Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- D3.1: Overview on IMS.
- D3.2: A study on PKI and biometrics.
- D3.3: Study on Mobile Identity Management.
- D3.5: Workshop on ID-Documents.
- D3.6: Study on ID Documents.
- D3.7: A Structured Collection on RFID Literature.
- D3.8: Study on protocols with respect to identity and identification – an insight on network protocols and privacy-aware communication.
- D3.9: Study on the Impact of Trusted Computing on Identity and Identity Management.
- D3.10: Biometrics in identity management.
- D3.11: Report on the Maintenance of the IMS Database.
- D3.15: Report on the Maintenance of the ISM Database.
- D3.17: Identity Management Systems – recent developments.
- D12.1: Integrated Workshop on Emerging AmI Technologies.
- D12.2: Study on Emerging AmI Technologies.
- D12.3: A Holistic Privacy Framework for RFID Applications.
- D12.4: Integrated Workshop on Emerging AmI.
- D12.5: Use cases and scenarios of emerging technologies.
- D12.6: A Study on ICT Implants.
- D12.7: Identity-related Crime in Europe – Big Problem or Big Hype?.
- D12.10: Normality Mining: Results from a Tracking Study.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
(S3) Scenario 3: An Identity Manager for RFID Tags
Article in a mobile computing journal, section “new developments”:
Singsang Inc. announces new CKP-509 phone with RFID tag management functions
The Singsang Inc. is going to launch the new exclusive CKP-509 mobile phone onto the market end of February 2011. This phone integrates advanced management functions for RFID tags according to the EPC global 4.0 standard. […]
The phone has an integrated RFID reader and writer and is able to detect RFID tags in reading rage. In addition it is able to take over access control by changing the cryptographic key from the vendor’s default key to a managed one. It also is able to communicate with V4.0 compliant RFID readers. This enables the transfer of the access key in an encrypted way to the reader so that the tag can be accessed by the reader. Transfer of keys to readers can be done (semi-)automatically based on policies, so that in defined cases no user interaction is necessary. At the same time the phone logs any access to the tag. A sophisticated log file analyser called “data track” allows log file analysis and informs the user, who accessed the tag and for what purpose.
According to the EPC 4.0 standard all communication between management device, reader and tag is encrypted (AES, 256 bit key). Key exchange is done using asymmetric cryptography. Reader and phone bear a certificate for identification; certificates can be verified against the existing public key infrastructure (PKI), operated by EZ-Trust.
10 / 38 |