Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID

Size: px
Start display at page:

Download "Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID"

Transcription

1 Where s The Beep? Privacy, Security, & User (Mis)undestandings of RFID Jennifer King Research Specialist

2 Overview Quick overview of RFID Research Question Context of Inquiry Study + findings Implications for ubicomp and security

3 What is RFID?

4 Terminology RFID: Any technology that transmits specific identifying numbers using radio. [Garfinkel 05] Ubiquitous computing: Making many computers available throughout the physical environment, but making them effectively invisible to the user. [Weiser 93]

5 Evolving Uses of RFID Past: livestock tagging, inventory management Present: proximity cards, library books, supply chain, government issued ID, limited consumer products (Nike +ipod, car keys) Future: clothing, paper clips, currency, baggage...?

6 Our Research RFID is a (somewhat) new and disruptive technology, with the potential for changing how people interact with their environment. We wanted to explore how users think about RFID, if they understand how it works, and how they expect it to work We investigated this approach by examining RFenabled objects in two domains: consumer/commercial: credit cards public: e-passport, public transit 6

7 Related Work Handful of studies exploring use in consumer goods most have raised privacy issues user expectation that tags be disabled after point of purchase Makela et al., CHI 2007: Nokia paper exploring user perceptions of interaction with RFID tags & mobile phones 50 subjects, given RF-enabled phones and posters to interact with compared comprehension of 2d barcodes vs. RFID tags subjects struggled to interact with RF tag - lack of mental models with which to reference Poole et al. (unpublished): used mental models to explore perceptions of RFID 35 subjects, interviews utilizing photo elicitation most subjects confused about capabilities, often ascribing more power than possible (satellites) RFID has no interface -- invisibility, hidden capabilities made subjects paranoid/suspicious about uses raises issues of notice, choice, and consent (FIPs) 7

8 Concerns with RFID Privacy threats: Data - When static, data can be linked to individuals User awareness - user may not realize the object contains a transponder Signaling - object may not notify the user when data is read Security: Tracking/hotlisting - both real time as well as database compilation Eavesdropping/Skimming - reading without knowledge or consent Cloning - tag data can be copied/cloned and reused Increasing Ubiquity - more tags and more readers builds a ubiquitous infrastructure more opportunities for surreptitious reads when object is carried through public places

9 Evolving Uses Identification US e-passport (2006) PASS card (2008) Enhanced drivers licenses (Wash., 2008) Transit Automated tolls: EZ-Pass, FasTrak Transit cards (in US: NYC, Atlanta, Bay Area), widespread in Europe Payment Asia and EU: hybrid transit/payment cards US: credit cards

10 Future Uses product/item level tagging NFC in cell phones for payment and information VeriChip/human implantation 10

11 Current Issues With Gov t Uses of RFID Often no choice when it comes to gov t issued ID Problems with Federal govt s adoption of e- Passport No consideration of user s needs Despite privacy checks in place, PIA didn t address privacy concerns Poor understanding by gov t officials of what RFID is and how it works Lack of expertise in gov t at all levels Poor understanding of implications of what they are building

12 Our Study Investigated user mental models of RF technology and RFID specifically Exploratory research - main portion will be conducted later this year Thus, findings are preliminary Small sample - 9 subjects 3 novices, 3 intermediates, 3 experts - expect our larger sample to have far more novices Examined transit cards, credit cards, and e- Passport Wanted to study real-world objects in use today

13 Mental Models Norman (1983, 1988) Image source: 13

14 Mental Models cont d We applied this concept by attempting to elicit: users MM of RF technology generally MM of the RFID-enabled object we investigated explicitly Methods: short survey to get a baseline measure of subjects attitudes/knowledge of RFID included questions about other RF-enabled objects to triangulate fundamental understanding of how RF works structured interviews with subject discussing use of object, how they thought it worked, how it functioned within a larger system gave user documentation and/or marketing materials to review to see if official docs provided aid 14

15 Our Subjects Most had heard of the term RFID Half had no understanding of how it works Evaluated personal usage scenarios: Transit passes: majority comfortable Keyless entry to home: very mixed Credit card: over half uncomfortable Passport: majority uncomfortable or uncertain 15

16 Transit Cards Most easily understood by users the structure of the interaction (both card & FasTrak) with the reader conforms to user expectations Obvious benefits/efficiencies reduces time, no paper tickets, no need for change Saw little personal risk since information wasn t seen as valuable 16

17 RFID Credit Cards Subjects saw little benefit to RFID didn t think the efficiency gains were worthwhile Concerned about security of payment system several mentioned ID theft Financial data seen as having a more personal impact Most wanted the security of signing for their purchases More comfortable with single use items (transit) than with payment cards 17

18 US e-passport No benefits to passport holder, seen as only benefiting gov t didn t see why it needed to be remotely readable Concerned about security due to: PII stored on document stakes seem higher, important, denotes citizenship lack of faith that gov t was looking out for their interests After examining official documentation, subjects could not articulate clear benefits or risks should users be made aware if risk is minimized? 18

19 Commonalities RFID (usually) = Convenience & Efficiency Where s the beep? - universal expectation of some sort of audible or visible feedback when chip is read Context of implementation is important does the expected use align with user benefits and with information shared/exposed? does the issuer benefit more than the user? 19

20 Notice & Consent None of the subjects were made aware of the presence of the chip by the object s issuer those who did know were made aware by friends or media reports After reviewing educational materials from each issuer, none had any better understanding of how RFID worked or if there were any risks 20

21 Implications for Security Actual risk varies between these 3 objects: epassport: weak encryption, gives non-static ID when queried, can be read when cover is open +1/4 transit cards: static ID but encrypted, bigger risk with transit data storage credit cards: not encrypted, static ID, readable by anyone with reader software In unprotected implementations, mitigating risk depends on your understanding of how RF works (absent clear guidelines) if you don t understand that readers don t have to beep, or the nuances of how RF works, you may not understand how or why to use a shield our novice and intermediate users lacked understanding, generally unable to assess potential risks 21

22 Implications for Ubiquitous Computing People don t get it. And it worries them. How do we introduce this technology to the public in ways that reveals how it works and what it is used for? How do you make use observable (vs. invisible)? esp. true concerning personal data Notice & consent issues: how do we manage the practicalities of N&C? how do we respect one s desire to opt-out? 22

23 Implications for Public Uses Should governments be incorporating this technology into gov t issued ID? Dept. of Homeland Security Privacy Advisory Committee, 2006: But for other applications related to human beings, RFID appears to offer little benefit when compared to the consequences it brings for privacy and data integrity. Instead, it increases risks to personal privacy and security, with no commensurate benefit for performance or national security. 23

24 Coming Soon... US PASS card (2008) WA state enhanced driver s license (released Jan. 08) Both use HF-RFID, read range ~30ft. UID only, no PII 24

25 Questions? Thanks! 25

Definition of RF-ID. Lecture on RF-IDs

Definition of RF-ID. Lecture on RF-IDs Definition of RF-ID RF-ID: Radio Frequency Identification. Indicates the use of Electromagnetic waves to detect and identify TAGS (i.e. labels) purposely attached to objects Basic components (2) Interrogator

More information

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification

MOBILE COMPUTING 2/25/17. What is RFID? RFID. CSE 40814/60814 Spring Radio Frequency IDentification MOBILE COMPUTING CSE 40814/60814 Spring 2017 What is RFID? Radio Frequency IDentification Who Are You? I am Product X RFID ADC (automated data collection) technology that uses radio-frequency waves to

More information

RFID and Privacy an antagonism?

RFID and Privacy an antagonism? BERLIN COMMISSIONER FOR DATA PROTECTION AND FREEDOM OF INORMATION, GERMANY RFID and Privacy an antagonism? Dr. Alexander Dix, LL.M. and Freedom of Information Member of the Art.29 Working Party Statement

More information

Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-passport

Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-passport Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-passport Marci Meingast Dept. of Electrical Engineering and Computer Science University of California Berkeley,

More information

RFID and privacy - Some industry perspectives (ICC, EICTA)

RFID and privacy - Some industry perspectives (ICC, EICTA) RFID and privacy - Some industry perspectives (ICC, EICTA) Jeroen Terstegge ICC, EICTA OECD, Paris 2005-10-05 Identification Technologies: Connecting PEOPLE to Information, Entertainment and Services.

More information

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID garfinkel.book Page 275 Thursday, June 2, 2005 11:56 PM Chapter 17 MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID Ari Schwartz 1 Paula Bruening 2 Introduction T he private sector s rollout of RFID at

More information

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com Layerone / 2006 RFID Technology, Security & Privacy Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com What are we talking about today? RFID history Technologies WiFi tags Privacy/ Security Who am

More information

Understanding the role governments and industry organizations play in RFID adoption. Mark Roberti, Founder & Editor, RFID Journal

Understanding the role governments and industry organizations play in RFID adoption. Mark Roberti, Founder & Editor, RFID Journal Understanding the role governments and industry organizations play in RFID adoption Mark Roberti, Founder & Editor, RFID Journal Regulations for spectrum allocation RFID standards development organizations

More information

ICAO. ICAO Council JTC1 ISO/IEC. Air Transport Committee SC17 TAG/MRTD WG3 ICBWG NTWG DOC ISO National Bodies.

ICAO. ICAO Council JTC1 ISO/IEC. Air Transport Committee SC17 TAG/MRTD WG3 ICBWG NTWG DOC ISO National Bodies. Electronic Machine Readable Passports: ICAO Standards Barry J. Kefauver Montevideo, Uruguay Summary The work on co-existing technologies began 10 years ago. A number of countries have devoted tremendous

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

Preface to the Third Edition. List of Abbreviations

Preface to the Third Edition. List of Abbreviations Contents Preface to the Third Edition List of Abbreviations 1 Introduction 1 1.1 Automatic Identification Systems 2 1.1.1 Barcode Systems 2 1.1.2 Optical Character Recognition 3 1.1.3 Biometric Procedures

More information

Presentation Outline

Presentation Outline Functional requirements for privacy enhancing systems Fred Carter Senior Policy & Technology Advisor Office of the Information & Privacy Commissioner / Ontario, Canada OECD Workshop on Digital Identity

More information

RFID HANDBOOK THIRD EDITION

RFID HANDBOOK THIRD EDITION RFID HANDBOOK THIRD EDITION RFID HANDBOOK FUNDAMENTALS AND APPLICATIONS IN CONTACTLESS SMART CARDS, RADIO FREQUENCY IDENTIFICATION AND NEAR-FIELD COMMUNICATION, THIRD EDITION Klaus Finkenzeller Giesecke

More information

A comprehensive guide to digital badges.

A comprehensive guide to digital badges. A comprehensive guide to digital badges. This is your in-depth guide to what digital badges are and how they are used. A FREE RESOURCE FROM ACCREDIBLE.COM A Comprehensive Guide to Digital Badges 2 Introduction

More information

Executive Summary. The process. Intended use

Executive Summary. The process. Intended use ASIS Scouting the Future Summary: Terror attacks, data breaches, ransomware there is constant need for security, but the form it takes is evolving in the face of new technological capabilities and social

More information

Privacy engineering, privacy by design, and privacy governance

Privacy engineering, privacy by design, and privacy governance CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://

More information

Roadmap to Digital Transformation: Implications for Intelligence

Roadmap to Digital Transformation: Implications for Intelligence Roadmap to Digital Transformation: Implications for Intelligence Presentation to the Office of the Director of National Intelligence February 26, 2008 Dr. Robert Atkinson President Information Technology

More information

RFID Frequency Overview to Application fit

RFID Frequency Overview to Application fit RFID Frequency Overview to Application fit 1 The Radio Spectrum RFID tags exhibit different characteristics at different frequencies and it is highly unlikely that there will ever be one tag that can be

More information

TTÜ infotehnoloogiateaduskond Informaatikainstituut. Enn Õunapuu Vanemteadur

TTÜ infotehnoloogiateaduskond Informaatikainstituut. Enn Õunapuu Vanemteadur TTÜ infotehnoloogiateaduskond Informaatikainstituut Enn Õunapuu enn.ounapuu@ttu.ee Vanemteadur Towards a connected world TEDxBNMIT We are moving towards a more connected, instrumented and data driven world

More information

Evaluating OTDOA Technology for VoLTE E911 Indoors

Evaluating OTDOA Technology for VoLTE E911 Indoors Evaluating OTDOA Technology for VoLTE E911 Indoors Introduction As mobile device usage becomes more and more ubiquitous, there is an increasing need for location accuracy, especially in the event of an

More information

Designing for End-User Programming through Voice: Developing Study Methodology

Designing for End-User Programming through Voice: Developing Study Methodology Designing for End-User Programming through Voice: Developing Study Methodology Kate Howland Department of Informatics University of Sussex Brighton, BN1 9QJ, UK James Jackson Department of Informatics

More information

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019 Human RFID Implants: The Good And Bad ECE 390 - Engineering Ethics and Professionalism Robert Billette February 12, 2019 BACKGROUND We live in a complex technological universe where it seems a new device

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information

Legislation & Standardization. Pawel Waszczur McMaster RFID Applications Lab McMaster University

Legislation & Standardization. Pawel Waszczur McMaster RFID Applications Lab McMaster University 1 Legislation & Standardization Pawel Waszczur McMaster RFID Applications Lab McMaster University 2 Agenda Electromagnetic Spectrum EM Spectrum Issues Wireless Devices using the EM Spectrum Licensed &

More information

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota

This research is supported by the TechPlan program funded by the ITS Institute at the University of Minnesota Frank Douma, Assistant Director,! Sarah Aue, Research Assistant! State and Local Policy Program! Humphrey Institute of Public Affairs! University of Minnesota! This research is supported by the TechPlan

More information

Eavesdropping Attacks on High-Frequency RFID Tokens

Eavesdropping Attacks on High-Frequency RFID Tokens Eavesdropping Attacks on High-Frequency RFID Tokens p. 1 Eavesdropping Attacks on High-Frequency RFID Tokens Gerhard P. Hancke July 11, 2008 Eavesdropping Attacks on High-Frequency RFID Tokens p. 2 What

More information

STAUNING Trade-In Internet Sales Process with /Voic Templates to Non-Responsive Prospects 2018 Edition

STAUNING Trade-In Internet Sales Process with  /Voic Templates to Non-Responsive Prospects 2018 Edition STAUNING Trade-In Internet Sales Process with Email/Voicemail Templates to Non-Responsive Prospects 2018 Edition Contents 60-DAY INTERNET SALES PROCESS TRADE-IN LEADS... 2 DAY 1 AUTO-RESPONSE (TRADE APPRAISAL)...

More information

Responsible Data Use Policy Framework

Responsible Data Use Policy Framework 1 May 2018 Sidewalk Toronto is a joint effort by Waterfront Toronto and Sidewalk Labs to create a new kind of complete community on Toronto s waterfront that combines cutting-edge technology and forward-thinking

More information

The aims. An evaluation framework. Evaluation paradigm. User studies

The aims. An evaluation framework. Evaluation paradigm. User studies The aims An evaluation framework Explain key evaluation concepts & terms. Describe the evaluation paradigms & techniques used in interaction design. Discuss the conceptual, practical and ethical issues

More information

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF

EXECUTIVE SUMMARY. St. Louis Region Emerging Transportation Technology Strategic Plan. June East-West Gateway Council of Governments ICF EXECUTIVE SUMMARY St. Louis Region Emerging Transportation Technology Strategic Plan June 2017 Prepared for East-West Gateway Council of Governments by ICF Introduction 1 ACKNOWLEDGEMENTS This document

More information

RFID, user identity and the public interest

RFID, user identity and the public interest RFID, user identity and the public interest lara srivastava senior policy analyst international telecommunication union ANEC General Assembly 1 June 2007, Brussels note: the views expressed in this presentation

More information

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou

Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Final Project Introduction to RFID (Radio Frequency IDentification) Andreas G. Andreou Radio Frequency IDentification Frequency Distance LF 125khz Few cm HF 13.56Mhz 1m Example Application Auto- Immobilizer

More information

STAUNING /Voic Templates to Non-Responsive Trade-In Prospects 2017 Edition

STAUNING  /Voic Templates to Non-Responsive Trade-In Prospects 2017 Edition STAUNING Email/Voicemail Templates to Non-Responsive Trade-In Prospects 2017 Edition Contents 30-DAY INTERNET SALES PROCESS TRADE-IN LEADS... 2 DAY 1 AUTO-RESPONSE (TRADE APPRAISAL)... 3 DAY 1 FIRST PERSONAL

More information

The future of IoT: Expert Survey results

The future of IoT: Expert Survey results The future of IoT: Expert Survey results The following paragraphs summarise the main findings of the foresight study on the future of the Internet of Things (IoT) and Ambient Intelligence (AmI). The study

More information

Guidelines on Short Range Devices. Spectrum Planning and Licensing

Guidelines on Short Range Devices. Spectrum Planning and Licensing Guidelines on Short Range Devices Spectrum Planning and Licensing DTE 01/08/2014 INTRODUCTION Short-range radio devices (SRDs) are low powered transmitters which provide either unidirectional or bidirectional

More information

Industry 4.0: the new challenge for the Italian textile machinery industry

Industry 4.0: the new challenge for the Italian textile machinery industry Industry 4.0: the new challenge for the Italian textile machinery industry Executive Summary June 2017 by Contacts: Economics & Press Office Ph: +39 02 4693611 email: economics-press@acimit.it ACIMIT has

More information

RFID. Presented by BESSER ASSOCIATES. Instructor: Al Scott

RFID. Presented by BESSER ASSOCIATES. Instructor: Al Scott RFID Presented by BESSER ASSOCIATES Instructor: Al Scott 1 COURSE OUTLINE Uses of RFID Basic RFID System ISM Frequency Bands Walmart Directive EPC RFID System How RF part of EPC System Works RF antennas

More information

Legislation & Standardization

Legislation & Standardization Legislation & Standardization Understanding the role governments and industry organizations play in RFID adoption Peter Basl, PhD. baslpa@mcmaster.ca (905) 906-1443 McMaster RFID Applications Lab McMaster

More information

Polycarbonate Datapage Security: Hinge Construction

Polycarbonate Datapage Security: Hinge Construction Polycarbonate Datapage Security: Hinge Construction Introduction Over the last two decades, polycarbonate (PC) has grown in use as a substrate for identification documents and become the performance material

More information

The Future of Smart Everyday Objects. Advances in Human Computer Interaction Sven Steudter

The Future of Smart Everyday Objects. Advances in Human Computer Interaction Sven Steudter The Future of Smart Everyday Objects Advances in Human Computer Interaction 08.11.2007 Sven Steudter Overview Introduction Economical Chances Privacy, Definitions and Risks Social Challenges and Implications

More information

Automotive Applications ofartificial Intelligence

Automotive Applications ofartificial Intelligence Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 7,6 cm) Automotive Applications ofartificial Intelligence Dr. David J. Atkinson Chassis

More information

NFC Forum NFC Use Cases

NFC Forum NFC Use Cases NFC Forum NFC Use Cases Peter Preuss Nokia Chairman NFC Forum Marketing Committee September 2009 THE NFC FORUM 2 History and Membership of the NFC Forum Established in 2004 Founded by Philips, Nokia and

More information

Whatever Happened to the. Fair Information Practices?

Whatever Happened to the. Fair Information Practices? Whatever Happened to the Fair Information Practices? Beth Givens Director Privacy Rights Clearinghouse Privacy Symposium August 22, 2007 Cambridge, MA Topics Definition and origins of FIPs Overview of

More information

RFID: Applications, Security, and Privacy

RFID: Applications, Security, and Privacy RFID: Applications, Security, and Privacy Simson Garfinkel, Beth Rosenberg Click here if your download doesn"t start automatically RFID: Applications, Security, and Privacy Simson Garfinkel, Beth Rosenberg

More information

Smart Cards in the Public Sector

Smart Cards in the Public Sector Smart Cards in the Public Sector Interoperability within, across & beyond transport David Sentinella Department for Transport, Local Government and the Regions Cards Nov 2001 Slide No. 1 What is a Smart

More information

Contents and Preface of the RFID-Handbook

Contents and Preface of the RFID-Handbook Contents and Preface of the RFID-Handbook RFID-Handbook, Wiley & Sons LTD 1999 Radio-Frequency Identification: Fundamentals and Applications Klaus Finkenzeller, Munich, Germany ISBN 0-471-98851-0 Contents

More information

Policy implications 15h00 16h15

Policy implications 15h00 16h15 COMPLETE RFID Workshop Brussels 2009-10-28 1 COMPLETE Workshop Brussels, October 29, 2009 RFID: Economic Impact & Europe's Competitive Position The Cases of Item Level Tagging and Public Transportation

More information

1040 DPI High Resolution Full-page epassport Reader Regula 8703

1040 DPI High Resolution Full-page epassport Reader Regula 8703 1040 DPI High Resolution Full-page epassport Reader Regula 8703 The world`s first mobile true high resolution full-page epassport reader featuring 1040 DPI resolution. Automatic reading and authenticity

More information

Infineon at a glance

Infineon at a glance Infineon at a glance 2017 www.infineon.com We make life easier, safer and greener with technology that achieves more, consumes less and is accessible to everyone. Microelectronics from Infineon is the

More information

TÜV SÜD Webinar: The European Radio Equipment Directive 2014/53/EU Questions & Answers

TÜV SÜD Webinar: The European Radio Equipment Directive 2014/53/EU Questions & Answers TÜV SÜD Webinar: The European Radio Equipment Directive 2014/53/EU Questions & Answers Questions From which date exactly will this Directive be in power? Answers Member States must publish and apply the

More information

Investigating the Effect of Temperature in RFID Technology

Investigating the Effect of Temperature in RFID Technology Paper ID #18531 Investigating the Effect of Temperature in RFID Technology Dr. Tae-Hoon Kim, Purdue University Northwest Dr. Lash B. Mapa, Purdue University Northwest Lash Mapa is a Professor in Industrial/Mechanical

More information

RFID ACCESS CONTROL. SRðAN LALE FACULTY OF ELECTRICAL ENGINEERING EASTERN SARAJEVO

RFID ACCESS CONTROL. SRðAN LALE FACULTY OF ELECTRICAL ENGINEERING EASTERN SARAJEVO RFID ACCESS CONTROL SRðAN LALE FACULTY OF ELECTRICAL ENGINEERING EASTERN SARAJEVO 1 INTRODUCTION RFID (RADIO - FREQUENCY IDENTIFICATION) systems use RF signals for identification of people, animals and

More information

Oil Spill Response User Manual

Oil Spill Response User Manual Oil Spill Response User Manual Seattle Audubon Puget Sound Seabird Survey August 2018 Contents Section 1: Oil Observations Reporting Guidance Introduction to the program. Section 2: Contact Information

More information

HUMAN FACTORS IN VEHICLE AUTOMATION

HUMAN FACTORS IN VEHICLE AUTOMATION Emma Johansson HUMAN FACTORS IN VEHICLE AUTOMATION - Activities in the European project AdaptIVe Vehicle and Road Automation (VRA) Webinar 10 October 2014 // Outline AdaptIVe short overview Collaborative

More information

COMMISSION OF THE EUROPEAN COMMUNITIES. Draft COMMISSION DECISION

COMMISSION OF THE EUROPEAN COMMUNITIES. Draft COMMISSION DECISION EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, C(2007) Draft COMMISSION DECISION of [ ] amending Decision 2006/771/EC on harmonisation of the radio spectrum for use by short-range devices EN

More information

Distributed spectrum sensing in unlicensed bands using the VESNA platform. Student: Zoltan Padrah Mentor: doc. dr. Mihael Mohorčič

Distributed spectrum sensing in unlicensed bands using the VESNA platform. Student: Zoltan Padrah Mentor: doc. dr. Mihael Mohorčič Distributed spectrum sensing in unlicensed bands using the VESNA platform Student: Zoltan Padrah Mentor: doc. dr. Mihael Mohorčič Agenda Motivation Theoretical aspects Practical aspects Stand-alone spectrum

More information

Basics of RFID technology Thomas Holtstiege Technical Manager EECC. October 2009

Basics of RFID technology Thomas Holtstiege Technical Manager EECC. October 2009 Basics of RFID technology Thomas Holtstiege Technical Manager EECC October 2009 About the European EPC Competence Center (EECC) First European EPCglobal accredited performance test center Active since

More information

I C T. Per informazioni contattare: "Vincenzo Angrisani" -

I C T. Per informazioni contattare: Vincenzo Angrisani - I C T Per informazioni contattare: "Vincenzo Angrisani" - angrisani@apre.it Reference n.: ICT-PT-SMCP-1 Deadline: 23/10/2007 Programme: ICT Project Title: Intention recognition in human-machine interaction

More information

Article. The Internet: A New Collection Method for the Census. by Anne-Marie Côté, Danielle Laroche

Article. The Internet: A New Collection Method for the Census. by Anne-Marie Côté, Danielle Laroche Component of Statistics Canada Catalogue no. 11-522-X Statistics Canada s International Symposium Series: Proceedings Article Symposium 2008: Data Collection: Challenges, Achievements and New Directions

More information

TRB Workshop on the Future of Road Vehicle Automation

TRB Workshop on the Future of Road Vehicle Automation TRB Workshop on the Future of Road Vehicle Automation Steven E. Shladover University of California PATH Program ITFVHA Meeting, Vienna October 21, 2012 1 Outline TRB background Workshop organization Automation

More information

1. First printing, TR , March, 2000.

1. First printing, TR , March, 2000. MERL { A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com Book Review: Biometrics William T. Freeman MERL, Mitsubishi Electric Research Labs. 201 Broadway Cambridge, MA 02139 TR-2000-07 March

More information

Foreword The Internet of Things Threats and Opportunities of Improved Visibility

Foreword The Internet of Things Threats and Opportunities of Improved Visibility Foreword The Internet of Things Threats and Opportunities of Improved Visibility The Internet has changed our business and private lives in the past years and continues to do so. The Web 2.0, social networks

More information

Cross-Border Interoperability Report Overview CANUS CIWG Meeting

Cross-Border Interoperability Report Overview CANUS CIWG Meeting Cross-Border Interoperability Report Overview CANUS CIWG Meeting June 21, 2016 Eric Torunski CITIG Executive Director Barry H. Luke NPSTC Deputy Executive Director Presentation Overview Current Cross Border

More information

RFID-ECE4803 Lecture 2. Prof. Manos M. Tentzeris

RFID-ECE4803 Lecture 2. Prof. Manos M. Tentzeris RFID-ECE4803 Lecture 2 Prof. Manos M. Tentzeris (etentze@ece.gatech.edu) Data Rate bit/sec 1G 100M 10M 1M Communication by Applications 802.15.3c mm-wave 802.15.3 UWB WPAN 802.15.1 Bluetooth 802.15.4 ZigBee

More information

Climate Asia Research Overview

Climate Asia Research Overview Climate Asia Research Overview Regional research study: comparable across seven countries The Climate Asia research was conducted in seven countries: Bangladesh, China, India, Indonesia, Nepal, Pakistan

More information

Effective Iconography....convey ideas without words; attract attention...

Effective Iconography....convey ideas without words; attract attention... Effective Iconography...convey ideas without words; attract attention... Visual Thinking and Icons An icon is an image, picture, or symbol representing a concept Icon-specific guidelines Represent the

More information

Global harmonization of short-range devices categories

Global harmonization of short-range devices categories Recommendation ITU-R SM.2103-0 (09/2017) Global harmonization of short-range devices categories SM Series Spectrum management ii Rec. ITU-R SM.2103-0 Foreword The role of the Radiocommunication Sector

More information

Ubiquitous Computing. Spring 2010

Ubiquitous Computing. Spring 2010 Ubiquitous Computing Spring 2010 - Making Sense of Sensing Systems: Five questions for designers and Researchers - Distributed mediation of ambiguous context an aware environments - RFID: A key to Automating

More information

The SONNETS Innovation Identification Framework

The SONNETS Innovation Identification Framework The SONNETS Innovation Identification Framework The project leading to this application has received funding from the European Union s Horizon 2020 research and innovation programme under grant agreement

More information

RENAULT CMF1 BCM BCM_CMF1_01

RENAULT CMF1 BCM BCM_CMF1_01 Document: User Manual / Functional Description Project: RENAULT CMF1 BCM BCM_CMF1_01 Date: October 1, 2014 Number of pages: 10 Name: Department: Phone: Date: Sign: Author: Jérôme Lee I B&S CF PG3 CFRF

More information

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009

Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 Should privacy impact assessments be mandatory? David Wright Trilateral Research & Consulting 17 Sept 2009 1 Today s presentation Databases solving one problem & creating another What is a privacy impact

More information

A UHF Radio Frequency Identification (RFID) System for Healthcare: Design and Implementation

A UHF Radio Frequency Identification (RFID) System for Healthcare: Design and Implementation A UHF Radio Frequency Identification (RFID) System for Healthcare: Design and Implementation A. C. Polycarpou 1, G. Gregoriou 1, A. Dimitriou 2, A. Bletsas 3, J. N. Sahalos 1,2 Cyprus Academic Research

More information

Bloodhound RMS Product Overview

Bloodhound RMS Product Overview Page 2 of 10 What is Guard Monitoring? The concept of personnel monitoring in the security industry is not new. Being able to accurately account for the movement and activity of personnel is not only important

More information

THE FIRST TO RESPOND. THE LAST TO GO HOME.

THE FIRST TO RESPOND. THE LAST TO GO HOME. THE FIRST TO RESPOND. THE LAST TO GO HOME. MOTOROLA APX Mobile Radios Safety Redefined. GET MORE INFORMATION. WITH LESS INTERACTION. During a high-speed pursuit or commanding a Fireground scene, communication

More information

Preparatory paper: food for thought

Preparatory paper: food for thought CNS SYMPOSIUM 2-3 October 2018 EUROCONTROL s Brussels HQ Preparatory paper: food for thought 1 Introduction EUROCONTROL will host a two-day interactive CNS Symposium on October 2 nd and 3 rd, 2018. This

More information

Wireless Environments & Privacy

Wireless Environments & Privacy Wireless Environments & Privacy Patricia S. Taylor Eastern Illinois University & Robert E. McGrath NCSA, University of Illinois EDRA Vancouver, BC -- May 2005 Introduction Views from a Social Scientist

More information

ELT0040 RFID ja NFC. Enn Õunapuu ICT-643

ELT0040 RFID ja NFC. Enn Õunapuu ICT-643 ELT0040 RFID ja NFC Enn Õunapuu enn.ounapuu@ttu.ee ICT-643 What Is NFC? NFC or Near Field Communication is a short range high frequency wireless communication technology. NFC is mainly aimed for mobile

More information

Contextual Design Observations

Contextual Design Observations Contextual Design Observations Professor Michael Terry September 29, 2009 Today s Agenda Announcements Questions? Finishing interviewing Contextual Design Observations Coding CS489 CS689 / 2 Announcements

More information

Installation Instructions RF identification system Read/write head ANT430 ANT431

Installation Instructions RF identification system Read/write head ANT430 ANT431 Installation Instructions RF identification system Read/write head ANT430 ANT431 UK 80262949 / 00 04 / 2017 Contents 1 Preliminary note...4 1.1 Symbols used...4 2 Safety instructions...4 2.1 General...4

More information

Associate Professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS)

Associate Professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) Foundations of Secure e-commerce (bmevihim219) Dr. Levente Buttyán Associate Professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu

More information

Wireless systems. includes issues of

Wireless systems. includes issues of Wireless systems includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs. digital, bits & bytes software applications, operating system organization

More information

Japan s FinTech Vision

Japan s FinTech Vision Japan s FinTech Vision First Comprehensive Industrial Finance Division Economic and Industrial Policy Bureau Ministry of Economy, Trade and Industry 1 FinTech: New Finance to Support the Fourth Industrial

More information

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30

Understanding User Privacy in Internet of Things Environments IEEE WORLD FORUM ON INTERNET OF THINGS / 30 Understanding User Privacy in Internet of Things Environments HOSUB LEE AND ALFRED KOBSA DONALD BREN SCHOOL OF INFORMATION AND COMPUTER SCIENCES UNIVERSITY OF CALIFORNIA, IRVINE 2016-12-13 IEEE WORLD FORUM

More information

PN5180 The best full NFC frontend on the market

PN5180 The best full NFC frontend on the market PN580 The best full NFC frontend on the market Product support package Public MobileKnowledge January 206 Agenda Watch recording Session 27 th January: PN580 product support package Where to find PN580

More information

2001 HSC Notes from the Examination Centre Design and Technology

2001 HSC Notes from the Examination Centre Design and Technology 2001 HSC Notes from the Examination Centre Design and Technology 2002 Copyright Board of Studies NSW for and on behalf of the Crown in right of the State of New South Wales. This document contains Material

More information

IS STANDARDIZATION FOR AUTONOMOUS CARS AROUND THE CORNER? By Shervin Pishevar

IS STANDARDIZATION FOR AUTONOMOUS CARS AROUND THE CORNER? By Shervin Pishevar IS STANDARDIZATION FOR AUTONOMOUS CARS AROUND THE CORNER? By Shervin Pishevar Given the recent focus on self-driving cars, it is only a matter of time before the industry begins to consider setting technical

More information

2. ROADSIDE TOLL COLLECTION SECTION 01.

2. ROADSIDE TOLL COLLECTION SECTION 01. 2. ROADSIDE TOLL COLLECTION 1 SECTION 01. Toll System Configuration Cash Tolls Violation Enforcement/Video Toll Collection Systems 2 Toll System Configuration Open (barrier tolls) Tolls collected as vehicles

More information

Ethical and social aspects of management information systems

Ethical and social aspects of management information systems Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How

More information

V I S O c o r e I n s p e c t

V I S O c o r e I n s p e c t V I S O c o r e I n s p e c t S o f t wa r e s o l u t i o n f o r s e c u r e d o c u m e n t v e r i f i c at i o n Passports and ID cards prove our identity. In order to improve and facilitate the verification

More information

Technologies that will make a difference for Canadian Law Enforcement

Technologies that will make a difference for Canadian Law Enforcement The Future Of Public Safety In Smart Cities Technologies that will make a difference for Canadian Law Enforcement The car is several meters away, with only the passenger s side visible to the naked eye,

More information

Tech Report Abstracts of recent published South African patents May 2014

Tech Report Abstracts of recent published South African patents May 2014 Tech Report Abstracts of recent published South African patents May 2014 Title: ELECTRONICALLY MONITORED SAFETY LOCKOUT DEVICES, SYSTEMS AND METHODS Patent No: 2013/03234 Applicant: Master Lock Company

More information

Communication with FCC s Office of Engineering Technology Regarding ISM Compliance of Power-Optimized Waveforms

Communication with FCC s Office of Engineering Technology Regarding ISM Compliance of Power-Optimized Waveforms Communication with FCC s Office of Engineering Technology Regarding ISM Compliance of Power-Optimized Waveforms Document ID: PG-TR-081120-GDD Date: 11 November 2008 Prof. Gregory D. Durgin 777 Atlantic

More information

Location Based Technologies

Location Based Technologies Location Based Technologies I have often wondered whether people really understand Location Based Services (LBS) technology and whether they would like a bit more insight into how exactly location based

More information

CO-ORDINATION MECHANISMS FOR DIGITISATION POLICIES AND PROGRAMMES:

CO-ORDINATION MECHANISMS FOR DIGITISATION POLICIES AND PROGRAMMES: CO-ORDINATION MECHANISMS FOR DIGITISATION POLICIES AND PROGRAMMES: NATIONAL REPRESENTATIVES GROUP (NRG) SUMMARY REPORT AND CONCLUSIONS OF THE MEETING OF 10 DECEMBER 2002 The third meeting of the NRG was

More information

Physical Affordances of Check-in Stations for Museum Exhibits

Physical Affordances of Check-in Stations for Museum Exhibits Physical Affordances of Check-in Stations for Museum Exhibits Tilman Dingler tilman.dingler@vis.unistuttgart.de Benjamin Steeb benjamin@jsteeb.de Stefan Schneegass stefan.schneegass@vis.unistuttgart.de

More information

We would be delighted to discuss your needs and how we could support you, so please get in touch. Our contact details appear on the final page.

We would be delighted to discuss your needs and how we could support you, so please get in touch. Our contact details appear on the final page. Fluent in Fintech Whether you are developing, procuring, or investing in financial technology we understand the opportunities and challenges your business can face and we are keen to support ambitious

More information

Moving Industry 4.0 from Concept to Implementation and Value

Moving Industry 4.0 from Concept to Implementation and Value Powder & Bulk Solids Moving Industry 4.0 from Concept to Implementation and Value Image courtesy of Festo AG & Co. KG By John S. Forrester, Managing Editor, Powder & Bulk Solids November 28, 2016 Much

More information

Public Engagement Experiences in Local Road Systems Decision- Making in Minnesota. Guillermo E. Narváez, Ph.D. Humphrey School of Public Affairs

Public Engagement Experiences in Local Road Systems Decision- Making in Minnesota. Guillermo E. Narváez, Ph.D. Humphrey School of Public Affairs Public Engagement Experiences in Local Road Systems Decision- Making in Minnesota Guillermo E. Narváez, Ph.D. Humphrey School of Public Affairs Acknowledgements Prof. Kathy Quick Prof. Jerry Zhao Emily

More information

Flexible Electronics: Revolutionary Products and Career Opportunities for Creative Engineers

Flexible Electronics: Revolutionary Products and Career Opportunities for Creative Engineers Flexible Electronics: Revolutionary Products and Career Opportunities for Creative Engineers TAPPI - PIMA Student Summit 2011 Michael Ciesinski President January 15, 2011 Microelectronics changed the world

More information

Mobile Security Fall 2015

Mobile Security Fall 2015 Mobile Security Fall 2015 Patrick Tague #8: Location Services 1 Class #8 Location services for mobile phones Cellular localization WiFi localization GPS / GNSS 2 Mobile Location Mobile location has become

More information