Scottish Startup Promotes Silent Tags

By Mary Catherine O'Connor

A system developed by Friendly Technologies uses the privacy mode found in NXP's Icode and Ucode chips to keep tags from being read by unauthorized parties.

Friendly Technologies, a startup company based in Aberdeen, Scotland, has developed what it claims is a means by which RFID technology can be used in the retail industry without compromising high standards for security or consumer privacy.

Friendly Technologies employs off-the-shelf passive RFID tags and interrogators, but uses them in a novel way and with the aid of a software platform it developed in-house. Rather than interrogating the RFID tags in order to collect the unique code encoded to each tag's memory, Friendly Technologies' Silent Tag software queries a group of tags by broadcasting their passwords and asking the tags to respond affirmatively when their numbers are broadcasted. To accomplish this, the company employs RFID tags that utilize NXP Semiconductors' chips—either the Icode for high-frequency (HF) passive tags (compliant with the ISO 14443 standard), or the Ucode for ultrahigh-frequency (UHF) tags (compliant with ISO 18000-6C and EPC Gen 2 standards). These chips have a special function known as a privacy mode, in which the chip is set to respond only when a password is presented, rather than respond to any reader that tries to interrogate it.


Humberto Morán

In the case of tags carrying the Icode chip, the passwords are assigned to the chip's memory at the point of manufacture, and cannot be altered, so an end user would not have the ability to assign its own password to those HF tags. With UHF tags carrying Ucode chips, however, an end user has more flexibility. It could choose to use a unique chip ID embedded in the chip memory as the password, or to select and assign its own unique password, using Friendly Technologies' software. However, says Humberto Morán, Friendly Technology's founder, the company plans to develop its own RFID tags in the long run, using printed chips that would be customizable so customers could choose either a fixed password or assign their own password to each chip.

In a retail environment, as envisioned by Friendly Technologies, products are tagged at the item level and the entire store—from the back room to the sales floor—is divided into zones, with an RFID interrogator assigned to each zone. As products are tagged and entered into inventory, each item is assigned to a zone within that location. The Friendly Technologies software manages the network of readers and associates a list of tag privacy passwords to each zone. The interrogator in each zone continuously polls that zone by making a query for each tag using the tag's privacy password—essentially, taking attendance of the population of tags within its interrogation zone. If any tag assigned to the zone does not respond, the software instructs the readers in the adjacent read zones to poll for that tag until it is located, at which point it is associated with that new zone. Using this approach, the software can track the movement of tagged items from one zone to another.

Only readers networked into the Friendly Technologies software platform in that store would have access to the database of tag privacy passwords. Therefore, if a third party were to bring an RFID reader into the store, it would not be able to read the tags or track their movements within that location.

Morán contends that the Silent Tag system would protect personal privacy. "Silent tags can only be found if you have a relative certainty of the location of the tag [and if you know the tag's password]. Whereas with EPC [Electronic Product Code], you can just look for everything in the reader's range, so you could take a reader onto a subway every day and, over time, you might start to detect the same tags and eventually associate a single tag ID with a specific person—because it is attached to something they carry every day—and use that ID to identify the person."

Silent Tag technology has been tested in a laboratory setting, Morán says, and the company is actively engaging with partners to perform pilot projects within retail environments. Friendly Technologies, he adds, also hopes to develop a system by which retailers could offer customer a means of storing the tag privacy passwords assigned to their purchased items on RFID-enabled cell phones. Customers would then use their phones to identify their tagged purchases for various applications related to product registration, or participation in warranty programs—or merely to take inventory of items in their closets or cupboards.

In addition, Morán says he is heading a project that would create a wide-ranging consortium of technology and government partnerships to develop a system for expanding the deployment and impact of RFID systems throughout both industry and society. He has already received support from 24 government and industry partners, he indicates, including the European Research Consortium for Informatics and Mathematics (ERCIM), the European Telecommunications Standards Institute (ETSI) and Tagsys, that are interested in participating in the project, known as the Socially-acceptable, Affordable, Environmentally-friendly Internet of Things, or SAFE-IOT.

The group is seeking €9 million ($12.8 million) in funding from the European Commission to develop the framework by which the Silent Tag architecture would be implemented globally, using a decentralized architecture with open and common standards. Morán's ultimate goal, he says, is to create an Internet of things wherein "data follows objects as they move." An important element of this design, he notes, would be to have cheap, printable RFID tags that could be associated with multiple identities, for use by different supply chain partners, and fortified by the data security and privacy protections he is presently developing at Friendly Technologies.

Morán says he expects to learn in January 2010 whether the European Commission will approve the SAFE-IOT funding request. "If the EC does not fund SAFE-IOT, the partners have agreed to keep looking for funding possibilities," he states. "Most partners are willing to finance some R&D with internal resources, yet not at the scale made possible by the EC funding."