RFID technology uses radio waves to automatically identify objects. It consists of RFID tags containing data, readers to retrieve data from tags, and a controller to filter the data. Current uses include ID cards, passports, and driver's licenses to enhance security and efficiency. However, risks include tracking, eavesdropping, and cloning without an off switch. While security precautions are taken, consumer concerns over privacy risks are still valid.
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
RFID & Government Issued Documentation
1. By: Grace Li RFID&Government-Issued Documentation
2. Introduction RFID – automatic identification technology First used in WWII Purpose of slidecast is to inform consumers of: The technology Current uses Benefits and risks in government-issued documentation
3. The Technology A wireless version of a barcode scanner Differ in: Amount of storage Read method Read speed A basic RFID system consists of: A RFID tag A reader A controller
4. RFID Tag Consists of an integrated circuit & an antenna Can be passive or active Depending on whether it has its own power source Passive tags cost less Source: http://www2.ministries-online.org/biometrics/rfidchip2.html
5. RFID Reader & Controller Reader include a radio frequency transceiver and one or more antennas. Can be either connected to an external controller or embedded in the control itself Differ in size Collect much more data than necessary Controller To filter and interpret data
6. Interactions Among Components RFID tag read by the reader Reader transfers the information received to controller to be filtered.
7. Current Uses Supply chain management ID cards, fare cards Can be inserted into human In medical bracelets Passports and driver’s licenses
8. Benefits Enhancing global civil aviation safety Improving efficiency of aviation operations Provide assurance that documents are genuine and unaltered
9. Risks RFID tags cannot be “turned off” Skimming Eavesdropping Tracking Cloning
10. Security Precautions Skimming – metallic element Not adequate Eavesdropping – Basic Access Control Tracking – Random Unique Identification Cloning – Public Key Infrastructure Can still distinguish nationality of ePassport holders Driver’s licenses: Off-switch mechanism