Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader

Size: px
Start display at page:

Download "Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader"

Transcription

1 Privacy Management for Medical Service Application using Mobile Phone collaborated with RFID Reader Byunggil Lee and Howon Kim Electronics and Telecommunications Research Institute Abstract The RFID and sensor network based ubiquitous computing has great potential in medical and healthcare services. Most of medical accidents around patients are depended on misidentification of patient or medical articles. The accidents can be reduced, if information about the patient is managed automatically. In this aspect, the mobile device with RFID reader is useful device as a medical assistant. However, the security and privacy problem related RFID application has become a serious issue in real service environment. In this paper, we propose a customized policy based privacy management architecture for medical and healthcare application. The proposed mechanism is a useful solution for user centric privacy management in medical environment. 1. Introduction The RFID based ubiquitous technology has a great deal of prospect in recent years. The ubiquitous computing technology is seamlessly integrated into the human s medical environment and it provides useful and effective medical services to human lives [1]-[3]. However, unless these medical applications are properly designed in privacy aspect, they can cause social privacy problem. Today, people should be convinced that using RFID-tags will not jeopardize their privacy in medical application. Otherwise, they will not accept and use them. Privacy is different from security, in aspect of Right to control over personal information by himself. Previous privacy-protecting schemes for basic tags have focused on cryptograph approach and rewriting approach such as, killing tag approach, renaming approach, minimalist cryptography approach, re-encryption approach, proxying approach and blocking approach[5]-[8]. In hospital, most of medical accidents around patients are depended on misidentification of patient or medical articles. The accidents can be reduced, if information about the patient is managed automatically [2][3]. In the medical environment, fixed RFID reader is used for equipment management or emergency room s In-Out management. And mobile RFID reader, reader embedded mobile phone is developed in Korea; various application service is tested for service verification. In this paper, we propose a policy based RFID privacy management architecture for medical application. Many applications in the ubiquitous computing environment should be customized based on user s context. Moreover, it has different user policy between patient tag(human tag) for medical application and product tag(object tag) for EPCglobal s enterprise application[4]. In view of this ubiquitous sharing system of medical information, a serious problem for RFID service is a threat to privacy. Here, the RFID privacy issues in medical application involve the risk of exposing the personal medical information, such as trace of personal location, information of personal health and clinical history. In standard such as HL7, customizing and detailed privacy mechanism is not yet provided. Therefore, we will define the privacy architecture and system for medical service environment. For these privacy issues, we cannot solve all the problems with existing crypto-technology, such as encryption and decryption. Nowadays, there has been significant research on the security and privacy issues that RFID bring to the table[6][7]. A lot of work has been done at RSA Labs by Ari Juel and etc. But, it was security protocol between tag and network by using hash or encryption. There is no mention of the privacy management mechanism and system. In order to ensure personal privacy protection service, a mechanism that encrypts and decrypts the outgoing data from tag and server has been proposed. However, these mechanisms may create limitations in the applicability of the ubiquitous service. In addition, if decryption of tag code is successful, all information can be exposed [8]. For this reason, we propose a mechanism that manages user centric privacy policy in the ubiquitous medical service. It is more flexible and secure mechanism, if it is integrated with cryptographic Copyright SITIS

2 algorithm for mitigating the aforementioned problems. The remainder of this paper is organized as follows. Section 2 describes proposed privacy managed service architecture for medical application. In section 3, we present a proposed scenarios and system architecture of privacy management. In section 4, we delineate a hospital application of the RFID using a customizing privacy policy. Finally, conclusions and a discussion of potential areas for future research are presented in Section 5. shall be applied to the information collection process through the use of the RFID reader. RPS:RFID Privacy Mgmt. System 2. Design of privacy managed service architecture In hospital, we can also use the object-tag for asset management for location finding. Patient-tag system is effective solution to reduce the medical accidents. However, unless these patient-tag systems or tagged-medical card systems are properly designed and constructed in privacy aspect, they can cause massive collateral damage to related user privacy. A hospital s 1 st aid patient labeled with unprotected tags may be monitored by unauthorized readers in hospital and street or subway. In the mobile environment, security and privacy is more important than fixed business environment. So, we define 3 step based privacy aware service architecture for RFID based medical application service. 1. First step : Access control of patient information by default privacy policy 2. Second step : User controllable profile based Privacy protection 3. Third step : Auditable Privacy management In the meantime, we introduce new RFID based service model and the application in the mobile environment. The architecture of mobile phone collaborated with RFID Reader is shown in figure 1 and we called it as mobile RFID. In the application, the mobile phone with RFID reader is applicable to B2C service model against B2B enterprise fixed style RFID system. In mobile RFID model, mobile RFID phone requests information by capturing the tag attached to the patient and the mobile RFID reader transmits this information to the back-end information server via middleware. The information server subsequently returns the requested information to the reader and displays it to end user(doctor, nurse, family, others). The mechanism of personal privacy in mobile RFID services is to allow individuals to control their personal information related to RFID services. In other words, unauthorized distribution of personal information carried on the patient tag shall be prevented and a privacy protection mechanism Figure 1. The architecture of mobile RFID network based medical service This paper aims to provide privacy protection services by adopting a privacy protection system (RPS) in the mobile RFID service network. For privacy management, we propose a profile based privacy management architecture for medical application. A privacy bit in tag is simple and costeffective mechanism for privacy control. The privacy bit is only reference for privacy service. The medical RFID information server check the privacy guaranteed service or not from the privacy policy. To illustrate how the privacy policy works in information server, let us consider it use in application and contents information system of service provider, as shown in Figure 2. Figure 2. The architecture of information system for privacy ensure service The privacy protection level is stored in the RPS. The RFID code format for application is defined in the "Mobile RFID Application Data Format" as a Korea standard. The privacy protection level has TYPE, LENGTH, and VALUE in the TLV structure. The maximum privacy level depends on the application services and the privacy level is defined from 1 to 9. The default privacy level follows the

3 privacy-applied standard of each application service; and if there is no standard, the privacy level is determined based on the privacy impact assessment result. Definition 1. Privacy level consist of a 10-tuple of information, where T={T 1, T 2,,T 10 } by default privacy policy. It also protected by user secure tag area and privacy server. We also define the privacy weight for medical information, as shown in table 1. Table 1. Examples of a default privacy weight for RFID based medical information. Privacy related people Privacy Policy Privacy Info. Doctor in charge of the patient T 4 T 9 Medical History Treatment Info. Nurse in charge of the patient T 4 T 9 Medical History Treatment Info. General doctor in hospital T 3 T 7 Medical treatment General nurse in hospital T 3 T 7 Medical treatment Family T 2 T 6 Medical tracking Info. Emergency Agency T 2 T 5 Medical Tracking Info, 1 st aid Info. Others T 1 All cut off the default privacy policy of the corresponding service or the privacy protection policy set by the user. Figure 3. The scenario for registration to the RPS 3. Scenarios and system architecture for privacy managed medical service The RFID and wireless sensor network related privacy problem is depending on application service. The threat of privacy infringement from RFID medical application is twofold. First, the presence of a unique serial number in an RFID tag opens up the possibility of clandestine physical route tracking on tagged patient for example A hospital at 3:20 am. to B hospital at 5:00 pm.. A second threat arises from the presence of patient information in RFID tag. This information in principle permits clandestine scanning of patient. We focus here on challenge involved in protecting the RFID privacy of users of medical application. So, this is a counter measure of the research trying to support various problems that arise during the privacy processing of the medical information through user s privacy policy bases. Therefore there is a need for the privacy management system(we called it RPS ) to notify a privacy policy to application server. The scenario of this privacy service shows in Figure 3. and Figure 4. When patient connect the RPS by mobile terminal initially, the patient s privacy policy can be set up and store in RPS. The Figure 3 shows the procedure for registering to RPS. To use the privacy protection service, the user shall register to RPS and define his/her privacy protection policy. In the same way, the service providers that intend to provide privacy-secured services shall also register to RPS and comply with Figure 4. The scenario for privacy management service In the first service stage, the inquire procedure is provided by result of registration of each policy as shown in Figure 4. And, figure 5 shows the system architecture of privacy management system. Figure 5. The architecture of privacy management system of medical service

4 The RPS that protects personal privacy in RFID services sets policies to gain users trust and provides a mechanism for users to check privacy protection. The major function of privacy management system is listed. - Real-time notification - Profile and policy management - Registration and authentication - Obligation management - Audit Management In code classification, we setup tag code by mobile RFID code(mcode) structure standard for application in Korea. There are four code classifications and privacy information for medical application in tag code. Medical Service Domain : Domain ID for medical service Hospital ID : Hospital identification code Medical ID : Medical object identification in hospital Serial Number : Patient serial number Privacy Info. : Code for privacy information The ubiquitous medical system utilizes existing information systems that had been developed during the medical information process. And it has adopted RFID for diagnosing and operation effectively shown Figure 6. to patient as a agent in medical discovery gateway and Hospital IS(Information Server). Various kinds of applicable method for privacy are being researched to design effective systems within the ubiquitous environment. The research aimed to provide smooth mutual intercommunication among mobile networked RFID and existing RFID systems by adaptation module. We focused on easy privacy aware service adaptation by common profile based privacy policy and user controllable modification. The basic model of the research was; each privacy sensitive data is classified by the default privacy weight initially. And it is modified by the end user s detailed policy for privacy service in medical applications. And these services mutually interlocked in tag and RPS server platform. The user controllable privacy policy in this research is considered as a basis of RFID privacy management service. The compatibility and scalability in medical application may cause problems during migration. But the mechanism is suitable for user s policy based privacy service within the ubiquitous environment. By applying suggested privacy management mechanism to actual medical ER(emergency room) system, networked medical Kiosk, RFID networked Emergency rescue system and medical examination service as shown in Figure 7. Tag Reader Figure 6. Using of RFID based medication information system 4. System Evaluation of Privacy Controlled Medical Service In this chapter, we show some practical result of privacy aware medical service in hospital. The hospital generates initial PCD(Privacy Controlled Data), which contains the patient code, medical ID and related information. And the default privacy level is used for patient cannot control by himself. In order to provide authentication and privacy interface Figure 7. Medical Application of the proposed prototype System There is some approach applying the RFID to medicine and hospital. From above, proposed privacy scheme has advantages in custom centric approach aspect for constructing a privacy aware ubiquitous medical system. 5. Conclusion In this paper, we considered an RFID based ubiquitous medical application with privacy aware service. The proposed hospital application was

5 presented in terms of privacy policy whereas we introduced a privacy protection scheme using owner configured privacy preference policy. In the proposed hospital mechanism, the owner configures the level of the personal clinical information that will be accessible to the public and the access control. By doing so, customized privacy protection can be realized. In this regard, the suggested mechanism is an effective solution for privacy protection in a ubiquitous system. 6. Acknowledgements This work was supported by the IT R&D program of MIC/IITA. [2005-S088-03, Development of Security technology for Secure RFID/USN Service]. References [1] Siio, I., Hayasaka, T., Putting information to things : RFID tags and their application, IPSJ Magazine, Vol. 40, No.8, pp , Aug [2] Shang-Wei Wang, et al., RFID Application in Hospitals: A Case Study on a Demonstration RFID Project in a Taiwan Hospital, HICSS2006, Vol. 8, Jan [4] EPCglobal. The EPCglobal Network:Overview of Design, Benefits and Security, Sep [5] A. Juels and S.A Weis, Authenticating Pervasive Devices with Human Protocols. In Proc. Of CRYPTO 05, LNCS 3621, pp , Springer- Verlag [6] G. Avoine and Ph. Oechslin, A scalable and provable secure hash based RFID protocol, International Workshop on Pervasive Computing and Comunications Security, PerSec 2005, pp IEEE, [7] Sanjay E. Sarma, et al., RFID Systems and Security and Privacy Implications, CHES 2002, Lecture Notes in Computer Science 2523, pp [8] Inseop Kim, Byunggil Lee, Howon Kim, Privacy- Friendly Mobile RFID Reader Protocol Design on trusted Agent and PKI, Proceedings of the IEEE Tenth ISCE 06, Vol 1, June, [3] Yu, W.D., Ramni, A., Design and implementation of a personal mobile medical assistant, HEALTHCOM2005, 23-25, June

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Arif Sari School of Applied Sciences, Department of Management Information Systems, European University

More information

Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems

Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems Secure EPCglobal Class-1 Gen-2 RFID System Against Security and Privacy Problems Kyoung Hyun Kim 1, Eun Young Choi 2,SuMiLee 3, and Dong Hoon Lee 4 Center for Information Security Technologies(CIST), Korea

More information

Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System

Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System Mobile Agent Code Updating and Authentication Protocol for Code-centric RFID System 1 Liang Yan, 2 Hongbo Guo, 3 Min Chen, 1 Chunming Rong, 2 Victor Leung 1 Department of Electrical Engineering and Computer

More information

Low-cost RFID identification variation

Low-cost RFID identification variation Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Low-cost RFID identification variation Koong Lin Tzu-Chang Yeh Yao-Yuan Liu Chad Lin Edith Cowan University 10.2991/jcis.2006.14 Originally

More information

Reassignment Scheme of an RFID Tag s Key for Owner Transfer

Reassignment Scheme of an RFID Tag s Key for Owner Transfer Reassignment Scheme of an RFID Tag s Key for Owner Transfer Junichiro Saito 1, Kenji Imamoto 1, and Kouichi Sakurai 2 1 Graduate School of Information Science and Electrical Engineering, The Department

More information

Lightweight Cryptography for RFID Systems

Lightweight Cryptography for RFID Systems Lightweight Cryptography for RFID Systems Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA G. Gong (University of Waterloo)

More information

February 14, Introducing.. Provable regulatory compliance!

February 14, Introducing.. Provable regulatory compliance! February 14, 2011 Introducing.. 1 Secure Cloud Computing 2 Secure Cloud Computing Secure Cloud Storage 3 The first complete security solution that lets you take advantage of Public Clouds while proving

More information

A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network

A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network A Framework for Seamless Information Retrieval between an EPC Network and a Mobile RFID Network Min Kyu Han, Il Woo Paik, Byung Hee Lee and Jin Pyo Hong Hankuk University of Foreign Studies {hufs96mk,

More information

Research and Development. Needs for RFID

Research and Development. Needs for RFID Research and Development Needs for RFID Thomas J. Sommer thomas.sommer@ec.europa.eu European Commission DG Information Society and Media Micro/Nanosystems EU RFID Forum Brussels, 13-14 March 2007 Scenarios

More information

ITU-T. JCA-NID Joint Coordination Activity on Network aspects of Identification Systems

ITU-T. JCA-NID Joint Coordination Activity on Network aspects of Identification Systems ITU-T JCA-NID Joint Coordination Activity on Network aspects of Identification Systems Pierre-André PROBST Convener JCA-NID OFCOM/Switzerland (presented by Kirit Lathia) Content: NID: What is this? NID

More information

Seminar: Communication Infrastructure, RFID Security

Seminar: Communication Infrastructure, RFID Security Seminar: Communication Infrastructure, RFID Security Thomas Thrainer, 0356015, Thomas.Thrainer@students.jku.at Johannes Kepler university Linz FIM Institut für Informationsverarbeitung und Mikroprozessortechnik

More information

Security challenges for RFID key applications

Security challenges for RFID key applications 3rd European Workshop on RFID Systems and Technologies 12./13. June 2007, Duisburg Security challenges for RFID key applications Ulrich Waldmann Fraunhofer-Institut SIT Content Discussion of product anti-counterfeiting

More information

SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network

SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network SignEPC : A Digital Signature Scheme for Efficient and Scalable Access Control in EPCglobal Network Roy Ka-Wei LEE School of Information Systems Singapore Management University 80 Stamford Road, Singapore

More information

Laboratory Management Based on Internet of Things. Jianming Huang

Laboratory Management Based on Internet of Things. Jianming Huang Advanced Materials Research Online: 2013-06-27 ISSN: 1662-8985, Vol. 711, pp 665-669 doi:10.4028/www.scientific.net/amr.711.665 2013 Trans Tech Publications, Switzerland Laboratory Management Based on

More information

Basics of EPC. Training

Basics of EPC. Training Basics of EPC Training Introduction Objectives: - Create awareness of the concepts - Develop technical knowledge - Show benefits of implementation - Explain 5 steps of Implementation 2 Programme Introduction

More information

A RFID Explicit Tag Estimation Scheme for Dynamic Framed- Slot ALOHA Anti-Collision

A RFID Explicit Tag Estimation Scheme for Dynamic Framed- Slot ALOHA Anti-Collision A RFID Explicit Tag Estimation Scheme for Dynamic Framed- Slot ALOHA Anti-Collision Author Pupunwiwat, Prapassara, Stantic, Bela Published 2010 Conference Title 6th International Conference on Wireless

More information

X Infotech Banking. Software solutions for smart card issuance

X Infotech Banking. Software solutions for smart card issuance X Infotech Banking Software solutions for smart card issuance WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for centralized and instant issuance of financial and non-financial

More information

Slide 1. IoTA-Special Session, IoT 2012, Wuxi, China

Slide 1. IoTA-Special Session, IoT 2012, Wuxi, China Slide 1 The Internet of Things applied Architecture Reference Model for the IoT Dr. Sebastian Lange, VDI/VDE-IT Slide 2 IoT Week 2013 Helsinki Slide 3 FP7 Project: Internet of Things Architecture (IoT-A)

More information

IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD

IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD IMPLEMENTATION FOR ENHANCING SECURITY OF RFID CARD Shilpa S. Badhiye1,Prof.Rupali S. Khule2 1 student, Electronics and telecommunication Department, MCOERC, Maharashtra, India 2 Professor, Electronics

More information

ITEM REMOVED PDA023 DATE REMOVED 14:08:14 TIME REMOVED 9:30AM FAULT CODE NONE. Intelligent Lockers. Solutions for total asset management

ITEM REMOVED PDA023 DATE REMOVED 14:08:14 TIME REMOVED 9:30AM FAULT CODE NONE. Intelligent Lockers. Solutions for total asset management ITEM REMOVED PDA023 USER D.SMITH DATE REMOVED 14:08:14 TIME REMOVED 9:30AM FAULT CODE NONE Intelligent Lockers Solutions for total asset management Innovative Management Solutions Recognized as global

More information

Design of the RFID for storage of biological information

Design of the RFID for storage of biological information Design of the RFID for storage of biological information Yu-Lee Choi *, Seok-Man Kim **, Sang-Hee Son ***, and Kyoung-Rok Cho ** Dept. of Bio and Information Technology * Chungbuk National University,

More information

X Infotech Government

X Infotech Government X Infotech Government Software solutions for identity documents WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for issuance, management and verification of electronic identity

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network

System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network System Virtualization and Efficient ID Transmission Method for RFID Tag Infrastructure Network Shin-ichi Kuribayashi 1 and Yasunori Osana 1 1 Department of Computer and Information Science, Seikei University,

More information

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2)

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin Abstract Traditional banking technology has multiple

More information

Gene H. Yoon/Senior Manager Emerging Business Incubation Center

Gene H. Yoon/Senior Manager Emerging Business Incubation Center Gene H. Yoon/Senior Manager Emerging Business Incubation Center Convergence Trend Convergence is a trend that is being accelerated by a number of drivers and will lead to ubiquitous service environment.

More information

Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective!

Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective! SESSION ID: CCS-T08 Blockchain Role in Smart Cities/IoT Security A Cryptographic Perspective! Dr. Hilal Houssain hilal.hussein@gmail.com Agenda Internet of Things (IoT) IoT Security Requirements IoT Security

More information

RFID and Privacy Impact Assessment (PIA)

RFID and Privacy Impact Assessment (PIA) RFID and Privacy Impact Assessment (PIA) JOURNÉES SCIENTIFIQUES URSI 25 ET 26 MARS 2014 1 Agenda Introduction: RFID everywhere? RFID and security issues RFID threats The European Recommendation Privacy

More information

Genesis Block Development

Genesis Block Development Genesis Block Development Who we are We are a group of companies engaged in software development, payment systems implementation, software and web solutions for e-commerce and blockchain solutions for

More information

CARDEA: Service platform for monitoring patients and medicines based on SIP OSGi and RFID technologies in hospital environment

CARDEA: Service platform for monitoring patients and medicines based on SIP OSGi and RFID technologies in hospital environment CARDEA: Service platform for monitoring patients and medicines based on SIP OSGi and RFID technologies in hospital environment Saúl Navarro, Ramón Alcarria, Juan A. Botía, Silvia Platas and Tomás Robles,

More information

A Secure Platform for Information Sharing in EPCglobal Network

A Secure Platform for Information Sharing in EPCglobal Network A Secure Platform for Information Sharing in EPCglobal Network Jie Shi a,b Yingjiu Li a Robert H. Deng a Wei He c Eng Wah Lee c a School of Information Systems, Singapore Management University b Jinan

More information

The Evolution of the Referral Process

The Evolution of the Referral Process The Evolution of the Referral Process Case Study: Providence Health System E-Referral Mike Reagin Director of Research and Development michael.reagin@providence.org Providence Health System Portland, Oregon

More information

AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL

AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL AUTHENTICATION OF THE WIRELESS RFID SYSTEM USING SECURITY PROTOCOL D.P.Anusuya,Asst.Professor, Karpapga Vinayaga College of Engineering and Technology, Madhrandagam,Chennai,India. anu.krish1988@gmail.com

More information

A Quality Evaluation Technique of RFID Middleware in Ubiquitous Computing

A Quality Evaluation Technique of RFID Middleware in Ubiquitous Computing A Quality Evaluation Technique of RFID Middleware in Ubiquitous Computing Gi oug, Oh, and Doo yeon, Kim and Sang il, Kim and Sung yul, Rhew giug@korea.com kimdoo@moe.go.kr hava67@selab.ssu.ac.kr syrhew@comp.ssu.ac.kr

More information

Centricity 360 Suite Case Exchange Physician Access Patient Access

Centricity 360 Suite Case Exchange Physician Access Patient Access Centricity 360 Suite Case Exchange Physician Access Patient Access Unleash the power of GE collaboration solutions to bring your distributed care teams together. Centricity 360 Suite with Case Exchange,

More information

1. Understanding Big Data. Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview

1. Understanding Big Data. Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. Understanding

More information

HIMS Salient Features

HIMS Salient Features HIMS Salient Features Document details Title HIMS Salient Features document Version 1.0 Date of Submission 11th September, 2015 Softcopy HIMS Features_v1.0 Number of Pages 32 IMAGE COMPUTER SYSTEMS HIMS

More information

A Shopping Environment for Blind People Using RFID

A Shopping Environment for Blind People Using RFID IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 58-62 www.iosrjournals.org A Shopping Environment for Blind People Using RFID Prof. Rajesh N. Kamath 1, Namita Tamse

More information

Campus Tracking System Based On IoT Yibiao Pi

Campus Tracking System Based On IoT Yibiao Pi Applied Mechanics and Materials Online: 2014-08-11 ISS: 1662-7482, Vols. 599-601, pp 1416-1419 doi:10.4028/www.scientific.net/amm.599-601.1416 2014 Trans Tech Publications, Switzerland Campus Tracking

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software Comparing Cost of Ownership: Symantec Managed PKI Service vs. On-Premise Software Who should read this paper Deploying and managing a PKI solution can be a complex undertaking. This is particularly the

More information

Lexmark esf Applications. Product Demonstration Guide

Lexmark esf Applications. Product Demonstration Guide Lexmark esf Applications Product Demonstration Guide Description Lexmark s Embedded Solution Framework (esf): Is an application platform that resides on the Lexmark devices Allows java-based applications

More information

The RFID Story. Sanjay Sarma Dean of Digital Learning, Professor of Mechanical Engineering. The Internet of Things: Roadmap to a Connected World

The RFID Story. Sanjay Sarma Dean of Digital Learning, Professor of Mechanical Engineering. The Internet of Things: Roadmap to a Connected World The RFID Story Sanjay Sarma Dean of Digital Learning, Professor of Mechanical Engineering Computer Science and Artificial Intelligence Laboratory (CSAIL) Massachusetts Institute of Technology CLASSIFYING

More information

SMS BASED MONEY TRANSACTION USING SOA

SMS BASED MONEY TRANSACTION USING SOA International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250 1568 Vol.2, Issue 2 June 2012 59-71 TJPRC Pvt. Ltd., SMS BASED MONEY TRANSACTION USING SOA P.MATHIVALAVAN

More information

RFID Overview. Outline. Definition. Barcode Replacement. Reading Tags

RFID Overview. Outline. Definition. Barcode Replacement. Reading Tags Outline 1. Introduction 2. Basic RFID Tags 3. Symetric-Key Tags 4. RFID News Written by: Ari Juels Presented by Carlos A. Lopez Definition RFID: Is a technology for automated identification of objetcs

More information

Supplier Security Directives

Supplier Security Directives Page 1 (8) Supplier Directives 1 Description This document (the Directives ) describes the security requirements applicable to Suppliers (as defined below) and other identified business partners to Telia

More information

How to Prepare for EPC Data Cost- Effectively. Christian Floerkemeier MIT Auto-ID Lab

How to Prepare for EPC Data Cost- Effectively. Christian Floerkemeier MIT Auto-ID Lab How to Prepare for EPC Data Cost- Effectively Christian Floerkemeier MIT Auto-ID Lab Configuration & Monitoring Transmit power set to 4 W Trigger read cycle when motion sensor detects object Use dense

More information

Mobile Encryption & Integration

Mobile Encryption & Integration Mobile Encryption & Integration Mobile Ready Apps Scalable Biometrics Secure Databases Connect Every Part of Your Mobile Enterprise to Enhance Security Measures and Increase Subscriber Usage. The success

More information

Privacy Challenges in RFID

Privacy Challenges in RFID Privacy Challenges in RFID Gildas Avoine Information Security Group Université catholique de Louvain Belgium SUMMARY Background about RFID Privacy: Information Leakage Privacy: Malicious Traceability Is

More information

Where are your medical records?

Where are your medical records? Where are your medical records? Abstract The world of medicine is changing rapidly. We are at the beginning of an era where we treat a patient for their particular condition and not just a general condition.

More information

IBM System Storage DR550 Express

IBM System Storage DR550 Express An affordable and secure archiving and information retention solution for small and medium businesses IBM System Storage DR550 Express Highlights Designed as a secure, scalable, Designed to leverage multiple

More information

Experimental Platform for Model-Integrated Clinical Information Systems

Experimental Platform for Model-Integrated Clinical Information Systems Experimental Platform for Model-Integrated Clinical Information Systems Janos Mathe, Jan Werner, Yonghwan Lee, Akos Ledeczi, Bradley Malin #, Janos Sztipanovits Department of Electrical Engineering and

More information

HEALTHCARE ACTIVITIES FROM ANYWHERE ANYTIME

HEALTHCARE ACTIVITIES FROM ANYWHERE ANYTIME HEALTHCARE ACTIVITIES FROM ANYWHERE ANYTIME Healthcare Utility Services To provide infrastructure or Software as a Service Platform to perform all kinds of healthcare operations by doctors, patients, lab

More information

TokenD principles. A framework for enterprise tokenization platforms. Distributed Lab

TokenD principles. A framework for enterprise tokenization platforms. Distributed Lab TokenD principles A framework for enterprise tokenization platforms Distributed Lab What is TokenD? A framework for creating tokenization platforms TokenD consists of best practices, protocols, a codebase,

More information

Privacy Preservation and Mutual Authentication in RFID Systems

Privacy Preservation and Mutual Authentication in RFID Systems Privacy Preservation and Mutual Authentication in RFID Systems Debadatta Meher Roll. No. 710CS2036 under the guidance of Prof. Ashok Kumar Turuk Department of Computer Science and Engineering National

More information

Should & How RFID System be Evaluated against CC v3.1. InfoCom Security Division Yao-Chang Yu 2007/9/26

Should & How RFID System be Evaluated against CC v3.1. InfoCom Security Division Yao-Chang Yu 2007/9/26 Should & How RFID System be Evaluated against CC v3.1 InfoCom Security Division Yao-Chang Yu 2007/9/26 Outline RFID System Overview EPCglobal Architecture Framework Security in EPC Standard Security Issues

More information

Frozen sample management solution. FreezerPro

Frozen sample management solution. FreezerPro Frozen sample management solution FreezerPro Complete Solution for Sample Tracking for Cryogenic Storage. FreezerPro is an intuitive, fast, reliable and secure solution which enables users to know precisely

More information

A Context Middleware Based on Sensor and RFID information

A Context Middleware Based on Sensor and RFID information A Context Middleware Based on Sensor and RFID information Tomás Sánchez López, Daeyoung Kim AutoID Lab Korea, ICU, Daejeon, South Korea. Email: tomas, kimd@icu.ac.kr Abstract Pervasive computing environments

More information

Management Strategies of Enterprise Mobile Application in Mobile Internet Environment

Management Strategies of Enterprise Mobile Application in Mobile Internet Environment 5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) Management Strategies of Enterprise Mobile Application in Mobile Internet Environment Mengli Li1, a, Xumei Zhang1,

More information

RFID AS A TOOL FOR SAFETY, SECURITY, PRIVACY AND CONVENIENCE FOR INTELLIGENT TRANSPORT SYSTEMS

RFID AS A TOOL FOR SAFETY, SECURITY, PRIVACY AND CONVENIENCE FOR INTELLIGENT TRANSPORT SYSTEMS RFID AS A TOOL FOR SAFETY, SECURITY, PRIVACY AND CONVENIENCE FOR INTELLIGENT TRANSPORT SYSTEMS MATTEO VEZZOSI NXP TECHNOLOGY DAY 7 TH JULY 2017 Agenda Overview Passive UHF in Automated Vehicle Identification

More information

Atlant s atwatch CAPA TM. Corrective and Preventive Action System (CAPA) Product & Services Bundle for

Atlant s atwatch CAPA TM. Corrective and Preventive Action System (CAPA) Product & Services Bundle for Corrective and Preventive Action System (CAPA) Product & Services Bundle for Atlant s atwatch CAPA TM Atlant Systems, Inc. (781)325-8157 team@atlantsystems.com Effectively Manage CAPAs Globally According

More information

Birlamedisoft Quanta V1.0 Web Based Hospital Information System

Birlamedisoft Quanta V1.0 Web Based Hospital Information System Introduction Birlamedisoft Pvt. Ltd., is an ISO 9001:2000 Certified company and one of the leading Healthcare software Development Company providing software solutions to the entire Healthcare industry

More information

Needed: unobtrusive, real-time visibility and actionable information

Needed: unobtrusive, real-time visibility and actionable information Mojix Secure and Safe Event Experience is based on the ViZix IoT Platform Solution and Mojix STAR Technology B eginning with a stylish and triumphant opening ceremony in Baku, Azerbaijan, over 250 thousand

More information

ITEM REMOVED MAC023 DATE REMOVED 15:09:11 TIME REMOVED 9:32AM FAULT CODE NONE. Total Management Solutions Educational Facilities

ITEM REMOVED MAC023 DATE REMOVED 15:09:11 TIME REMOVED 9:32AM FAULT CODE NONE. Total Management Solutions Educational Facilities ITEM REMOVED MAC023 USER D.SMITH DATE REMOVED 15:09:11 TIME REMOVED 9:32AM FAULT CODE NONE Total Management Solutions Educational Facilities Innovative Management Solutions Recognized as global leaders

More information

Australian Journal of Basic and Applied Sciences

Australian Journal of Basic and Applied Sciences AENSI Journals Australian Journal of Basic and Applied Sciences Journal home page: www.ajbasweb.com RFID based Medical Database System Mohamad Harris Misran, Maizatul Alice Meor Said, Azahari Salleh, Mohd

More information

PMS is an integrated Clinic Management solution that helps local SMEs on:

PMS is an integrated Clinic Management solution that helps local SMEs on: PMS is an integrated Clinic Management solution that helps local SMEs on: Productivity Enhancements Cost-Saving Initiative Document Management and Tablet Access Inventory and Queue Managements Centralization

More information

A proposed formula for comparing kill password effectiveness in single password RFID systems

A proposed formula for comparing kill password effectiveness in single password RFID systems Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2012 A proposed formula for comparing kill password effectiveness in

More information

The research and design of the RFID track and trace system based on web services

The research and design of the RFID track and trace system based on web services Applied Mechanics and Materials Online: 2014-02-06 ISSN: 1662-7482, Vols. 513-517, pp 1123-1126 doi:10.4028/www.scientific.net/amm.513-517.1123 2014 Trans Tech Publications, Switzerland The research and

More information

Ubiquitous Korea Project

Ubiquitous Korea Project Ubiquitous Korea Project Minkoo Kim, We Duke Cho, Jaeho Lee, Rae Woong Park, Hamid Mukhtar, and Ki Hyung Kim Presented by Lin Deng About the paper A chapter in: Book: Handbook of Ambient Intelligence and

More information

RFID IN HEALTHCARE Technology Meets Stringent Safety Regulations for use in Medical Devices

RFID IN HEALTHCARE Technology Meets Stringent Safety Regulations for use in Medical Devices Whitepaper RFID IN HEALTHCARE Technology Meets Stringent Safety Regulations for use in Medical Devices HEALTHCARE RFID MEETS RIGOROUS INDUSTRY STANDARDS ON RF ENABLED MEDICAL DEVICES RFID technology application

More information

Student Attendance system and Monitoring using RFID and Processing

Student Attendance system and Monitoring using RFID and Processing ISSN 2395-1621 Student Attendance system and Monitoring using RFID and Processing #1 Rahul More, #2 Kiran Patel, #3 Rhutika Tavasalkar, #4 Yogita Khandagale, #5 Prof. A. R. Uttarkar 1 rahulmore942@gmail.com,

More information

EPC Primer. Erik Sundermann HUG Meeting - Paris 20th Sept 2006

EPC Primer. Erik Sundermann HUG Meeting - Paris 20th Sept 2006 EPC Primer Erik Sundermann HUG Meeting - Paris 20th Sept 2006 Agenda The Fundamentals of RFID The Internet of Things The EPCglobal Organization EPCglobal Network Standards Physical Object Exchange Standards

More information

data sheet RFID IN ORACLE 11i10 E-BUSINESS SUITE Oracle Warehouse Management with Application Server 10g

data sheet RFID IN ORACLE 11i10 E-BUSINESS SUITE Oracle Warehouse Management with Application Server 10g data sheet RFID IN ORACLE 11i10 E-BUSINESS SUITE Radio Frequency Identification (RFID) is gaining momentum with numerous initiatives in the manufacturing and supply chain spaces. Both the US Department

More information

Medical Virtual Public Services

Medical Virtual Public Services Revista Informatica Economică nr. 1(45)/2008 157 Medical Virtual Public Services Manole VELICANU Academy of Economic Studies, Bucharest Iulia SURUGIU TotalSoft, Bucharest The healthcare enterprises are

More information

T²Enterprise. Mapping Communication Translation Management. T 2 Tran. EDI solution Translation/transport Monitoring/tracking.

T²Enterprise. Mapping Communication Translation Management. T 2 Tran. EDI solution Translation/transport Monitoring/tracking. Systrends T²Enterprise Mapping Communication Translation Management T 2 Mapper T 2 Com T 2 Tran T 2 App Mapping solution Data transformation Data conversion EDI solution Translation/transport Monitoring/tracking

More information

Outbound Delivery Using RFID in Sap System

Outbound Delivery Using RFID in Sap System Outbound Delivery Using RFID in Sap System Sheng Wang, Dong Wang Class B0303395 School of Software Shanghai Jiao Tong University Shanghai, China 800 Dong Chuan Road Phone: 086-021-62933040; 086-13764599933

More information

Moving Toward a Consumer-Driven Electronic Health Records Infrastructure

Moving Toward a Consumer-Driven Electronic Health Records Infrastructure Moving Toward a Consumer-Driven Electronic Health Records Infrastructure Intelligent Information Systems IBM Almaden Research Center DBSEC 2007 - Privacy and Security for Service-Oriented Architectures

More information

RFID Vendor Collaboration and Meeting the Needs of Your Clients

RFID Vendor Collaboration and Meeting the Needs of Your Clients RFID Vendor Collaboration and Meeting the Needs of Your Clients By Raymond Lowe Email: Raymond.lowe@providence.org Providence Health and Services IS Director Saint Joseph Medical Center Ca Regional Director

More information

Professor John Gray Professor Zhipeng Wu University of Manchester

Professor John Gray Professor Zhipeng Wu University of Manchester Automated Adaptive Packaging in Food Processing An IoT Approach Professor John Gray Professor Zhipeng Wu University of Manchester This project has received funding from the European Union KBBE.2012.2.3-03:

More information

INSIGHT DRIVEN HEALTH BLOCKCHAIN WHAT S PROGRESS ARE WE MAKING IN HEALTHCARE APRIL 2018

INSIGHT DRIVEN HEALTH BLOCKCHAIN WHAT S PROGRESS ARE WE MAKING IN HEALTHCARE APRIL 2018 INSIGHT DRIVEN HEALTH BLOCKCHAIN WHAT S PROGRESS ARE WE MAKING IN HEALTHCARE APRIL 2018 WHERE IS PROGRESS OCCURRING? IDENTITY DATA LOCATION TRACK AND TRACE DATA RECONCILIATION Copyright 2018 Accenture.

More information

A Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007

A Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007 A Review of RFID ISO Standards & CEN TC225 Developments Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007 RFID Standards Types of Standard Technology - air interface

More information

IEEE RFID 2012 Tutorials and Workshops

IEEE RFID 2012 Tutorials and Workshops IEEE RFID 2012 Tutorials and Workshops Tutorial: Advanced UHF RFID Tag Antenna Design (April 3: 8:30 am 12:00 pm) Organizer: Gaetano Marrocco (University of Roma Tor Vergata) Things equipped with electronic

More information

SmartAL Smart Assisted Living. Improved health, safety and well-being of people

SmartAL Smart Assisted Living. Improved health, safety and well-being of people SmartAL Smart Assisted Living Improved health, safety and well-being of people What is SmartAL? SmartAL is a technological ecosystem simplifying people's daily lives from the health and social point of

More information

IBM System Storage. IBM Information Archive: The next-generation information retention solution

IBM System Storage. IBM Information Archive: The next-generation information retention solution IBM System Storage IBM Information Archive: The next-generation information retention solution Highlights Reduce cost Reduce disk capacity requirements with built-in data deduplication and compression

More information

New Directions in RFID Security

New Directions in RFID Security New Directions in RFID Security Erik-Oliver Blass and Refik Molva EURECOM, Sophia Antipolis, France Abstract. Current research in RFID security focuses on basic authentication protocols between a tag and

More information

Contemplate For Online Plebiscite Capturing using ATM Terminals

Contemplate For Online Plebiscite Capturing using ATM Terminals Contemplate For Online Plebiscite Capturing using ATM Terminals Kausal Malladi & Srivatsan Sridharan Department of Computer Science, IIIT - Bangalore. E-mail : kausalmalladi@gmail.com, vatsan.s@rediff.com

More information

Malaysia, Batu Pahat, Johor, Malaysia. Keywords: RFID, Bloom filter, data filtering, sensor, supply chain

Malaysia, Batu Pahat, Johor, Malaysia. Keywords: RFID, Bloom filter, data filtering, sensor, supply chain An Efficient Approach to Processing Massive RFID Data in Supply Chain Hairulnizam Mahdin 1, a, Mohd Farhan Md Fudzee 2,b, Azizul Azhar Ramli 3, c, Mohd Aizi Salamat 4,d and Shahreen Kasim 5,e 1,2,3,4,5

More information

Laboratory Information Management System Index

Laboratory Information Management System Index Laboratory Information Management System Index About LIMS Patient Tracking Overview Key Module & Key Features LIMS Architecture Benefits LIMS Standards Interface Integration Sample Tracking LIMS. Net Screen-shots

More information

Security solutions White paper. Effectively manage access to systems and information to help optimize integrity and facilitate compliance.

Security solutions White paper. Effectively manage access to systems and information to help optimize integrity and facilitate compliance. Security solutions White paper Effectively manage access to systems and information to help optimize integrity and facilitate compliance. March 2007 Contents 2 Overview 3 Answer key questions related to

More information

Mobile RFID Security Issues

Mobile RFID Security Issues All rights are reserved and copyright of this manuscript belongs to the authors. This manuscript has been published without reviewing and editing as received from the authors: posting the manuscript to

More information

RFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas

RFID Technical Tutorial and Threat Modeling. Presented by: Neeraj Chaudhry University of Arkansas RFID Technical Tutorial and Threat Modeling Presented by: Neeraj Chaudhry University of Arkansas 1 RFID Tutorial Outline Introduction RFID System Tags Readers Data link layer Modulation Encoding Anti-Collision

More information

EMV Terminology Guide

EMV Terminology Guide To make life easier, TMG has compiled some of the most commonly used EMV terms in this guide. If you have questions about EMV, contact your Director of Client Relations directly or email clientrelations@themebersgroup.com.

More information

IntelliSense RFID Workshop

IntelliSense RFID Workshop IntelliSense RFID Workshop RFID Technology from Sensing to Interacting European research on RFID O. Vermesan, SINTEF, Norway Radisson SAS Scandinavia, Oslo, Norway 28 November 2007 1 Outline RFID Policy

More information

Centralized management of healthcare communications using the Vyne Exchange Platform

Centralized management of healthcare communications using the Vyne Exchange Platform Centralized management of healthcare communications using the Vyne Exchange Platform Connecting Disconnected Data vynecorp.com Solutions Designed Specifically for Healthcare The Vyne Exchange Platform,

More information

Performance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement

Performance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement , pp.1-10 http://dx.doi.org/10.14257/ijseia.2014.8.3.01 Performance Analysis of Anti-collision Algorithm for Tag Identification Time Improvement Chang-Su Kim 1, Bong-Im Jang 1 and Hoe-Kyung Jung 1* 1 PaiChai

More information

FDA, Counterfeit, and RFID Technology

FDA, Counterfeit, and RFID Technology FDA, Counterfeit, and RFID Technology Edmund W. Schuster APICS members should note the implications of an article that appeared in the Wall Street Journal on February 19, 2004. Among other things, the

More information

Optimizing and Tracking - RFID in Medical & Health. Richard Aufreiter, PM, HID Global

Optimizing and Tracking - RFID in Medical & Health. Richard Aufreiter, PM, HID Global Optimizing and Tracking - RFID in Medical & Health Richard Aufreiter, PM, HID Global An ASSA ABLOY Company The global leader in door opening solutions Operations in more than 50 countries $ 5.8 billion

More information

DESIGN OF MOBILE APPLICATIONS AND INFORMATION ARCHITECTURES. CPET 499 Mobile Computing Systems David Rash Chris Meisner

DESIGN OF MOBILE APPLICATIONS AND INFORMATION ARCHITECTURES. CPET 499 Mobile Computing Systems David Rash Chris Meisner DESIGN OF MOBILE APPLICATIONS AND INFORMATION ARCHITECTURES CPET 499 Mobile Computing Systems David Rash Chris Meisner 11-10-14 EXECUTIVE SUMMARY We were called in to review and discuss the current inventory

More information

RADIOLOGY WORKFLOW SOLUTIONS

RADIOLOGY WORKFLOW SOLUTIONS RADIOLOGY WORKFLOW SOLUTIONS YOUR PATH TO MORE EFFICIENCY radiology workflow management for hospitals OPTIMISED WORKFLOW MAXIMUM EFFICIENCY TARGET REACHED EARLIER medavis. Your trusted partner for workflow

More information

New Directions in RFID Security

New Directions in RFID Security New Directions in RFID Security Erik-Oliver Blass and Refik Molva EURECOM, Sophia Antipolis, France Abstract. Current research in RFID security focuses on basic authentication protocols between a tag and

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Hardward Device Hardware Device Inventory provides the Enterprise with the methods and schema necessary to identify

More information