Monday, December 25, 2006
IBM's RFID tech to combat fake pharmaceuticals
Saturday, December 16, 2006
Your secrets not so safe with RFID-enabled passports
Ever since these newfangled RFID e-passports hit the mainstream, understandable concerns have frequently surfaced regarding the security (or lack thereof) involved. The Dutch version has already been cracked, Germans can clone theirs, and Ireland's doesn't even have a protective sheath to keep its data safe from unauthorized readers; now it appears that you have one more reason to stick with the ole laminated paper version, as security researchers have released "proof-of-contact code that they say enables an attacker to read the passport number, date of birth, and passport expiration date." The flaw was unveiled by Adam Laurie -- a well-respected watchman of Bluetooth security weaknesses -- in his "Bugtraq" newsletter, but no specifics were reported regarding how evildoers could extract such precious information and subsequently steal your identity. Nevertheless, those RFID-shielding manufacturers must be licking their chops right about now, and rightfully so.
Source:
Posted by Darren Murph in Engadget
Friday, December 15, 2006
Here comes RFID Gaurdian -Is it the Nemisis of RFID ?
Let's face. Researchers in Amsterdam have gone ahead and created a device which would prevent RFID tags from being read and this was being done with the aim of protecting users from this technology which was posing a threat to their privacy.
Called the RFID Guardian, it is a PDA size handheld device which warns a person that when a RFID scanner is trying to read a chip by beeping. This device runs on a 550MHz XScale 32 bit processor with 64Mbytes of RAM. The next few months would be spent by the research team on debugging and preparing the device for commercial use.
Though one can question its commerical viability as questioned by an industry observer who says that since RFID is touted to be next big thing in the pervasive computing, all materials in the future will come embedded with RF identification. RFID gaurdian would keep on warning, forcing the user to turn it off to stop the incessant beeping. Well, he goes to propose another model instead - A RFID Jammer.
This device, the size of a fountain pen, could act as a shield by emitting a constant RF jamming signal capable of preventing any RFID reader within a six foot radius from reading any of your RFID data. Now there is a device worth having.
Surely, the scientist from amsterdam is also listening. Expect some surprise too.
Thursday, December 14, 2006
RFID companies still not ready for growth, says expert
Frost & Sullivan recently reported that the total North American RFID market for manufacturing and logistics is predicted to grow at a compound annual growth rate of nearly 20 percent over the next six years. Yet, about 75 percent of the technology companies responding to a CompTIA survey earlier this year said there aren't enough people trained in the field. Eighty-percent said they believe that a lack of talent will hinder RFID adoption.
David Sommer, VP of e-business and software solutions at CompTIA, who speaks often about the looming shortage of RFID-trained workers, said that many factors are converging to promote RFID growth, but companies must focus on training workers to make sure the technology will work for them.
Global standards, interoperability, and declining prices are working in favor of rapid adoption, said Sommer, who worked with more than 20 organizations to develop CompTIA's professional RFID certification program. Sommer said he does not believe that there is a "magic number" for calculating when the cost of RFID technology will be low enough to trigger widespread adoption.
"We've seen where the tag itself, the semiconductor with the antenna, has gotten down to the 10- to 17-cent level," he said during a recent interview, adding that the prices vary depending on how companies deploy the technology. "The costs are continuing to decrease to the point where they are becoming very attractive."
In 2007, consumers will begin seeing more RFID tags on individual items. They will appear on higher-end electronics and pharmaceuticals before they make it into everyday products, he said.
"You're going to see them on expensive items, things that are easily counterfeited," he said. "It will be a ways down the road before you see it on the item level on something like toothpaste. It's a question of time and economics."
Eventually, when RFID is used in personal items such as clothing, retailers are likely to use technology that allows consumers to have the tags "killed" at checkout counters.
Item level RFID - the prosperous market 2006-2016
Item level RFID is the tagging of the smallest taggable unit of things - the library book, apparel, jewellery, engineering parts and laundry are examples. Already profitable for most suppliers, item level tags and systems will be the world's largest RFID market by value from 2007 onwards. Item level RFID tagging will rocket from $0.16 billion in 2006 to $13 billion in 2016 for systems including tags. In 2006, 0.2 billion items will be RFID tagged in the world. In 2016, 550 billion items may be RFID tagged. Those adopting item level tagging today do so willingly and are prepared to pay for good performance as they enjoy rapid multiple paybacks.
- Suitable for Electronic Product Code EPC coding/mass serialisation and open systems
- Small
- Made in millions to trillions yearly
- Need to read items individually but also many at a time
- Proximate metal and/or water
- Potential paybacks rarely worth more than a few percent of the value of the item tagged
- Tags need to be disposable or fitted for life
- Unquantifiable safety and security benefits are often sought and achieved
The US Food and Drug Administration will make tagging of up to 20 billion prescription drugs a legal requirement in the US, the TREAD Act will create a tire tagging market in the US and many new high priced retail items will enjoy the excellent paybacks currently found with apparel in the UK, China and Japan. China will rapidly adopt item level tagging. Globally, healthcare supplies, tools and assets are being urgently fitted with RFID for safety, security and cost control, including theft reduction. Boeing and Airbus are progressing the tagging of aircraft parts and equipment. Over ten million test samples for blood (Europe) and milk (New Zealand), drug research and other uses have been tagged with the potential of billions yearly.
However, it is challenging to meet the most sophisticated requirements for item level tagging and to evolve appropriate technical specifications and approval procedures for, say, mission critical aircraft parts. At the other extreme it is tough to get down to the price that justifies tagging a can of soda in a supermarket or a letter. Item level tagging has therefore started with the many lucrative intermediate requirements as shown below and it is rapidly widening in scope.
Source: IDTechEx
Source: IDTechEx
* May rise to 1000 in ten years as East Asia expands
Source: IDTechEx
Sunday, December 10, 2006
TI inks RFID smart label deal
Under the deal, TI becomes the primary supply of ultra-high frequency EP Gen 2 flexible inlays for new Moore Wallace RFID labels.
Specifically, TI's RF silicon components would be inserted into Moore Wallace's RFID thermal transfer labels, which customers can encode with RFID as well as print barcodes and text onto. The result is a label that is EPC Gen 2 ready.
Gen 2 is currently being reviewed by the International Standards Organization as the first global RFID technology standard. It is widely expected to get the green light from the ISO by early next year.
Under the deal, Moore Wallace would be able to make more than 500 million Gen 2 smart labels annually using TI silicon.
"[The deal] is unprecedented from the context of Gen 2 production readiness," said Enu Waktola, TI's EPC retail supply chain marketing manager.
Terms of the agreement were not disclosed.
This likely would be the first of many deals with RFID label markers for TI's Gen 2 inlays, said Erik Michielsen, director of RFID at ABI Research.
"This is significant in that it demonstrates how RFID solutions are ramping up for high-volume Gen 2 deployments," said Michielsen. "This is a big step for TI in that this is probably is the initial opening announcement for their Gen 2 label partners. I imagine there'll be more to come."
Waktola said the agreement with Moore Wallace was not exclusive and that TI also is working with other label makers.
It makes sense that TI struck its first Gen 2 label-making deal with Moore Wallace, one of the world's biggest makers of RFID labels, since the companies have been working together on RFID since 1998. "We are leveraging the relationship and production capabilities that we can bring together to the market," Waktola said.
While smaller silicon makers, notably Impinj, are also marketing Gen 2 inlays, Michielsen said partnerships between large companies such as TI and Moore Wallace give the RFID industry Gen 2 supply stability and clout. "It sheds a positive light on the future for Gen 2," he said.
The TI-Moore Wallace deal also points to where Gen 2 RFID product volumes are headed next year, Michielsen said.
Moore Wallace sells its RFID labels to between 30% and 40% of so-called compliance program suppliers in the US today, said Nancy Mitchell, Moore Wallace's RFID product manager. That is, companies who comply with the RFID mandates of large goods purchasers such as Wal-Mart, Target and the US Department of Defense.
Most of Moore Wallace's RFID customers are consumer goods product makers, Mitchell said. Industrial manufacturers, which include the DoD, are its next-largest group of customers, followed by pharmaceutical makers. While drug makers are fast adopting RFID, she expects this customer mix to remain unchanged for the next year or so.
TI's Waktola said she expects Gen 2 RFID hardware, such as readers and printers, to be on the market this quarter.
The new Moore Wallace smart labels are currently being sampled, with full production slated for later in the third quarter.
Mitchell said a number of consumer goods makers have already begun pilots of the labels and she expects them to convert to Gen 2 during the next two quarters.
Moore Wallace has distribution channels for the new labels in Asia, Europe and North and South America, she said.
Currently, the company would just manufacture the Gen 2 labels in North America and expects production at its plants in Asia, Europe and South America at some future point. "We've been discussing that internally but don't have any specific timelines," Mitchell said.
Saturday, December 9, 2006
RFID virus created
In a paper entitled "Is your cat infected with a computer virus?" presented before the IEEE International Conference on Pervasive Computing, three Netherlands-based researchers show how RFID tags can carry malware and propagate via databases along the supply chain.
"The security breaches that RFID deployers dread most - RFID malware, RFID worms, and RFID viruses - are right around the corner," wrote the study's principle researcher, Melanie Rieback, an American PhD student at Vrije university in Amsterdam.
The sky is not falling, of course, and the paper's main message seems to be that RFID software should not implicitly trust the data it pulls off RFID tags. It should be subject to the same security check as any potentially untrustworthy user input.
The paper's title refers to a hypothetical scenario outlined in the paper's introduction, in which a household pet implanted with an infected RFID tag is able to spread an infection to a veterinarian's computer system, with damaging consequences.
Rieback, and fellow researchers Bruno Crispo and Andrew Tanenbaum, found they were able to execute an SQL injection attack against an Oracle database and Apache web server using 127 characters of data stored on a cheap RFID tag.
SQL injection attacks are well-known from the web applications world. Using escape characters and SQL queries, crackers are sometimes able to interface directly with a back-end database, amending or deleting data as they see fit.
In Rieback's scenario, the virus uses SQL injection to write itself to a database whenever the infected tag is scanned. In a real-world scenario, this scan could happen when a pallet of goods arrives at a store or warehouse. New tags entering the system would have the viral code written to them.
"The manipulation of less than 1 Kbits of on-tag RFID data can exploit security holes in RFID middleware, subverting its security, and perhaps even compromising the entire computer, or the entire network," she wrote.
Rieback's paper outline a few other types of attack that could work from RFID tags. Even though RFID tags are limited in the amount of data they can store, she found that buffer overflow attacks are even possible, due to looping commands permitted by the RFID spec.
The research could open intriguing new possibilities in the field of virus propagation research.
Old floppy disk viruses spread along social networks, as friends and colleagues physically swapped disks and used them on their own computers. In a similar way, mobile phone viruses that spread via Bluetooth also require physical proximity to spread, much like their biological counterparts.
Email worms also spread along social lines, but over greater distances, using their victim's address books to find targets. Network worms have tended to have simple algorithms for randomly generating IP addresses to attempt to spread to.
There are not believed to be any recorded cases of malware designed to spread along the supply chain, but the new research seems to indicate that is at least a possibility.
Friday, December 8, 2006
Nike + iPod Sport Kit RFID Flaw
But researchers from the University of Washington think that a security flaw in the Sport Kit (which uses an active RFID tag) lets stalkers also monitor runners. They claim that someone with a scanner can track a jogger's regimen from a distance of up to 60 feet, even from a car. They could go as far as skimming RFID data and recording jogging times and even plotting routes on Google Maps for later use. [Info Shop via RFID News]
While this potential threat shouldn't be taken lightly, one thought comes to my mind. The average human being isn't going to go to such lengths. Anyone who does go to all that effort to stalk someone doesn't need to utilize the Sport Kit flaw to do so. Their sickness would prompt them into doing it by other methods. In this scenario, I think, it's the person and not the technology that's to blame. On the other hand, this flaw can be exploited by more than just stalkers, possibly encouraging borderline personalities into surveillance activities that they might not otherwise bother with.
Source : RFID Gazette
Monday, December 4, 2006
RFID tags used to teach English
For example, here is a picture of little kids touching a fire truck with a RFID tag and trying to find the correct answer (Credit: Purdue University).
Here is how — and why — MMC works according to "Learning with Merlin"
(Purdue University Insights, Fall/winter 2005).
Below is a picture of Amicia Elliott and Alexei Czeskis, the two students who developed Merlin’s Magic Castle (Credit: Purdue University).
Merlin’s Magical Castle (MMC) is designed to be a fun way to supplement classroom education. Whether in school or at home, children can find learning exciting with this tool. A friendly wizard greets the children at the start of the computer game and gives them various options of what they can do. There is an assortment of games a player can choose from, such as: Trivia Game, Scavenger Hunt, Fill in the Blanks, Category Quest, etc.
These games involve interaction between the toys of interest and the computer, which can identify the scanned toy and give the children feedback as they play. For example, in the Trivia game, Merlin gives the player a hint about the toy that he is looking for. If the player scans the correct toy, Merlin cheers, if the toy that was brought to Merlin was incorrect, he’ll offer another hint. Category Quest, presents the player with a toy and asks them to find other toys that are similar. This game involves abstract thinking — one has to be able to identify the similarity between a dog and a cat because both have four legs.
MMC comes equipped with computer software, a scanner, and electronic tags which are embedded into appropriate objects. In the current version of MMC, tags are implanted in toys. When this toy is brought near the antenna, the tag is scanned and its identification number is sent to the computer. The computer will then identify the toy.
Now the students plan to sell licenses to their software to established companies such as the Walt Disney Company or toy manufacturers like Mattel and Hasbro. Good luck to them!
Sources: Various web sites
Sunday, December 3, 2006
India Adopts 865-867 MHz for RFID
In a move expected to kick-start RFID adoption among Indian companies, regulators in India recently designated UHF RFID spectrum in accordance with the frequencies used by Europe and the United States.
The Wireless Planning and Coordination (WPC) wing of India's Ministry of Communication assigned the 865-867 MHz UHF band for use by radio frequency identification devices. The ruling was part of a process initiated by EPCglobal India, a joint industry-government initiative that is leading the development of electronic product code to support the use of RFID.
"India has a strong export economy, so getting this spectrum was an absolute must," says Ravi Mathur, CEO of EPCglobal India, which is based in New Dehli.
Clearing the spectrum in India will enable Indian manufacturers to tag shipments of goods to meet the UHF RFID requirements of customers in Europe and the United States. Prior to the ruling, each use of the UHF spectrum for RFID required special permission from the WPC. Until now, Mathur maintains, some Indian pharmaceutical companies supplying tagged shipments to Wal-Mart have been forced to do so after the products have already arrived in in the United States, where the UHF spectrum for RFID is 902 MHz to 928 MHz. Because Wal-Mart and other retailers are requiring more of their suppliers to tag shipments of goods, Indian companies will increasingly be expected to tag their exports, as well.
Tags that comply with EPCglobal's Gen 2 standard are designed to operate between 860 MHZ to 960 MHz without degradation in performance. Thus, Indian companies will now find it much easier to encode and read tags on goods shipped, regardless of whether those goods are bound for the United States or Europe (where the UHF spectrum for RFID is is 865 MHz to 868 MHz).
Being able to use the 865-867 MHz UHF band for RFID will also be a boon to India's high-tech businesses. "The Indian software industry is in a position to be a major provider of RFID systems solutions [to the United States and Europe], but it needs to be able to test and develop RFID. In addition, chip manufacturers are also in discussions about producing RFID chips in India. With the spectrum allocated, Indian companies can work with UHF RFID without requiring special clearance," says Mathur.
EPCglobal India is also hoping to see an Indian university become one of the Auto-ID Labs—a federation of research universities that has evolved from the now-defunct Auto-ID Center and is dedicated to researching and developing new technologies and applications for revolutionizing global commerce.
India had originally considered allocating 2.4 GHz as the spectrum for UHF RFID, but EPCglobal India argued that having UHF spectrum incompatible with that used by the United States, Europe and other key markets would have seriously limited the ability of India's businesses to stay in step with RFID adoption elsewhere around the world.
"Our objective was to ensure that RFID spectrum in India would [provide] important access to the world markets," says Mathur.
EPCglobal India says its petition to the WPC faced initial opposition from both India’s military and railways, which had previously had had access to the 865-867 MHz spectrum. In its application to the authority, EPCglobal says it was supported by allocation of the UHF spectrum that had already taken place in the United States and Europe.
Source : RFID Journal
Saturday, December 2, 2006
What is RFID
Metal has a shielding effect. Unlike barcodes the RFID technology provides the possibility of re-programming identification and/or object data on the tag whenever it is required, which means the tag can be written electronically.
A basic RFID system consists of three components: reader, antenna (connected to the reader) and a tag, attached to the object to identify.
Tags come in various types. There are tags of different memory sizes or they are categorized as either read-only or read-write tag. Therefore, scemtec developed the so-called “multi-standard” reader, a reader, especially developed to read and write to any type of tag.
At present RFID systems usually operate at 125 kHz or 13,56 MHz in Europe. scemtec offers multi-standard readers for both frequency ranges.
Tags have numerous advantages. A summary:
- Tags are used to identify and trace any kind of objects, for example containers Identification of the object does not require line of sight. That means, opening of the container is no longer required and it stays intact
- The data transfer from tag to reader is not affected by dirt, ice, water , scratches etc. The tag could even be embedded in plastic
- A variable data storage allows in-use data modifications
- Process security is given due to the circumstance that password protected tags additionally could be encrypted in order to prevent others than the authorized readers from reading or modifying data
- High data security because of the fact that transponder data are complete, unchanged and saved at any time
- Certain tag types allow a simultaneous reading of several tags (anti-collision mode)
- Product identification
- Process- ad production control
- Process- and production inspection
- Warehouse management
- Merchandise protection
- Merchandise tracking
- Ticketing
- Access control
- Animal identification
- Container identification
- Sports-Timing
- Traffic control
Source : Scemtec
Friday, December 1, 2006
Solar Powered RFID Reader Measures Road Traffic
New York State currently monitors traffic flows on certain roads via 15 permanently stationed readers, which collect data from the EZPass tags. The new solar-powered portable solution provides a method of monitoring traffic flow for situations where it's too costly or unnecessary to install a permanent RFID reader—such as on roads where construction is underway, or on those traveled heavily only for special events.
The portable RFID unit, dubbed mGate, connects to a laptop computer via a USB cable, with batteries charged by a solar panel. Operators load the unit onto a trailer hitched to a truck for transport. When deployed alongside a road, the unit’s laptop sends the encrypted tag ID, timestamp and reader location via a wireless Internet connection to the Rensellaer server.
The system will ultimately be used to calculate how long it takes traffic to move from one installed RFID reader to another. However, the current pilot is only testing read rates. Eventually, traffic data from the mGate system could be used to reroute traffic when congestion looms, or to alert motorists via signage or the Internet about slow-moving road conditions, reducing the need for employees to identify problems as they arise.
Researchers received a $3.9 million grant from the Federal Highway Administration (FHWA) to fund the program, says Jeffrey Wojtowicz, a research engineer in civil and environmental engineering at Rensselaer.
Source : RFID Journal
Groundbreaking FDA Approval of RFID Technology
Blog Archive
-
▼
2006
(23)
-
▼
December
(13)
- IBM's RFID tech to combat fake pharmaceuticals
- Your secrets not so safe with RFID-enabled passports
- Here comes RFID Gaurdian -Is it the Nemisis of RFID ?
- RFID companies still not ready for growth, says ex...
- Item level RFID - the prosperous market 2006-2016
- TI inks RFID smart label deal
- RFID virus created
- Nike + iPod Sport Kit RFID Flaw
- RFID tags used to teach English
- India Adopts 865-867 MHz for RFID
- What is RFID
- Solar Powered RFID Reader Measures Road Traffic
- Groundbreaking FDA Approval of RFID Technology
-
▼
December
(13)