Resources
- Identity Use Cases & Scenarios.
- FIDIS Deliverables.
- Identity of Identity.
- D2.1: Inventory of Topics and Clusters.
- D2.2: Set of use cases and scenarios.
- D2.3: Models.
- D2.6: Identity in a Networked World – Use Cases and Scenarios.
- D2.13: Virtual Persons and Identities.
- Interoperability.
- Profiling.
- Forensic Implications.
- HighTechID.
- Privacy and legal-social content.
- Mobility and Identity.
- Other.
- Identity of Identity.
- IDIS Journal.
- FIDIS Interactive.
- Press & Events.
- In-House Journal.
- Booklets
- Identity in a Networked World.
- Identity R/Evolution.
D2.2: Set of use cases and scenarios
Potential Scenario
A man is waiting in a dark alley hidden from view; his aim is to attack a passer-by for their money and valuables. His wireless RFID scanner is located on the side of the path, detecting people as they walk past and sending their unique embedded RFID tag information to his wearable personal display screen. These unique tag codes are cross-correlated in real-time with an online database to reveal the actual identity of the item.
The first person walks past, and the following information is revealed:
25€ in banknotes – Titanium hip replacement – 1 box of bran flakes – Leather shoes – Wax jacket – Bottle of Viagra – Reading glasses – Bingo Club membership card
The man decides to wait.
The next person walks past, and the following information is revealed:
205€ in banknotes – Unbranded Denim jeans – ‘Puma’ trainers – Designer glasses – Library card – 1 litre orange juice – 1 loaf of bread – Book on family planning – ‘Rolex’ watch – High dosage asthma inhaler
The assailant is able to make an informed choice based on the information ‘leaked’ by the RFID tags, and decides to attack.
48 / 69 |