Anti-Counterfeiting of Integrated Circuits: RFID Tags as a Countermeasure

Size: px
Start display at page:

Download "Anti-Counterfeiting of Integrated Circuits: RFID Tags as a Countermeasure"

Transcription

1 Anti-Counterfeiting of Integrated Circuits: RFID Tags as a Countermeasure Sathya Kanth Vardhanapu Fall

2 Counterfeiting of Integrated Circuits Counterfeit Electronic part is defined by U.S. Dept. of Commerce as: One that is not genuine because it is an unauthorized copy. Does not conform to original OCM design, model, or performance standards. Not produced by the OCM, or is produced by unauthorized contractors. An off-specification, defective, or used OCM product sold as new or working. Has incorrect or false markings or documentation, or both. Counterfeiting is done on a large scale and counterfeiting costs US based semiconductor companies more than $7.5 billion per year Semiconductor Industry Association as of Fall

3 Sample of ATMEL Counterfeit Source: A. Huang, The one on the left has date code as 1004, which means it was fabbed on the 4 th week of The one on the right has date code 0723, which means it was fabbed on the 23 rd week of The ATmega328 wasn t in production in Fall

4 STMicroelectronics Counterfeit Source: A. Huang, s.com/blog/?p=208, 2007 Fall

5 On the Die Source: A. Huang, The chip is by STMicroelectronics, but the die says it s by Fairchild Semiconductors Fall

6 Security Aspect: General Perception In electronic devices, primarily security is seen in terms of Software and Hardware. Focus is mostly on Software. Hardware security is usually taken for granted. Threats specific to ICs are: ØCounterfeiting: Authenticity issue, the counterfeits quality is usually lacking. ØReverse Engineering: Data Confidentiality is at risk, based on the working at critical junctures of the device, steal information or extract IP. ØTampering: Change logic of the hardware, Integrity is at risk. Fall

7 History: Counterfeiting Electronics China, Korea, Chinese Taipei, Hong Kong, and the Philippines were the top five counterfeit goods suppliers to the U.S. in 13. Data provided by US and EU States Customs Services. Most counterfeit and pirated goods come from Asia as of today. OECDs report in 2007 reported that, close to $200 billion of International trade was pirated and counterfeited in This number increased to $250 billion in Fall

8 Estimate of Total Value of Counterfeit and Pirated Products OECD Category Internationally traded counterfeit and pirated products Domestically produced and consumed counterfeit and pirated products Estimate (2008 data) Estimate (2015 data) $ billion $960 billion $ billion $570 billion Digitally pirated products $30-75 billion $240 billion Total $ billion $1.77 trillion Source: M.Tehranipoor, U. Guin, D. Forte, Counterfeit Integrated Circuits, Springer, 2015 Fall

9 Security Threats Have negative impact on day-to-day life. As electronics are used widely. For instance, if we have a counterfeit component in a space vehicle, the vehicle could fail. The loss would be extremely high. In a pacemaker, a counterfeit component could cause the device to fail which would lead to someone losing their life. In a vehicle, if the ABS fails, there could be damage to the vehicle owner and others on the road. People might lose their lives. Fall

10 Types of IC Counterfeiting Recycled Forged Documentation Remarked Overproduced Out-of-spec/Defective Cloned Tampered Fall

11 Methods Used for Anti-Counterfeiting RFID Tags (includes some puf based types) EM Fingerprints Hardware Watermarking Metering PUF based methods Fuse and Time Stamp Circuits Fall

12 RFID Tags- Why Choose it over the rest? Low Cost Doesn t have a Power Unit. Don t need to be placed in Line-of-Sight. Provides high security. Data can be encrypted or Password Protected Not only used for Identification. It can be used for Anticounterfeiting as well. They are re-usable and have high durability. Fall

13 RFID Tag Source: Web, Fall

14 Implemented With PUFs RFID Tag-Methods to Counter Counterfeiting With Fuse and Time Stamp Circuits RFID Tags with FPGAs for Authentication Counterfeit Detection and System Traceability (CST) Fall

15 With PUFs Functions based on physical characteristics Unique for each chip Can provide key which cannot be easily reverse engineered. RFID tags using PUFs based on hidden timing and delay information of Integrated Circuits. Regular RFIDs can still be counterfeited PUF RFID chip has its own unique secrets PUF adds a secure authentication to prevent counterfeiting Fall

16 Overview of PUF based Authentication Source: S. Devdas et al., Design and Implementation of PUF-Based Unclonable RFID Ics for Anti-Counterfeiting and Security Applications, IEEE Intnl. Conf. on RFID, Nevada, 2008 Fall

17 Anti-Counterfeit Structure Source: Web, Nxp semiconductors, RFID documents archive Fall

18 Counterfeit Detection and System Traceability (CST) Has different types of on-chip sensors and in-system structures. Verifies the authenticity of the system. Core is an RFID tag which is used as a storage and a channel to read information different types of chips on the PCBs. This system addresses the problem with authenticity of chips on a PCB apart from other security concerns. Fall

19 Counterfeit Detection and System Traceability (CST) Source: K. Yang et al., An RFID-based technology for electronic component and system Counterfeit detection and Traceability, IEEE Intnl. Symp. on Tech. for Homeland Security (HST), Massachusetts, 2015 (a) A PCB with an RFID tag connected to different chips, (b) Internal structure of a chip with various sensors, (c) Internal structure of an RFID tag, and (d) Internal structure of the digital control unit in an RFID tag. Fall

20 Counterfeit of ICs- Semiconductor Companies Asia is the primary source for counterfeit goods or pirated goods in case of ICs. Many companies have a countermeasure for counterfeit ICs today. Each have their own parameters that are key to detection of ICs. Fall

21 Most Counterfeited Semiconductors Rank Commodity Type 1 Analog IC 25.2% 2 Microprocessor IC 13.4% 3 Memory IC 13.1% 4 Programmable Logic IC 8.3% 5 Transistor 7.6% Source: IHS Parts Management, 2012 % of Reported Incidents Fall

22 Part Type Percentage by Application Market Industrial Automotive Consumer Wireless Wired Compute Other Analog IC 14% 17% 21% 29% 6% 14% 0% Microproc 4% essor IC 1% 4% 2% 3% 85% 0% Memory IC 3% 2% 13% 26% 2% 53% 1% Programm able Logic 30% 3% 14% 18% 25% 11% 0% IC Transistor 22% 12% 25% 8% 10% 22% 0% Source: IHS isuppli, 2012 Fall

23 Companies with Countermeasures ON Semiconductor. ATMEL (CryptoMemory products). STMicroelectronics. Maxim Integrated (DeepCover Secure Authenticators). NXP Semiconductors Parker Hannifin (In Medical Devices) Fall

24 Verayo Solution for Anti-Counterfeiting Source: Web, RFIDjournal.net, Verayo Webinar, 2008 Fall

25 Marvell 88PA810 Trusted Authentication IC Source: Maxim product datasheets Maxim s deep cover embedded solutions MAX66242 is a Transponder IC. Combines ISO/IEC and ISO Mode 1-compatible RF front-end, an I2C frontend, a FIPS 180-based SHA-256 engine and 4096 bits of user EEPROM in a single chip. Fall

26 Basic Working Two way authentication between Host system and MAX Bidirectional security model. Each device has unique 64 bit ROM ID. ROM ID is used as input during cryptographic operations and acts as electronic serial number within application. I2C interface can act as master or slave port. Can harvest energy from active RF field. Fall

27 Conclusions Counterfeiting is growing at a rapid pace Current measures taken by semiconductor companies are inadequate. Many companies don t even have an inbuilt system in their products to prevent counterfeiting! Security is compromised because of counterfeiting. RFID is a cost effective method to combat this. Depending on application, right mixture of authentication and data protection techniques can provide complete product protection. Fall

28 Futurescope RFID tags even with existing precautions can be cloned. In order to prevent this, there is an approach called Hardware Intrinsic Security. In the Hardware Intrinsic Security, we often have PUFs. Verayo, an MIT based Spinoff Company are the only one company that have implemented this form. PUFs and RFID. Fall

29 The End Any Questions? Fall

SECURE AUTHENTICATION THROUGH A NEAR FIELD COMMUNICATION IN ASYMMETRIC CRYPTOGRAPHY

SECURE AUTHENTICATION THROUGH A NEAR FIELD COMMUNICATION IN ASYMMETRIC CRYPTOGRAPHY International Journal of Advances in Applied Science and Engineering (IJAEAS) ISSN (P): 2348-1811; ISSN (E): 2348-182X Vol-1, Iss.-4, SEPTEMBER 2014, 82-86 SECURE AUTHENTICATION THROUGH A NEAR FIELD COMMUNICATION

More information

DESIGN AND IMPLEMENTATION OF PUF-BASED UNCLONABLE RFID AND SECURITY APPLICATIONS

DESIGN AND IMPLEMENTATION OF PUF-BASED UNCLONABLE RFID AND SECURITY APPLICATIONS DESIGN AND IMPLEMENTATION OF PUF-BASED UNCLONABLE RFID AND SECURITY APPLICATIONS #1 PENTA MAHESH, M.Tech student, #2 M.SIRIN KUMARI, Assistant Professor, Dept of ECE, SREE CHAITANYA INSTITUTE OF TECHNOLOGICAL

More information

SL3 ICS General description UCODE EPC G2

SL3 ICS General description UCODE EPC G2 SL3 ICS 10 Rev. 3.0 20 September 2006 129430 Product short data sheet 1. General description The EPC global UHF Generation 2 Standard allows the commercialised provision of mass adaption of UHF EPC technology

More information

Security challenges for RFID key applications

Security challenges for RFID key applications 3rd European Workshop on RFID Systems and Technologies 12./13. June 2007, Duisburg Security challenges for RFID key applications Ulrich Waldmann Fraunhofer-Institut SIT Content Discussion of product anti-counterfeiting

More information

A Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007

A Review of RFID ISO Standards & CEN TC225 Developments. Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007 A Review of RFID ISO Standards & CEN TC225 Developments Paul Chartier Principal, Praxis Consultants Chair, CEN TC225 RFID Ad Hoc October 2007 RFID Standards Types of Standard Technology - air interface

More information

Secure SoC Manufacturing: Foundation for a Connected World

Secure SoC Manufacturing: Foundation for a Connected World Secure SoC Manufacturing: Foundation for a Connected World As mobile usage continues to permeate daily lives with increasingly sensitive data and high-value transactions, the importance of device security

More information

JANUS-GATE: RFID UHF GATE

JANUS-GATE: RFID UHF GATE -: RFID UHF PROTECTION - CONTROL - IDENTIFICATION TRACKING 1002 WHAT WE OFFER 02 Protection. LeghornGroup can protect your goods and assets with security seals and various products for tamper protection.

More information

Automated Vehicle Identification for Tolling and Parking: RFID vs ANPR

Automated Vehicle Identification for Tolling and Parking: RFID vs ANPR Whitepaper Automated Vehicle Identification for Tolling and Parking: RFID vs ANPR By Michael Hrabina, Executive Vice President, FEIG ELECTRONICS INC This paper analyzes ANPR versus RFID on key vehicle

More information

RFID Technology and Developments in Smart Packaging. Presented by Prateep Misra (

RFID Technology and Developments in Smart Packaging. Presented by Prateep Misra ( RFID Technology and Developments in Smart Packaging Presented by Prateep Misra ( Prateep.Misra@tcs.com) Agenda Overview of RFID Technology RFID in Smart Packaging Printed Electronics About TCS RFID Offerings

More information

An RFID-based Technology for Electronic Component and System Counterfeit Detection and Traceability

An RFID-based Technology for Electronic Component and System Counterfeit Detection and Traceability An RFID-based Technology for Electronic Component and System Counterfeit Detection and Traceability Kun Yang, Domenic Forte, and Mark Tehranipoor ECE Dept., University of Connecticut {kuy12001, forte,

More information

Close supply chain collaboration enables easy implementation of chip embedded power SiP

Close supply chain collaboration enables easy implementation of chip embedded power SiP Close supply chain collaboration enables easy implementation of chip embedded power SiP Gerald Weidinger, R&D Project Leader, AT&S AT & S Austria Technologie & Systemtechnik Aktiengesellschaft Fabriksgasse13

More information

IntelliSense RFID Workshop

IntelliSense RFID Workshop IntelliSense RFID Workshop RFID Technology from Sensing to Interacting European research on RFID O. Vermesan, SINTEF, Norway Radisson SAS Scandinavia, Oslo, Norway 28 November 2007 1 Outline RFID Policy

More information

UM0925 User manual. Using the M24LR64-R datalogger reference design. Introduction

UM0925 User manual. Using the M24LR64-R datalogger reference design. Introduction User manual Using the M24LR64-R datalogger reference design Introduction The M24LR64-R is a Dual Interface EEPROM which targets a wide range of applications such as industrial or medical equipment and

More information

Lightweight Cryptography for RFID Systems

Lightweight Cryptography for RFID Systems Lightweight Cryptography for RFID Systems Guang Gong Department of Electrical and Computer Engineering University of Waterloo CANADA G. Gong (University of Waterloo)

More information

Identity Management. ID management for people and objects

Identity Management. ID management for people and objects Identity Management ID management for people and objects System accessible assigned tokens Token means something you have. This is separate from something you know or you are. Things you carry and perform

More information

PCB 4.0 mit RFID So funkt(ioniert) Elektronikindustrie 4.0

PCB 4.0 mit RFID So funkt(ioniert) Elektronikindustrie 4.0 PCB 4.0 mit RFID So funkt(ioniert) Elektronikindustrie 4.0 Alexander M. Schmoldt 1 Ozzie 4.0 Die Zukunft ist ein Kind der Gegenwart (C.A. Tiedge) 2 Industrie 4.0 & CPS Industry 4.0 means the technical

More information

Automatic Vehicle Identification at Tollgates and Theft Detection of Vehicles

Automatic Vehicle Identification at Tollgates and Theft Detection of Vehicles Automatic Vehicle Identification at Tollgates and Theft Detection of Vehicles A. Jeyashree Kothai M. Swathi Priya V. Subhashree Abstract - we live in a world where technology is omnipresent. Yet, there

More information

Your Product is Made WHERE?

Your Product is Made WHERE? Your Product is Made WHERE? SESSION ID: GRC-W03 David Doughty Director Product Security Engineering Intel Corporation Intel Corporation 2012 revenue of $53B USD Global commercial off the shelf products

More information

Questions and Answers about the Proposed Use of RFID for U.S. Border Crossing Documents

Questions and Answers about the Proposed Use of RFID for U.S. Border Crossing Documents Questions and Answers about the Proposed Use of RFID for U.S. Border Crossing Documents November 2007 Developed by: Smart Card Alliance Identity Council About the Smart Card Alliance The Smart Card Alliance

More information

Industrial RFID. Overview RFID Reader and Antenna RFID Tags

Industrial RFID. Overview RFID Reader and Antenna RFID Tags 13 Industrial RFID Overview RFID Reader and Antenna RFID Tags RFID is not new; with thousands of industrial installations in advanced manufacturing arenas such as the automotive, electronics, automated

More information

TA0347 Technical article

TA0347 Technical article Technical article Key features and benefits of STMicroelectronics short-range contactless memory ICs Introduction STMicroelectronics has a broad range offer of short-range contactless memory ICs. All devices

More information

Real or Fake? The Counterfeit Chip Conundrum

Real or Fake? The Counterfeit Chip Conundrum Real or Fake? The Counterfeit Chip Conundrum Hal Rotchadl Premier Semiconductor Services Tempe, AZ, USA hrotchadl@premiers2.com Counterfeiting is clearly a growing problem in many industries, including

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO 17367 Second edition 2013-03-01 Supply chain applications of RFID Product tagging Applications de chaîne d approvisionnements de RFID Étiquetage de produit Reference number ISO

More information

Bridging the gap for new applications in electronics with interactive Gen2 RFID

Bridging the gap for new applications in electronics with interactive Gen2 RFID Bridging the gap for new applications in electronics with interactive Gen2 RFID NXP s new UCODE I 2 C integrated circuit (IC) is transforming EPC Gen 2 UHF RFID tags into interactive tools for electronics.

More information

Avoiding Counterfeit Components

Avoiding Counterfeit Components Avoiding Counterfeit Components DMSMS & Standardization 2009 Orlando, Florida September 21-24, 2009 Presented by Marty Lanning, XTREME Semiconductor Company Information A Texas Company founded in January

More information

Microcontroller Based Intelligent Blood Collecting System P. Aruna Kumari 1 M. Janardhana Raju 2 1 M.Tech 2 Professor 1, 2 SIETK, Puttur

Microcontroller Based Intelligent Blood Collecting System P. Aruna Kumari 1 M. Janardhana Raju 2 1 M.Tech 2 Professor 1, 2 SIETK, Puttur IJSRD - International Journal for Scientific Research & Development Vol. 1, Issue 9, 2013 ISSN (online): 2321-0613 Microcontroller Based Intelligent Blood Collecting System P. Aruna Kumari 1 M. Janardhana

More information

RFID Technologies. By Francisco J. Carabez

RFID Technologies. By Francisco J. Carabez RFID Technologies By Francisco J. Carabez franciscojavier@carabez.com Index 1 What is RFID? RFID History Working principle of RFID Technology? 4 RFID System Basics 5 Why RFID? 2 RFID Components RFID Readers

More information

RFID & Fingerprint Based Vehicle Security System with GSM & GPS Technology

RFID & Fingerprint Based Vehicle Security System with GSM & GPS Technology #1.0-2018 RESEARCH ARTICLE OPEN ACCESS RFID & Fingerprint Based Vehicle Security System with GSM & GPS Technology N. KISHORE KUMAR 1, K. IMRAN SHAREEF 2, S. MD. TAYAB 3, P. CHAITHANYA KUMAR 4 1(Assistant

More information

Chip Card & Security ICs my-d vicinity SRF 55V02P

Chip Card & Security ICs my-d vicinity SRF 55V02P Chip Card & Security ICs my-d vicinity Intelligent 2.5 Kbit EEPROM with Contactless Interface compliant to ISO/IEC 15693 and ISO/IEC 18000-3 mode 1 Plain Mode Operation Short Product Information July 2007

More information

Sponsors. Gold Sponsors. Silver Sponsors. Bronze Sponsors

Sponsors. Gold Sponsors. Silver Sponsors. Bronze Sponsors RAIN RFID Alliance Sponsors Gold Sponsors Silver Sponsors Bronze Sponsors 2 RAIN RFID Alliance RAIN is a subsidiary of AIM RAIN RFID Alliance was founded in 2014 Increase awareness and understanding of

More information

Counterfeit threat for electronic industry on rise: plug it

Counterfeit threat for electronic industry on rise: plug it Cover Story The Holography Times Counterfeit threat for electronic industry on rise: plug it Author: Author is Secretary of Hologram Manufacturers Association of India (HoMAI) since 2006 and also serves

More information

RAIN Radio Protocol. December 2015

RAIN Radio Protocol. December 2015 RAIN Radio Protocol December 2015 Background RAIN reader tag communications use the UHF Gen2 radio protocol. The MIT Auto-ID Center pioneered the early work on the UHF Gen2 protocol in 2002, transitioning

More information

Counterfeiting It s Worse Than You Think!

Counterfeiting It s Worse Than You Think! NAVAIR DMSMS Team Counterfeiting It s Worse Than You Think! Ric Loeslein AIR 6.7.1.6 NAVAIR DMSMS Team Lead 301-342-2179 George.Loeslein@navy.mil Weapon System Life Cycle Development Start Base Model IOC

More information

Bringing Rewriteable Memory to Printed Electronics Launching consumer products Making integrated systems possible

Bringing Rewriteable Memory to Printed Electronics Launching consumer products Making integrated systems possible Thin Film Electronics ASA: Bringing Rewriteable Memory to Printed Electronics Launching consumer products Making integrated systems possible Davor Sutija, CEO Annual General Meeting 10 May, 2011 Agenda

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March-2016 1026 LIFI BASED AUTOMATED SMART TROLLEY USING RFID V.Padmapriya 1, R.Sangeetha 2, R.Suganthi 3, E.Thamaraiselvi

More information

Chip versus chipless for RFID applications

Chip versus chipless for RFID applications Chip versus chipless for RFID applications Raghu Das r.das@idtechex.com www.idtechex.com is an independent strategic analyst on RFID, smart labels, smart packaging and printed electronics. Our core services

More information

EMV Terminology Guide

EMV Terminology Guide To make life easier, TMG has compiled some of the most commonly used EMV terms in this guide. If you have questions about EMV, contact your Director of Client Relations directly or email clientrelations@themebersgroup.com.

More information

PRODUCT DATASHEET. Confidex Captura CONTENTS

PRODUCT DATASHEET. Confidex Captura CONTENTS Confidex 2010 1 (5) PRODUCT DATASHEET Confidex Captura CONTENTS 1. PRODUCT DESCRIPTION... 2 1.1 SPECIFICATION DATA... 2 1.2 DIMENSIONS... 2 1.3 ELECTRICAL PERFORMANCE... 3 1.4 RESISTANCE AGAINST ENVIRONMENTAL

More information

We Digitize Your Products So You Can Digitize Your Business.

We Digitize Your Products So You Can Digitize Your Business. We Digitize Your Products So You Can Digitize Your Business. The winners in every market will be the businesses that bridge the gap between the real world and the digital world. We re here to digitize

More information

Imagine Memory Everywhere Thin Film Electronics ASA

Imagine Memory Everywhere Thin Film Electronics ASA ASA Presentation May 09, 2007 Talk outline Introduction Current State of Technology Printed memory applications Printed Electronics Market Making progress Organisation Summary Financials Demonstration

More information

CURE FOR THE COUNTERFEITING PANDEMIC IN THE AUTOMOTIVE INDUSTRY

CURE FOR THE COUNTERFEITING PANDEMIC IN THE AUTOMOTIVE INDUSTRY RFID IOT NFC Confidex and Sasken proudly present the Dynamic Parts Authentication TM CURE FOR THE COUNTERFEITING PANDEMIC IN THE AUTOMOTIVE INDUSTRY JUNE 2017 INTRODUCTION Apparel, accessories, music,

More information

Product Specific Security Features Based on RFID Technology

Product Specific Security Features Based on RFID Technology Product Specific Security Features Based on RFID Technology Zoltán Nochta, Thorsten Staake, Elgar Fleisch Auto-ID Labs White Paper WP-BIZAPP-028 Zoltán Nochta Project Manager SAP AG Contact: Thorsten Staake

More information

Secure Access Solutions using Passive Radio Frequency Identification Technology

Secure Access Solutions using Passive Radio Frequency Identification Technology Secure Access Solutions using Passive Radio Frequency Identification Technology R.C. Mala Department of Electrical and Electronics Manipal Institute of Technology Manipal University, India Anirudh Mital

More information

SPECIAL SPECIFICATION 8783 Border Safety Inspection Facility Transponder Reader System

SPECIAL SPECIFICATION 8783 Border Safety Inspection Facility Transponder Reader System 2004 Specifications CSJ 0921-02-173 SPECIAL SPECIFICATION 8783 Border Safety Inspection Facility Transponder Reader System 1. Description. Furnish, install and test Transponder Reader System consisting

More information

A Prevention and Automation of Public Distribution System using RFID and Facial Recognition Camera

A Prevention and Automation of Public Distribution System using RFID and Facial Recognition Camera IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 02 (February. 2014), V6 PP 09-13 www.iosrjen.org A Prevention and Automation of Public Distribution System

More information

Smart identification. RFID cable ties support Industry 4.0

Smart identification. RFID cable ties support Industry 4.0 Smart identification RFID cable ties support Industry 4.0 Three in one: information carrier, product label and fastener all in a single product! RFID technology, combined with the versatility of cable

More information

AN ULTRA SMALL INDIVIDUAL RECOGNITION SECURITY CHIP

AN ULTRA SMALL INDIVIDUAL RECOGNITION SECURITY CHIP AN ULTRA SMALL INDIVIDUAL RECOGNITION SECURITY CHIP THE MANUFACTURE AND DISTRIBUTION OF GOODS REQUIRES GOOD QUALITY AND INVENTORY CONTROL. THE RFID-ENABLED µ-chip S SMALL SIZE AND LOW COST MAKE IT SUITABLE

More information

Fault Tolerance Evaluation of RFID Tags

Fault Tolerance Evaluation of RFID Tags Fault Tolerance Evaluation of RFID Tags Nadpis 1 Nadpis 2 Nadpis 3 Omar Abdelmalek, David Hély and Vincent Beroulle omar.abelmaleck@lcis.grenoble-inp.fr Grenoble Institute of Technology Laboratoire de

More information

Company Presentation

Company Presentation Company Presentation Overview Facts, Vision and Mission Portfolio, Markets and Capabilities Smart Cosmos The Internet of Your Things Quality and Certifications 2 Key Facts Global RFID and IoT pacesetter,

More information

The RAIN RFID Market Raghu Das, CEO, IDTechEx

The RAIN RFID Market Raghu Das, CEO, IDTechEx The RAIN RFID Market Raghu Das, CEO, IDTechEx r.das@idtechex.com 1 IDTechEx: Brief Overview of RFID Capability IDTechEx is an independent technology and market analyst company IDTechEx has covered the

More information

EMV and Educational Institutions:

EMV and Educational Institutions: October 2014 EMV and Educational Institutions: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks,

More information

RFID IN HEALTHCARE Technology Meets Stringent Safety Regulations for use in Medical Devices

RFID IN HEALTHCARE Technology Meets Stringent Safety Regulations for use in Medical Devices Whitepaper RFID IN HEALTHCARE Technology Meets Stringent Safety Regulations for use in Medical Devices HEALTHCARE RFID MEETS RIGOROUS INDUSTRY STANDARDS ON RF ENABLED MEDICAL DEVICES RFID technology application

More information

Wireless Sensor Network based Automatic Fare Collection for Public Transport System

Wireless Sensor Network based Automatic Fare Collection for Public Transport System Wireless Sensor Network based Automatic Fare Collection for Public Transport System Anne Frank Joe.A 1, Celin. S 2, G. Rajalakshmi 3, Ajay kumar 4, Gaurav sharma 5 Assistant Professor, Dept. of EIE, Sathyabama

More information

ALN-9768 Wonder Dog Inlay

ALN-9768 Wonder Dog Inlay ALN-9768 Wonder Dog Inlay The Alien Technology ALN-9768 Wonder Dog is a multi-faceted UHF RFID inlay suitable for many uses. While useful in many general purpose applications, it is particularly effective

More information

Electronic Design & Manufacture Hardware, Software and IoT Capabilities Under One Roof

Electronic Design & Manufacture Hardware, Software and IoT Capabilities Under One Roof Electronic Design & Manufacture Hardware, Software and IoT Capabilities Under One Roof Electronic Design & Manufacture Selecting a development and manufacturing partner is often the most important decision

More information

ENCODING, PRINTING & VALIDATING RFID TAGS WITH PORTALTRACK

ENCODING, PRINTING & VALIDATING RFID TAGS WITH PORTALTRACK ENCODING, PRINTING & VALIDATING RFID TAGS WITH PORTALTRACK Maximizing Your RFID Investment with PortalTrack from MSM Solutions MSM Solutions PortalTrack gives you the freedom to tailor your RFID and Barcode

More information

SPECIAL SPECIFICATION 6683 Border Safety Inspection Facility Transponder Reader System

SPECIAL SPECIFICATION 6683 Border Safety Inspection Facility Transponder Reader System 2004 Specifications CSJ 0922-00-025 SPECIAL SPECIFICATION 6683 Border Safety Inspection Facility Transponder Reader System 1. Description. Furnish, install and test Transponder Reader System consisting

More information

SPECIAL SPECIFICATION 8772 Border Safety Inspection Facility Transponder Reader System

SPECIAL SPECIFICATION 8772 Border Safety Inspection Facility Transponder Reader System 2004 Specifications CSJ 0921-02-173 SPECIAL SPECIFICATION 8772 Border Safety Inspection Facility Transponder Reader System 1. Description. Furnish, install and test Transponder Reader System consisting

More information

Addressing Counterfeits & Non-Conforming Components

Addressing Counterfeits & Non-Conforming Components Addressing Counterfeits & Non-Conforming Components Joe Jarzombek, Director for Software and Supply Chain Assurance Stakeholder Engagement & Cyber Infrastructure Resilience Supply Chain Risk Management

More information

Optimizing Waste Collection with RFID

Optimizing Waste Collection with RFID WHITE PAPER Optimizing Waste Collection with RFID RFID technology enhances waste management efficiency practices. HID Global is committed to the growth and development of RFID technology in waste management

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO 17366 Second edition 2013-03-01 Supply chain applications of RFID Product packaging Applications de chaîne d approvisionnements de RFID Empaquetage de produit Reference number

More information

SPECIFICATION SHEET NO. 1 ATTACHMENT 3 TEMPERATURE MONITORING DEVICE

SPECIFICATION SHEET NO. 1 ATTACHMENT 3 TEMPERATURE MONITORING DEVICE TEMPERATURE MONITORING DEVICE DATE: 4 Feb 2016 1. SCOPE 1.1 This Specification Sheet covers the requirements for various types and sizes of temperature monitoring devices. 1.2 Intended use. Temperature

More information

The Counterfeit Conundrum:

The Counterfeit Conundrum: The Counterfeit Conundrum: 5 Best Practices for Mitigating Counterfeit Issues in the Electronics Industry Industry white paper highlighting proven strategies to limit the impact of counterfeiting issues

More information

RFID, Identification & Wireless Systems for the Middle East & North Africa

RFID, Identification & Wireless Systems for the Middle East & North Africa Taglogic RFID Administrative Office: P.O.Box 415, Templar House, Don Road, St. Helier, Jersey, JE4 8WH, Channel Islands Main Branch: 2 nd Floor, Tour de Lyon bldg, Emile Eddeh str, Hamra, P.O.Box: 1135366

More information

HID Trusted Tag Services

HID Trusted Tag Services HID Trusted Tag Services RFID SOLUTIONS Empowering the Internet of Things Today, billions of everyday objects are now capable of interacting with each other to drive tremendous value for individuals and

More information

Supercharge Your Assets with Embedded RFID

Supercharge Your Assets with Embedded RFID Supercharge Your Assets with Embedded RFID INTELLIGENT ASSETS Embedding RFID to Improve Tracking, MRO and More Asset tracking solutions built around RFID technology have traditionally leveraged the ability

More information

IEEE RFID 2012 Tutorials and Workshops

IEEE RFID 2012 Tutorials and Workshops IEEE RFID 2012 Tutorials and Workshops Tutorial: Advanced UHF RFID Tag Antenna Design (April 3: 8:30 am 12:00 pm) Organizer: Gaetano Marrocco (University of Roma Tor Vergata) Things equipped with electronic

More information

MICROCHIP TECHNOLOGY, MITSUBISHI MATERIALS AND CHECKPOINT SYSTEMS RAISE THE BAR IN MHz RFID TAGGING IC PERFORMANCE

MICROCHIP TECHNOLOGY, MITSUBISHI MATERIALS AND CHECKPOINT SYSTEMS RAISE THE BAR IN MHz RFID TAGGING IC PERFORMANCE For Immediate Release Editorial Contact: Reader/Literature Inquiries: Christina Hecht (480) 786-7668 Microchip Technology Inc. Web: www.microchip.com (480) 786-7669 Glenda Laudisio Checkpoint Systems (856)

More information

VON BRAUN LABS. News WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO WHAT WE DO VON BRAUN LABS

VON BRAUN LABS. News WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO WHAT WE DO VON BRAUN LABS VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM News VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WHO WE ARE OUR SOLUTIONS HOW WE DO WHAT WE DO Greetings from Mr. Dario S. Thober - CEO

More information

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks

Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Security issues in RFID Middleware Systems: Proposed EPC implementation for network layer attacks Arif Sari School of Applied Sciences, Department of Management Information Systems, European University

More information

Ⅰ. Market Introduction _ Wafer Demand by Devices Type and Used Equipment Targets

Ⅰ. Market Introduction _ Wafer Demand by Devices Type and Used Equipment Targets Forecast of Used Equipment Market Based on Demand & Supply 03. 19.2013 Ⅰ. Market Introduction _ Wafer Demand by Devices Type and Used Equipment Targets 300 mm 20 nm to 0.13 μm Computing Microprocessors

More information

Greenhouse Environment Monitoring System using Near Field Communication. (NFC) Technology

Greenhouse Environment Monitoring System using Near Field Communication. (NFC) Technology Greenhouse Environment Monitoring System using Near Field Communication (NFC) Technology Jun Wang 1, Tiansi Ren 1, Fu Zhang 1, Ronggang Xia 1, Zhaomei Qiu 1 1. College of agriculture Engineering, Henan

More information

SSMC WoW for BUSINESS EXCELLENCE

SSMC WoW for BUSINESS EXCELLENCE SSMC WoW for BUSINESS EXCELLENCE Jagadish CV, CEO AGENDA Organisation Profile The phases SSMC goes through WoW for Business Excellence Organisation Profile Organisation Profile Incorporated on 4 th Dec

More information

(RFID) Radio Frequency IDentification System RFID 101. M. I. Suhile Ahamed

(RFID) Radio Frequency IDentification System RFID 101. M. I. Suhile Ahamed Radio Frequency IDentification System (RFID) RFID 101 Technical Whitepaper V1.0.1 M. I. Suhile Ahamed KCP Technologies Limited 2, Dr. P. V. Cherian Crescent, Egmore, Chennai - 600 008, INDIA. Phone: +91

More information

Forecast of Used Equipment Market Based on Demand & Supply

Forecast of Used Equipment Market Based on Demand & Supply Forecast of Used Equipment Market Based on Demand & Supply 2013. 06. 05 Thomas LEE Ⅰ. Market Introduction 300 200 150 _ Wafer Demand by Devices Type and Used Equipment Targets 20 to 0.13 0.13 to 0.5 >

More information

HID Trusted Tag Services

HID Trusted Tag Services HID Trusted Tag Services RFID SOLUTIONS Empowering the Internet of Things Today, billions of everyday objects are now capable of interacting with each other to drive tremendous value for individuals and

More information

Electromagnetic Guided Factory Intelligent AGV

Electromagnetic Guided Factory Intelligent AGV 3rd International Conference on Mechatronics and Information Technology (ICMIT 2016) Electromagnetic Guided Factory Intelligent AGV Xiaoyu Chen1, a, Wenping Lin1, b, Jian Liu1, c, Lichao Guan1, d, Yipin

More information

Brand Protection That Your Marketing Team Won t Say No To

Brand Protection That Your Marketing Team Won t Say No To Brand Protection That Your Marketing Team Won t Say No To Pack Expo East, April 17, 2018 Presented by Julie Hatlem and Aaron Sniker What keeps you up at night? 1. Understanding what your lost revenue is

More information

Implementation and Design of Digital System for High Frequency RFID Tag Chip

Implementation and Design of Digital System for High Frequency RFID Tag Chip Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Implementation and Design of Digital System for High Frequency RFID Tag Chip Wenwen Zhang, * Weiping Jing, Bin Jiang antong

More information

Library Automation using RFID Technology

Library Automation using RFID Technology Library Automation using RFID Technology Page 1 of 7 Introduction New technologies have always been of interest for libraries, both for the potential of increasing the quality of service and for improving

More information

Chinese American Semiconductor Professional Association (CASPA)

Chinese American Semiconductor Professional Association (CASPA) Chinese American Semiconductor Professional Association (CASPA) 1159 Sonora Court, Suite 105, Sunnyvale, CA 94086 Tel: (408)940-4600; Email: office@caspa.com URL:http://www.caspa.com About Infineon Infineon

More information

RFID and Privacy Impact Assessment (PIA)

RFID and Privacy Impact Assessment (PIA) RFID and Privacy Impact Assessment (PIA) JOURNÉES SCIENTIFIQUES URSI 25 ET 26 MARS 2014 1 Agenda Introduction: RFID everywhere? RFID and security issues RFID threats The European Recommendation Privacy

More information

Information Security in Electronic Toll Fare System

Information Security in Electronic Toll Fare System Vol. 5, 22 Information Security in Electronic Toll Fare System Neeta Ranjan, S.D.Joshi and Rajiv Ranjan Abstract-- As road infrastructure financing are turning towards a utilitarian basis, car toll systems

More information

Dimitar Popov Zeina Muallem

Dimitar Popov Zeina Muallem Dimitar Popov Zeina Muallem Auto-IDs serve to provide information about people, animals, goods, etc. Used in purchasing, distribution logistics, industry, manufacturing companies. Storage capacity, data

More information

COMPANY PRESENTATION. For excellence in electronics. Electronics consulting, expertise and services 1

COMPANY PRESENTATION. For excellence in electronics. Electronics consulting, expertise and services 1 COMPANY PRESENTATION For excellence in electronics Electronics consulting, expertise and services 1 Our mission INDEPENDENT, INTERNATIONAL ONE-STOP-SHOP PLATFORM FOR SOLUTIONS AND SERVICES IN ELECTRONICS

More information

LEGIC advant transponder chips. For flexible and secure ID systems at MHz

LEGIC advant transponder chips. For flexible and secure ID systems at MHz LEGIC advant transponder chips For flexible and secure ID systems at 13.56 MHz 1 advant the right decision Free choice of medium With advant, you have a free choice of smartcard, key fob, watch, credit

More information

Basics of EPC. Training

Basics of EPC. Training Basics of EPC Training Introduction Objectives: - Create awareness of the concepts - Develop technical knowledge - Show benefits of implementation - Explain 5 steps of Implementation 2 Programme Introduction

More information

TRACEABILITY: SOLVING CHALLENGES & ADDING VALUE IN ELECTRONICS MANUFACTURING

TRACEABILITY: SOLVING CHALLENGES & ADDING VALUE IN ELECTRONICS MANUFACTURING TRACEABILITY: SOLVING CHALLENGES & ADDING VALUE IN ELECTRONICS MANUFACTURING By Rob Prosser, global product manager, industrial ID materials, Brady Corporation Last updated: May 2014 TRACEABILITY: SOLVING

More information

Topics. Background Approach Status

Topics. Background Approach Status 16 th September 2014 Topics Background Approach Status Background e-governance in India National e-governance Plan 2006 31 Mission Mode Projects Quality Assurance in e-governance Quality Assessment of

More information

Texas Instruments DRA726 Jacinto 6 Eco SoC Processor for Automotive Infotainment

Texas Instruments DRA726 Jacinto 6 Eco SoC Processor for Automotive Infotainment Texas Instruments DRA726 Jacinto 6 Eco SoC Processor for Automotive Infotainment Cost-optimized in-vehicle infotainment for entry- to mid-level automobile segments Infotainment in automobiles is growing

More information

Combating Food Fraud with Packaging Technologies Carol Zweep, NSF International SIAL Show, Montreal May 2, 2018

Combating Food Fraud with Packaging Technologies Carol Zweep, NSF International SIAL Show, Montreal May 2, 2018 Combating Food Fraud with Packaging Technologies Carol Zweep, NSF International SIAL Show, Montreal May 2, 2018 Overview NSF Organization & Services Food Fraud Definition Initiatives taken Packaging protects

More information

Written evidence submitted by the Anti-Counterfeiting Group (ACG) (DEB 50)

Written evidence submitted by the Anti-Counterfeiting Group (ACG) (DEB 50) Written evidence submitted by the Anti-Counterfeiting Group (ACG) (DEB 50) 1. Introduction The UK Anti-Counterfeiting Group (ACG), which represents over 3,000 international brands, wishes to bring to your

More information

EU1000 CRIMPER OPERATORS MANUAL WITH ACTTM CONTROLLER

EU1000 CRIMPER OPERATORS MANUAL WITH ACTTM CONTROLLER EU1000 CRIMPER OPERATORS MANUAL WITH ACTTM CONTROLLER SAFETY PRECAUTIONS READ INSTRUCTIONS AND IDENTIFY ALL COMPONENT PARTS BEFORE USING CRIMPER KEEP HANDS AWAY FROM PINCH POINTS CONSULT HOSE AND FITTING

More information

Radio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches

Radio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches Radio Frequency Identification (RFID) on Cisco Catalyst 9000 Family Switches Overview RFID is an automatic identification technology that uses radio waves to capture data from tags, rather than optically

More information

RAIN Drives Industry 4.0

RAIN Drives Industry 4.0 RAIN Drives Industry 4.0 Welcome to the RAIN RFID Alliance Steve Halliday President, RAIN RFID Alliance An Introduction June 2018 2 Sponsors Platinum Sponsor Silver Sponsors Bronze Sponsors 3 RAIN RFID

More information

Contactless Payment: Applications, Technologies and Transaction Models

Contactless Payment: Applications, Technologies and Transaction Models Contactless Payment: Applications, Technologies and Transaction Models Smart Card Alliance Terminal & etransaction Infrastructure Task Force February 13, 2003 1 New Contactless Payment White Paper (Medich)

More information

mcube MC3635: The Smallest MEMS Accelerometer for Wearables

mcube MC3635: The Smallest MEMS Accelerometer for Wearables mcube MC3635: The Smallest MEMS Accelerometer for Wearables Ultra-low power 3D TSV MEMS Single-Chip 3-axis Accelerometer With its market share increasing every year, mcube is seeking to become a leader

More information

Design of the RFID for storage of biological information

Design of the RFID for storage of biological information Design of the RFID for storage of biological information Yu-Lee Choi *, Seok-Man Kim **, Sang-Hee Son ***, and Kyoung-Rok Cho ** Dept. of Bio and Information Technology * Chungbuk National University,

More information

Digital Fiat Currency. The true alternative to physical currency

Digital Fiat Currency. The true alternative to physical currency Digital Fiat Currency The true alternative to physical currency The single largest opportunity for Central Banks in fintech is to digitize cash $75 trillion worth of cash transactions globally 85% of global

More information

FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION

FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION FOR A BARRIER-FREE PAYMENT PROCESSING SOLUTION MAKE THE SWITCH TO MONEXgroup ecommerce I Mobile I Wireless I Integrated I Countertop Solutions PAYMENTS IN-STORE PAYMENTS ON-THE-GO PAYMENTS ONLINE Accept

More information