Tagged: authentication Toggle Comment Threads | Keyboard Shortcuts

  • Editing Team 11:43 on October 24, 2013 Permalink | Reply
    Tags: authentication, , , medicine,   

    RFID to Authenticate Traditional Chinese Medicines 

    LSCM-Hong-Kong-authenticate-traditional-Chinese-medicines-RFID-blogThe Hong Kong R&D Centre of Logistics and Supply Chain Management Enabling Technologies (LSCM) is conducting a pilot project in Hong Kong to examine the use of RFID in authenticating traditional Chinese medicines (TCM) in the retail setting.

    The pilot involves placing RFID tags on packs of TCM during manufacturing which can then be read using a scanner in-store.

    Partners of the project include companies such as Chinese Pharmaceuticals, Eu Yan Sang, Hin Sang Hong, Ling Nam Medicine Factory and Wisdom Come.

    The project, with the registered trademark Authen√Tick, involves setting up an authentication network with “secured communication and reliable authentication processing between third-party operated readers and authentication platform through the open Internet”.

    In the LSCM’s latest newsletter it notes that when a product with an RFID tag embedded in package connects with an RFID reader, an authentication check would be processed with the result known in a few seconds.

    “Product information such as product ingredients and laboratory test certifications can also be simultaneously acquired,” it says. The pilot also plans to use QR codes on packs so that consumers can use their own smartphones for product information checking.

     
  • Editing Team 16:49 on October 21, 2013 Permalink | Reply
    Tags: authentication,   

    IBM Introduces NFC-based Dual-factor Authentication System 

    IBM-NFC-dual-factor-authentication-system-rfid-blogAlthough dual-factor authentication is becoming a popular trend in keeping online accounts and services secure, IBM is claiming that current systems are already getting a bit old and should be updated to a mobile device era, with the inclusion of NFC.

    As the name implies, dual-factor authentication involves two steps. The first is the regular user name and password used to login via a web browser or app, which, in fact, offers little security and is susceptible to hacks. Thus, a second step is needed that involves something a user already has and isn’t easy to get access to: his or her smartphone. Usually, a key is sent to a smartphone or mobile device which can then be used to complete the authentication process.

    But, according to IBM, in today’s world where users access their online services such as banks and stores via their mobile device, the smartphone becomes involved in both the first and second steps in the process, notifying the benefits of dual-factor authentication. A stolen smartphone can thus be used to access an online service and authenticate at the same time.

    The solution, according to the company, can be found in NFC, specifically, an NFC-enabled card issued by, say, a bank that is unique and specific to each user. This card becomes the second factor in authentication. The process is equally simple. A user logs into his or her bank account using a mobile app for that bank and the bank sends a key to the phone and asks for the user’s password. Once the user puts in the password, he must tap the phone to the NFC-enabled card which will calculate the key and send the information back to the bank for verification. If the wrong or no card is used, or if the user enters the wrong password, the login fails.

    This would, indeed, provide a smarter security system for fully mobile transactions, although if both smartphone and card are stolen, then you’d be out of luck. There is, however, one major hurdle to IBM’s proposal. The iPhone, which, like it or not, makes up a large percentage of mobile users, has so far still eschewed NFC technology with no indication of changing its ways any time soon.

     
  • Editing Team 18:11 on August 1, 2013 Permalink | Reply
    Tags: authentication,   

    French Vintner Le Pin Deploys NFC for Authentication 

    The French vintner Le Pin has been looking for ways to combat fraud and counterfeiting of its wine, which, the vintner says is not only expensive but difficult to prosecute. In 2012, it looked into technologies that included QR codes and holograms, etc., but found that all of these solutions could be copied using digital, laser or industrial printers.

    Now the company is using anti-counterfeiting identification technology company Selinko’s NFC solution which consists of a HF 13.56 MHz NFC-compliant RFID tag built into a wine bottle’s label, an application for an NFC-enabled phone to capture that label’s ID number, and a server to manage the collected data.

    With this technology, Le Pin’s owners can ensure that every bottle’s label is authentic, and confirm that a particular product is in a consumer’s hands.

    For Le Pin, the advantage that the NFC solution offered was its inability to be copied, says Gwennaëlle Festraets, a partner at Selinko, since each chip contains an encrypted, tamperproof digital certificate. “The entire communication is encrypted and is impossible to reproduce, even by ourselves,” she says.

     

    Le-Pin-wine-NFC-authentication-rfid-blog

     
  • Editing Team 09:07 on December 12, 2012 Permalink | Reply
    Tags: authentication, , , , , , ,   

    Stop Worrying, and Embrace RFID 

    stop-worrying-embrace-RFID-blogRadio-frequency identification (RFID) is a convenient technology of using embedded chips as a form of tracking and authentication. It is now fairly common to have pets implanted with RFID chips, so that they can be identified even without a collar.

    As more and more RFID products are being put into use, there has been a number of religious and privacy advocates opposing the technology. Yet in reality, RFID isn’t that scary, and we should embrace it.

    Now, some schools require students to wear RFID-equipped badges so they can track students’ movement on campus for funding and truancy purposes. One of the students in these schools refused to wear the badge on religious and privacy grounds. In response, the school suspended her until she agrees to use the school ID. Thus a legal battle ensued, and a judge temporarily lifted the school suspension until the case can proceed later.

    In fact, these concerns are minor and based on fear of technology. The case mentioned above is just a tinfoil hat situation on a larger scale than normal. Besides, the low-tech method of having teachers taking roll call in class is even more inconvenient and time-consuming. If this was legitimately about privacy concerns, advocates would be against roll call in school as well. Instead, this whole situation is about fear-mongering — not privacy concerns.

    Although there are some issues concerning the technology, specifically relating to other people accessing the information on the chip, this can be solved as the technology advances. Preventing unauthorized access to the chip’s data is a problem, but it can be handled with cryptography. For example, using a PIN or rolling code can thwart evil-doers successfully. Besides, some manufacturers are now concerning biometric technology on mobile devices. In the future, it may become an effective means of identification. But if you are still worried about other people reading your RFID chip, you can cover it in an RF-blocking wallet

    Behavior is the real problem here — not technology. RFID is a useful tool and it’s already being used by big companies like Wal-mart and organizations like the Department of Defense in the United States for authentication and tracking purposes.

    Yes, it’s true that RFID might be abused by some evil-doers, but it’s just like anything else and the technology isn’t inherently bad. After all, common technology like smartphones and tablets are more susceptible to nefarious use. Thus we should embrace RFID and stop worrying about the tech so much. Just give it a break.

     
  • Editing Team 07:33 on November 5, 2012 Permalink | Reply
    Tags: authentication, , , , , , ,   

    NXP Releases New NFC Tag Chips 

    NXP-NFC-tag-chips-NTAG21x-RFID-blogTo provide greater flexibility to the fast-growing NFC market, NXP Semiconductors has developed a new series of NFC HF passive RFID chips, which can support such functions as tracking which NFC tags are being used at any given time, off-line authentication via a digital signature, and the ability for a tag to count the number of times it is read.

    The company has been focusing on NFC technology development for several years, initially with chips for RFID readers embedded in mobile phones and tablets. According to Giancarlo Cutrignelli, NXP’s global marketing manager, the firm has so far sold 100 million such chips for NFC-enabled reader devices. “The market has shown tremendous growth” during the past year, he says. But NXP found that there was a shortage of NFC tag chips which are able to meet the diverse requirements of the NFC applications being launched worldwide.

    Now, the second generation of its NFC tag chips — the four chips within the new NTAG21x family — will enable the development of new tags with greater functionality to meet the diverse needs of NFC technology users.

    The four chips have varying amounts of memory:

    ■The NTAG210 chip, with just 48 bytes of user memory, is the least expensive. It is intended for the mass-market use case of tags requiring only a very simple function, such as directing a smartphone or other RFID-reading device to a URL.

    ■The NTAG213 model has 144 bytes of memory.

    ■The NTAG215 version has 504 bytes.

    ■The NTAG216 chip, at 888 bytes, has the most memory.

    All of these come with functionality that includes mirroring, a serialization service to enable that mirroring, and a counter function to count read taps and authentication signatures for authentication applications that can be read off-line by any NFC reader.

    NXP also offers a fifth chip, the NTAG 216F model, which is a version of the NTAG 216 chip that provides password protection and sleep mode.

    With all of these functions, Cutrignelli says, “We want to demonstrate that while payment is a relevant application for NFC, it is not the only application. It’s a clear commitment of NXP to proceed in the development of NFC non-payment applications.”

    NXP is now taking orders for its new chips, but the price remains unknown.

     
  • Editing Team 20:38 on October 23, 2012 Permalink | Reply
    Tags: authentication, , , ,   

    NXP Demonstrates NFC Credit Card with Capacitive Touchscreen for Further Authentication 

    NXP-NFC-credit-card-capacitive-touchscreen-rfid-blogNXP has showed off an NFC-equipped smart card with a capacitive touchscreen for further authentication.

    NXP’s work on NFC has yet to fully pay off despite the firm boasting 8 out of 10 smartphone vendors using its chips. One of the biggest fears the firm claims is not an issue, but the ability for payments to be made without the traditional layer of security which comes from a signature or a PIN being entered.

    Arne Burghardt, a system engineer at NXP showed a working prototype NFC smartphone with a capacitive touchscreen, allowing the user to enter a pattern to authorize payments. The card doesn’t have a power source and its thickness is nearly identical to that of existing credit cards.

    Burghardt said the technology will be useful to reassure those who have fears that NFC could result in unauthorized payments. He said that it will be about 2 years before cards will be in the hands of users, but credit card makers will not have to substantially alter their processes to accommodate the touchscreen.

    He added that the touchscreen resolution isn’t quite enough for a full signature. The demonstration unit did not support multitouch, however, he said that capability can be added easily.

     
  • Editing Team 21:55 on September 18, 2012 Permalink | Reply
    Tags: authentication, , , ROI, ,   

    ABI Predicts Modernizing RFID Applications to Hit $4.5 Billion by 2017 

    Traditional uses of RFID for the identification of animals, people, and within the automotive sector will increase by $2.8 billion from 2012 to 2017, ABI estimated. However, ABI Research’s new RFID Market Tracker found that modernizing RFID applications will grow twice as fast with annual revenues derived from these jumping by $4.5 billion in the same timeframe.

    “Despite the general economic malaise affecting much of the world, solutions and technologies that can deliver savings and provide wider benefit will attract investment. The business model and use case for RFID is now being better understood and real-world ROI can be demonstrated in a growing number of instances.” said John Devlin, practice director.

    The ability to add and implement greater security is another factor driving the growing adoption of RFID in both traditional and new applications.

    Devlin added, “There will be an increasing need for companies and, in particular government organizations, to be able to track and authenticate their in-house assets and equipment as well as items and products provided and sold. Think of the supply of food and pharmaceutical products, as well as consumer electronics and automotive, from the farm or point of manufacture and onto consumption and use. Similarly the installation and maintenance of large projects, e.g. transportation and utilities, are of critical importance. We expect to see increasing use of RFID ahead of alternative solutions to provide this audit trail.”

     
  • Editing Team 14:35 on August 30, 2012 Permalink | Reply
    Tags: authentication, , , ,   

    Italian Art Gallery Authenticates Its Artworks via NFC 

    Italian-art-gallery-authenticate-nfc-rfid-blogThe Italian art gallery Linea Murano Art has used NFC tags to protect the authenticity of the displayed works. Buyers as well as guests can learn about information regarding the artists and their artworks, ensuring that the objects are genuine.

    Celotto’s art is sold worldwide, with a very high price, and due to that, some counterfeiters have copied his techniques and sold their own works as his, which cheats the buyers and diminishes the value of Celotto’s creations. Thus, the art gallery wanted a technology that could prove the authenticity of the works. Besides, they also wanted a method for providing information to prospective buyers.

    They had considered utilizing an RFID system using passive high-frequency (HF) handheld or desktop RFID readers. However, as the number of NFC-enabled smartphones has grown such that they finally decided to deploy an NFC solution.

    The new system consists of NFC tags, a Samsung Galaxy Mini NFC-enabled smartphone, an NFC reader plugged into a PC, and RFID Soluzioni’s software on Linea Murano’s server, to store data of each piece of art. The system was first introduced to the public on June 28, 2012.

    Now each piece of Celotto’s art is tagged, and then the tag’s unique ID number is entered into the software on the gallery’s server, including data and photos related to the artwork.

    Visitors can place the gallery’s Samsung NFC-enabled phone, or their own NFC-enabled handset, under the glass shelf where the tag is attached to the glassware, to read the tag.

    When a customer purchases a piece of art, he/she can request to have his/her own name added to the item’s data, so that anyone using an NFC reader could view not only details about the art, but also the owner’s identity.

    Art-buying clients have shown an interest in reading the tags. However, the greatest benefit has been the assurance that the gallery can guarantee the authenticity of the work that it sells.

     
  • Editing Team 15:18 on August 29, 2012 Permalink | Reply
    Tags: authentication, , ,   

    RFID Tagging in Authenticating Secret Documents 

    tagging-authentificate-secret-document-paper-counterfeit-rfid-blogIn the old days, secret documents and important papers and envelopes were sealed with hot wax embossed with the author’s signature or signet ring. Once the seal was broken, the document could no longer be considered secure and the seal could not be reused.

    Now in this modern society, technology has developed such that it’s hard to recognize whether the information you get is the original one or not. So how can a company make sure that the certifications of compliance are genuine, and not counterfeit? Here comes RFID tagging.

    For one thing, RFID tag can be printed in between pressed pages so that you may not even know its presence at first glance. If anyone tries to tamper with the tag, the document is destroyed.

    For another, the tag can be encrypted and locked so that only authorized recipients can read them.

    In addition, RFID tags are not costly. They provide document authentication for packages, contractual agreements, official schedules, or any other critical materials that require certification of genuine origin.

    Nowadays, counterfeiters do not just counterfeit products. They forge packaging, logo, labels, compliance certificate, shipping documents, transit, and customs documents. With RFID tagging, users can be 99.9% sure that what they receive is what they ordered.

    Users can hold their document to an RFID-enabled display to recognize the presence of an RFID tag. Within a second, the smart display will access the cloud and authenticate the document. It is just a matter of software, optics, and computer power. Maybe in the future, users can also use their mobile phone, laptop, and tablet to detect it.

     
  • Editing Team 17:55 on August 23, 2012 Permalink | Reply
    Tags: authentication, , ,   

    Shanghai Uses RFID Technology to Curb Illegal Taxis 

    Shanghai-illegal-taxi-cab-rfid-blogThe Chinese city, Shanghai, has begun using RFID technology to curb counterfeit taxi cabs to protect both passengers and taxi drivers.

    The authorities of Shanghai have put an RFID-enabled electronic license on each of the 50,000 taxis in the city. The tag, which will be pasted on the left side of the windshield, contains information including license plate number, engine number, color of the taxi, and details of the operating license.

    Law enforcement personnel will be able to scan the tag using a handheld device and instantly recognize whether the taxi is licensed and deemed legal.

    In Shanghai, illegal and counterfeit taxis have been causing headache to the authorities. Since the gradual roll-out of the system, approximately 271 “clone” taxis have been detained by the authorities.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel
Rss Feed Tweeter button Facebook button Myspace button Linkedin button