535 resultados para RFID authentication


Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

RFID on 2000-luvulla yleisesti saatavilla tullut tekniikka erilaisten kohteiden tunnistamiseen. RFID-tekniikassa tunnistamiseen käytetään pienikokoisia tunnisteita, joiden tietosisältö pystytään lukemaan langattomasti ilman näköyhteyttä tarkoitukseen soveltuvalla lukulaitteella. Tunnisteet ovat halpoja ja yksinkertaisia. Yleensä ne eivät sisällä omaa virtalähdettä, vaan ne toimivat ainoastaan lukulaitteen luoman kentän voimalla. Tässä työssä tutkitaan RFID-tekniikan soveltuvuutta betonista valmistettujen rakennuselementtien tunnistamiseen. Ympäristön vaikutukset tekniikan käyttöön tutkitaan ja selvitetään, mitkä ovat parhaat toimintatavat elementtien tunnistamiseen nämä vaikutukset huomioon ottaen. Työssä esitellään ensin RFID-tekniikan toimintaperiaatteet sekä tunnisteiden ja lukulaitteiden rakenne. Tunnisteiden jaottelu erilaisten ominasisuuksien perusteella käydään läpi ja sovellusalan kannalta tärkeimmät standardit esitellään. Käytännön osuudessa esitellään RFID-tekniikan soveltamista betonista valmistettujen rakennuselementtien tunnistamiseen. Työssä esitellään saavutetut mittaustulokset sekä betonielementtien tunnistamiseen ja tietojen hallintaan toteutetun järjestelmän rakenne.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The goal of this work is to design and implement authentication and authorization section to PeerHood system. PeerHood system is developedin Lappeenranta University of Technology. It provides functions of discovering devices compatible with PeerHood and listing services offered by those devices; based on wireless technologies: Wi-Fi, Bluetooth and GPRS. The thesis describes implementation of the security approach intomobile Ad-Hoc environment and includes both authentication and authorization processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Aquest projecte inclou una aproximació als conceptes de RFID i targetes contactless centrant-se en l’ampliament usat MIFARE Classic chip. L’objectiu principal es mostrar el seu funcionament i les seves vulnerabilitats, així com alguns exemples pràctics fent una anàlisi de diferents serveis que les utilitzen.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

ITENE és un institut tecnològic de recerca situat a Paterna (València). Té una plantapilot especialitzada en logística on les empreses que ho vulguin (mitjançant convenis,en règim de lloguer, etc.), poden utilitzar les instal•lacions (magatzem intel•ligent,aplicacions RFID, etc.), per provar els seus productes i simular processos de logística itraçabilitat.En aquesta planta s'ha detectat la necessitat de poder provar nous productes cometiquetes, detectors i processadors equipats amb tecnologia RFID (Identificació perRadiofreqüència). Aquesta tecnologia consisteix en passar informació que conté unaetiqueta “intel•ligent” cap a un terminal (PC) mitjançant uns detectors que, perproximitat, poden llegir la informació. Per exemple, quan un camió ple de mercaderiesprèviament etiquetades, passa per un pòrtic amb detectors RFID, es genera unainformació que passa directament a un terminal. Al moment es pot saber què porta elcamió, quantitat, color, mides, etc. Si això es combina amb un ERP, es pot descomptarde l'estoc en temps real. De fet s'utilitza per moltes aplicacions logística, control deprocessos de fabricació, traçabilitat de productes, etc.Per aquest motiu, ITENE, mitjançant el contacte de AIFOS SOLUTIONS S.L (empresaespecialitzada en RFID) ha encarregat un sistema de transportadors de banda per provarnoves solucions.L'objecte del present projecte consisteix en el disseny i automatització d'un sistema de 4cintes transportadores 2 elevadors per tal de fer un circuit tancat per moure caixes en un“bucle” de forma automàtica. L'objectiu és “llençar” caixes plenes de productes (etiquetats amb RFID) mitjançant untransportador equipat amb un pòrtic que té instal•lats diversos detectors de radiofreqüència,i poder-ne provar la correcta detecció a diferents velocitats. Un “buffer” s'encarrega desubministrar les caixes d'una en una que, un cop acabat el circuit, tornen al lloc d'on hansortit. Per donar un producte per bo, es realitzen tests de diverses hores i se n'obté unaestadística de lectures bones/dolentes. Si la ràtio és la desitjada es dóna per bo elproducte.Per aconseguir un disseny correcte s'ha utilitzat diferents eines CAD per dimensionar elsistema de transportadors i els seus elements. Tota l'aplicació està realitzada en 3Dmitjançant el software AutoCAD 3D. L'abast d'aquest projecte inclourà la solució mecànica i pneumàtica del sistema, aixícom el seu muntatge i tot el referent a les normes de seguretat per tal que el sistemacompleixi la normativa referida a la seguretat de màquines

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis is composed of three main parts. The first consists of a state of the art of the different notions that are significant to understand the elements surrounding art authentication in general, and of signatures in particular, and that the author deemed them necessary to fully grasp the microcosm that makes up this particular market. Individuals with a solid knowledge of the art and expertise area, and that are particularly interested in the present study are advised to advance directly to the fourth Chapter. The expertise of the signature, it's reliability, and the factors impacting the expert's conclusions are brought forward. The final aim of the state of the art is to offer a general list of recommendations based on an exhaustive review of the current literature and given in light of all of the exposed issues. These guidelines are specifically formulated for the expertise of signatures on paintings, but can also be applied to wider themes in the area of signature examination. The second part of this thesis covers the experimental stages of the research. It consists of the method developed to authenticate painted signatures on works of art. This method is articulated around several main objectives: defining measurable features on painted signatures and defining their relevance in order to establish the separation capacities between groups of authentic and simulated signatures. For the first time, numerical analyses of painted signatures have been obtained and are used to attribute their authorship to given artists. An in-depth discussion of the developed method constitutes the third and final part of this study. It evaluates the opportunities and constraints when applied by signature and handwriting experts in forensic science. A brief summary covering each chapter allows a rapid overview of the study and summarizes the aims and main themes of each chapter. These outlines presented below summarize the aims and main themes addressed in each chapter. Part I - Theory Chapter 1 exposes legal aspects surrounding the authentication of works of art by art experts. The definition of what is legally authentic, the quality and types of the experts that can express an opinion concerning the authorship of a specific painting, and standard deontological rules are addressed. The practices applied in Switzerland will be specifically dealt with. Chapter 2 presents an overview of the different scientific analyses that can be carried out on paintings (from the canvas to the top coat). Scientific examinations of works of art have become more common, as more and more museums equip themselves with laboratories, thus an understanding of their role in the art authentication process is vital. The added value that a signature expertise can have in comparison to other scientific techniques is also addressed. Chapter 3 provides a historical overview of the signature on paintings throughout the ages, in order to offer the reader an understanding of the origin of the signature on works of art and its evolution through time. An explanation is given on the transitions that the signature went through from the 15th century on and how it progressively took on its widely known modern form. Both this chapter and chapter 2 are presented to show the reader the rich sources of information that can be provided to describe a painting, and how the signature is one of these sources. Chapter 4 focuses on the different hypotheses the FHE must keep in mind when examining a painted signature, since a number of scenarios can be encountered when dealing with signatures on works of art. The different forms of signatures, as well as the variables that may have an influence on the painted signatures, are also presented. Finally, the current state of knowledge of the examination procedure of signatures in forensic science in general, and in particular for painted signatures, is exposed. The state of the art of the assessment of the authorship of signatures on paintings is established and discussed in light of the theoretical facets mentioned previously. Chapter 5 considers key elements that can have an impact on the FHE during his or her2 examinations. This includes a discussion on elements such as the skill, confidence and competence of an expert, as well as the potential bias effects he might encounter. A better understanding of elements surrounding handwriting examinations, to, in turn, better communicate results and conclusions to an audience, is also undertaken. Chapter 6 reviews the judicial acceptance of signature analysis in Courts and closes the state of the art section of this thesis. This chapter brings forward the current issues pertaining to the appreciation of this expertise by the non- forensic community, and will discuss the increasing number of claims of the unscientific nature of signature authentication. The necessity to aim for more scientific, comprehensive and transparent authentication methods will be discussed. The theoretical part of this thesis is concluded by a series of general recommendations for forensic handwriting examiners in forensic science, specifically for the expertise of signatures on paintings. These recommendations stem from the exhaustive review of the literature and the issues exposed from this review and can also be applied to the traditional examination of signatures (on paper). Part II - Experimental part Chapter 7 describes and defines the sampling, extraction and analysis phases of the research. The sampling stage of artists' signatures and their respective simulations are presented, followed by the steps that were undertaken to extract and determine sets of characteristics, specific to each artist, that describe their signatures. The method is based on a study of five artists and a group of individuals acting as forgers for the sake of this study. Finally, the analysis procedure of these characteristics to assess of the strength of evidence, and based on a Bayesian reasoning process, is presented. Chapter 8 outlines the results concerning both the artist and simulation corpuses after their optical observation, followed by the results of the analysis phase of the research. The feature selection process and the likelihood ratio evaluation are the main themes that are addressed. The discrimination power between both corpuses is illustrated through multivariate analysis. Part III - Discussion Chapter 9 discusses the materials, the methods, and the obtained results of the research. The opportunities, but also constraints and limits, of the developed method are exposed. Future works that can be carried out subsequent to the results of the study are also presented. Chapter 10, the last chapter of this thesis, proposes a strategy to incorporate the model developed in the last chapters into the traditional signature expertise procedures. Thus, the strength of this expertise is discussed in conjunction with the traditional conclusions reached by forensic handwriting examiners in forensic science. Finally, this chapter summarizes and advocates a list of formal recommendations for good practices for handwriting examiners. In conclusion, the research highlights the interdisciplinary aspect of signature examination of signatures on paintings. The current state of knowledge of the judicial quality of art experts, along with the scientific and historical analysis of paintings and signatures, are overviewed to give the reader a feel of the different factors that have an impact on this particular subject. The temperamental acceptance of forensic signature analysis in court, also presented in the state of the art, explicitly demonstrates the necessity of a better recognition of signature expertise by courts of law. This general acceptance, however, can only be achieved by producing high quality results through a well-defined examination process. This research offers an original approach to attribute a painted signature to a certain artist: for the first time, a probabilistic model used to measure the discriminative potential between authentic and simulated painted signatures is studied. The opportunities and limits that lie within this method of scientifically establishing the authorship of signatures on works of art are thus presented. In addition, the second key contribution of this work proposes a procedure to combine the developed method into that used traditionally signature experts in forensic science. Such an implementation into the holistic traditional signature examination casework is a large step providing the forensic, judicial and art communities with a solid-based reasoning framework for the examination of signatures on paintings. The framework and preliminary results associated with this research have been published (Montani, 2009a) and presented at international forensic science conferences (Montani, 2009b; Montani, 2012).

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Breu descripció del funcionament d"un sistema RFID, de les seves aplicacions en biblioteques, i dels problemes i limitacions que té.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Langattomat lähiverkot ovat viime vuosikymmeninä saavuttaneet suuren suosion. Tässä työssä käsitellään käyttäjien todentamisjärjestelmän suunnittelua ja kehitystä langattomaan monioperaattoriverkkoon. Langattomassa monioperaattoriverkossa käyttäjillä on mahdollisuus käyttää eri operaattoreiden palveluita. Aluksi käsitellään olemassa olevia todentamismenetelmiä ja -järjestelmiä. minkä jälkeen kuvaillaan todentamisjärjestelmä langattomille monioperaattoriverkoille. Todentamisjärjestelmän ratkaisuvaihtoehtoja esitellään kaksi, niin sanotut moni- istunto - ja yksittäisistuntomalli. Moni-istuntomalli on normaali lähestymistapa käyttäjien todentamiseen tietokonejärjestelmissä. Siinä käyttäjän pitää tunnistautua ja todentaa itsensä jokaiselle verkon palvelulle erikseen. Yksittäisistuntomallissa pyritään parempaan luotettavuuteen ja käytettävyyteen. Siinä käyttäjä todentaa itsensä vain kerran ja voi sen jälkeen päästä useisiin palveluihin. Työn loppuosassa kuvaillaan suunnitellun järjestelmän toteutusta. Lisäksi ehdotetaan vaihtoehtoisia toteutustapoja, analysoidaan järjestelmän heikkouksia ja kerrotaan jatkokehitysmahdoillisuuksista.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Phase encoded nano structures such as Quick Response (QR) codes made of metallic nanoparticles are suggested to be used in security and authentication applications. We present a polarimetric optical method able to authenticate random phase encoded QR codes. The system is illuminated using polarized light and the QR code is encoded using a phase-only random mask. Using classification algorithms it is possible to validate the QR code from the examination of the polarimetric signature of the speckle pattern. We used Kolmogorov-Smirnov statistical test and Support Vector Machine algorithms to authenticate the phase encoded QR codes using polarimetric signatures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Wireless community networks became popular in uniting people with common interests. This thesis presents authentication and authorization service for a wireless community network using captive portal approach including ability to authenticate clients from associated networks thereby combining multiple communities in a syndicate. The system is designed and implemented to be reliable, scalable and flexible. Moreover, the result includes software management system, which automatically performs software updates at network’s access points. Future development of the system can be concentrated on an improvement of the software management system.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tässä diplomityössä tarkastellaan radiotaajuisen tunnistamisteknologian (RFID) seurannan yhtenäisiä perusteita puolustusvoimien lääkintähuollolle ja materiaalihallinnolle. Nykytilaa selvitettiin pääpainona lääkintähuollon ja materiaalihallinnon osa-alueet ja samalla tarkasteltiin koko puolustusvoimien RFIDtekniikan käyttöä. Puolustusvoimissa RFID-teknologiaa käytetään myös vaatehuollon ja kulunvalvonnan toiminnoissa. Tämän työn teoriaosuudessa tarkastellaan RFID-tekniikkaa ja sen komponentteja sekä niiden hyödyntämistä eri sektoreilla ja logistiikassa. Työn empiirisessä osuudessa selvitetään, mitkä ovat puolustusvoimien tarpeet RFID:n käytöllä ja vaatimuksia ensihoidon kiireellisyysluokittelulle (TRIAGE) sekä materiaalihallinnon ja niiden kautta saatavalle tilannekuvalle. Työn tuloksena saadaan perusteita puolustusvoimien RFID-ratkaisujen suunnittelun pohjaksi.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Organic food products are highly susceptible to fraud. Currently, administrative controls are conducted to detect fraud, but having an analytical tool able to verify the organic identity of food would be very supportive. The state-of-the-art in food authentication relies on fingerprinting approaches that find characteristic analytical patterns to unequivocally identify authentic products. While wide research on authentication has been conducted for other commodities, the authentication of organic chicken products is still in its infancy. Challenges include finding fingerprints to discriminate organic from conventional products, and recruiting sample sets that cover natural variability. Future research might be oriented towards developing new authentication models for organic feed, eggs and chicken meat, keeping models updated and implementing them into regulations. Meanwhile, these models might be very supportive to the administrative controls directing inspections towards suspicious fraudulent samples.