<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Retail News Update &#187; chip</title>
	<atom:link href="http://artrm.com/retail-news/tag/chip/feed/" rel="self" type="application/rss+xml" />
	<link>http://artrm.com/retail-news</link>
	<description>by Quicksoft Services</description>
	<lastBuildDate>Tue, 23 Aug 2022 10:26:31 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>RFID Technology</title>
		<link>http://artrm.com/retail-news/2007/10/rfid-technology/</link>
		<comments>http://artrm.com/retail-news/2007/10/rfid-technology/#comments</comments>
		<pubDate>Wed, 31 Oct 2007 11:25:55 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[RFID]]></category>
		<category><![CDATA[antenna]]></category>
		<category><![CDATA[chip]]></category>
		<category><![CDATA[frequencies.]]></category>
		<category><![CDATA[microchip]]></category>

		<guid isPermaLink="false">http://www.artrm.com/retail-news/2007/10/31/rfid-technology/</guid>
		<description><![CDATA[How does an RFID system work? An RFID system consists of a tag made up of a microchip with an antenna, and an interrogator or reader with an antenna. The reader sends out electromagnetic waves. The tag antenna is tuned to receive these waves. A passive RFID tag draws power from the field created by [&#8230;] <a class="more-link" href="http://artrm.com/retail-news/2007/10/rfid-technology/">&#8595; Read the rest of this entry...</a>]]></description>
				<content:encoded><![CDATA[<p><strong>How does an RFID system work?</strong><br />
An RFID system consists of a tag made up of a microchip with an antenna, and an interrogator or reader with an antenna. The reader sends out electromagnetic waves. The tag antenna is tuned to receive these waves. A passive RFID tag draws power from the field created by the reader and uses it to power the microchip&#8217;s circuits. The chip then modulates the waves that the tag sends back to the reader, which converts the new waves into digital data. For more information on the components of a complete system used in businesses, see Getting Started.</p>
<p><strong>What is the difference between low-, high-, and ultra-high frequencies?</strong><br />
Just as your radio tunes in to different frequencies to hear different channels, RFID tags and readers have to be tuned to the same frequency to communicate. RFID systems use many different frequencies, but generally the most common are low-frequency (around 125 KHz), high-frequency (13.56 MHz) and ultra-high-frequency or UHF (860-960 MHz). Microwave (2.45 GHz) is also used in some applications. Radio waves behave differently at different frequencies, so you have to choose the right frequency for the right application.</p>
<p><strong>How do I know which frequency is right for my application? </strong><br />
Different frequencies have different characteristics that make them more useful for different applications. For instance, low-frequency tags use less power and are better able to penetrate non-metallic substances. They are ideal for scanning objects with high-water content, such as fruit, but their read range is limited to less than a foot (0.33 meter). High-frequency tags work better on objects made of metal and can work around goods with high water content. They have a maximum read range of about three feet (1 meter). UHF frequencies typically offer better range and can transfer data faster than low- and high-frequencies. But they use more power and are less likely to pass through materials. And because they tend to be more &#8220;directed,&#8221; they require a clear path between the tag and reader. UHF tags might be better for scanning boxes of goods as they pass through a dock door into a warehouse. It is best to work with a knowledgeable consultant, integrator or vendor that can help you choose the right frequency for your application.</p>
<p><strong>Do all countries use the same frequencies?</strong><br />
No. Different countries have allotted different parts of the radio spectrum for RFID, so no single technology optimally satisfies all the requirements of existing and potential markets. The industry has worked diligently to standardize three main RF bands: low frequency (LF), 125 to 134 kHz; high frequency (HF), 13.56 MHz; and ultrahigh frequency (UHF), 860 to 960 MHz. Most countries have assigned the 125 or 134 kHz areas of the spectrum for low-frequency systems, and 13.56 MHz is used around the world for high-frequency systems (with a few exceptions), but UHF systems have only been around since the mid-1990s, and countries have not agreed on a single area of the UHF spectrum for RFID. UHF bandwidth across the European Union ranges from 865 to 868 MHz, with interrogators able to transmit at maximum power (2 watts ERP) at the center of that bandwidth (865.6 to 867.6 MHz). RFID UHF bandwidth in North America ranges from 902 to 928 MHz, with readers able to transmit at maximum power (1 watt ERP) for most of that bandwidth. Australia has allotted the 920 to 926 MHz range for UHF RFID technology. And European transmission channels are restricted to a maximum of 200 kHz in bandwidth, versus 500 kHz in North America. China has approved bandwidth in the 840.25 to 844.75 MHz and 920.25 to 924.75 MHz ranges for UHF tags and interrogators used in that country. Until recently, Japan did not allow any UHF spectrum for RFID, but it is looking to open up the 960 MHz area. Many other devices use the UHF spectrum, so it will take years for all governments to agree on a single UHF band for RFID.</p>
<p><strong>RFID can be used with sensors. Is that true ? </strong><br />
Yes. Some companies are combining RFID tags with sensors that detect and record temperature, movement and even radiation. The technology can also be used in the health-care sector. For instance, Belgium&#8217;s University Hospital of Ghent has implemented a system that detects when a patient is having cardiac distress, and sends caregivers an alert indicating the patient&#8217;s location.</p>
]]></content:encoded>
			<wfw:commentRss>http://artrm.com/retail-news/2007/10/rfid-technology/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>RFID Viruses</title>
		<link>http://artrm.com/retail-news/2007/11/rfid-viruses/</link>
		<comments>http://artrm.com/retail-news/2007/11/rfid-viruses/#comments</comments>
		<pubDate>Tue, 13 Nov 2007 06:31:15 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[Retail Technology]]></category>
		<category><![CDATA[RFID]]></category>
		<category><![CDATA[chip]]></category>
		<category><![CDATA[viruses]]></category>

		<guid isPermaLink="false">http://www.artrm.com/retail-news/2007/11/13/rfid-viruses/</guid>
		<description><![CDATA[RFID Threats Unfortunately, businesses and governments are not the only ones interested in RFID. Civil liberties groups, hackers and criminals are also keenly interested in this new development, albeit for very different reasons. Civil liberties groups are concerned about RFID technology being used to invade people&#8217;s privacy; RFID tags enable unethical individuals to snoop on [&#8230;] <a class="more-link" href="http://artrm.com/retail-news/2007/11/rfid-viruses/">&#8595; Read the rest of this entry...</a>]]></description>
				<content:encoded><![CDATA[<p><strong>RFID Threats</strong></p>
<p>Unfortunately, businesses and governments are not the only ones interested in RFID. Civil liberties groups, hackers and criminals are also keenly interested in this new development, albeit for very different reasons. Civil liberties groups are concerned about RFID technology being used to invade people&#8217;s privacy; RFID tags enable unethical individuals to snoop on people and surreptitiously collect data on them without their approval or even knowledge. For example, RFID-enabled public transit tickets could allow public transit managers to compile a dossier listing all of a person&#8217;s travels in the past year &#8212; information which may be of interest to the police, divorce lawyers, and others.</p>
<p>However, privacy is not the focus of this website and will not be discussed further below. On the other hand, we are intensely concerned about privacy in an RFID-enabled world and have built an entire sister website about a device we have constructed, called the RFID Guardian, which could potentially help people protect their privacy from RFID snooping in the future.</p>
<p>A completely different category of threats arises when hackers or criminals cause valid RFID tags to behave in unexpected (and generally malicious) ways. Typically, computer-bound or mobile RFID readers query RFID tags for their unique identifier or on-tag data, which often serves as a database key or launches some real-world activity. For example, when an RFID reader at a supermarket checkout counter reads the tag on a product, the software driving it could add the item scanned to the list of the customer&#8217;s purchases, tallying up the total after all products have been scanned.</p>
<p>Here is where the trouble comes in. Up until now, everyone working on RFID technology has tacitly assumed that the mere act of scanning an RFID tag cannot modify back-end software, and certainly not in a malicious way. Unfortunately, they are wrong. In our research, we have discovered that if certain vulnerabilities exist in the RFID software, an RFID tag can be (intentionally) infected with a virus and this virus can infect the backend database used by the RFID software. From there it can be easily spread to other RFID tags. No one thought this possible until now. Later in this website we provide all the details on how to do this and how to defend against it in order to warn the designers of RFID systems not to deploy vulnerable systems.</p>
<p>While we have some hesitation in giving the &#8220;bad guys&#8221; precise information on how to infect RFID tags, it has been our experience that when talking to people in charge of RFID systems, they often dismiss security concerns as academic, unrealistic, and unworthy of spending any money on countering, as these threats are merely &#8220;theoretical.&#8221; By making code for RFID &#8220;malware&#8221; publicly available, we hope to convince them that the problem is serious and had better be dealt with, and fast. It is a lot better to lock the barn door while the prize race horse is still inside than to deal with the consequences of not doing so afterwards.</p>
<p><strong>Real-World Scenarios</strong></p>
<p>To make clear what kinds of problems might arise from RFID hacking by amateurs or criminals, let us consider three possible and all-too-realistic scenarios.</p>
<ol>
<li>A prankster goes to a supermarket that scans the purchases in its customers&#8217; shopping carts using the RFID chips affixed to the products instead of their bar codes. Many supermarkets have plans in this direction because RFID scans are faster (and in some cases can be done by the customers, eliminating the expense of having cashiers). The prankster selects, scans, and pays for a nice jar of chunk-style peanut butter that has an RFID tag attached to it. Upon getting it home, he removes or destroys the RFID tag. Then he takes a blank RFID tag he has purchased and writes a exploit on it using his home computer and commercially available equipment for writing RFID tags. He then attaches the infected tag to the jar of peanut butter, brings it back to the supermarket, heads directly for the checkout counter, and pays for it again. Unfortunately, this time when the jar is scanned, the virus on its tag infects the supermarket&#8217;s product database, potentially wreaking all kinds of havoc such as changing prices.</li>
<li>Emboldened by his success at the supermarket, the prankster decides to unwittingly enlist his cat in the fun. The cat has a subdermal pet ID tag, which the attacker rewrites with a virus using commercially available equipment. He then goes to a veterinarian (or the ASPCA), claims it is stray cat and asks for a cat scan. Bingo! The database is infected. Since the vet (or ASPCA) uses this database when creating tags for newly-tagged animals, these new tags can also be infected. When they are later scanned for whatever reason, that database is infected, and so on. Unlike a biological virus, which jumps from animal to animal, an RFID virus spread this way jumps from animal to database to animal. The same transmission mechanism that applies to pets also applies to RFID-tagged livestock.</li>
<li>Now we get to the scary part. Some airports are planning to expedite baggage handling by attaching RFID-augmented labels to the suitcases as they are checked in. This makes the labels easier to read at greater distances than the current bar-coded baggage labels. Now consider a malicious traveler who attaches a tiny RFID tag, pre-initialized with a virus, to a random person&#8217;s suitcase before he checks it in. When the baggage-handling system&#8217;s RFID reader scans the suitcase at a Y-junction in the conveyor-belt system to determine where to route it, the tag responds with the RFID virus, which could infect the airport&#8217;s baggage database. Then, all RFID tags produced as new passengers check in later in the day may also be infected. If any of these infected bags transit a hub, they will be rescanned there, thus infecting a different airport. Within a day, hundreds of airport databases all over the world could be infected. Merely infecting other tags is the most benign case. An RFID virus could also carry a payload that did other damage to the database, for example, helping drug smugglers or terrorists hide their baggage from airline and government officials, or intentionally sending baggage destined for Alaska to Argentina to create chaos (e.g., as revenge for a recently fired airline employee).</li>
</ol>
<p>Some companies with a vested interest in RFID technology have said their software can withstand attacks such as the ones we have proposed. We hope that is the case. These claims would be much more believable, however, if the companies made their software available to universities and other neutral parties for exhaustive testing, along with a large reward (say, $100,000) for the first person to construct a virus that successfully infects it. If no one is able to infect the software after, say 6 months, the claim that the software cannot be infected is a great deal stronger than merely stating it without proof. The nice part of this for the company is that if the software is bulletproof, it costs the company nothing.</p>
<p><strong>The World&#8217;s First RFID Chip Infected with a Virus</strong></p>
<p><img src="http://retailnu.files.wordpress.com/2007/11/rfid_virus.jpg" alt="rfid_virus.jpg" /></p>
]]></content:encoded>
			<wfw:commentRss>http://artrm.com/retail-news/2007/11/rfid-viruses/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
	</channel>
</rss>
