitiveness issues. It aims to ensure
More informationBoeing NFC Project Team #43 Shao-Chi Ou Yang James Kim Neil Misak
Boeing NFC Project Team #43 Shao-Chi Ou Yang James Kim Neil Misak ECE 445-Senior Design Spring 2013 Neil Misak James Kim Shao-Chi Ou Yang Team Members Collaboration with Our 6 team members visited Boeing's
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework
INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number
More informationThe 4A Vision: Anytime, anywhere, by anyone and anything
The 4A Vision: Anytime, anywhere, by anyone and anything Dr Tim Kelly Head, Strategy & Policy Unit, ITU and Visiting Scholar, HKUST Business School ITAHK Luncheon, 8 December 2005 2 The 4A vision: Agenda
More informationLothar Fritsch Norwegian Computing Center, Oslo
Investing in Privacy Protection with Privacy-Enhancing Technology Nova Gorica, Slovenia, 11. 6. 2008 Lothar Fritsch Norwegian Computing Center, Oslo INFOSEK Vaš 2008 partner FORUM za varovanje Conference
More informationRFID Integrated Teacher Monitoring
RFID Integrated Teacher Monitoring Introduction Article by Adewopo Adeniyi M.Sc, Texila American University, Nigeria Email: preciousadewopon@yahoo.com Radio Frequency Identification (RFID) is a generic
More informationRFID. Presented by BESSER ASSOCIATES. Instructor: Al Scott
RFID Presented by BESSER ASSOCIATES Instructor: Al Scott 1 COURSE OUTLINE Uses of RFID Basic RFID System ISM Frequency Bands Walmart Directive EPC RFID System How RF part of EPC System Works RF antennas
More informationLaser Surface Authentication TM : biometrics for documents and goods
Laser Surface Authentication TM : biometrics for documents and goods Professor Russell Cowburn Professor of Nanotechnology, Department of Physics, Imperial College London, UK. Chief Technical Officer,
More informationAnalysis of Privacy and Data Protection Laws and Directives Around the World
Analysis of Privacy and Data Protection Laws and Directives Around the World Michael Willett (Seagate) ISTPA Board and Framework Chair Track IIB: Global Privacy Policy The Privacy Symposium: Boston, 23
More informationGOVERNMENT RESOLUTION ON THE OBJECTIVES OF THE NATIONAL INFORMATION SOCIETY POLICY FOR
GOVERNMENT RESOLUTION ON THE OBJECTIVES OF THE NATIONAL INFORMATION SOCIETY POLICY FOR 2007-2011 2 1. Introduction Information and communications technology (ICT) plays an ever greater role in everyday
More informationPolicy implications 15h00 16h15
COMPLETE RFID Workshop Brussels 2009-10-28 1 COMPLETE Workshop Brussels, October 29, 2009 RFID: Economic Impact & Europe's Competitive Position The Cases of Item Level Tagging and Public Transportation
More informationDigitale Ausweise für physische Identifikation?
Digitale Ausweise für physische Identifikation? Univ.-Prof. Dr. René Mayrhofer und Michael Hölzl, MSc Institut für Netzwerke und Sicherheit, Johannes Kepler Universität Linz Vortrag zur IKT-Sicherheitskonferenz
More informationFrom here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam.
Student Quick Guide Accessing Examity You can easily access Examity through Canvas. First, login to your course in Canvas, then click on the Examity link. This will bring you to your Examity dashboard.
More informationExtending the range of NFC capable devices
February 6, 2017 Source: The Guardian Source: Betaalvereniging Nederland NFC NFC is a subtype of RFID NFC High frequency 13.56 MHz Reader & tags Active & Passive devices Source: NPO Inductance Electromagnetic
More informationPrivacy by Design: essential for organizational accountability and strong business practices
IDIS (2010) 3:405 413 DOI 10.1007/s12394-010-0053-z Privacy by Design: essential for organizational accountability and strong business practices Ann Cavoukian & Scott Taylor & Martin E. Abrams Received:
More informationARTICLE 29 Data Protection Working Party
ARTICLE 29 Data Protection Working Party Brussels, 10 April 2017 Hans Graux Project editor of the draft Code of Conduct on privacy for mobile health applications By e-mail: hans.graux@timelex.eu Dear Mr
More informationStudent Integrated Quick Guide
Student Integrated Quick Guide Accessing Examity You can easily access Examity through D2L. First, select the name of your course. Next, click on the Examity link within UA Tools. This will bring you to
More informationThe future of IoT: Expert Survey results
The future of IoT: Expert Survey results The following paragraphs summarise the main findings of the foresight study on the future of the Internet of Things (IoT) and Ambient Intelligence (AmI). The study
More informationDefinition of RF-ID. Lecture on RF-IDs
Definition of RF-ID RF-ID: Radio Frequency Identification. Indicates the use of Electromagnetic waves to detect and identify TAGS (i.e. labels) purposely attached to objects Basic components (2) Interrogator
More informationV I S O c o r e I n s p e c t
V I S O c o r e I n s p e c t S o f t wa r e s o l u t i o n f o r s e c u r e d o c u m e n t v e r i f i c at i o n Passports and ID cards prove our identity. In order to improve and facilitate the verification
More informationHong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability
Legal Week s Corporate Counsel Forum 2016 Renaissance Harbour View Hotel 23 June 2016 Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Stephen Kai-yi Wong Privacy
More informationInformation and Communications Technology and Environmental Regulation: Critical Perspectives
Image: European Space Agency Information and Communications Technology and Environmental Regulation: Critical Perspectives Rónán Kennedy School of Law, National University of Ireland Galway ronan.m.kennedy@nuigalway.ie
More informationPersonal. Identity. Information
Personal Identity Information What is it? Work Membership Student Citizen Identity Healthcare On-line Financial Military What Is Identity Information? Definition: Identity information is an assortment
More informationSUSTAINABILITY MATERIALITY OVERVIEW
SUSTAINABILITY MATERIALITY OVERVIEW EMC undertakes materiality assessments to identify and prioritize sustainability factors for the purposes of deciding where to focus our resources, setting goals, and
More informationA Critical Approach to Privacy Research in Ubiquitous Environments Issues and Underlying Assumptions
A Critical Approach to Privacy Research in Ubiquitous Environments Issues and Underlying Assumptions Maria Karyda 1, Stefanos Gritzalis 1, and Jong Hyuk Park 2 1 Dept. of Information & Communication Systems
More informationFrom here, you can create or edit your profile and schedule, reschedule or cancel your exam. This is also where you will go to start your exam.
Student Quick Guide Accessing Examity You can easily access Examity through Brightspace/D2L. First, select the name of your course. Next, click on the Examity link within Content. This will bring you to
More informationMaking Identity Use Predictable. UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016
Making Identity Use Predictable UNCITRAL Colloquium on Identity Management and Trust Services 21 April, 2016 Why Am I Here CertiPath High Assurance Identity Trust Framework Supports Aerospace and Defense
More informationORCA-50 Handheld Data Terminal UHF Demo Manual V1.0
ORCA-50 UHF Demo Manual V1.0 ORCA-50 Handheld Data Terminal UHF Demo Manual V1.0 Eximia Srl. www.eximia.it - www.rfidstore.it mario.difloriano@eximia.it 1 Eximia Srl www.eximia.it - www.rfidstore.it Catelogue
More informationSmart Cards in the Public Sector
Smart Cards in the Public Sector Interoperability within, across & beyond transport David Sentinella Department for Transport, Local Government and the Regions Cards Nov 2001 Slide No. 1 What is a Smart
More informationDecentralisation, i.e. Internet for Social Good
Decentralisation, i.e. Internet for Social Good Fabrizio Sestini DG CONNECT E3 (Next-Generation Internet) http://ec.europa.eu/digital-single-market/en/collectiveawareness * The personal views expressed
More informationITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA
August 5, 2016 ITAC RESPONSE: Modernizing Consent and Privacy in PIPEDA The Information Technology Association of Canada (ITAC) appreciates the opportunity to participate in the Office of the Privacy Commissioner
More informationWhat I want to do tonight is to share some of the emerging issues thrown up by our work at the National Consumer Council (NCC) on identity.
The Age of Identity Ed Mayo National Consumer Council James Baldwin, the author, wrote that identity is the garment with which one covers the nakedness of the self: in which case, it is best that the garment
More informationMPR kHz Reader
MPR-5005 Page 1 Doc# 041326 MPR-5005 125kHz Reader Installation & Operation Manual - 041326 MPR-5005 Page 2 Doc# 041326 COPYRIGHT ACKNOWLEDGEMENTS The contents of this document are the property of Applied
More informationCanada s Digital ID Future - A Federated Approach
Canada s Digital ID Future - A Federated Approach Spring 2018 Digital ID Digital ID is the challenge of answering Who are you? with a high degree of certainty, without resorting to face-to-face interaction
More informationID4Africa 2018 E-voting: An analysis of scenarios and preconditions of success
ID4Africa 2018 E-voting: An analysis of scenarios and preconditions of success Nicolas Jaouen Business Development Manager Government ID April 25, 2018 Agenda 1 2 3 4 5 6 7 Infineon presentation Definition
More informationPRINTED ELECTRONICS 3
PRINTED ELECTRONICS 3 4 INKTEC PRINTED ELECTRONICS 5 6 INKTEC PRINTED ELECTRONICS 7 InkTec Leads New Paradigm in Printed Electronic Materials Applications OTFT, Memory Cell, Display, RFID and so on Product
More informationLocation Privacy by Design - Technology & Business Incentives
Location Privacy by Design - Technology & Business Incentives Dr. Lothar Fritsch Norsk Regnesentral Norwegian Computing Center Oslo Internetdargana, Stockholm, 26-27.10.2010 Contents Location Privacy Concepts
More informationSuccess factor technology
Success factor technology Career opportunities for women at NXP www.nxp.com/jobs Careers without barriers NXP Semiconductors is driving innovation in a globalized environment in cooperation with different
More informationNFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags
NFC OpenSense & NFC SpeedTap 128- & 256-bit NFC Tags previously known as Kovio NFC Barcode Functional Specification Product Features Passive 13.56MHz 128- or 256-bit Read-Only Memory (ROM) 106 Kb/s Data
More informationOECD WORK ON ARTIFICIAL INTELLIGENCE
OECD Global Parliamentary Network October 10, 2018 OECD WORK ON ARTIFICIAL INTELLIGENCE Karine Perset, Nobu Nishigata, Directorate for Science, Technology and Innovation ai@oecd.org http://oe.cd/ai OECD
More informationStudent Quick Guide. Accessing your Examity Dashboard
Student Quick Guide Accessing your Examity Dashboard Access your Examity dashboard at https://prod.examity.com/otis by logging in with credentials provided. This will bring you to your Examity dashboard.
More information1040 DPI High Resolution Full-page epassport Reader Regula 8703
1040 DPI High Resolution Full-page epassport Reader Regula 8703 The world`s first mobile true high resolution full-page epassport reader featuring 1040 DPI resolution. Automatic reading and authenticity
More informationWorking Party on Security and Privacy in the Digital Economy
Unclassified DSTI/ICCP/REG(2015)12 DSTI/ICCP/REG(2015)12 Unclassified Organisation de Coopération et de Développement Économiques Organisation for Economic Co-operation and Development 06-Nov-2015 English
More informationSPECIFICATION. Product Name : Square Flexible Near-Field Communications Antenna with Ferrite Layer for Metal Direct Mount
SPECIFICATION Part No. : FXR.06.A.dg Product Name : Square Flexible Near-Field Communications Antenna with Ferrite Layer for Metal Direct Mount Features : 13.56 MHz RFID / NFC Antenna Can be placed directly
More informationSuccess factor technology
Success factor technology Career opportunities for women at NXP www.nxp.com/jobs Careers without barriers NXP Semiconductors is driving innovation in a globalized environment in cooperation with different
More informationUNIVERSAL SERVICE PRINCIPLES IN E-COMMUNICATIONS
UNIVERSAL SERVICE PRINCIPLES IN E-COMMUNICATIONS BEUC paper EC register for interest representatives: identification number 9505781573-45 100% broadband coverage by 2013 ICT services have become central
More informationPrivacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D
IDIS (2010) 3:247 251 DOI 10.1007/s12394-010-0062-y Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D Ann Cavoukian Received: 10 March 2010 / Accepted: 5 May 2010 / Published
More informationDigital Identity. Workshop. Roland Berger Munich Office
Digital Identity Workshop Roland Berger Munich Office 7 April 2017 We are looking forward to working with you in today's workshop Your Roland Berger hosts Sebastian Steger Stephan Janssens Sebastian Maus
More informationPrivacy Management in Smart Cities
Privacy Management in Smart Cities Antonio Kung 26/04/2017 Data management and citizens privacy in smart cities open governance 1 Introduction Speaker Antonio Kung, Trialog (www.trialog.com,fr) Engineering
More informationCards and Fobs. Cards & Fobs. What is a card / fob? What is a batch coded card/ fob? RFID. What is a site coded card/fob?
Cards and Fobs There are currently a number of different technologies involved in access control cards and fobs. This document aims to inform the reader of what cards or fobs are appropriate for different
More informationFundamentals of NFC. Jeff Fonseca Regional Sales Director, NXP Semiconductors Smart Card Alliance. All Rights Reserved.
Fundamentals of NFC Jeff Fonseca Regional Sales Director, NXP Semiconductors 2014. Smart Card Alliance. All Rights Reserved. NXP Solution Provider for a Connected World Leader in security and contactless
More informationRFID Frequency Overview to Application fit
RFID Frequency Overview to Application fit 1 The Radio Spectrum RFID tags exhibit different characteristics at different frequencies and it is highly unlikely that there will ever be one tag that can be
More informationSecure identity and electronic signatures essential for digital trust
Secure identity and electronic signatures essential for digital trust Betalingsformidlingskonferansen, November 16 th 2017 Eirik Dalen, Signicat (Eirik.dalen@Signicat.com) Signicat's vision is to be the
More informationAIMICT.ORG AIMICT Newsletter
SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program
More informationSPECIFICATION. Product Name : Square Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector
SPECIFICATION Part No. : FXR.06.52.0075X.A.dg Product Name : Square Flexible Near-Field Communications Ferrite Antenna with 75mm Twisted Pair 28AWG Cable and ACH(F) connector Features : 13.56 MHz RFID
More informationAuthenticating Identities & Securing Transactions. March 29, 2012
Authenticating Identities & Securing Transactions March 29, 2012 Forward Looking Statements This document includes forward-looking statements which include statements regarding our business strategy, financial
More informationFUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES
FUTURE TECHNOLOGIES FUTURE PRIVACY CHALLENGES Michael Friedewald, Fraunhofer ISI istockphoto.com/marco Volpi Panel on Privacy: Appraising challenges to technologies and ethics @ CPDP 2012 Brussels, 25
More informationTOKEN SALE AGREEMENT
TOKEN SALE AGREEMENT SwiftDemand Last Updated: March 30, 2018 This Token Sale Agreement is a legally binding contract between you and SwiftDemand Inc. (hereinafter Company ) regarding your rights and responsibilities
More informationIMPORTANT: PLEASE DO NOT USE THIS DOCUMENT WITHOUT READING THIS PAGE
IMPORTANT: PLEASE DO NOT USE THIS DOCUMENT WITHOUT READING THIS PAGE This document is designed to be a template for a document you can provide to your employees who will be using TimeIPS in your business
More informationWireless Environments & Privacy
Wireless Environments & Privacy Patricia S. Taylor Eastern Illinois University & Robert E. McGrath NCSA, University of Illinois EDRA Vancouver, BC -- May 2005 Introduction Views from a Social Scientist
More informationMira M-3 Handheld Raman Spectrometer. On-site verification of materials in seconds
Mira M-3 Handheld Raman Spectrometer On-site verification of materials in seconds Mira M-3 compact, fast, and highly accurate 02 The Mira M-3 is one of the fastest and most compact handheld Raman spectrometers
More informationMaintaining privacy in pervasive computing enabling acceptance of sensor-based services
Maintaining privacy in pervasive computing enabling acceptance of sensor-based services A Soppera and T Burbridge In the near future, everyday objects like cars and home appliances will connect the living
More informationStudent Integrated Quick Guide
Student Integrated Quick Guide Accessing Examity You can easily access Examity through D2L. First, select the name of your course. Next, click on the Examity link in the Table of Contents on the left of
More informationNFC Forum NFC Use Cases
NFC Forum NFC Use Cases Peter Preuss Nokia Chairman NFC Forum Marketing Committee September 2009 THE NFC FORUM 2 History and Membership of the NFC Forum Established in 2004 Founded by Philips, Nokia and
More informationWireless Keyboard Without Need For Battery
Technical Disclosure Commons Defensive Publications Series April 29, 2015 Wireless Keyboard Without Need For Battery Vijay Asrani James Tanner Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More informationUHF-Technology. Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2016
UHF-Technology Vorlesung RFID Systems Benno Flecker, Michael Gebhart TU Graz, Sommersemester 2016 RFID System A traditional passive label (tag) is queried and it responds with it s ID accordingly. Power
More informationBig Data & AI Governance: The Laws and Ethics
Institute of Big Data Governance (IBDG): Inauguration-cum-Digital Economy and Big Data Governance Symposium 5 December 2018 InnoCentre, Kowloon Tong Big Data & AI Governance: The Laws and Ethics Stephen
More informationSLAVERY AND HUMAN TRAFFICKING
1 SLAVERY AND HUMAN TRAFFICKING Pursuant to Section 3 of the California Transparency in Supply Chains Act of 2010 and the United Kingdom (UK) Modern Slavery Act 2015, Chapter 30, Part 6, Provision 54,
More informationEnd-to-End Privacy Accountability
End-to-End Privacy Accountability Denis Butin 1 and Daniel Le Métayer 2 1 TU Darmstadt 2 Inria, Université de Lyon TELERISE, 18 May 2015 1 / 17 Defining Accountability 2 / 17 Is Accountability Needed?
More informationThe IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. Overview June, 2017
The IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems Overview June, 2017 @johnchavens Ethically Aligned Design A Vision for Prioritizing Human Wellbeing
More informationThe Privacy Case. Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns. Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG
The Privacy Case Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns Tudor B. Ionescu, Gerhard Engelbrecht SIEMENS AG Agenda Introduction Defining the privacy case Privacy-relevant
More informationDesign of UHF RFID Emulators with Applications to RFID Testing and Data Transport
Design of UHF RFID Emulators with Applications to RFID Testing and Data Transport Rich Redemske MIT AutoID Lab Cambridge, MA, USA redemske@mit.edu Rich Fletcher TagSense, Inc. Cambridge, MA, USA rf@tagsense.com
More informationFraunhofer ISI Seite 1
Seite 1 A"NEW"WAY"OF"LOOKING"AT"PRIVACY" Michael"Friedewald,"Fraunhofer"ISI" istockphoto.com/marco Volpi Why"privacy"is" important" "at"least"in"western" countries! Philosophically,! Part of human dignity
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework
INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number
More informationELG 5121/CSI 7631 Fall Projects Overview. Projects List
ELG 5121/CSI 7631 Fall 2009 Projects Overview Projects List X-Reality Affective Computing Brain-Computer Interaction Ambient Intelligence Web 3.0 Biometrics: Identity Verification in a Networked World
More informationStudent Quick Guide. For Stand-Alone Access
Student Quick Guide For Stand-Alone Access Accessing your Examity Dashboard For ALEKS exams, access your Examity dashboard at https://prod.examity.com/lanecc by logging in with credentials provided. For
More information