Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader"

Transcription

1 Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader Byunggil Lee and Howon Kim Electronics and Telecommunications Research Institute Abstract The RFID and sensor network based ubiquitous computing has great potential in medical and healthcare services. Most of medical accidents around patients are depended on misidentification of patient or medical articles. The accidents can be reduced, if information about the patient is managed automatically. In this aspect, the mobile device with RFID reader is useful device as a medical assistant. However, the security and privacy problem related RFID application has become a serious issue in real service environment. In this paper, we propose a customized policy based privacy management architecture for medical and healthcare application. The proposed mechanism is a useful solution for user centric privacy management in medical environment. 1. Introduction The RFID based ubiquitous technology has a great deal of prospect in recent years. The ubiquitous computing technology is seamlessly integrated into the human s medical environment and it provides useful and effective medical services to human lives [1]-[3]. However, unless these medical applications are properly designed in privacy aspect, they can cause social privacy problem. Today, people should be convinced that using RFID-tags will not jeopardize their privacy in medical application. Otherwise, they will not accept and use them. Privacy is different from security, in aspect of Right to control over personal information by himself. Previous privacy-protecting schemes for basic tags have focused on cryptograph approach and rewriting approach such as, killing tag approach, renaming approach, minimalist cryptography approach, re-encryption approach, proxying approach and blocking approach[5]-[8]. In hospital, most of medical accidents around patients are depended on misidentification of patient or medical articles. The accidents can be reduced, if information about the patient is managed automatically [2][3]. In the medical environment, fixed RFID reader is used for equipment management or emergency room s In-Out management. And mobile RFID reader, reader embedded mobile phone is developed in Korea; various application service is tested for service verification. In this paper, we propose a policy based RFID privacy management architecture for medical application. Many applications in the ubiquitous computing environment should be customized based on user s context. Moreover, it has different user policy between patient tag(human tag) for medical application and product tag(object tag) for EPCglobal s enterprise application[4]. In view of this ubiquitous sharing system of medical information, a serious problem for RFID service is a threat to privacy. Here, the RFID privacy issues in medical application involve the risk of exposing the personal medical information, such as trace of personal location, information of personal health and clinical history. In standard such as HL7, customizing and detailed privacy mechanism is not yet provided. Therefore, we will define the privacy architecture and system for medical service environment. For these privacy issues, we cannot solve all the problems with existing crypto-technology, such as encryption and decryption. Nowadays, there has been significant research on the security and privacy issues that RFID bring to the table[6][7]. A lot of work has been done at RSA Labs by Ari Juel and etc. But, it was security protocol between tag and network by using hash or encryption. There is no mention of the privacy management mechanism and system. In order to ensure personal privacy protection service, a mechanism that encrypts and decrypts the outgoing data from tag and server has been proposed. However, these mechanisms may create limitations in the applicability of the ubiquitous service. In addition, if decryption of tag code is successful, all information can be exposed [8]. For this reason, we propose a mechanism that manages user centric privacy policy in the ubiquitous medical service. It is more flexible and secure mechanism, if it is integrated with cryptographic Copyright SITIS

2 algorithm for mitigating the aforementioned problems. The remainder of this paper is organized as follows. Section 2 describes proposed privacy managed service architecture for medical application. In section 3, we present a proposed scenarios and system architecture of privacy management. In section 4, we delineate a hospital application of the RFID using a customizing privacy policy. Finally, conclusions and a discussion of potential areas for future research are presented in Section 5. shall be applied to the information collection process through the use of the RFID reader. RPS:RFID Privacy Mgmt. System 2. Design of privacy managed service architecture In hospital, we can also use the object-tag for asset management for location finding. Patient-tag system is effective solution to reduce the medical accidents. However, unless these patient-tag systems or tagged-medical card systems are properly designed and constructed in privacy aspect, they can cause massive collateral damage to related user privacy. A hospital s 1 st aid patient labeled with unprotected tags may be monitored by unauthorized readers in hospital and street or subway. In the mobile environment, security and privacy is more important than fixed business environment. So, we define 3 step based privacy aware service architecture for RFID based medical application service. 1. First step : Access control of patient information by default privacy policy 2. Second step : User controllable profile based Privacy protection 3. Third step : Auditable Privacy management In the meantime, we introduce new RFID based service model and the application in the mobile environment. The architecture of mobile phone collaborated with RFID Reader is shown in figure 1 and we called it as mobile RFID. In the application, the mobile phone with RFID reader is applicable to B2C service model against B2B enterprise fixed style RFID system. In mobile RFID model, mobile RFID phone requests information by capturing the tag attached to the patient and the mobile RFID reader transmits this information to the back-end information server via middleware. The information server subsequently returns the requested information to the reader and displays it to end user(doctor, nurse, family, others). The mechanism of personal privacy in mobile RFID services is to allow individuals to control their personal information related to RFID services. In other words, unauthorized distribution of personal information carried on the patient tag shall be prevented and a privacy protection mechanism Figure 1. The architecture of mobile RFID network based medical service This paper aims to provide privacy protection services by adopting a privacy protection system (RPS) in the mobile RFID service network. For privacy management, we propose a profile based privacy management architecture for medical application. A privacy bit in tag is simple and costeffective mechanism for privacy control. The privacy bit is only reference for privacy service. The medical RFID information server check the privacy guaranteed service or not from the privacy policy. To illustrate how the privacy policy works in information server, let us consider it use in application and contents information system of service provider, as shown in Figure 2. Figure 2. The architecture of information system for privacy ensure service The privacy protection level is stored in the RPS. The RFID code format for application is defined in the "Mobile RFID Application Data Format" as a Korea standard. The privacy protection level has TYPE, LENGTH, and VALUE in the TLV structure. The maximum privacy level depends on the application services and the privacy level is defined from 1 to 9. The default privacy level follows the

3 privacy-applied standard of each application service; and if there is no standard, the privacy level is determined based on the privacy impact assessment result. Definition 1. Privacy level consist of a 10-tuple of information, where T={T 1, T 2,,T 10 } by default privacy policy. It also protected by user secure tag area and privacy server. We also define the privacy weight for medical information, as shown in table 1. Table 1. Examples of a default privacy weight for RFID based medical information. Privacy related people Privacy Policy Privacy Info. Doctor in charge of the patient T 4 T 9 Medical History Treatment Info. Nurse in charge of the patient T 4 T 9 Medical History Treatment Info. General doctor in hospital T 3 T 7 Medical treatment General nurse in hospital T 3 T 7 Medical treatment Family T 2 T 6 Medical tracking Info. Emergency Agency T 2 T 5 Medical Tracking Info, 1 st aid Info. Others T 1 All cut off the default privacy policy of the corresponding service or the privacy protection policy set by the user. Figure 3. The scenario for registration to the RPS 3. Scenarios and system architecture for privacy managed medical service The RFID and wireless sensor network related privacy problem is depending on application service. The threat of privacy infringement from RFID medical application is twofold. First, the presence of a unique serial number in an RFID tag opens up the possibility of clandestine physical route tracking on tagged patient for example A hospital at 3:20 am. to B hospital at 5:00 pm.. A second threat arises from the presence of patient information in RFID tag. This information in principle permits clandestine scanning of patient. We focus here on challenge involved in protecting the RFID privacy of users of medical application. So, this is a counter measure of the research trying to support various problems that arise during the privacy processing of the medical information through user s privacy policy bases. Therefore there is a need for the privacy management system(we called it RPS ) to notify a privacy policy to application server. The scenario of this privacy service shows in Figure 3. and Figure 4. When patient connect the RPS by mobile terminal initially, the patient s privacy policy can be set up and store in RPS. The Figure 3 shows the procedure for registering to RPS. To use the privacy protection service, the user shall register to RPS and define his/her privacy protection policy. In the same way, the service providers that intend to provide privacy-secured services shall also register to RPS and comply with Figure 4. The scenario for privacy management service In the first service stage, the inquire procedure is provided by result of registration of each policy as shown in Figure 4. And, figure 5 shows the system architecture of privacy management system. Figure 5. The architecture of privacy management system of medical service

4 The RPS that protects personal privacy in RFID services sets policies to gain users trust and provides a mechanism for users to check privacy protection. The major function of privacy management system is listed. - Real-time notification - Profile and policy management - Registration and authentication - Obligation management - Audit Management In code classification, we setup tag code by mobile RFID code(mcode) structure standard for application in Korea. There are four code classifications and privacy information for medical application in tag code. Medical Service Domain : Domain ID for medical service Hospital ID : Hospital identification code Medical ID : Medical object identification in hospital Serial Number : Patient serial number Privacy Info. : Code for privacy information The ubiquitous medical system utilizes existing information systems that had been developed during the medical information process. And it has adopted RFID for diagnosing and operation effectively shown Figure 6. to patient as a agent in medical discovery gateway and Hospital IS(Information Server). Various kinds of applicable method for privacy are being researched to design effective systems within the ubiquitous environment. The research aimed to provide smooth mutual intercommunication among mobile networked RFID and existing RFID systems by adaptation module. We focused on easy privacy aware service adaptation by common profile based privacy policy and user controllable modification. The basic model of the research was; each privacy sensitive data is classified by the default privacy weight initially. And it is modified by the end user s detailed policy for privacy service in medical applications. And these services mutually interlocked in tag and RPS server platform. The user controllable privacy policy in this research is considered as a basis of RFID privacy management service. The compatibility and scalability in medical application may cause problems during migration. But the mechanism is suitable for user s policy based privacy service within the ubiquitous environment. By applying suggested privacy management mechanism to actual medical ER(emergency room) system, networked medical Kiosk, RFID networked Emergency rescue system and medical examination service as shown in Figure 7. Tag Reader Figure 6. Using of RFID based medication information system 4. System Evaluation of Privacy Controlled Medical Service In this chapter, we show some practical result of privacy aware medical service in hospital. The hospital generates initial PCD(Privacy Controlled Data), which contains the patient code, medical ID and related information. And the default privacy level is used for patient cannot control by himself. In order to provide authentication and privacy interface Figure 7. Medical Application of the proposed prototype System There is some approach applying the RFID to medicine and hospital. From above, proposed privacy scheme has advantages in custom centric approach aspect for constructing a privacy aware ubiquitous medical system. 5. Conclusion In this paper, we considered an RFID based ubiquitous medical application with privacy aware service. The proposed hospital application was

5 presented in terms of privacy policy whereas we introduced a privacy protection scheme using owner configured privacy preference policy. In the proposed hospital mechanism, the owner configures the level of the personal clinical information that will be accessible to the public and the access control. By doing so, customized privacy protection can be realized. In this regard, the suggested mechanism is an effective solution for privacy protection in a ubiquitous system. 6. Acknowledgements This work was supported by the IT R&D program of MIC/IITA. [2005-S088-03, Development of Security technology for Secure RFID/USN Service]. References [1] Siio, I., Hayasaka, T., Putting information to things : RFID tags and their application, IPSJ Magazine, Vol. 40, No.8, pp , Aug [2] Shang-Wei Wang, et al., RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital, HICSS2006, Vol. 8, Jan [4] EPCglobal. The EPCglobal Network:Overview of Design, Benefits and Security, Sep [5] A. Juels and S.A Weis, Authenticating Pervasive Devices with Human Protocols. In Proc. Of CRYPTO 05, LNCS 3621, pp , Springer- Verlag [6] G. Avoine and Ph. Oechslin, A scalable and provable secure hash based RFID protocol, International Workshop on Pervasive Computing and Comunications Security, PerSec 2005, pp IEEE, [7] Sanjay E. Sarma, et al., RFID Systems and Security and Privacy Implications, CHES 2002, Lecture Notes in Computer Science 2523, pp [8] Inseop Kim, Byunggil Lee, Howon Kim, Privacy- Friendly Mobile RFID Reader Protocol Design on trusted Agent and PKI, Proceedings of the IEEE Tenth ISCE 06, Vol 1, June, [3] Yu, W.D., Ramni, A., Design and implementation of a personal mobile medical assistant, HEALTHCOM2005, 23-25, June

Reassignment Scheme of an RFID Tag s Key for Owner Transfer

Reassignment Scheme of an RFID Tag s Key for Owner Transfer Reassignment Scheme of an RFID Tag s Key for Owner Transfer Junichiro Saito 1, Kenji Imamoto 1, and Kouichi Sakurai 2 1 Graduate School of Information Science and Electrical Engineering, The Department

More information

Seminar: Communication Infrastructure, RFID Security

Seminar: Communication Infrastructure, RFID Security Seminar: Communication Infrastructure, RFID Security Thomas Thrainer, 0356015, Thomas.Thrainer@students.jku.at Johannes Kepler university Linz FIM Institut für Informationsverarbeitung und Mikroprozessortechnik

More information

ITU-T. JCA-NID Joint Coordination Activity on Network aspects of Identification Systems

ITU-T. JCA-NID Joint Coordination Activity on Network aspects of Identification Systems ITU-T JCA-NID Joint Coordination Activity on Network aspects of Identification Systems Pierre-André PROBST Convener JCA-NID OFCOM/Switzerland (presented by Kirit Lathia) Content: NID: What is this? NID

More information

Laboratory Management Based on Internet of Things. Jianming Huang

Laboratory Management Based on Internet of Things. Jianming Huang Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2)

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin Abstract Traditional banking technology has multiple

More information

AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL

AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL D.P.Anusuya,Asst.Professor, Karpapga Vinayaga College of Engineering and Technology, Madhrandagam,Chennai,India. anu.krish1988@gmail.com

More information

Campus Tracking System Based On IoT Yibiao Pi

Campus Tracking System Based On IoT Yibiao Pi Applied Mechanics and Materials Online: 2014-08-11 ISS: 1662-7482, Vols. 599-601, pp 1416-1419 doi:10.4028/www.scientific.net/amm.599-601.1416 2014 Trans Tech Publications, Switzerland Campus Tracking

More information

A Secured Mutual Authentication Protocol For RFID System

A Secured Mutual Authentication Protocol For RFID System A Secured Mutual Authentication Protocol For RFID System Rajarshi Roy Chowdhury, Md. Abdul Awal Ansary Abstract: Contactless automatic RFID system is intended to replace existing barcode scheme, since

More information

Outbound Delivery Using RFID in Sap System

Outbound Delivery Using RFID in Sap System Outbound Delivery Using RFID in Sap System Sheng Wang, Dong Wang Class B0303395 School of Software Shanghai Jiao Tong University Shanghai, China 800 Dong Chuan Road Phone: 086-021-62933040; 086-13764599933

More information

Centricity 360 Suite Case Exchange Physician Access Patient Access

Centricity 360 Suite Case Exchange Physician Access Patient Access Centricity 360 Suite Case Exchange Physician Access Patient Access Unleash the power of GE collaboration solutions to bring your distributed care teams together. Centricity 360 Suite with Case Exchange,

More information

Lexmark esf Applications. Product Demonstration Guide

Lexmark esf Applications. Product Demonstration Guide Lexmark esf Applications Product Demonstration Guide Description Lexmark s Embedded Solution Framework (esf): Is an application platform that resides on the Lexmark devices Allows java-based applications

More information

Where are your medical records?

Where are your medical records? Where are your medical records? Abstract The world of medicine is changing rapidly. We are at the beginning of an era where we treat a patient for their particular condition and not just a general condition.

More information

FDA, Counterfeit, and RFID Technology

FDA, Counterfeit, and RFID Technology FDA, Counterfeit, and RFID Technology Edmund W. Schuster APICS members should note the implications of an article that appeared in the Wall Street Journal on February 19, 2004. Among other things, the

More information

RFID Vendor Collaboration and Meeting the Needs of Your Clients

RFID Vendor Collaboration and Meeting the Needs of Your Clients RFID Vendor Collaboration and Meeting the Needs of Your Clients By Raymond Lowe Email: Raymond.lowe@providence.org Providence Health and Services IS Director Saint Joseph Medical Center Ca Regional Director

More information

IntelliSense RFID Workshop

IntelliSense RFID Workshop IntelliSense RFID Workshop RFID Technology from Sensing to Interacting European research on RFID O. Vermesan, SINTEF, Norway Radisson SAS Scandinavia, Oslo, Norway 28 November 2007 1 Outline RFID Policy

More information

A Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007

A Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007 A Review of RFID ISO Standards & CEN TC225 Developments Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007 RFID Standards Types of Standard Technology - air interface

More information

PMS is an integrated Clinic Management solution that helps local SMEs on:

PMS is an integrated Clinic Management solution that helps local SMEs on: PMS is an integrated Clinic Management solution that helps local SMEs on: Productivity Enhancements Cost-Saving Initiative Document Management and Tablet Access Inventory and Queue Managements Centralization

More information

Laboratory Information Management System Index

Laboratory Information Management System Index Laboratory Information Management System Index About LIMS Patient Tracking Overview Key Module & Key Features LIMS Architecture Benefits LIMS Standards Interface Integration Sample Tracking LIMS. Net Screen-shots

More information

The research and design of the RFID track and trace system based on web services

The research and design of the RFID track and trace system based on web services Applied Mechanics and Materials Online: 2014-02-06 ISSN: 1662-7482, Vols. 513-517, pp 1123-1126 doi:10.4028/www.scientific.net/amm.513-517.1123 2014 Trans Tech Publications, Switzerland The research and

More information

Product Specific Security Features Based on RFID Technology

Product Specific Security Features Based on RFID Technology Product Specific Security Features Based on RFID Technology Zoltán Nochta, Thorsten Staake, Elgar Fleisch Auto-ID Labs White Paper WP-BIZAPP-028 Zoltán Nochta Project Manager SAP AG Contact: Thorsten Staake

More information

SUBSCRIPTION MANAGEMENT Internet of Things

SUBSCRIPTION MANAGEMENT Internet of Things SUBSCRIPTION MANAGEMENT Internet of Things SUBSCRIPTION MANAGEMENT Biggest market revolution in 20 years Flexible Connectivity Solutions with GoPROVeU! With Gartner predicting 6.4 bn mobile devices connected

More information

TransKrypt Security Server

TransKrypt Security Server TransKrypt Security Server Overview Security of transactions is a fundamental requirement for payment transaction industry and this becomes even more critical as the volume of payments are growing at a

More information

ORACLE HOSPITALITY HOTEL CONSULTING SERVICE DESCRIPTIONS November 3, 2017

ORACLE HOSPITALITY HOTEL CONSULTING SERVICE DESCRIPTIONS November 3, 2017 ORACLE HOSPITALITY HOTEL CONSULTING SERVICE DESCRIPTIONS November 3, 2017 TABLE OF CONTENTS Service Offerings CONSULTING SERVICE OFFERINGS Part Number ORACLE HOSPITALITY HOTEL PROPERTY MANAGEMENT SYSTEM

More information

GS1 EPCglobal RFID-based Electronic Articles Surveillance (EAS) Technical Implementation Guideline. Technical Implementation Guide

GS1 EPCglobal RFID-based Electronic Articles Surveillance (EAS) Technical Implementation Guideline. Technical Implementation Guide 1 2 3 4 5 6 7 8 GS1 EPCglobal RFID-based Electronic Articles Surveillance (EAS) Technical Implementation Guide Issue 1.0 Approved, September-2009 9 September-2009, Issue 1.0 All contents copyright GS1

More information

Legal Aspects of RFID Technology

Legal Aspects of RFID Technology Legal Aspects of RFID Technology Jürgen Müller University of Kassel Provet Project Team for Constitutionally Compatible Technology Design Matthias Handy University of Rostock Institute of Applied Microelectronics

More information

Understanding Your Enterprise API Requirements

Understanding Your Enterprise API Requirements Understanding Your Enterprise Requirements Part 2: The 3 management platforms which architecture model fits your business? Strategically choosing the right management architecture model will ensure your

More information

Ubiquitous Sensor Network System

Ubiquitous Sensor Network System TOMIOKA Katsumi, KONDO Kenji Abstract A ubiquitous sensor network is a means for realizing the collection and utilization of real-time information any time and anywhere. Features include easy implementation

More information

RAIN Radio Protocol. December 2015

RAIN Radio Protocol. December 2015 RAIN Radio Protocol December 2015 Background RAIN reader tag communications use the UHF Gen2 radio protocol. The MIT Auto-ID Center pioneered the early work on the UHF Gen2 protocol in 2002, transitioning

More information

SECURE AUTHENTICATION THROUGH A NEAR FIELD COMMUNICATION IN ASYMMETRIC CRYPTOGRAPHY

SECURE AUTHENTICATION THROUGH A NEAR FIELD COMMUNICATION IN ASYMMETRIC CRYPTOGRAPHY International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol-1, Iss.-4, SEPTEMBER 2014, 82-86 SECURE AUTHENTICATION THROUGH A NEAR FIELD COMMUNICATION

More information

siemens.com/teamplay teamplay data sheet

siemens.com/teamplay teamplay data sheet siemens.com/teamplay teamplay data sheet valid from September, 2016 Overview teamplay is a network that brings together healthcare professionals in order to advance medicine and human health in a team

More information

Ubiquitous Computing in Business Processes Part II

Ubiquitous Computing in Business Processes Part II Ubiquitous Computing in Business Processes Part II Prof. Dr. Lutz Heuser Urban Software Institute Prof. Dr. Zoltán Nochta SAP AG Darmstadt November 13 th, 2015 Outline 1. Recap What kind of Business Processes

More information

On Board Use and Application of Computer based systems

On Board Use and Application of Computer based systems (Dec 2006 (Corr.1 Oct 2007) (Rev.1 Sept 2010) (Rev.2 June 2016 Complete Revision) On Board Use and Application of Computer based systems 1. Introduction 1.1 Scope These requirements apply to design, construction,

More information

FOR THE PROVIDED BY BORICA AD QUALIFIED SERVICE FOR ISSUING QUALIFIED ELECTRONIC TIME STAMPS OF B-TRUST QUALIFIED TIME STAMP AUTHORITY

FOR THE PROVIDED BY BORICA AD QUALIFIED SERVICE FOR ISSUING QUALIFIED ELECTRONIC TIME STAMPS OF B-TRUST QUALIFIED TIME STAMP AUTHORITY Security Level C1 (For general use) Policy and practice statement FOR THE PROVIDED BY BORICA AD QUALIFIED SERVICE FOR ISSUING QUALIFIED ELECTRONIC TIME STAMPS OF B-TRUST QUALIFIED Version 1.2 July 1, 2017

More information

PROPOSED MODEL FOR REQUIREMENTS OF EPAYMENT GATEWAYS

PROPOSED MODEL FOR REQUIREMENTS OF EPAYMENT GATEWAYS International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) Vol.1, Issue 2 Dec 2011 152-168 TJPRC Pvt. Ltd., PROPOSED MODEL FOR REQUIREMENTS OF EPAYMENT GATEWAYS

More information

Clino Life Care. Intelligent Life Care. Care Communication of the Future

Clino Life Care. Intelligent Life Care. Care Communication of the Future Clino Life Care Intelligent Life Care Care Communication of the Future Clino Life Care Your care communication needs more: Safety Comfort Productivity Networking Multimedia The Clino Life Care platform

More information

Top 5 Must Do IT Audits

Top 5 Must Do IT Audits Top 5 Must Do IT Audits Mike Fabrizius, Sharp HealthCare, VP, Internal Audit DJ Wilkins, KPMG, Partner, IT Advisory 2011 AHIA Annual Conference www.ahia.org Background on Sharp HealthCare Sharp s Co-sourcing

More information

Achieving Healthcare Interoperability in the Cloud with WebSphere ESB

Achieving Healthcare Interoperability in the Cloud with WebSphere ESB Achieving Healthcare Interoperability in the Cloud with WebSphere ESB Ajay Asthana Business Solution Architect, Business Performance and Service Optimization Group IBM software division Tom Fausel Chief

More information

Management Strategies of Enterprise Mobile Application in Mobile Internet Environment

Management Strategies of Enterprise Mobile Application in Mobile Internet Environment 5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) Management Strategies of Enterprise Mobile Application in Mobile Internet Environment Mengli Li1, a, Xumei Zhang1,

More information

Siebel Partner Relationship Management Administration Guide Addendum for Industry Applications. Version 8.0 December 2006

Siebel Partner Relationship Management Administration Guide Addendum for Industry Applications. Version 8.0 December 2006 Siebel Partner Relationship Management Administration Guide Addendum for Industry Applications Version 8.0 December 2006 Copyright 2005, 2006, Oracle. All rights reserved. The Programs (which include both

More information

Lessons from the neighbor's field EPCglobal middleware for supply chains

Lessons from the neighbor's field EPCglobal middleware for supply chains Lessons from the neighbor's field EPCglobal middleware for supply chains Orange Labs Marc-Antoine Mouilleron, Research & Development marcantoine.mouilleron@orange-ftgroup.com WIRELESS FACTORY WORKSHOP

More information

Monitoring & reporting. Scan management. Print management YSOFT SAFEQ 5. Private Cloud. Security & access management

Monitoring & reporting. Scan management. Print management YSOFT SAFEQ 5. Private Cloud. Security & access management Monitoring & reporting Print management Scan management YSOFT SAFEQ 5 Private Cloud Security & access management Key benefits Economical Secure Efficient Green Economical With YSoft SafeQ you save an average

More information

Jetstream Certification and Testing

Jetstream Certification and Testing PJM Interconnection 02/01/2016 This page is intentionally left blank. PJM 2016 www.pjm.com 2 P age Introduction Document Description PJM maintains and publishes a list of certified devices, software packages

More information

2 The LockID command INC 2010

2 The LockID command INC 2010 213 INC 21 To facilitate the exchange of information and physical objects between trading partners. To foster the existence of a competitive marketplace for system components. To encourage innovation.

More information

Passengers Rights Boarding pass using Radio frequency identification

Passengers Rights Boarding pass using Radio frequency identification Passengers Rights Boarding pass using Radio frequency identification SAUTY Aurélien, Institut de Formation Universitaire et de Recherche du Transport Aérien. aurelien_sauty@yahoo.com The reason of this

More information

Back-End Management for E-Business Portals: A Workflow-Based Approach

Back-End Management for E-Business Portals: A Workflow-Based Approach Back-End Management for E-Business Portals: A Workflow-Based Approach Giacomo Piccinelli Hewlett-Packard Labs, Bristol (UK) (giacomo_piccinelli@hp.com) Abstract In the E-Business world, a Web portal represents

More information

Guidelines for Using RFID Tags in Ontario Public Libraries

Guidelines for Using RFID Tags in Ontario Public Libraries Guidelines for Using RFID Tags in Ontario Public Libraries Information and Privacy Commissioner/Ontario Ann Cavoukian, Ph.D. Commissioner June 2004 Acknowledgements These Guidelines build upon three previous

More information

ORACLE HOSPITALITY CLOUD CONSULTING SERVICE DESCRIPTIONS October 19, 2017

ORACLE HOSPITALITY CLOUD CONSULTING SERVICE DESCRIPTIONS October 19, 2017 ORACLE HOSPITALITY CLOUD CONSULTING SERVICE DESCRIPTIONS October 19, 2017 TABLE OF CONTENTS Service Offerings CONSULTING SERVICE OFFERINGS Part Number ORACLE HOSPITALITY FOOD AND BEVERAGE POINT OF SALE

More information

ISO/IEC SC31 & GS1/EPCglobal. ETSI, 3 December 2007 Henri Barthel, GS1 Global Office

ISO/IEC SC31 & GS1/EPCglobal. ETSI, 3 December 2007 Henri Barthel, GS1 Global Office ISO/IEC SC31 & GS1/EPCglobal ETSI, 3 December 2007 Henri Barthel, GS1 Global Office GS1 in a nutshell The global language of business GS1 is a not-for-profit organisation that develops global Identification,

More information

Cisco Connected Imaging

Cisco Connected Imaging Cisco Connected Imaging Connected Imaging: Improve Medical Imaging Collaboration, Performance, and Workflow Cisco Connected Imaging enhances collaboration among radiologists, physicians, and technologists

More information

Evertson Croes ( ) Danny Hendrix ( ) Carlo Meijer ( ) Roland Verbruggen ( ) Akis Dimakogiannis ( ) December 5, 2013

Evertson Croes ( ) Danny Hendrix ( ) Carlo Meijer ( ) Roland Verbruggen ( ) Akis Dimakogiannis ( ) December 5, 2013 Final Report Evertson Croes (4241754) Danny Hendrix (4241746) Carlo Meijer (4335880) Roland Verbruggen (3038084) Akis Dimakogiannis (4384202) December 5, 2013 This document serves as a high level design

More information

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det. GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,

More information

TRACKER HYSTER TRACKER WIRELESS ASSET MANAGEMENT

TRACKER HYSTER TRACKER WIRELESS ASSET MANAGEMENT TRACKER HYSTER TRACKER WIRELESS ASSET MANAGEMENT WWW.HYSTER.COM HYSTER TRACKER UPSIZE, DOWNSIZE, RIGHT SIZE, OPTIMIZE MANAGE YOUR FLEET Take your fleet operation to the next level with wireless asset management

More information

RFID Middleware as a Service Enabling Small and Medium-sized Enterprises to Participate in the EPC Network

RFID Middleware as a Service Enabling Small and Medium-sized Enterprises to Participate in the EPC Network RFID Middleware as a Service Enabling Small and Medium-sized Enterprises to Participate in the EPC Network Jürgen Müller, Matthieu Schapranow, Marco Helmich, Sebastian Enderlein, and Alexander Zeier Hasso

More information

Radio Frequency Identification: The Current and Future Solutions for Privacy and Security

Radio Frequency Identification: The Current and Future Solutions for Privacy and Security Radio Frequency Identification: The Current and Future Solutions for Privacy and Security by Vivek Jain B.S., Electronics Engineering Technology University of North Texas December 2006 Submitted to the

More information

cobas POC IT solutions Bringing it all together

cobas POC IT solutions Bringing it all together cobas POC IT solutions Bringing it all together cobas POC IT solutions are a very powerful tool. I can use it to look at how equipment is used. If there are any particular user issues, cobas IT 1000 application

More information

SOA in the pan-canadian EHR

SOA in the pan-canadian EHR SOA in the pan-canadian EHR Dennis Giokas Chief Technology Officer Solutions Products and Group Canada Health Infoway Inc. 1 Outline Infoway EHR Solution EHRS Blueprint Overview Oriented Architecture Business

More information

LEGIC advant transponder chips. For flexible and secure ID systems at MHz

LEGIC advant transponder chips. For flexible and secure ID systems at MHz LEGIC advant transponder chips For flexible and secure ID systems at 13.56 MHz 1 advant the right decision Free choice of medium With advant, you have a free choice of smartcard, key fob, watch, credit

More information

Adopting Azure Resource Manager for efficient cloud infrastructure management

Adopting Azure Resource Manager for efficient cloud infrastructure management Microsoft IT Showcase Adopting Azure Resource Manager for efficient cloud infrastructure management Microsoft IT runs in the cloud. We have a massive investment in Microsoft Azure for our cloud IT infrastructure,

More information

Managing the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER

Managing the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER Managing the EPC Generation Gap An overview of EPC standard migration from Generation 1 To Generation 2 RFID tags. APPLICATION WHITE PAPER Copyrights 2004 ZIH Corp. All product names and numbers are Zebra

More information

ACS ANNUAL SERVICES EXHIBIT ORACLE FUNCTIONAL HELP DESK SERVICES

ACS ANNUAL SERVICES EXHIBIT ORACLE FUNCTIONAL HELP DESK SERVICES ACS ANNUAL SERVICES EXHIBIT ORACLE FUNCTIONAL HELP DESK SERVICES This ACS Annual Services Oracle Functional Help Desk Services Exhibit incorporates by reference the terms of Your order. A. Definitions.

More information

Services Directory (ServD) Response to OMG RFP Healthcare Community Services Provider Directory

Services Directory (ServD) Response to OMG RFP Healthcare Community Services Provider Directory Services Directory (ServD) Response to OMG RFP Healthcare Community Services Provider Directory HSSP context HSSP a collaboration between OMG and HL7 Service Functional Model for HCSPDIR documented by

More information

there are many features which are dependent on other areas of technology and because of those limitations this technology cannot get the required reco

there are many features which are dependent on other areas of technology and because of those limitations this technology cannot get the required reco RFID Implementation and Security Concerns A Case Study of Pakistan Musab Umair Malik malikumair@msn.com Farooq Malik xfarooqmalik@yahoo.com Fahad Ahmed Khan fodi_mufasa@yahoo.com Dr. Nadeem Ehsan m4nadeem@yahoo.com

More information

Create interoperability in a MEDITECH environment

Create interoperability in a MEDITECH environment Create interoperability in a MEDITECH environment Create real connections with your medical community Corepoint Health solutions are transforming the way hospitals and clinics meet their interoperability

More information

EMC Information Infrastructure Solutions for Healthcare Providers. Delivering information to the point of care

EMC Information Infrastructure Solutions for Healthcare Providers. Delivering information to the point of care EMC Information Infrastructure Solutions for Healthcare Providers Delivering information to the point of care Healthcare information growth is unrelenting More tests. More procedures. New technologies.

More information

UWB IEEE a Ultra Wide Band wireless technology

UWB IEEE a Ultra Wide Band wireless technology RTLS TECHNOLOGY OVERVIEW Real time location system features wireless UWB technology enabling superior precise object tracking for months of battery lifetime. UWB IEEE 802.15.4 a Ultra Wide Band wireless

More information

RFID EPC-Gen2 for Postal Applications: A Security and Privacy Survey

RFID EPC-Gen2 for Postal Applications: A Security and Privacy Survey RFID EPC-Gen2 for Postal Applications: A Security and Privacy Survey Joan Melià-Seguí, Joaquin Garcia-Alfaro, Member, IEEE and Jordi Herrera-Joancomartí, Member, IEEE Abstract Security and privacy on low-cost

More information

Powering the Edge to the Enterprise

Powering the Edge to the Enterprise Powering the Edge to the Enterprise Intelligent Equipment. Smart Devices. Smart Systems for OEMs. Intelligent Equipment. Smart Devices. Smart Systems. Our connected world is increasingly populated with

More information

TABLE OF CONTENTS DOCUMENT HISTORY

TABLE OF CONTENTS DOCUMENT HISTORY TABLE OF CONTENTS DOCUMENT HISTORY 4 UPDATE 17D 4 Revision History 4 Overview 4 Optional Uptake of New Features (Opt In) 5 Update Tasks 5 Feature Summary 6 Supply Chain Collaboration 7 Streamline Collaboration

More information

High-Power Proxies for Enhancing RFID Privacy and Utility

High-Power Proxies for Enhancing RFID Privacy and Utility High-Power Proxies for Enhancing RFID Privacy and Utility PETs Workshop June 1, 2005 Paul Syverson Naval Research Laboratory Joint work with Ari Juels, Dan Bailey RSA Labs Presentation Outline Background

More information

Implementing ITIL Best Practices

Implementing ITIL Best Practices REMEDY WHITE PAPER Implementing ITIL Best Practices Mapping ITIL to Remedy Applications WHITE PAPER Table of Contents Introduction.................................................................... 1

More information

Protecting Doctors Identity in Drug Prescription Analysis (Draft Version)

Protecting Doctors Identity in Drug Prescription Analysis (Draft Version) Protecting Doctors Identity in Drug Prescription Analysis (Draft Version) Václav Matyáš Jr. University of Cambridge Computer Laboratory Vaclav.Matyas@cl.cam.ac.uk Abstract: This paper describes work undertaken

More information

HEALTHCARE INDUSTRY VISION: SMART INVENTORY MANAGEMENT SYSTEM

HEALTHCARE INDUSTRY VISION: SMART INVENTORY MANAGEMENT SYSTEM HEALTHCARE INDUSTRY VISION: SMART INVENTORY MANAGEMENT SYSTEM TERSO SOLUTIONS SMART INVENTORY MANAGEMENT SYSTEM AN INDUSTRY VISION SUMMARY: This paper will enable executives in the healthcare sector to

More information

The STS Prepayment Standard TID rollover in 2024 managing the change

The STS Prepayment Standard TID rollover in 2024 managing the change The STS Prepayment Standard TID rollover in 2024 managing the change Kobus van den Berg (PrEng) STSA Director/ Associate, Electrical Engineer Aurecon AMEU Convention 2016 Vanderbijlpark Overview STS enhancements

More information

Summary. CAEN group overview. CAEN RFID products. Cold Chain Case Histories

Summary. CAEN group overview. CAEN RFID products. Cold Chain Case Histories RFID Conference in Struer, 12-13th October 2011 Summary CAEN group overview CAEN RFID products Cold Chain Case Histories CAEN: from High Energy Physics to RFID Founded in 1980, Headquarters in Viareggio

More information

PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE

PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE PREDICTIVE INTELLIGENCE SECURITY, PRIVACY, AND ARCHITECTURE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers.

More information

Federal Financial Supervisory Authority (BaFin)

Federal Financial Supervisory Authority (BaFin) Cover sheet: Supervisory Requirements for IT in Financial Institutions (Bankaufsichtliche Anforderungen an die IT BAIT) in the version of 3 November 2017 Please note: This English version is provided for

More information

Ti RTOS Based Parking Lot Guidance System

Ti RTOS Based Parking Lot Guidance System I J C T A, 9(13) 2016, pp. 6165-6173 International Science Press Ti RTOS Based Parking Lot Guidance System Swathikaa S. V. and J. Selvakumar ABSTRACT This idea is proposed with the problem statement in

More information

Back Office System. The most advanced and modern tolling and transportation system in the market.

Back Office System. The most advanced and modern tolling and transportation system in the market. US Kapsch TrafficCom Back Office System. The most advanced and modern tolling and transportation system in the market. The Kapsch Next Generation Back Office is integrated by a set of interconnected modules

More information

Product Documentation SAP Business ByDesign February Business Configuration

Product Documentation SAP Business ByDesign February Business Configuration Product Documentation PUBLIC Business Configuration Table Of Contents 1 Business Configuration.... 4 2 Business Background... 5 2.1 Configuring Your SAP Solution... 5 2.2 Watermark... 7 2.3 Scoping...

More information

An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises

An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises An RFID Based Generalized Integrated System for the Identification and Traceability of Products and Subsets in Enterprises Turcu, Cristina Elena Prodan, Remus Catalin Popa, Valentin 14 th December 2005

More information

Software Brochure. Supplied By Windmill Road, Sunbury-on-Thames, Middlesex, United Kingdom, TW16 7HD.

Software Brochure. Supplied By Windmill Road, Sunbury-on-Thames, Middlesex, United Kingdom, TW16 7HD. Software Brochure Supplied By 110 Windmill Road, Sunbury-on-Thames, Middlesex, United Kingdom, TW16 7HD sales@planer.com 01932 755000 www.planer.com The company... Pro-curo Software Ltd is a supplier of

More information

Introducing Software Ecosystems for Mass-Produced Embedded Systems

Introducing Software Ecosystems for Mass-Produced Embedded Systems Introducing Software Ecosystems for Mass-Produced Embedded Systems Ulrik Eklund and Jan Bosch Chalmers University of Technology Software Engineering Division, Dept. of Computer Science & Engineering Göteborg,

More information

Business Process Framework (etom) Release Level 2 Process: Customer Management

Business Process Framework (etom) Release Level 2 Process: Customer Management Huawei Tech. Co., Ltd Digital CRM R2.1 TM Forum Frameworx 16.0 Certification Business Process Framework (etom) Release 16.0 Self-Assessment Process Mapping Report Level 2 Process: 1.3.4 - Customer Management

More information

Efficient Audit Services for Data Outsourcing in Clouds

Efficient Audit Services for Data Outsourcing in Clouds IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VI (Nov Dec. 2014), PP 24-28 Efficient Audit Services for Data Outsourcing in Clouds Anuraj

More information

HSM Global Market Study

HSM Global Market Study HSM Global Market Study Sponsored by HP Atalla Independently conducted by Ponemon Institute LLC Publication Date: July 2014 Ponemon Institute Research Report HSM Global Market Study Ponemon Institute,

More information

RFID Tags and Privacy. Dan Bailey, RSA Laboratories August 26, 2004

RFID Tags and Privacy. Dan Bailey, RSA Laboratories August 26, 2004 RFID Tags and Privacy Dan Bailey, RSA Laboratories August 26, 2004 Early examples of consumer backlash 42% of Google results on RFID include word privacy CASPIAN (Consumers Against Supermarket Privacy

More information

icharge PMS Middleware, Integration and Call Accounting

icharge PMS Middleware, Integration and Call Accounting icharge PMS Middleware, Integration and Call Accounting Superior communication is at the heart of every successful hotel. MITEL CONNECTED GUESTS The class leading Hospitality Applications Suite is transforming

More information

SUCCESS STORY Inbox or mailbox, Swiss Post now delivers

SUCCESS STORY Inbox or mailbox, Swiss Post now delivers SUCCESS STORY Inbox or mailbox, Swiss Post now delivers With SecureTransport handling high-volume data flows, customers get what they need, where they need it Headquarters Bern, Switzerland Industry Transportation

More information

Securing Access of Health Information Using Identity Management

Securing Access of Health Information Using Identity Management Securing Access of Health Information Using Identity Management Steve Whicker Manager Security Compliance HIPAA Security Officer AHIS Central Region St Vincent Health sawhicke@stvincent.org Chris Bidleman

More information

Systems Requirement Specifications

Systems Requirement Specifications Department of Computer Science and Engineering the University of Texas at Arlington Systems Requirement Specifications BehindtheCurtain Enterprises Project Team Members: Kyle Burgess Kyle Crumpton Austen

More information

This topic focuses on how to prepare a customer for support, and how to use the SAP support processes to solve your customer s problems.

This topic focuses on how to prepare a customer for support, and how to use the SAP support processes to solve your customer s problems. This topic focuses on how to prepare a customer for support, and how to use the SAP support processes to solve your customer s problems. 1 On completion of this topic, you will be able to: Explain the

More information

An Efficient Mobile Payment System Based On NFC Technology

An Efficient Mobile Payment System Based On NFC Technology An Efficient Mobile Payment System Based On NFC Technology Shafiq ur Rehman and Jane Coughlan Abstract The work we have accomplished in implementing a Mobile Payment mechanism that enables customers to

More information

Access Control. StarWatch SMS - Core System Capabilities

Access Control. StarWatch SMS - Core System Capabilities Access Control StarWatch SMS - Core System Capabilities DAQ Electronics, LLC T 732.981.0050 F 732.981.0058 262B Old New Brunswick Road www.daq.net Piscataway, NJ 08854 USA Access Control PROVEN SOLUTIONS

More information

Power your communications with IBM and Avaya

Power your communications with IBM and Avaya Power your communications with IBM and Avaya How can you gain new business and build on existing customer relationships and reduce costs at the same time? The answer lies in exploring advanced business

More information

BLOCKCHAIN CLOUD SERVICE. Integrate Your Business Network with the Blockchain Platform

BLOCKCHAIN CLOUD SERVICE. Integrate Your Business Network with the Blockchain Platform BLOCKCHAIN CLOUD SERVICE Your Business Network with the Blockchain Platform Enable real-time transactions and securely share tamper-proof data across a trusted business network. Oracle Blockchain Cloud

More information

RFID solutions for the logistics industry RFID Apps Pedestals Tables Carts Software Integration

RFID solutions for the logistics industry RFID Apps Pedestals Tables Carts Software Integration R F I D R E S O U R C E G U I D E A p p l i c a t i o n s H a r d w a r e JUNE 2015 Ask about our free antenna specials! RFID solutions for the logistics industry RFID Apps Pedestals Tables Carts Software

More information

Use of RFID Technology in Libraries: a New Approach to Circulation, Tracking, Inventorying, and Security of Library Materials

Use of RFID Technology in Libraries: a New Approach to Circulation, Tracking, Inventorying, and Security of Library Materials University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Library Philosophy and Practice (e-journal) Libraries at University of Nebraska-Lincoln October 2005 Use of RFID Technology

More information

IHE IT Infrastructure (ITI) Technical Framework Supplement. Cross-Enterprise Document Workflow (XDW) Draft for Public Comment

IHE IT Infrastructure (ITI) Technical Framework Supplement. Cross-Enterprise Document Workflow (XDW) Draft for Public Comment Integrating the Healthcare Enterprise 5 IHE IT Infrastructure (ITI) Technical Framework Supplement 10 Cross-Enterprise Document Workflow (XDW) 15 Draft for Public Comment 20 Date: June 3, 2011 Author:

More information

RFID enabled Solutions TYRE MANAGEMENT

RFID enabled Solutions TYRE MANAGEMENT RFID enabled Solutions TYRE MANAGEMENT Why RFID Bar Code Requires Line of - Site Requires correct orientation Easily obscured by dirt Easily scratched or damaged Contents cannot be modified Can only read

More information