I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY.

Slides:



Advertisements
Similar presentations
WELCOME Keyscans Access Control KIMA SECURITY INC.
Advertisements

PRESENTED BY: FATIMA ALSALEH Credit Cards Fraud - skimmers -
RFID: OPPORTUNITIES and CHALLENGES Yize Chen. History In 1969, Mario Cardullo presented a RFID business plan to investors. The application areas include:
NFC Security What is NFC? NFC Possible Security Attacks. NFC Security Attacks Countermeasures. Conclusion. References.
TPS – UNIQUE HARDWARE ( Option 1: Transaction Processing Systems.
Contactless Payment. © Family Economics & Financial Education – January 2007 –– Financial Institution Unit – Contactless Payment - 2 Funded by a grant.
JAIPUR 16 DEC 08 TECHNOLOGY FOR FINANCIAL INCLUSION Indian Institute of Banking & Finance N D RAO.
Security for RFID Department of Information Management, ChaoYang University of Technology. Speaker : Che-Hao Chen ( 陳哲豪 ) Date:2006/01/18.
ITEC 810 Overview of Micropayment Technology
Near Field Communication
RFID Security CMPE 209, Spring 2009 Presented by:- Snehal Patel Hitesh Patel Submitted to:- Prof Richard Sinn.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
Near Field Communication By Van Logan HTM 304. What is Near Field Communication Short range wireless communication technology between electronic devices.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
How to Build a Low-Cost, Extended-Range RFID Skimmer Ilan Kirschenbaum & Avishai Wool 15 th Usenix Security Symposium,2006 Kishore Padma Raju.
General Overview Application Uses –Real-Time Location Systems –Inventory Management –Pharmaceutical Tracking –Document Management.
Overview of RFID System Characteristics Operating Frequency Method of Coupling Transmission Range Data Storage Capacity Power Supply (Active, Passive)
Radio Frequency Identification (RFID) Features and Functionality of RFID Including application specific ISO specifications Presented by: Chris Lavin Sarah.
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
IWD2243 Wireless & Mobile Security
RFID Review / Bluetooth ENGR 475 – Telecommunications Harding University December 5, 2006 Jonathan White.
RFID – An Introduction Murari Raghavan UNC-Charlotte.
Presented by: Arpit Jain Guided by: Prof. D.B. Phatak.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
RFID Last Update Copyright Kenneth M. Chipps Ph.D.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
ANTI THEFT PROTECTION SYSTEMS IMMOBILISER LECTURER NAME: MR
RFID Inventory Management And Tracking System Greg McDaniel Hashem Garner Adam Kesner Thomas Harris.
NFC - Near Field Communication Technology
RFID Payment Terminal Presented by: Rohit Kale. Introduction RFID: an automatic identification method, relying on storing and remotely retrieving data.
Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Ignite Presentation: Near Field Communication Harry Yang.
R F I D Presented by Kerry Wong. What is RFID? Radio Frequency IDentification –Analogous to electronic barcode –Uses radio waves to send info Serial numbers.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
RFID: Radio Frequency Identification Amanda Di Maso Shreya Patel Tresit Tarko.
Overall: 9/10. GOODWORK ON  Good information  Very detailed  Nice Introduction  RFID has many similarities with barcoding but with the unique characteristics.
How to Build a Low-Cost, Extended-Range RFID Skimmer Ilan Kirschenbaum & Avishai Wool 15 th Usenix Security Symposium, 2006 * Presented by Justin Miller.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
Describe direct data entry and associated devices, e. g
The Before….. And After Story The first prototype of magnetic stripe card created by IBM in the late 1960s Today’s Cards.
Radio Frequency Identification (RFID)
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Security Device using RFID Reader Alex Gerard & Joe Nevin.
Near Field Communication Armando Octavio Yesenia Sunny Nidia.
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 13 –ID Card Access Control.
RFID Mike Treon CPSC 310. What is RFID? Radio Frequency Identification Wireless link to transmit data and collect stored information. (EPC) Allows for.
What is RFID? Radio frequency identification (RFID) is a wireless form of automated identification technology. RFID is sometimes called dedicated short-range.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
WIRELESS CHARGING Presented by: K.MAHESH (08T81A1236)
English for Advance Learners I
RADIO FREQUENCY IDENTIFICATION(RFID)
Designing a Production Plan
Radio Frequency Identification (RFID)
Extending the Range of eZ430-TMS37157 PaLFI
THE ABC’s OF NFC.
RADIO FREQUENCY IDENTIFICATION
OCR GCSE ICT Data capture methods.
Databases.
Let’s talk RFID Technologies
Databases.
Team 7 Technical Presentation
Elecbits.
Radio Frequency Identification
Mobile Computing Lecture Materials By Bintang Eka Putera.
RFID used for real-time tracking Physics 490 seminar 4/15/2019
Presentation transcript:

I’m back ! Had a nice Holiday? I’m back ! Had a nice Holiday? Today we are talking PROXIMITY TECHNOLOGY Today we are talking PROXIMITY TECHNOLOGY

What is a Proximity Card ? A proximity card - or prox card - is a "contactless" or hands-free card which can be read without inserting it into a reader device, as required by earlier magnetic strip cards such as credit cards and "contact" type cards. The proximity cards are part of the Contactless card technologies. Held near an electronic reader for a moment they enable the identification of an encoded number. The reader usually produces a beep or other sound to indicate the card has been read. Proximity cards typically have a read range up to 50 cm (< 15 inches) which is the main difference with contactless smartcard with 2 to 10 cm (1 to 3 inches). The card can often be left in a wallet or a purse, and read by simply holding the wallet or purse near the reader.

Proximity cards can’t hold more data than a magnetic strip card. They are all proprietary, which means that there is no compatibility between the readers of a specific brand and the cards of another brand. However, manufactuers are expanding support for multiple formats. This is the case of all existing memory based brands (Mifare Classic, iClass, etc…) This technology is a READ only technology.

125 kHz cards More widely used Powered by radio frequency signals from the reader device Limited range Must be held close to the reader unit Used as keycards for access control doors in buildings Passive Cards 125 kHz Prox cards Powered by an internal lithium battery Have a greater range – up to 2 meters Battery eventually runs down May have to be replaced after 2 years Used in barrier and gate applications Active Cards

How does it work? The card and the reader unit communicate with each other through 125 kHz radio frequency fields, by a process called resonant energy transfer. Passive Card’s Components *** contains the user's ID number in specific formats and no other data. The reader unit has its own antenna, which continuously transmits a short range radio frequency field.

When the card is placed within range of the reader, the antenna coil and capacitor, which form a tuned circuit, absorb and store energy from the field, resonating like an electrical version of a tuning fork. This energy is rectified to direct current which powers the integrated circuit. The chip sends its ID number or other data to the antenna coil, which transmits it by radio frequency signals back to the reader unit. The reader checks whether the ID number from the card is correct, and then performs whatever function it has been programmed to do. Since all the energy to power the card comes from the reader unit, passive cards must be close to the reader to function, and so have only a limited range. A proximity sensor is able to detect the presence of nearby objects without any physical contact.

Main advantages of proximity cards over magnetic stripe cards and barcodes

Interesting fact : One of the reasons Proximity technology was developped, was because pharmaceutical companies research labs required a hands-free secure method to unlock and lock doors. All of this started in the early stages of Aids research Interesting fact : One of the reasons Proximity technology was developped, was because pharmaceutical companies research labs required a hands-free secure method to unlock and lock doors. All of this started in the early stages of Aids research

Conclusion Most modern access control systems use proximity (also know as RFID ) cards or key fobs as the ‘credentials’ that enable users to gain access into restricted areas. They store a specific number and format. Proximity readers can read the information using radio frequency communication, making actual contact with the card unnecessary. By simply holding the card or fob close to the reader, the holder’s details can be read and checked quickly so that a decision whether or not to grant access can be made in an instance. The technology used in proximity cards and readers can vary from manufacturer to manufacturer, and there are many standard and proprietary systems on the market. It is important to be aware of this when designing a system. Talk to you next month!