Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader
|
|
- Job Nelson
- 6 years ago
- Views:
Transcription
1 Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader Byunggil Lee and Howon Kim Electronics and Telecommunications Research Institute Abstract The RFID and sensor network based ubiquitous computing has great potential in medical and healthcare services. Most of medical accidents around patients are depended on misidentification of patient or medical articles. The accidents can be reduced, if information about the patient is managed automatically. In this aspect, the mobile device with RFID reader is useful device as a medical assistant. However, the security and privacy problem related RFID application has become a serious issue in real service environment. In this paper, we propose a customized policy based privacy management architecture for medical and healthcare application. The proposed mechanism is a useful solution for user centric privacy management in medical environment. 1. Introduction The RFID based ubiquitous technology has a great deal of prospect in recent years. The ubiquitous computing technology is seamlessly integrated into the human s medical environment and it provides useful and effective medical services to human lives [1]-[3]. However, unless these medical applications are properly designed in privacy aspect, they can cause social privacy problem. Today, people should be convinced that using RFID-tags will not jeopardize their privacy in medical application. Otherwise, they will not accept and use them. Privacy is different from security, in aspect of Right to control over personal information by himself. Previous privacy-protecting schemes for basic tags have focused on cryptograph approach and rewriting approach such as, killing tag approach, renaming approach, minimalist cryptography approach, re-encryption approach, proxying approach and blocking approach[5]-[8]. In hospital, most of medical accidents around patients are depended on misidentification of patient or medical articles. The accidents can be reduced, if information about the patient is managed automatically [2][3]. In the medical environment, fixed RFID reader is used for equipment management or emergency room s In-Out management. And mobile RFID reader, reader embedded mobile phone is developed in Korea; various application service is tested for service verification. In this paper, we propose a policy based RFID privacy management architecture for medical application. Many applications in the ubiquitous computing environment should be customized based on user s context. Moreover, it has different user policy between patient tag(human tag) for medical application and product tag(object tag) for EPCglobal s enterprise application[4]. In view of this ubiquitous sharing system of medical information, a serious problem for RFID service is a threat to privacy. Here, the RFID privacy issues in medical application involve the risk of exposing the personal medical information, such as trace of personal location, information of personal health and clinical history. In standard such as HL7, customizing and detailed privacy mechanism is not yet provided. Therefore, we will define the privacy architecture and system for medical service environment. For these privacy issues, we cannot solve all the problems with existing crypto-technology, such as encryption and decryption. Nowadays, there has been significant research on the security and privacy issues that RFID bring to the table[6][7]. A lot of work has been done at RSA Labs by Ari Juel and etc. But, it was security protocol between tag and network by using hash or encryption. There is no mention of the privacy management mechanism and system. In order to ensure personal privacy protection service, a mechanism that encrypts and decrypts the outgoing data from tag and server has been proposed. However, these mechanisms may create limitations in the applicability of the ubiquitous service. In addition, if decryption of tag code is successful, all information can be exposed [8]. For this reason, we propose a mechanism that manages user centric privacy policy in the ubiquitous medical service. It is more flexible and secure mechanism, if it is integrated with cryptographic Copyright SITIS
2 algorithm for mitigating the aforementioned problems. The remainder of this paper is organized as follows. Section 2 describes proposed privacy managed service architecture for medical application. In section 3, we present a proposed scenarios and system architecture of privacy management. In section 4, we delineate a hospital application of the RFID using a customizing privacy policy. Finally, conclusions and a discussion of potential areas for future research are presented in Section 5. shall be applied to the information collection process through the use of the RFID reader. RPS:RFID Privacy Mgmt. System 2. Design of privacy managed service architecture In hospital, we can also use the object-tag for asset management for location finding. Patient-tag system is effective solution to reduce the medical accidents. However, unless these patient-tag systems or tagged-medical card systems are properly designed and constructed in privacy aspect, they can cause massive collateral damage to related user privacy. A hospital s 1 st aid patient labeled with unprotected tags may be monitored by unauthorized readers in hospital and street or subway. In the mobile environment, security and privacy is more important than fixed business environment. So, we define 3 step based privacy aware service architecture for RFID based medical application service. 1. First step : Access control of patient information by default privacy policy 2. Second step : User controllable profile based Privacy protection 3. Third step : Auditable Privacy management In the meantime, we introduce new RFID based service model and the application in the mobile environment. The architecture of mobile phone collaborated with RFID Reader is shown in figure 1 and we called it as mobile RFID. In the application, the mobile phone with RFID reader is applicable to B2C service model against B2B enterprise fixed style RFID system. In mobile RFID model, mobile RFID phone requests information by capturing the tag attached to the patient and the mobile RFID reader transmits this information to the back-end information server via middleware. The information server subsequently returns the requested information to the reader and displays it to end user(doctor, nurse, family, others). The mechanism of personal privacy in mobile RFID services is to allow individuals to control their personal information related to RFID services. In other words, unauthorized distribution of personal information carried on the patient tag shall be prevented and a privacy protection mechanism Figure 1. The architecture of mobile RFID network based medical service This paper aims to provide privacy protection services by adopting a privacy protection system (RPS) in the mobile RFID service network. For privacy management, we propose a profile based privacy management architecture for medical application. A privacy bit in tag is simple and costeffective mechanism for privacy control. The privacy bit is only reference for privacy service. The medical RFID information server check the privacy guaranteed service or not from the privacy policy. To illustrate how the privacy policy works in information server, let us consider it use in application and contents information system of service provider, as shown in Figure 2. Figure 2. The architecture of information system for privacy ensure service The privacy protection level is stored in the RPS. The RFID code format for application is defined in the "Mobile RFID Application Data Format" as a Korea standard. The privacy protection level has TYPE, LENGTH, and VALUE in the TLV structure. The maximum privacy level depends on the application services and the privacy level is defined from 1 to 9. The default privacy level follows the
3 privacy-applied standard of each application service; and if there is no standard, the privacy level is determined based on the privacy impact assessment result. Definition 1. Privacy level consist of a 10-tuple of information, where T={T 1, T 2,,T 10 } by default privacy policy. It also protected by user secure tag area and privacy server. We also define the privacy weight for medical information, as shown in table 1. Table 1. Examples of a default privacy weight for RFID based medical information. Privacy related people Privacy Policy Privacy Info. Doctor in charge of the patient T 4 T 9 Medical History Treatment Info. Nurse in charge of the patient T 4 T 9 Medical History Treatment Info. General doctor in hospital T 3 T 7 Medical treatment General nurse in hospital T 3 T 7 Medical treatment Family T 2 T 6 Medical tracking Info. Emergency Agency T 2 T 5 Medical Tracking Info, 1 st aid Info. Others T 1 All cut off the default privacy policy of the corresponding service or the privacy protection policy set by the user. Figure 3. The scenario for registration to the RPS 3. Scenarios and system architecture for privacy managed medical service The RFID and wireless sensor network related privacy problem is depending on application service. The threat of privacy infringement from RFID medical application is twofold. First, the presence of a unique serial number in an RFID tag opens up the possibility of clandestine physical route tracking on tagged patient for example A hospital at 3:20 am. to B hospital at 5:00 pm.. A second threat arises from the presence of patient information in RFID tag. This information in principle permits clandestine scanning of patient. We focus here on challenge involved in protecting the RFID privacy of users of medical application. So, this is a counter measure of the research trying to support various problems that arise during the privacy processing of the medical information through user s privacy policy bases. Therefore there is a need for the privacy management system(we called it RPS ) to notify a privacy policy to application server. The scenario of this privacy service shows in Figure 3. and Figure 4. When patient connect the RPS by mobile terminal initially, the patient s privacy policy can be set up and store in RPS. The Figure 3 shows the procedure for registering to RPS. To use the privacy protection service, the user shall register to RPS and define his/her privacy protection policy. In the same way, the service providers that intend to provide privacy-secured services shall also register to RPS and comply with Figure 4. The scenario for privacy management service In the first service stage, the inquire procedure is provided by result of registration of each policy as shown in Figure 4. And, figure 5 shows the system architecture of privacy management system. Figure 5. The architecture of privacy management system of medical service
4 The RPS that protects personal privacy in RFID services sets policies to gain users trust and provides a mechanism for users to check privacy protection. The major function of privacy management system is listed. - Real-time notification - Profile and policy management - Registration and authentication - Obligation management - Audit Management In code classification, we setup tag code by mobile RFID code(mcode) structure standard for application in Korea. There are four code classifications and privacy information for medical application in tag code. Medical Service Domain : Domain ID for medical service Hospital ID : Hospital identification code Medical ID : Medical object identification in hospital Serial Number : Patient serial number Privacy Info. : Code for privacy information The ubiquitous medical system utilizes existing information systems that had been developed during the medical information process. And it has adopted RFID for diagnosing and operation effectively shown Figure 6. to patient as a agent in medical discovery gateway and Hospital IS(Information Server). Various kinds of applicable method for privacy are being researched to design effective systems within the ubiquitous environment. The research aimed to provide smooth mutual intercommunication among mobile networked RFID and existing RFID systems by adaptation module. We focused on easy privacy aware service adaptation by common profile based privacy policy and user controllable modification. The basic model of the research was; each privacy sensitive data is classified by the default privacy weight initially. And it is modified by the end user s detailed policy for privacy service in medical applications. And these services mutually interlocked in tag and RPS server platform. The user controllable privacy policy in this research is considered as a basis of RFID privacy management service. The compatibility and scalability in medical application may cause problems during migration. But the mechanism is suitable for user s policy based privacy service within the ubiquitous environment. By applying suggested privacy management mechanism to actual medical ER(emergency room) system, networked medical Kiosk, RFID networked Emergency rescue system and medical examination service as shown in Figure 7. Tag Reader Figure 6. Using of RFID based medication information system 4. System Evaluation of Privacy Controlled Medical Service In this chapter, we show some practical result of privacy aware medical service in hospital. The hospital generates initial PCD(Privacy Controlled Data), which contains the patient code, medical ID and related information. And the default privacy level is used for patient cannot control by himself. In order to provide authentication and privacy interface Figure 7. Medical Application of the proposed prototype System There is some approach applying the RFID to medicine and hospital. From above, proposed privacy scheme has advantages in custom centric approach aspect for constructing a privacy aware ubiquitous medical system. 5. Conclusion In this paper, we considered an RFID based ubiquitous medical application with privacy aware service. The proposed hospital application was
5 presented in terms of privacy policy whereas we introduced a privacy protection scheme using owner configured privacy preference policy. In the proposed hospital mechanism, the owner configures the level of the personal clinical information that will be accessible to the public and the access control. By doing so, customized privacy protection can be realized. In this regard, the suggested mechanism is an effective solution for privacy protection in a ubiquitous system. 6. Acknowledgements This work was supported by the IT R&D program of MIC/IITA. [2005-S088-03, Development of Security technology for Secure RFID/USN Service]. References [1] Siio, I., Hayasaka, T., Putting information to things : RFID tags and their application, IPSJ Magazine, Vol. 40, No.8, pp , Aug [2] Shang-Wei Wang, et al., RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital, HICSS2006, Vol. 8, Jan [4] EPCglobal. The EPCglobal Network:Overview of Design, Benefits and Security, Sep [5] A. Juels and S.A Weis, Authenticating Pervasive Devices with Human Protocols. In Proc. Of CRYPTO 05, LNCS 3621, pp , Springer- Verlag [6] G. Avoine and Ph. Oechslin, A scalable and provable secure hash based RFID protocol, International Workshop on Pervasive Computing and Comunications Security, PerSec 2005, pp IEEE, [7] Sanjay E. Sarma, et al., RFID Systems and Security and Privacy Implications, CHES 2002, Lecture Notes in Computer Science 2523, pp [8] Inseop Kim, Byunggil Lee, Howon Kim, Privacy- Friendly Mobile RFID Reader Protocol Design on trusted Agent and PKI, Proceedings of the IEEE Tenth ISCE 06, Vol 1, June, [3] Yu, W.D., Ramni, A., Design and implementation of a personal mobile medical assistant, HEALTHCOM2005, 23-25, June
Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks
Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Arif Sari School of Applied Sciences, Department of Management Information Systems, European University
More informationSecure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems
Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems Kyoung Hyun Kim 1, Eun Young Choi 2,SuMiLee 3, and Dong Hoon Lee 4 Center for Information Security Technologies(CIST), Korea
More informationMobile Agent Code Updating and Authentication Protocol for Code-centric RFID System
Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System 1 Liang Yan, 2 Hongbo Guo, 3 Min Chen, 1 Chunming Rong, 2 Victor Leung 1 Department of Electrical Engineering and Computer
More informationLow-cost RFID identification variation
Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Low-cost RFID identification variation Koong Lin Tzu-Chang Yeh Yao-Yuan Liu Chad Lin Edith Cowan University 10.2991/jcis.2006.14 Originally
More informationReassignment Scheme of an RFID Tag s Key for Owner Transfer
Reassignment Scheme of an RFID Tag s Key for Owner Transfer Junichiro Saito 1, Kenji Imamoto 1, and Kouichi Sakurai 2 1 Graduate School of Information Science and Electrical Engineering, The Department
More informationLightweight Cryptography for RFID Systems
Lightweight Cryptography for RFID Systems Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA G. Gong (University of Waterloo)
More informationFebruary 14, Introducing.. Provable regulatory compliance!
February 14, 2011 Introducing.. 1 Secure Cloud Computing 2 Secure Cloud Computing Secure Cloud Storage 3 The first complete security solution that lets you take advantage of Public Clouds while proving
More informationA Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network
A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network Min Kyu Han, Il Woo Paik, Byung Hee Lee and Jin Pyo Hong Hankuk University of Foreign Studies {hufs96mk,
More informationResearch and Development. Needs for RFID
Research and Development Needs for RFID Thomas J. Sommer thomas.sommer@ec.europa.eu European Commission DG Information Society and Media Micro/Nanosystems EU RFID Forum Brussels, 13-14 March 2007 Scenarios
More informationITU-T. JCA-NID Joint Coordination Activity on Network aspects of Identification Systems
ITU-T JCA-NID Joint Coordination Activity on Network aspects of Identification Systems Pierre-André PROBST Convener JCA-NID OFCOM/Switzerland (presented by Kirit Lathia) Content: NID: What is this? NID
More informationSeminar: Communication Infrastructure, RFID Security
Seminar: Communication Infrastructure, RFID Security Thomas Thrainer, 0356015, Thomas.Thrainer@students.jku.at Johannes Kepler university Linz FIM Institut für Informationsverarbeitung und Mikroprozessortechnik
More informationSecurity challenges for RFID key applications
3rd European Workshop on RFID Systems and Technologies 12./13. June 2007, Duisburg Security challenges for RFID key applications Ulrich Waldmann Fraunhofer-Institut SIT Content Discussion of product anti-counterfeiting
More informationSignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network
SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network Roy Ka-Wei LEE School of Information Systems Singapore Management University 80 Stamford Road, Singapore
More informationLaboratory Management Based on Internet of Things. Jianming Huang
Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on
More informationBasics of EPC. Training
Basics of EPC Training Introduction Objectives: - Create awareness of the concepts - Develop technical knowledge - Show benefits of implementation - Explain 5 steps of Implementation 2 Programme Introduction
More informationA RFID Explicit Tag Estimation Scheme for Dynamic Framed- Slot ALOHA Anti-Collision
A RFID Explicit Tag Estimation Scheme for Dynamic Framed- Slot ALOHA Anti-Collision Author Pupunwiwat, Prapassara, Stantic, Bela Published 2010 Conference Title 6th International Conference on Wireless
More informationX Infotech Banking. Software solutions for smart card issuance
X Infotech Banking Software solutions for smart card issuance WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for centralized and instant issuance of financial and non-financial
More informationSlide 1. IoTA-Special Session, IoT 2012, Wuxi, China
Slide 1 The Internet of Things applied Architecture Reference Model for the IoT Dr. Sebastian Lange, VDI/VDE-IT Slide 2 IoT Week 2013 Helsinki Slide 3 FP7 Project: Internet of Things Architecture (IoT-A)
More informationIMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD
IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD Shilpa S. Badhiye1,Prof.Rupali S. Khule2 1 student, Electronics and telecommunication Department, MCOERC, Maharashtra, India 2 Professor, Electronics
More informationITEM REMOVED PDA023 DATE REMOVED 14:08:14 TIME REMOVED 9:30AM FAULT CODE NONE. Intelligent Lockers. Solutions for total asset management
ITEM REMOVED PDA023 USER D.SMITH DATE REMOVED 14:08:14 TIME REMOVED 9:30AM FAULT CODE NONE Intelligent Lockers Solutions for total asset management Innovative Management Solutions Recognized as global
More informationDesign of the RFID for storage of biological information
Design of the RFID for storage of biological information Yu-Lee Choi *, Seok-Man Kim **, Sang-Hee Son ***, and Kyoung-Rok Cho ** Dept. of Bio and Information Technology * Chungbuk National University,
More informationX Infotech Government
X Infotech Government Software solutions for identity documents WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for issuance, management and verification of electronic identity
More informationComparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
More informationSystem Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network
System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network Shin-ichi Kuribayashi 1 and Yasunori Osana 1 1 Department of Computer and Information Science, Seikei University,
More informationOpenBank - banking platform for e-money management based on blockchain technology (version 0.2)
OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin Abstract Traditional banking technology has multiple
More informationGene H. Yoon/Senior Manager Emerging Business Incubation Center
Gene H. Yoon/Senior Manager Emerging Business Incubation Center Convergence Trend Convergence is a trend that is being accelerated by a number of drivers and will lead to ubiquitous service environment.
More informationBlockchain Role in Smart Cities/IoT Security A Cryptographic Perspective!
SESSION ID: CCS-T08 Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective! Dr. Hilal Houssain hilal.hussein@gmail.com Agenda Internet of Things (IoT) IoT Security Requirements IoT Security
More informationRFID and Privacy Impact Assessment (PIA)
RFID and Privacy Impact Assessment (PIA) JOURNÉES SCIENTIFIQUES URSI 25 ET 26 MARS 2014 1 Agenda Introduction: RFID everywhere? RFID and security issues RFID threats The European Recommendation Privacy
More informationGenesis Block Development
Genesis Block Development Who we are We are a group of companies engaged in software development, payment systems implementation, software and web solutions for e-commerce and blockchain solutions for
More informationCARDEA: Service platform for monitoring patients and medicines based on SIP OSGi and RFID technologies in hospital environment
CARDEA: Service platform for monitoring patients and medicines based on SIP OSGi and RFID technologies in hospital environment Saúl Navarro, Ramón Alcarria, Juan A. Botía, Silvia Platas and Tomás Robles,
More informationA Secure Platform for Information Sharing in EPCglobal Network
A Secure Platform for Information Sharing in EPCglobal Network Jie Shi a,b Yingjiu Li a Robert H. Deng a Wei He c Eng Wah Lee c a School of Information Systems, Singapore Management University b Jinan
More informationThe Evolution of the Referral Process
The Evolution of the Referral Process Case Study: Providence Health System E-Referral Mike Reagin Director of Research and Development michael.reagin@providence.org Providence Health System Portland, Oregon
More informationAUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL
AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL D.P.Anusuya,Asst.Professor, Karpapga Vinayaga College of Engineering and Technology, Madhrandagam,Chennai,India. anu.krish1988@gmail.com
More informationA Quality Evaluation Technique of RFID Middleware in Ubiquitous Computing
A Quality Evaluation Technique of RFID Middleware in Ubiquitous Computing Gi oug, Oh, and Doo yeon, Kim and Sang il, Kim and Sung yul, Rhew giug@korea.com kimdoo@moe.go.kr hava67@selab.ssu.ac.kr syrhew@comp.ssu.ac.kr
More informationCentricity 360 Suite Case Exchange Physician Access Patient Access
Centricity 360 Suite Case Exchange Physician Access Patient Access Unleash the power of GE collaboration solutions to bring your distributed care teams together. Centricity 360 Suite with Case Exchange,
More information1. Understanding Big Data. Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview
Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. Understanding
More informationHIMS Salient Features
HIMS Salient Features Document details Title HIMS Salient Features document Version 1.0 Date of Submission 11th September, 2015 Softcopy HIMS Features_v1.0 Number of Pages 32 IMAGE COMPUTER SYSTEMS HIMS
More informationA Shopping Environment for Blind People Using RFID
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 58-62 www.iosrjournals.org A Shopping Environment for Blind People Using RFID Prof. Rajesh N. Kamath 1, Namita Tamse
More informationCampus Tracking System Based On IoT Yibiao Pi
Applied Mechanics and Materials Online: 2014-08-11 ISS: 1662-7482, Vols. 599-601, pp 1416-1419 doi:10.4028/www.scientific.net/amm.599-601.1416 2014 Trans Tech Publications, Switzerland Campus Tracking
More informationComparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software Who should read this paper Deploying and managing a PKI solution can be a complex undertaking. This is particularly the
More informationLexmark esf Applications. Product Demonstration Guide
Lexmark esf Applications Product Demonstration Guide Description Lexmark s Embedded Solution Framework (esf): Is an application platform that resides on the Lexmark devices Allows java-based applications
More informationThe RFID Story. Sanjay Sarma Dean of Digital Learning, Professor of Mechanical Engineering. The Internet of Things: Roadmap to a Connected World
The RFID Story Sanjay Sarma Dean of Digital Learning, Professor of Mechanical Engineering Computer Science and Artificial Intelligence Laboratory (CSAIL) Massachusetts Institute of Technology CLASSIFYING
More informationSMS BASED MONEY TRANSACTION USING SOA
International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250 1568 Vol.2, Issue 2 June 2012 59-71 TJPRC Pvt. Ltd., SMS BASED MONEY TRANSACTION USING SOA P.MATHIVALAVAN
More informationRFID Overview. Outline. Definition. Barcode Replacement. Reading Tags
Outline 1. Introduction 2. Basic RFID Tags 3. Symetric-Key Tags 4. RFID News Written by: Ari Juels Presented by Carlos A. Lopez Definition RFID: Is a technology for automated identification of objetcs
More informationSupplier Security Directives
Page 1 (8) Supplier Directives 1 Description This document (the Directives ) describes the security requirements applicable to Suppliers (as defined below) and other identified business partners to Telia
More informationHow to Prepare for EPC Data Cost- Effectively. Christian Floerkemeier MIT Auto-ID Lab
How to Prepare for EPC Data Cost- Effectively Christian Floerkemeier MIT Auto-ID Lab Configuration & Monitoring Transmit power set to 4 W Trigger read cycle when motion sensor detects object Use dense
More informationMobile Encryption & Integration
Mobile Encryption & Integration Mobile Ready Apps Scalable Biometrics Secure Databases Connect Every Part of Your Mobile Enterprise to Enhance Security Measures and Increase Subscriber Usage. The success
More informationPrivacy Challenges in RFID
Privacy Challenges in RFID Gildas Avoine Information Security Group Université catholique de Louvain Belgium SUMMARY Background about RFID Privacy: Information Leakage Privacy: Malicious Traceability Is
More informationWhere are your medical records?
Where are your medical records? Abstract The world of medicine is changing rapidly. We are at the beginning of an era where we treat a patient for their particular condition and not just a general condition.
More informationIBM System Storage DR550 Express
An affordable and secure archiving and information retention solution for small and medium businesses IBM System Storage DR550 Express Highlights Designed as a secure, scalable, Designed to leverage multiple
More informationExperimental Platform for Model-Integrated Clinical Information Systems
Experimental Platform for Model-Integrated Clinical Information Systems Janos Mathe, Jan Werner, Yonghwan Lee, Akos Ledeczi, Bradley Malin #, Janos Sztipanovits Department of Electrical Engineering and
More informationHEALTHCARE ACTIVITIES FROM ANYWHERE ANYTIME
HEALTHCARE ACTIVITIES FROM ANYWHERE ANYTIME Healthcare Utility Services To provide infrastructure or Software as a Service Platform to perform all kinds of healthcare operations by doctors, patients, lab
More informationTokenD principles. A framework for enterprise tokenization platforms. Distributed Lab
TokenD principles A framework for enterprise tokenization platforms Distributed Lab What is TokenD? A framework for creating tokenization platforms TokenD consists of best practices, protocols, a codebase,
More informationPrivacy Preservation and Mutual Authentication in RFID Systems
Privacy Preservation and Mutual Authentication in RFID Systems Debadatta Meher Roll. No. 710CS2036 under the guidance of Prof. Ashok Kumar Turuk Department of Computer Science and Engineering National
More informationShould & How RFID System be Evaluated against CC v3.1. InfoCom Security Division Yao-Chang Yu 2007/9/26
Should & How RFID System be Evaluated against CC v3.1 InfoCom Security Division Yao-Chang Yu 2007/9/26 Outline RFID System Overview EPCglobal Architecture Framework Security in EPC Standard Security Issues
More informationFrozen sample management solution. FreezerPro
Frozen sample management solution FreezerPro Complete Solution for Sample Tracking for Cryogenic Storage. FreezerPro is an intuitive, fast, reliable and secure solution which enables users to know precisely
More informationA Context Middleware Based on Sensor and RFID information
A Context Middleware Based on Sensor and RFID information Tomás Sánchez López, Daeyoung Kim AutoID Lab Korea, ICU, Daejeon, South Korea. Email: tomas, kimd@icu.ac.kr Abstract Pervasive computing environments
More informationManagement Strategies of Enterprise Mobile Application in Mobile Internet Environment
5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) Management Strategies of Enterprise Mobile Application in Mobile Internet Environment Mengli Li1, a, Xumei Zhang1,
More informationRFID AS A TOOL FOR SAFETY, SECURITY, PRIVACY AND CONVENIENCE FOR INTELLIGENT TRANSPORT SYSTEMS
RFID AS A TOOL FOR SAFETY, SECURITY, PRIVACY AND CONVENIENCE FOR INTELLIGENT TRANSPORT SYSTEMS MATTEO VEZZOSI NXP TECHNOLOGY DAY 7 TH JULY 2017 Agenda Overview Passive UHF in Automated Vehicle Identification
More informationAtlant s atwatch CAPA TM. Corrective and Preventive Action System (CAPA) Product & Services Bundle for
Corrective and Preventive Action System (CAPA) Product & Services Bundle for Atlant s atwatch CAPA TM Atlant Systems, Inc. (781)325-8157 team@atlantsystems.com Effectively Manage CAPAs Globally According
More informationBirlamedisoft Quanta V1.0 Web Based Hospital Information System
Introduction Birlamedisoft Pvt. Ltd., is an ISO 9001:2000 Certified company and one of the leading Healthcare software Development Company providing software solutions to the entire Healthcare industry
More informationNeeded: unobtrusive, real-time visibility and actionable information
Mojix Secure and Safe Event Experience is based on the ViZix IoT Platform Solution and Mojix STAR Technology B eginning with a stylish and triumphant opening ceremony in Baku, Azerbaijan, over 250 thousand
More informationITEM REMOVED MAC023 DATE REMOVED 15:09:11 TIME REMOVED 9:32AM FAULT CODE NONE. Total Management Solutions Educational Facilities
ITEM REMOVED MAC023 USER D.SMITH DATE REMOVED 15:09:11 TIME REMOVED 9:32AM FAULT CODE NONE Total Management Solutions Educational Facilities Innovative Management Solutions Recognized as global leaders
More informationAustralian Journal of Basic and Applied Sciences
AENSI Journals Australian Journal of Basic and Applied Sciences Journal home page: www.ajbasweb.com RFID based Medical Database System Mohamad Harris Misran, Maizatul Alice Meor Said, Azahari Salleh, Mohd
More informationPMS is an integrated Clinic Management solution that helps local SMEs on:
PMS is an integrated Clinic Management solution that helps local SMEs on: Productivity Enhancements Cost-Saving Initiative Document Management and Tablet Access Inventory and Queue Managements Centralization
More informationA proposed formula for comparing kill password effectiveness in single password RFID systems
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2012 A proposed formula for comparing kill password effectiveness in
More informationThe research and design of the RFID track and trace system based on web services
Applied Mechanics and Materials Online: 2014-02-06 ISSN: 1662-7482, Vols. 513-517, pp 1123-1126 doi:10.4028/www.scientific.net/amm.513-517.1123 2014 Trans Tech Publications, Switzerland The research and
More informationUbiquitous Korea Project
Ubiquitous Korea Project Minkoo Kim, We Duke Cho, Jaeho Lee, Rae Woong Park, Hamid Mukhtar, and Ki Hyung Kim Presented by Lin Deng About the paper A chapter in: Book: Handbook of Ambient Intelligence and
More informationRFID IN HEALTHCARE Technology Meets Stringent Safety Regulations for use in Medical Devices
Whitepaper RFID IN HEALTHCARE Technology Meets Stringent Safety Regulations for use in Medical Devices HEALTHCARE RFID MEETS RIGOROUS INDUSTRY STANDARDS ON RF ENABLED MEDICAL DEVICES RFID technology application
More informationStudent Attendance system and Monitoring using RFID and Processing
ISSN 2395-1621 Student Attendance system and Monitoring using RFID and Processing #1 Rahul More, #2 Kiran Patel, #3 Rhutika Tavasalkar, #4 Yogita Khandagale, #5 Prof. A. R. Uttarkar 1 rahulmore942@gmail.com,
More informationEPC Primer. Erik Sundermann HUG Meeting - Paris 20th Sept 2006
EPC Primer Erik Sundermann HUG Meeting - Paris 20th Sept 2006 Agenda The Fundamentals of RFID The Internet of Things The EPCglobal Organization EPCglobal Network Standards Physical Object Exchange Standards
More informationdata sheet RFID IN ORACLE 11i10 E-BUSINESS SUITE Oracle Warehouse Management with Application Server 10g
data sheet RFID IN ORACLE 11i10 E-BUSINESS SUITE Radio Frequency Identification (RFID) is gaining momentum with numerous initiatives in the manufacturing and supply chain spaces. Both the US Department
More informationMedical Virtual Public Services
Revista Informatica Economică nr. 1(45)/2008 157 Medical Virtual Public Services Manole VELICANU Academy of Economic Studies, Bucharest Iulia SURUGIU TotalSoft, Bucharest The healthcare enterprises are
More informationT²Enterprise. Mapping Communication Translation Management. T 2 Tran. EDI solution Translation/transport Monitoring/tracking.
Systrends T²Enterprise Mapping Communication Translation Management T 2 Mapper T 2 Com T 2 Tran T 2 App Mapping solution Data transformation Data conversion EDI solution Translation/transport Monitoring/tracking
More informationOutbound Delivery Using RFID in Sap System
Outbound Delivery Using RFID in Sap System Sheng Wang, Dong Wang Class B0303395 School of Software Shanghai Jiao Tong University Shanghai, China 800 Dong Chuan Road Phone: 086-021-62933040; 086-13764599933
More informationMoving Toward a Consumer-Driven Electronic Health Records Infrastructure
Moving Toward a Consumer-Driven Electronic Health Records Infrastructure Intelligent Information Systems IBM Almaden Research Center DBSEC 2007 - Privacy and Security for Service-Oriented Architectures
More informationRFID Vendor Collaboration and Meeting the Needs of Your Clients
RFID Vendor Collaboration and Meeting the Needs of Your Clients By Raymond Lowe Email: Raymond.lowe@providence.org Providence Health and Services IS Director Saint Joseph Medical Center Ca Regional Director
More informationProfessor John Gray Professor Zhipeng Wu University of Manchester
Automated Adaptive Packaging in Food Processing An IoT Approach Professor John Gray Professor Zhipeng Wu University of Manchester This project has received funding from the European Union KBBE.2012.2.3-03:
More informationINSIGHT DRIVEN HEALTH BLOCKCHAIN WHAT S PROGRESS ARE WE MAKING IN HEALTHCARE APRIL 2018
INSIGHT DRIVEN HEALTH BLOCKCHAIN WHAT S PROGRESS ARE WE MAKING IN HEALTHCARE APRIL 2018 WHERE IS PROGRESS OCCURRING? IDENTITY DATA LOCATION TRACK AND TRACE DATA RECONCILIATION Copyright 2018 Accenture.
More informationA Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007
A Review of RFID ISO Standards & CEN TC225 Developments Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007 RFID Standards Types of Standard Technology - air interface
More informationIEEE RFID 2012 Tutorials and Workshops
IEEE RFID 2012 Tutorials and Workshops Tutorial: Advanced UHF RFID Tag Antenna Design (April 3: 8:30 am 12:00 pm) Organizer: Gaetano Marrocco (University of Roma Tor Vergata) Things equipped with electronic
More informationSmartAL Smart Assisted Living. Improved health, safety and well-being of people
SmartAL Smart Assisted Living Improved health, safety and well-being of people What is SmartAL? SmartAL is a technological ecosystem simplifying people's daily lives from the health and social point of
More informationIBM System Storage. IBM Information Archive: The next-generation information retention solution
IBM System Storage IBM Information Archive: The next-generation information retention solution Highlights Reduce cost Reduce disk capacity requirements with built-in data deduplication and compression
More informationNew Directions in RFID Security
New Directions in RFID Security Erik-Oliver Blass and Refik Molva EURECOM, Sophia Antipolis, France Abstract. Current research in RFID security focuses on basic authentication protocols between a tag and
More informationContemplate For Online Plebiscite Capturing using ATM Terminals
Contemplate For Online Plebiscite Capturing using ATM Terminals Kausal Malladi & Srivatsan Sridharan Department of Computer Science, IIIT - Bangalore. E-mail : kausalmalladi@gmail.com, vatsan.s@rediff.com
More informationMalaysia, Batu Pahat, Johor, Malaysia. Keywords: RFID, Bloom filter, data filtering, sensor, supply chain
An Efficient Approach to Processing Massive RFID Data in Supply Chain Hairulnizam Mahdin 1, a, Mohd Farhan Md Fudzee 2,b, Azizul Azhar Ramli 3, c, Mohd Aizi Salamat 4,d and Shahreen Kasim 5,e 1,2,3,4,5
More informationLaboratory Information Management System Index
Laboratory Information Management System Index About LIMS Patient Tracking Overview Key Module & Key Features LIMS Architecture Benefits LIMS Standards Interface Integration Sample Tracking LIMS. Net Screen-shots
More informationSecurity solutions White paper. Effectively manage access to systems and information to help optimize integrity and facilitate compliance.
Security solutions White paper Effectively manage access to systems and information to help optimize integrity and facilitate compliance. March 2007 Contents 2 Overview 3 Answer key questions related to
More informationMobile RFID Security Issues
All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to
More informationRFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas
RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas 1 RFID Tutorial Outline Introduction RFID System Tags Readers Data link layer Modulation Encoding Anti-Collision
More informationEMV Terminology Guide
To make life easier, TMG has compiled some of the most commonly used EMV terms in this guide. If you have questions about EMV, contact your Director of Client Relations directly or email clientrelations@themebersgroup.com.
More informationIntelliSense RFID Workshop
IntelliSense RFID Workshop RFID Technology from Sensing to Interacting European research on RFID O. Vermesan, SINTEF, Norway Radisson SAS Scandinavia, Oslo, Norway 28 November 2007 1 Outline RFID Policy
More informationCentralized management of healthcare communications using the Vyne Exchange Platform
Centralized management of healthcare communications using the Vyne Exchange Platform Connecting Disconnected Data vynecorp.com Solutions Designed Specifically for Healthcare The Vyne Exchange Platform,
More informationPerformance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement
, pp.1-10 http://dx.doi.org/10.14257/ijseia.2014.8.3.01 Performance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement Chang-Su Kim 1, Bong-Im Jang 1 and Hoe-Kyung Jung 1* 1 PaiChai
More informationFDA, Counterfeit, and RFID Technology
FDA, Counterfeit, and RFID Technology Edmund W. Schuster APICS members should note the implications of an article that appeared in the Wall Street Journal on February 19, 2004. Among other things, the
More informationOptimizing and Tracking - RFID in Medical & Health. Richard Aufreiter, PM, HID Global
Optimizing and Tracking - RFID in Medical & Health Richard Aufreiter, PM, HID Global An ASSA ABLOY Company The global leader in door opening solutions Operations in more than 50 countries $ 5.8 billion
More informationDESIGN OF MOBILE APPLICATIONS AND INFORMATION ARCHITECTURES. CPET 499 Mobile Computing Systems David Rash Chris Meisner
DESIGN OF MOBILE APPLICATIONS AND INFORMATION ARCHITECTURES CPET 499 Mobile Computing Systems David Rash Chris Meisner 11-10-14 EXECUTIVE SUMMARY We were called in to review and discuss the current inventory
More informationRADIOLOGY WORKFLOW SOLUTIONS
RADIOLOGY WORKFLOW SOLUTIONS YOUR PATH TO MORE EFFICIENCY radiology workflow management for hospitals OPTIMISED WORKFLOW MAXIMUM EFFICIENCY TARGET REACHED EARLIER medavis. Your trusted partner for workflow
More informationNew Directions in RFID Security
New Directions in RFID Security Erik-Oliver Blass and Refik Molva EURECOM, Sophia Antipolis, France Abstract. Current research in RFID security focuses on basic authentication protocols between a tag and
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Hardward Device Hardware Device Inventory provides the Enterprise with the methods and schema necessary to identify
More information