E-Passports and Rfid

In: Computers and Technology

Submitted By acad21
Words 1911
Pages 8
I. E-Passport Proposal Following the 9/11 terrorist attacks, the Bush Administration launched the Machine Readable Passport (MRP) program to increase border security. In 2005, the US government issued its first E-passports (see Fig 1) to select government officials and went public with issuance in late 2006, albeit amid numerous privacy concerns. The new passports contain traditional passport information (such as name, date of birth, gender, place of birth, date of issuance and expiration, and passport number) as well as personal biometric information for facial and fingerprint recognition purposes on a 64 kilobyte chip. Figure 2 shows the configuration of data in the E-passport (Yong & Bertino, 2007). The US Department of State and Western Hemisphere Travel Initiative determined electronic passports were necessary in order to facilitate faster immigration inspections and increase border protection and security. E-passports are scanned prior to inspections, providing border patrol agents additional assurances regarding authenticity, originality, and validity of the relationship between the holder and travel documentation. They also permit officials to scan passport information against watch lists and national no-travel databases to more accurately define prospective terrorists and other threats to the nation (US DOS, 2009).
II. Contactless Technology: Radio Frequency Identification (RFID) International standards for passports have been set by the International Civil Aviation Organization (ICAO) for the past 50 years. The ICAO accepted the RFID technology as a leading global standard due to its “global interoperability, reliability, durability, and practicality” (King, Meingast, & Mulligan, 2007). While some countries use other smart-card technology for their versions of E-passports, the 27 countries in the US Visa Waiver Program are required to use the RFID…...

Similar Documents


...-----------------------------------------------------------------------8 Introduction This report shows how RFID works in daily basis I will be discussing some of any existing technologies and important features of the technology and discuss possible uses of the technology and the feature impact of the technology KNOWLEDGE Radio Frequency identification RFID is a non contact system which radio waves reads the information stored in a transponder. This technology makes it possible to transmit data via radio waves without physical or visual contact and RFID commutation includes at least one transponder, transmitter devices and background acting of IT system which means you need make some coding to make RFID to work. RFID is already used in daily bases e.g. in car immobilizers, toll systems, tags, car tracking, passports, payments, warehouses and many more The first exploration of RFID technology approached in world war II when the British army used RFID technology to act as aircraft identification to make sure whether airplanes were friendly or enemies so the development of RFID have continued since from late 1960 (Jeremy Gragg, 2003). Then later on RFID was also used for anti-theft systems on doors then in the 1970s and 1980s first RFID created for Keyless access control system some of these system allow the opening of car doors from several feet away. Then widespread use of RFID technology found only through the development of cost effective transponder in the......

Words: 1492 - Pages: 6

Passport of the Future

...MSc thesis Information security Passport of the Future: Biometrics against Identity Theft? Marijana Kosmerlj NISlab Høgskolen i Gjøvik marijana@erdal.biz 30 June 2004 Sammendrag Formålet med biometriske pass er å forhindre ulovlig adgang av reisende inn i et land og å begrense bruken av forfalskede reisedokumenter ved en mer nøyaktig autentisering av reisende. Etter den 11. september 2001 har interessen for bruk av slike biometriske pass økt kraftig. Biometriske pass vil bestå av et høykapasitets smartkort som vil inneholde et bilde av passinnehaveren i tillegg til annen type identitetsinformasjon. I passkontrollen vil ett foto bli tatt av passeieren og sammenlignet med fotoet lagret i passet. Et systemdefinert parameter vil avgjøre om disse to fotoene er like nok til å fastslå om personen i de to fotoene er en og samme person. Mange utfordringer er knyttet til biometriske systemer slik som feilrater, “spoofing”angrep, ikke-universalitet og interoperabilitetsproblemer. Forskningen har vist hvor lett det er å lure biomtriske systemer ved bruk av for eksempel statiske foto. Denne rapporten går ett skritt videre og tar en nærmere titt på fiender og deres ressurser i et grensekontrollmiljø. Den tradisjonelle måten å beregne feilakseptraten til biometriske systemer på, vil ikke gjenspeile den virkelige feilakseptraten i dette miljøet. For eksempel, vil andelen av fiendene som har minst tyve ”look-alikes” i målpopulasjonen sett fra et biometrisk system’s perspektiv være...

Words: 15324 - Pages: 62

Rfid Critics

...CURRENT TOPICS IN COMPUTING (CSC 812) A RESEARCH ON RADIO FREQUENCY IDENTIFICATION (RFID) (PRESENT, FUTURE APPLICATION, SECURITY IMPLICATION AND CRITICS) SUBMITTED BY AKINSOWON, TOSIN BLESSING (060805018) IN PARTIAL FULFILMENT OF MASTER DEGREE TO DEPARTMENT OF COMPUTER SCIENCES, FACULTY OF SCIENCES, UNIVERSITY OF LAGOS, AKOKA, YABA, LAGOS. SESSION 2012/2013 SUPERVISED BY Prof H.O.D LONGE Abstract Radio Frequency Identification (RFID) technology has been available for more than fifty years. However it has only been recently that the prices of RFID devices have fallen to the point where these devices can be used as a "throwaway" inventory. This presents numerous opportunities along with innumerable risks. A lot of research is being done to suggest methods which will ensure secure communications in RFID systems. The objective of this paper is to present RFID technology, its current, future applications, study various potential threats to security, and Critics of RFID. 1 Introduction RFID 1.0 BACKGROUND STUDY Radio Frequency Identification (RFID) is an automatic identification system. It make use of Radio Frequency (RF) to identify “tagged” items .Data collected were transmitted to a host system using a Radio Frequency Reader. RFID is one of the numerous technologies grouped under the term Automatic Identification (Auto ID), such as bar code, magnetic inks, optical character recognition (OCR), voice recognition, touch memory, smart cards, biometrics etc. Auto ID......

Words: 5867 - Pages: 24


...International Journal of Scientific & Engineering Research Volume 4, Issue 2, February-2013 ISSN 2229-5518 1 RFID-Based Students Attendance Management System Arulogun O. T., Olatunbosun, A., Fakolujo O. A., and Olaniyi, O. M. Abstract In recent years, there have been rise in the number of applications based on Radio Frequency Identification (RFID) systems and have been successfully applied to different areas as diverse as transportation, health-care, agriculture, and hospitality industry to name a few. RFID technology facilitates automatic wireless identification using electronic passive and active tags with suitable readers. In this paper, an attempt is made to solve recurrent lecture attendance monitoring problem in developing countries using RFID technology. The application of RFID to student attendance monitoring as developed and deployed in this study is capable of eliminating time wasted during manual collection of attendance and an opportunity for the educational administrators to capture face-to-face classroom statistics for allocation of appropriate attendance scores and for further managerial decisions. Keywords: RFID, Lecture, Attendance, Passive tag, Reader INTRODUCTION T he emergence of electronic paradigm for learning compared to traditional method and availability of almost all information on the information superhighway(Internet), nowadays have caused students to be less motivated to come to the lecture rooms than ever before. Laziness on......

Words: 3596 - Pages: 15


...Radio Frequency Identification (RFID) is not beneficial to the society The advancement of information and technology has been the most influential aspect throughout the last century of the Modern World. Moreover, the rapid development and pace in the field of technology have opened up literally world of possibilities for the future. While considering this, the innovation of Radio Frequency Identification (RFID) in information and technology makes an incredible stride in modern businesses’ and societies’ progression. “RFID is the generic name for technologies that use radio waves to identify and track objects automatically”(Jones, Hill, Hiller & Comfort, 2005). RFID system comprises tags with integrated circuit where data is stored, a reader and antenna which communicate between reader and tags. The tags could be active, passive or semi-passive. Active tags have built in battery and can be used for reading and writing capabilities. Similarly, semi-passive tags contain a battery that enables longer reading distance and also enable the tags to operate independently of the reader whereas passive tags do not have power source and do not have writing capability. This RFID system does not require line of sight to detect data like in bar code system. The reader transmits wave signal where the tags use this signal as power source or use the power in circuit to transmit data stored in tags back to the reader. The data acquired by the reader is then passed to a host computer or......

Words: 2443 - Pages: 10


...Gulf University For Science and Technology Department of Management Information Systems MIS-118 Introduction to Computer and Information Systems Project Specifications The project is expected to train the students on presenting a specific topic using a presentation application. The presentation is to be designed using MS PowerPoint and the topics may span several aspects such as: Geocaching Onstar Telesurgery Slingbox Gesture Input E-Paper 3D Printer Browser Operating System Wireless Power WiMax Wi-Fi SD Cards Geobrowsing Securexam Remote Proctor Google Search Privacy Supercookies Adware/spyware/ stealthware Cloud Computing Mobile Augmented Reality QR Codes RFID Technology Smart Home Phishing Identity theft Or any topic accepted by your instructor. 1 Gulf University For Science and Technology Department of Management Information Systems The PowerPoint presentation must contain the following: *  Cover and ending slides (containing automatic date). *  Overview/Agenda and introduction. *  At least 5 material slides (not including cover and ending slides) *  At least one hyperlink linking to related explanatory material *  Slide and text animation *  May have a(n) video/audio clip depending which is more relevant to your presentation (or both) *  At least one table/picture depending which is more relevant to your presentation (or both) *  Slide numbers *  References *  Duration: 5-7......

Words: 282 - Pages: 2


...Brief History of RFID: RFID technology was invented in 1948, but it was not mainstreamed for commercial applications until the 1980s. One of its first known applications was during World War II, when it was used by the British radar system to differeniate between German aircraft and their own aircraft with attached radio transponders. Only recently, due to technology advances, have the price points dropped to where RFID is now feasible for companies to adopt. Wal-Mart was among the first commercial enterprises to select RFID technology to achieve improvements in the inventory supply process and theft control. Wal-Mart started the process of implementing RFID throughout its retail distribution chain by requiring its top 100 suppliers to use RFID tags by year-end 2004 on the pallets and cases they shipped to Wal-Mart. However, in 2004 due to the status of standards and limited tag production capabilities, manufacturers of RFID tags were unable to meet the volume of demand within Wal-Mart's desired time frame. As the standards further evolved, production capabilites expanded and price points kept dropping, Wal-Mart's implementation is now in full swing with most of their top suppliers delivering RFID tagged pallets and crates to all of Wal-Mart's distributions centers. RFID use has started to penetrate other corporate supply chains, but in many cases these implementions are closed loop systems. In other words, the RIFD is deployed within a particular corporation's......

Words: 1562 - Pages: 7


...| ByMr Shireesh | RFID | | | | Words Count: 2,180 Tables of Content Page Tables of Content 1 Introduction 2 What is Radio Frequency Identification (RFID)? 2 - 3 Purpose of RFID 3 - 6 Benefits of RFID 6 Disadvantages of RFID 6 Points of View 7 Conclusion 8 References 9 Introduction Imagine a technology that could slice the time it takes a retailer to measure inventory, one that could provide accurate information about a single tem as it moves from manufacturing through a store and then on to post-sales support. Imagine one that could finally fully automate checkout, freeing store personnel to provide increased levels of customer support. RFID - Radio Frequency......

Words: 2473 - Pages: 10


...provide such serve for customers? by cutting down the product cost and selling cost RFID(Radio Frequency IDentification): Introduction:is the wireless use of electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects. How does RFID work? the tags contain electronically stored information. Some tags are powered by electromagnetic induction from magnetic fields produced near the reader. Some types collect energy from the interrogating radio waves and act as a passive transponder. Other types have a local power source such as a battery and may operate at hundreds of meters from the reader.Unlike a barcode, the tag does not necessarily need to be within line of sight of the reader and may be embedded in the tracked object. Recycling the RFID chips we give the each customers a coles card like memberships card, everytime the customer bring a chip, we give them a point loyalty point, when the customer gets 500 points, we give them something free. Budget of the using RFID a tag can be bought at $0,05 even today. At least if you believe Kevin Ashton, the cofa tag can be bought at $0,05 even today. At least if you believe Kevin Ashton, the cofounder and executive director of the Auto-ID Center and this article by him in RFID Journal. But, no matter the cost of $0,05 or $0,07 per tag, the early adopters of item-level RFID constantly show better inventory levels and sales growth in comparison to......

Words: 1055 - Pages: 5


...RFID in transportation Gopi Krishna Potla Wilmington University Abstract: Radio Frequency Identification is the most prevailing technology in the current world. RFID has many successful applications. Transportation is one among such applications. The use of RFID in transportation made tracking to things easy. RFID increase the efficiency of transportation, saves time and money. It is used in trucking, shipping, airports and also in railways. In this paper, RFID technology is explained briefly at the beginning. Later, implementation of RFID on different ways of transportation is illustrated. The standards of RFID in transportation are also presented. Introduction: RFID stands for Radio-Frequency Identification. RFID technology is a type of wireless communication in which radio waves are used to recognize people and objects. The purpose of an RFID system is transmitting data from a portable device, called a tag, to an RFID reader to execute a particular application based on the tag provided identification or location information (Graafstra, 2006; O' Brien, 2006). This was initially developed for improving warfare technologies. Now, it has been a part of everyone’s routine life. It consists of a tag with a chip and an antenna for sending and receiving data. The technology consolidates with an interrogator (reader), which has an antenna that communicates with the tag. This is an enhanced distinct option for barcodes as it has read and write capabilities. RFID in......

Words: 1467 - Pages: 6

Rfid Security

...RFID SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express permission of the Government of the HKSAR. Disclaimer: Whilst the Government endeavours to ensure the accuracy of the information in this paper, no express or implied warranty is given by the Government as to the accuracy of the information. The Government of HKSAR accepts no liability for any error or omission arising from or related to the use of the information. TABLE OF CONTENTS Summary ............................................................................................................................. 2 I. Introduction.................................................................................................................... 3 An Introduction to RFID ................................................................................................. 3 How does RFID work? ................................................................................................... 4 II. Adoption of RFID........................................................................................................... 5 Business Trends .............................................................................................................. 5 Government Use .....................................................................................

Words: 3358 - Pages: 14

Rfid-Working with Rfid

...Working with RFID Technofutur 3 Turning Client Vision into Results Gosselies, 23 February 2005 An International Player A leading international IT services company providing business consulting, technology integration and managed operations • Annual revenues over € 5 bn • 45,000 employees • In 50 countries 2 Turning Client Vision into Results The Olympic Games – Winning IT for a successful world-class event Atos Origin is proud to serve as the official “Worldwide Information Technology partner” for the Athens 2004, Turin 2006, and Beijing 2008 Olympic Games. We provide the people, processes and technology supporting the Games. We are responsible for the overall IT strategy, project management, key software integration, network security and data integrity. With over 3 billion people all over the world watching, no single project could better illustrate our commitment to delivery 3 Turning Client Vision into Results Atos Origin & RFID February 2005 The Integrated IT architecture of the Real Time Enterprise 5 Turning Client Vision into Results The Integrated IT architecture of the Real Time Enterprise Strategic Enterprise Management Data Warehouse SCM WMS ERP MES CRM SCE Equipment E-Monitoring Chained into reality with RFID…. 6 Turning Client Vision into Results RFID Markets & Applications RFID-EPC enabled systems offer significant benefits in a wide variety of supply......

Words: 1820 - Pages: 8


...freedom to violent inmates and burden correctional staffs that disturb the community’s safety. Therefore, we come up to a project designed to monitor the inmates that includes their location, movement and headcount at a specific instant of time. Thus, helping the jail officers to constantly check the inmates and having a record of incidents that had happened which could be used for future investigation. Objectives of the Study General Objectives This study aims to improve the monitoring of inmates using an active Radio Frequency Identification (RFID) reader. Specific Objectives More specifically, thisstudy aims to: a. Track inmates through a server-based database using an automated system b. Monitor inmates using a non-detachable and water resistant Radio Frequency Identification(RFID) wristband c. Cover a certain radius per transceiver d. Provide a database system that would log history at a regular basis e. Trigger an alarm in case of tag tampering or loss Importance of the Study The prison escape rate in correctional facilities is not in an alarming level, but it remains a troubling problem because traditional monitoring requires dedicated staffing, thus, taking officers away from other duties. An inmate under traditional monitoring is typically checked on by corrections staff from time to time. Even with this effort by correction facilities, inmates still finds enough time trying to break out or even attempt any accident. Hence, the......

Words: 3484 - Pages: 14


...Abstract RFID (Radio Frequency IDentification) is a technology that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency (RF) portion of the electromagnetic spectrum to uniquely identify an object, animal, or a person. It is an automatic identification method, relying on storing and remotely retrieving data whenever required using devices called RFID Tags or transponders. It is also called Dedicated Short Range Communication (DSRC). I would like to make a presentation on the following topics related to RFID technology: * Brief overview of RFID technology * Basic components of RFID * Standards followed * Simple working and Sequence of Communication involved * Advantages, applications and future scope Components of RFID Technology Tags (Chip + Antenna): An RFID Tag is an object that can be stuck on or incorporated into a product, animal or a person for the purpose of identification using radio waves. There are two main components present in the RFID tag. Firstly, a small silicon chip or integrated circuit which contains a unique identification number (ID). Secondly, an antenna that can send and receive radio waves Interrogators (Antenna + Reader): Interrogators are used to read the Tags & in certain cases even write on them. Middleware: Middleware is the needed interface between the existing company databases & information management software. Middleware provides a range of functions: • Data Filtering • System......

Words: 734 - Pages: 3


...APPLICATION FOR A U.S. PASSPORT PLEASE DETACH AND RETAIN THIS INSTRUCTION SHEET FOR YOUR RECORDS I applied: Place: Date: FOR INFORMATION, QUESTIONS, AND INQUIRIES: Please visit our website at travel.state.gov. In addition, you may contact the National Passport Information Center (NPIC) toll-free at 1-877-487-2778 (TDD: 1-888-874-7793) or by email at NPIC@state.gov. Customer Service Representatives are available Monday-Friday 8:00a.m.-10:00p.m. Eastern Time (excluding federal holidays.) Automated information is available 24/7. U.S. PASSPORTS, EITHER IN BOOK OR CARD FORMAT, ARE ISSUED ONLY TO U.S. CITIZENS OR NON-CITIZEN NATIONALS. EACH PERSON MUST OBTAIN HIS OR HER OWN PASSPORT BOOK OR PASSPORT CARD. THE PASSPORT CARD IS A U.S. PASSPORT ISSUED IN CARD FORMAT. LIKE THE TRADITIONAL PASSPORT BOOK, IT REFLECTS THE BEARER'S ORIGIN, IDENTITY, AND NATIONALITY AND IS SUBJECT TO EXISTING PASSPORT LAWS AND REGULATIONS. UNLIKE THE PASSPORT BOOK, THE PASSPORT CARD IS VALID ONLY FOR ENTRY TO THE UNITED STATES AT LAND BORDER CROSSINGS AND SEA PORTS OF ENTRY WHEN TRAVELING FROM CANADA, MEXICO, THE CARIBBEAN, AND BERMUDA. THE U.S. PASSPORT CARD IS NOT VALID FOR INTERNATIONAL AIR TRAVEL. APPLICANTS WHO HAVE HAD A PREVIOUS U.S. PASSPORT BOOK AND/OR U.S. PASSPORT CARD If your most recent passport book and/or passport card was issued less than 15 years ago and you were over 16 years old at the time of issuance, you may be eligible to use Form DS-82. To determine your......

Words: 5327 - Pages: 22

BeeTV APK Latest Version | Marriage in the Middle Ages | Devil May Cry 3