Home Internet of Things Aerospace Apparel Energy Defense Health Care Logistics Manufacturing Retail

Security White Papers

  • Underappreciated and Unheralded: 433 MHz RFID Vehicle ID, Gated Entry, Asset and Personnel Tracking Applications
    Published July 2010
    Douglas L. Cram of cramZ Marketing Services explains why he believes the 433 MHz frequency holds the key to increased levels of security, customer satisfaction, return on investment and profitability with regarding to applications involving vehicle identification, gated entry, and the tracking of assets and personnel. (3 pages)
    Tags: Security
  • Physical Asset Management and IT Security
    Published April 2010
    Information technology involves virtual assets and transactions, but security vulnerabilities may lurk in its physical foundations. Jim Caudill, Xterprise's senior VP of marketing and strategy, explains how identifying, tracking and managing risks to physical servers, storage devices and network hardware can help close security gaps that can not be addressed by electronic asset management. This document outlines RFID methods to integrate IT security across physical and virtual domains.
    Tags: Security
  • Using PNR as a New Approach to Enhancing RFID Channel Security Via Direct Sequence Spread Spectrum (DSSS)
    Published March 2010
    Salman Altaf and Mumtaz A. Kamala, of the University of Bradford School of Computing, Information and Media, and Qudoos Yousuf, of Innovation North Leedsmet University, outline how retailers, manufacturers, hospitals, federal agencies and other organizations can use RFID to improve functionality and product quality, and maintain a good checks-and-balances system, without experiencing data security and privacy vulnerabilities. The authors discuss a proposed technique for preventing data leakage and providing protection against eavesdropping and interference, by spreading spectrum over the wideband, utilizing a suitable pseudorandom (PNR) code. (7 pages)
    Tags: Security
  • SmartDEGREE from TCS to Combat Certificate Malpractices
    Published October 2009
    Tata Consultancy Services' Chandrashekar Mudraganam explains how to employ radio frequency identification to curb fake degree certificates issued by universities, which can pose a threat to the integrity of degree holders and educational institutions alike. TCS has successfully implemented this solution at the University of Hyderabad, in India, since 2007. (9 pages)
    Tags: Security
  • End-to-End Encryption and Chip Cards in the U.S. Payments Industry
    Published September 2009
    In this position paper, the Smart Card Alliance clarifies and defines end-to-end encryption, detailing which types of problems such encryption can help address. This document explores the advantages of an alternative strategy for protecting cardholder data—moving data protection to the payment card itself, using chip-card technology—and proposes the use of contactless chip cards, including a dynamic cryptogram with each transaction and authorizing transactions online. (12 pages)
    Tags: Security
  • Secura Key Radio Key Technology
    Published August 2009
    Radio Key is Secura Key's brand name for its 125 kHz proximity cards. Radio Key cards, key tags and interrogators employ proximity technology and are suitable for a variety of applications, including access control, time and attendance, membership, parking, fuel management, and more. This document outlines basic operation, credentials, control applications and uses for non-access applications, to familiarize applications providers, consultants, resellers and end users with the capabilities of Radio Key. (9 pages)
    Tags: Security
  • Secura Key e*Tag Technology
    Published August 2009
    e*Tag is Secura Key's brand name for its 13.56 MHz contactless smart cards. e*Tag cards, key tags, labels, interrogators and reader-writers employ 13.56 MHz ISO 15693 technology and are suitable for a variety of applications, including access control, time and attendance, membership and loyalty programs, logical access, storage of biometric templates, parking and ePurse, fuel management, data retrieval, asset and inventory management, data collection and more. This document provides an overview intended to familiarize applications providers, consultants, resellers and end users with the capabilities of e*Tag. (11 pages)
    Tags: Security
  • Improving Security With Identification Printing
    Published August 2005
    Zebra Technologies explains how to improve security with identification printing solutions, featuring bar-code, radio frequency identification, graphics, logos, digitized photos and text, with real-world examples of how companies and law enforcement agencies have benefited from ID card and label printing technology.
    Tags: Security
  • The Role of Chips in Making Identification Documents More Secure
    Published July 2005
    With the United States taking enormous strides toward strengthening its homeland security in the years following the terrorist attacks of Sep. 11, 2001, Infineon Technologies examines the use of chip-based identification in ePassports, as well as the role of education in assuaging public concerns. For further information about this white paper, please contact saswato.das@infineon.com.
    Tags: Security
  • ASEMC: Authentication for a SEcure M-Commerce
    Published June 2005
    This white paper, written by Christina Braz and Esma Aimeur, describes a user-centered security authentication system against fraud, counterfeit and theft for the mobile commerce domain, specifically for mobile devices. This, the authors assert, is achieved through a microprocessor chip implanted under human skin.
    Tags: Security
PREMIUM CONTENT
Case Studies Features Best Practices How-Tos
RFID JOURNAL EVENTS
Live Events Virtual Events Webinars
ASK THE EXPERTS
Simply enter a question for our experts.
TAKE THE POLL
JOIN THE CONVERSATION ON TWITTER
Loading
RFID Journal LIVE! RFID in Health Care LIVE! LatAm LIVE! Brasil LIVE! Europe RFID Connect Virtual Events RFID Journal Awards Webinars Presentations