RFID http://www.soumu.go.jp/snews/2004/040223_2.html http://www.meti.go.jp/feedback/data/i4 0316aj.html



Similar documents
幅広い業種や業務に適応可能なRFIDソリューション

RFID RFID + ) (RFID IC transponder) RFID Tag Antenna wired-line Reader Ethernet/ RS232c Antenna RFID Tag Reader id command id interrogation id radio s

i


Z7000操作編_本文.indb

untitled


19_22_26R9000操作編ブック.indb



7,, i

<95DB8C9288E397C389C88A E696E6462>

22 Google Trends Estimation of Stock Dealing Timing using Google Trends

旭硝子のリグラスカタログ

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

2

2

2

"CAS を利用した Single Sign On 環境の構築"

3_23.dvi


2

Journal of Geography 116 (6) Configuration of Rapid Digital Mapping System Using Tablet PC and its Application to Obtaining Ground Truth



H8000操作編

3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2



谷口/谷口

, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i

untitled

( )

untitled

2

32C2100操作編ブック.indb

Web Basic Web SAS-2 Web SAS-2 i

untitled

HP cafe HP of A A B of C C Map on N th Floor coupon A cafe coupon B Poster A Poster A Poster B Poster B Case 1 Show HP of each company on a user scree

00_1512_SLIMLINE_BOOK.indb


3: OFF WEB 4 4: 30 (3) Radio Frequency Identification RFID RFID RFID IC Suica ICOCA PASMO PiTaPa Edy id 1 RFID RFID RFID 1 1mm 2.3 ON/OFF 3 3 (1) (2)

MOTIF XF 取扱説明書

01_舘野.indd

10_細川直史.indd

"CAS を利用した Single Sign On 環境の構築"

Microsoft Word - PrivateAccess_UM.docx


C H H H C H H H C C CUTION:These telephones are for use in Japan only. They cannot be used in other countries because of differences in voltages, tele


SERPWatcher SERPWatcher SERP Watcher SERP Watcher,

RTM RTM Risk terrain terrain RTM RTM 48

九州大学学術情報リポジトリ Kyushu University Institutional Repository 看護師の勤務体制による睡眠実態についての調査 岩下, 智香九州大学医学部保健学科看護学専攻 出版情報 : 九州大学医学部保健学

HASC2012corpus HASC Challenge 2010,2011 HASC2011corpus( 116, 4898), HASC2012corpus( 136, 7668) HASC2012corpus HASC2012corpus

<31322D899C8CA982D982A95F985F95B65F2E696E6464>


Hansen 1 2, Skinner 5, Augustinus 6, Harvey 7 Windle 8 Pels 9 1 Skinner 5 Augustinus 6 Pels 9 NL Harvey ML 11 NL


VE-GP32DL_DW_ZA

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

DEIM Forum 2010 D Development of a La

取扱説明書_KX-PW100CL

Studies of Foot Form for Footwear Design (Part 9) : Characteristics of the Foot Form of Young and Elder Women Based on their Sizes of Ball Joint Girth

LC304_manual.ai

_念3)医療2009_夏.indd

Salesforce DX.key

GP05取説.indb

Microsoft Word - toyoshima-deim2011.doc

取扱説明書

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

Plan of Talk CAS CAS 2 CAS Single Sign On CAS CAS 2 CAS Aug. 19, 2005 NII p. 2/32

2015 ( 27 ) RFID RF RFID, 2., 3., 4. i

I N S T R U M E N T A T I O N & E L E C T R I C A L E Q U I P M E N T Pressure-resistant gasket type retreat method effective bulk compressibility Fro

Cisco ASA Firepower ASA Firepower

IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra

untitled

39-3/2.論説:藤井・戸前・山本・井上

P

ERA-201D1


XML RFID, RFID, RFID IP,, RFID EPC Global, RFID IP, RFID, RFID, IP, RFID, IP, RFID, RFID XML(Extensible Markup Language), RFID XML, RFID XML, RFID,, R

取説_VE-PV11L(応用編)

The Journal of the Japan Academy of Nursing Administration and Policies Vol 7, No 2, pp 19 _ 30, 2004 Survey on Counseling Services Performed by Nursi

2


Hospitality-mae.indd

Introduction Purpose This training course describes the configuration and session features of the High-performance Embedded Workshop (HEW), a key tool

24 LED A visual programming environment for art work using a LED matrix

9_18.dvi

ÿþ

VE-GD21DL_DW_ZB

40) 41) 42) 40) Vol.10 p.121 (2) 2 1 [2]

システム開発プロセスへのデザイン技術適用の取組み~HCDからUXデザインへ~

LCC LCC INOUE, Gaku TANSEI, Kiyoteru KIDO, Motohiro IMAMURA, Takahiro LCC 7 LCC Ryanair 1 Ryanair Number of Passengers 2,000,000 1,800,000 1,

1 UD Fig. 1 Concept of UD tourist information system. 1 ()KDDI UD 7) ) UD c 2010 Information Processing S

Huawei G6-L22 QSG-V100R001_02

VQT3B86-4 DMP-HV200 DMP-HV150 μ μ l μ

Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involv

PFQX2227_ZA


Transcription:

RFID LSI sozo@c.csce.kyushu-u.ac.jp RFID Radio Frequency mm 0.5 5m 2m 1 64k IC http://www.tij.co.jp/jmc/docs/tiris/goods/index.html RF http://www.hitachisemiconduct or.com/sic/jsp/japan/jpn/gain/1 35/next/

RFID http://www.soumu.go.jp/snews/2004/040223_2.html http://www.meti.go.jp/feedback/data/i4 0316aj.html

IC RFID ( ) LED RFID LED http://www.uchida.co.jp/ tsushin/nl/nl-j/j027.html

http://www.hitachi-hitec.com/ Future Store

( YRP http://pcweb.mycom.co.jp/news/2004/03/24/001.html http://itpro.nikkeibp.co.jp/free/nc/ne WS/20040308/141068/

http://www.dnp.co.jp/jis/news/2004/040227.html

http://itpro.nikkeibp.co.jp/free/nby/rfid/20040324/1/ Close.. Open Production Recycle Distribution User Services

RFID RFID

10

RFID RFID

RFID

( User 1 User 2 User 3 Session Room A Board Terminal 1 Location Session Room B Session Room C Session Room D Board Terminal 2 09:00 12:00 15:00 18:00 Time (Jan. 23)

Benetton RFID http://www.boycottbenetton.org/,.. RFID

RFID Customer DB RFID Owner 1. : Amazon.com ID DB 2.. ID. RFID Savant, ONS,PML Book RFID JAN

-RFID- Savant, ONS,PML Customer DB Book RFID RFID Owner 1. -RFID- 2. -RFID 3. RFID- Linkability ID.. 1. 2.

RFID New!..? Visibility

How? Visibility?. 1:. 2: key : Blocker tags 1. IDLocalize 2. ID RFID

1 st Approach Combination of ROM and rewritable memory on an RFID tag globally unique ID on the ROM localized ID on the rewritable memory (EEPROM, FRAM) Users cannot access the ROM when a private ID is set. ROM 110110010 Rewritable Public-ID mode ROM 110110010 Rewritable 001010 Private-ID mode 1 st Approach 110110010 Public-ID mode Any users can identify the product. Private-ID mode The owner decides the private ID value. Only the owner can identify, and can relate the private ID and the public ID. Avoids Linkability by visibly changing the private ID. Low cost than implementing crypto. 110110010 Public mode Recycle Public mode Production mode Distribution, Retail 110110010 001010 Private User Services 110110010 111010 Memory update

2 nd Approach Option 1: To a Consumer Globally Unique ID 101101001 101 Class ID Pure ID Killed 101101001 101 011010 User-defined Class ID (Rewritable) Option 2: To a Consumer Class ID: the field related the object type. Pure ID: the field to identify the object in the type. 101 011010 User-defined Class ID (Rewritable) 2 nd Approach The owner can identify, Other users cannot, from user-defined Class ID and Pure ID. The users who can see the object may identify: onsite identification A repairer can know the product type (sometimes from the barcode) and identify from the Pure ID. Privacy is protected by default (without the owners labor) Object cannot be identified only by Pure ID. Privacy is visible by physically-separated RFID tags. No more special RFID tags.

MIT AUTO-ID By Weis, Sarma, Rivest, Engels(2003) ID Compute and compare: hash(id r) Who are you? hash(id r), r RFID ID MIT AUTO-ID By Weis, Sarma, Rivest, Engels(2003) ID Compute and compare: hash(id r) Who are you? hash(id r), r RFID ID

RFID CSS2003 Fo ward-secure RFID Privacy Protection for Low-cost RFID * NTT RFID * NTT) RFID * RFID * NTT) SCIS2004 Pretty-Simple Privacy Enhanced RFID and Its Application Dingzhe Liu (University of Tokyo), Kazukuni Kobara (University of Tokyo), Hideki Imai (University of Tokyo) RFID ( ), ( ) Hash-Chain Based Forward-Secure Privacy Protection Scheme for Low-Cost RFID (NTT), (NTT), (NTT) RFID ( ), ( ), ( ) RFID (NTT), (NTT), (NTT), (NTT) and, ``RFID ID '',, 2004-UBI-3 UBI, Vol.2004, No.4, pp.63-68, Jan. 2004. Sozo Inoue and Hiroto Yasuura, ``RFID Privacy Using User- Controllable Uniqueness'', RFID Privacy Workshop, Nov. 2003. Sozo Inoue, Shin'ichi Konomi, and Hiroto Yasuura, ``Privacy in the Digitally Named World with RFID Tags'', Workshop on Socially-informed Design of Privacy-enhancing Solutions in Ubiquitous Computing, Sep. 2002.

Compared to Crypto. Approach Anonymity on site Anonymity from remote Visibility of Privacy ID Manipulation 1 st Approach Secure Rewrite 2 nd Approach Secure Rewrite Crypto. Approach Linkability Secure Rewrite ID Conflicts Cost

Denial of Service RFID ID LSI Visibility ID ID img.htm http://www.imes.boj.or. jp/cm/htmls/history_09 http://www.imes.boj.or.j p/cm/htmls/history_22.h tm

RFID LSI

RF RFID / RFID / RFID I-404 I-407 I-403 I-406I-405 I-409I-408 I-402 W1 W3 W2 W4 W5 W6 W7 W8 W9 W1W2W3W4 W5W3W6W7W8W9W8 RFID 30 1 50 1 37 30 75 130 56 1 (%) = /

RFID

RFID

in G i ={ 3, 10, 4, 43} 43 4 10 RFID

RFID (%) = /

(%) = / POS

ID Data Base ID ID ID RFID ID ID, 1. 2. 3. 4. 5. 6.