SlideShare uma empresa Scribd logo
1 de 11
By: Grace Li RFID&Government-Issued Documentation
Introduction RFID – automatic identification technology First used in WWII Purpose of slidecast is to inform consumers of: The technology Current uses Benefits and risks in government-issued documentation
The Technology A wireless version of a barcode scanner Differ in: Amount of storage Read method Read speed A basic RFID system consists of: A RFID tag A reader A controller
RFID Tag Consists of an integrated circuit & an antenna Can be passive or active Depending on whether it has its own power source Passive tags cost less Source: http://www2.ministries-online.org/biometrics/rfidchip2.html
RFID Reader & Controller Reader include a radio frequency transceiver and one or more antennas. Can be either connected to an external controller or embedded in the control itself Differ in size Collect much more data than necessary Controller To filter and interpret data
Interactions Among Components RFID tag read by the reader Reader transfers the information received to controller to be filtered.
Current Uses Supply chain management ID cards, fare cards Can be inserted into human In medical bracelets Passports and driver’s licenses
Benefits Enhancing global civil aviation safety Improving efficiency of aviation operations Provide assurance that documents are genuine and unaltered
Risks RFID tags cannot be “turned off” Skimming Eavesdropping Tracking Cloning
Security Precautions Skimming – metallic element Not adequate Eavesdropping – Basic Access Control Tracking – Random Unique Identification Cloning – Public Key Infrastructure Can still distinguish nationality of ePassport holders Driver’s licenses: Off-switch mechanism
Conclusion Consumer concerns are Valid Not subdued Risks are still present Consumers should be given a choice

Mais conteúdo relacionado

Mais procurados

RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
avinash yada
 
11010673 pt8
11010673 pt811010673 pt8
11010673 pt8
lkk1368
 
11013842 pt8
11013842 pt811013842 pt8
11013842 pt8
wwm1123
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
Amit Ranjan
 

Mais procurados (20)

RFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPTRFID BASED ATTENDANCE SYSTEM PPT
RFID BASED ATTENDANCE SYSTEM PPT
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 
RFID based Attendance System
RFID based Attendance SystemRFID based Attendance System
RFID based Attendance System
 
15251675 pps-ans
15251675 pps-ans15251675 pps-ans
15251675 pps-ans
 
Facts seminar
Facts seminarFacts seminar
Facts seminar
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
11010673 pt8
11010673 pt811010673 pt8
11010673 pt8
 
15218473 pss7-ans
15218473 pss7-ans15218473 pss7-ans
15218473 pss7-ans
 
15215288 pss7 ans
15215288 pss7 ans15215288 pss7 ans
15215288 pss7 ans
 
RIFD Application
RIFD ApplicationRIFD Application
RIFD Application
 
RFID Based Access Control And Proximity Security System.
RFID Based Access Control And Proximity Security System.RFID Based Access Control And Proximity Security System.
RFID Based Access Control And Proximity Security System.
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
11013842 pt8
11013842 pt811013842 pt8
11013842 pt8
 
RFID Applications
RFID ApplicationsRFID Applications
RFID Applications
 
Arduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access SystemArduino RFID Module (RC522) & Buzzer Access System
Arduino RFID Module (RC522) & Buzzer Access System
 
13251473 pss7
13251473 pss713251473 pss7
13251473 pss7
 
Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 

Semelhante a RFID & Government Issued Documentation

RFID Application
RFID ApplicationRFID Application
RFID Application
RainySiu
 
Mr. Shan Senthil - effectiveness of rfid technology enhancing supply chain ma...
Mr. Shan Senthil - effectiveness of rfid technology enhancing supply chain ma...Mr. Shan Senthil - effectiveness of rfid technology enhancing supply chain ma...
Mr. Shan Senthil - effectiveness of rfid technology enhancing supply chain ma...
kuwaitsupplychain
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
Alexander Decker
 

Semelhante a RFID & Government Issued Documentation (20)

13252976 pss7
13252976 pss713252976 pss7
13252976 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
16224213 pss7
16224213 pss716224213 pss7
16224213 pss7
 
12200786 pss7
12200786 pss712200786 pss7
12200786 pss7
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
POXO RFID Access control ppt.pptx
POXO RFID Access control ppt.pptxPOXO RFID Access control ppt.pptx
POXO RFID Access control ppt.pptx
 
15213897 pss7
15213897 pss715213897 pss7
15213897 pss7
 
A Security Framework in RFID
A Security Framework in RFIDA Security Framework in RFID
A Security Framework in RFID
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
15251640 pss7
15251640 pss715251640 pss7
15251640 pss7
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
RFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCMRFID, a great potential for Operations and SCM
RFID, a great potential for Operations and SCM
 
Mr. Shan Senthil - effectiveness of rfid technology enhancing supply chain ma...
Mr. Shan Senthil - effectiveness of rfid technology enhancing supply chain ma...Mr. Shan Senthil - effectiveness of rfid technology enhancing supply chain ma...
Mr. Shan Senthil - effectiveness of rfid technology enhancing supply chain ma...
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
 
15251179 pss7
15251179 pss715251179 pss7
15251179 pss7
 
SANTOSHA.pptx
SANTOSHA.pptxSANTOSHA.pptx
SANTOSHA.pptx
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

RFID & Government Issued Documentation

  • 1. By: Grace Li RFID&Government-Issued Documentation
  • 2. Introduction RFID – automatic identification technology First used in WWII Purpose of slidecast is to inform consumers of: The technology Current uses Benefits and risks in government-issued documentation
  • 3. The Technology A wireless version of a barcode scanner Differ in: Amount of storage Read method Read speed A basic RFID system consists of: A RFID tag A reader A controller
  • 4. RFID Tag Consists of an integrated circuit & an antenna Can be passive or active Depending on whether it has its own power source Passive tags cost less Source: http://www2.ministries-online.org/biometrics/rfidchip2.html
  • 5. RFID Reader & Controller Reader include a radio frequency transceiver and one or more antennas. Can be either connected to an external controller or embedded in the control itself Differ in size Collect much more data than necessary Controller To filter and interpret data
  • 6. Interactions Among Components RFID tag read by the reader Reader transfers the information received to controller to be filtered.
  • 7. Current Uses Supply chain management ID cards, fare cards Can be inserted into human In medical bracelets Passports and driver’s licenses
  • 8. Benefits Enhancing global civil aviation safety Improving efficiency of aviation operations Provide assurance that documents are genuine and unaltered
  • 9. Risks RFID tags cannot be “turned off” Skimming Eavesdropping Tracking Cloning
  • 10. Security Precautions Skimming – metallic element Not adequate Eavesdropping – Basic Access Control Tracking – Random Unique Identification Cloning – Public Key Infrastructure Can still distinguish nationality of ePassport holders Driver’s licenses: Off-switch mechanism
  • 11. Conclusion Consumer concerns are Valid Not subdued Risks are still present Consumers should be given a choice