22
RFID Jeffrey Piontek Lead Instructional Technology Specialist Region 2 NYC Department of Education

RFID Privacy

Embed Size (px)

DESCRIPTION

This is a presentation that was developed to look at the use of RFID chips in education.

Citation preview

Page 1: RFID Privacy

RFID

Jeffrey PiontekLead Instructional Technology SpecialistRegion 2 NYC Department of Education

Page 2: RFID Privacy

What are RFID tags, and how do they work?

RFID tags are electronic chips that emit radiosignals. Tags can be active or passive. Oftenan RFID tag contains only a unique identifieralthough some may contain more information.Different tags transmit at a distance that maybe limited to a fraction of an inch or extend to1,500 feet. The system with which a tag communicatesoften creates and stores informationabout where a tag is, what time it passes areader and may relate that information to a purchaseor the movement of materials or people.

Page 3: RFID Privacy

RFID

Who is using it?– Walmart – EZ Pass and SmartTag for toll roads– Exxon Speedpass– New car security systems– Agriculture– Libraries– Records Management

Page 4: RFID Privacy

How does it work?

• A tag is affixed to a resource.

• The tag is programmed to be recognized by the system.

• The tag can be scanned by a reader device to help manage the collection of resources.

Page 5: RFID Privacy

Types of Tags

PassiveNo imbedded power source. Weaker signal.

Active Imbedded power source. Stronger signal.

Page 6: RFID Privacy
Page 7: RFID Privacy

Readers

Page 8: RFID Privacy
Page 9: RFID Privacy
Page 10: RFID Privacy

Forward and Backward Channels

Page 11: RFID Privacy

Hash-Based Access Control

Page 12: RFID Privacy

Randomized Access Control

Page 13: RFID Privacy

Silent Tree Walking

Page 14: RFID Privacy

Educational Uses

Most widely known is the libraryTextbook storesStudent Identification CardsMeal Plans in colleges and universities

Page 15: RFID Privacy

How are libraries using RFID?

Tags on books, videos, DVD/CD Self-checkoutAutomated book return Automated sorting of books for large systems

Page 16: RFID Privacy

Inventory Assistance

Use handheld equipment to inventory the collection or resources.

Find lost and misplaced books/files/boxes.

Page 17: RFID Privacy

Handheld Devices

Page 18: RFID Privacy

RFID – Policy Issues

Data CollectionPrivacy ConcernsPublic and staff education about the

realities of RFID and how information will be used.

Page 19: RFID Privacy

RFID - Cons

Expensive equipment and materials.Difficulty reading tags.Still a new technology – many issues with

standards and security.

Page 20: RFID Privacy

Cons continued…..

RFID tags: Big Brother in small packages RFID Foes Find Righteous Ally  Used improperly, RFID has the potential to jeopardize

consumer privacy, reduce or eliminate purchasing anonymity, and threaten civil liberties.

Auto-ID: The worst thing that ever happened to consumer privacy

Spychips: How Major Corporations and Government Plan to Track Your Every Move with RFID

Stop RFIDs in California IDsTell Your Lawmakers to Vote "YES" to SB 682

Feds Rethinking RFID Passport

Page 21: RFID Privacy

RFID - Pros

Easier and faster inventoryFaster checkoutsFaster sorting – automated handlingSave staff time, repetitive tasksUtilize staff on other projects & services

Page 22: RFID Privacy

Future Applications Maintaining shelf stocks in retail environments Tagging pets Proximity badges for building access Clothing – anti-forgery, customer returns Parenting logistics

– Water park uses RFID bracelets to track children “Smart” appliances

– Refrigerators that automatically create shopping lists– Ovens that know how to cook pre-packaged food

“Smart” products– Clothing, appliances, CDs tagged for store returns

“Smart” paper– Airline tickets that indicate your location in the airport– Library books– Business cards

Recycling– Plastics that sort themselves