<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>On the road to Bandol &#187; RFID</title>
	<atom:link href="https://javacard.vetilles.com/tag/rfid/feed/" rel="self" type="application/rss+xml" />
	<link>https://javacard.vetilles.com</link>
	<description>A weblog on Java Card, security, and other things personal</description>
	<lastBuildDate>Mon, 18 Aug 2025 06:48:26 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.0.32</generator>
	<item>
		<title>RFID in schools, or Security vs. Transparency</title>
		<link>https://javacard.vetilles.com/2012/11/29/rfid-in-schools-or-security-vs-transparency/</link>
		<comments>https://javacard.vetilles.com/2012/11/29/rfid-in-schools-or-security-vs-transparency/#comments</comments>
		<pubDate>Thu, 29 Nov 2012 12:16:04 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[User-centric]]></category>
		<category><![CDATA[RFID]]></category>
		<category><![CDATA[Security]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=847</guid>
		<description><![CDATA[I recently became enthusiastic about how wonderful transparent security would be. I still feel that way, but we also need to define limits on transparency. The example of a girl being expelled from her school because she refuses to wear a RFID badge (through @stoweboyd) is interesting. The issue is rather simple. A school has [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I recently became enthusiastic about how wonderful transparent security would be. I still feel that way, but we also need to define limits on transparency. The example of a girl being expelled from her school because <a href="http://thenextweb.com/insider/2012/11/23/judge-temporarily-saves-teenage-girl-facing-suspension-for-refusing-to-wear-rfid-tag-in-school/" class="liexternal">she refuses to wear a RFID badge</a> (through <a href="https://twitter.com/stoweboyd" class="liexternal">@stoweboyd</a>) is interesting.</p>
<p>The issue is rather simple. A school has issued RFID badges to track attendance, a student refuses to wear the badge, she gets expelled, a judge issues a stay, an we are now waiting for the trial. I also wear a RFID badge at work every day, and that doesn&#8217;t bother me much (well, it bothers me a bit: I usually wear it &#8220;visibly&#8221;, but not too much, as I don&#8217;t like the idea of the dangling name tag around my neck). This badge helps me getting into offices; it could also help me get connected to internet, and many other things. However, there is a big difference: my badge is a proximity badge. When I want to enter a room, I wave it to a reader; when I want to access internet, I insert it in a card reader. I can be tracked, but there are clear limits on what can be tracked. In that particular schoool&#8217;s case, things are different: the badges are designed to be read from a distance, without any badgeholder interference.</p>
<p>This is transparency, of course, and it could make your life easier. Think about a restricted area&#8217;s door opening just because you are arriving: sounds nice, doesn&#8217;t it? That makes it more convenient than a standard badge. However, this convenience implies that you trust the badge&#8217;s issuer, at least enough to believe that they won&#8217;t read your badge to monitor your every movement, like how much time do you spend in your office (working), or elsewhere (potentially not working). Here, the issue is the lack of user engagement from the user. With such a system, the user ends up believing/fearing that she is the victim of pemanent surveillance, and this may just be true.</p>
<p>This problem is not specific to this case. Gemalto has a technology called <a href="http://www.gemalto.com/ego/index.html" class="liexternal">eGo</a> that faces similar issues. This technology communicates through the body to establish a secure link between a reader and a personal device. To take the access control example, a door could open when you touch it. It is better than simply using RFID, but not much. With this technology, you can be tracked whenever you touch something, and some people will (understandably) not like it. Of course, it is easy to design limits. For instance, one could imagine a specific, clearly marked pad that you have to touch in order to start the authentication: then, there is a specific gesture, which can be interpreted as an acknowledgement. For RFID, this is more difficult to do, especially in crowded areas like schools, where several badges are likely to be readable at any time.</p>
<p>This post is actually turning into advertisement for <a href="http://www.naturalsecurity.com/" class="liexternal">Natural Security</a>. This startup proposes a contactless device that communicates with a fingerprint reader that can be integrated in a variety of envionments. When you swipe your finger, you are authenticated, and then a transaction can occur. You don&#8217;t need to take the card out of your pocket or purse, but you are doing a specific simple gesture to acknowledge your intention to do something. On top of that, you are authenticated, which is a nice bonus. Security, naturally and esaily; I guess that this is where the company name comes from.</p>
<p>Once again, no system is foolproof, and heavy surveillance could be achieved with most products, just like fraud remains possible in most cases. However, good security systems should allow/encourage the institutions and corporations who use them to respect their users&#8217; privacy, just as much as they should encourage/force the end users to comply to the security rules. As I mentioned in the previous post, end users aren&#8217;t security providers&#8217; customers, but they have rights, which are often hard to understan, and it is also our responsibility to help our customers respect these rights.</p>
<p>One final note about RFID at school. If this system is installed, it is likely that it will soon replace human checks, and sudents will be able to escape class or other oblgations by swapping badges or putting their badge in somebody else&#8217;s pocket. Why? Because a human being looking at badges performs an authentication by matching the ace on the badge and the face of the person wearing it, where a RFID system simply counts badges, and doesn&#8217;t care about human beings. What a package: you get less privacy <em>and</em> less security.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2012/11/29/rfid-in-schools-or-security-vs-transparency/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>We are the cherry on the NFC cake</title>
		<link>https://javacard.vetilles.com/2009/11/11/we-are-the-cherry-on-the-nfc-cake/</link>
		<comments>https://javacard.vetilles.com/2009/11/11/we-are-the-cherry-on-the-nfc-cake/#comments</comments>
		<pubDate>Wed, 11 Nov 2009 18:32:09 +0000</pubDate>
		<dc:creator><![CDATA[Eric Vétillard]]></dc:creator>
				<category><![CDATA[Discussions]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[NFC]]></category>
		<category><![CDATA[RFID]]></category>

		<guid isPermaLink="false">http://javacard.vetilles.com/?p=502</guid>
		<description><![CDATA[I love Apple, at least for one thing. Even a rumor on an Apple product yields more articles on a technology than several real product announcements from other vendors. That&#8217;s the case for the NFC rumor. There are plenty of articles, including one on The Register that compares Apple to other NFC vendors and recalls [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I love Apple, at least for one thing. Even a rumor on an Apple product yields more articles on a technology than several real product announcements from other vendors. That&#8217;s the case for the NFC rumor. There are plenty of articles, including one on The Register that <a href="http://www.theregister.co.uk/2009/11/10/iphone_nfc/" class="liexternal">compares Apple to other NFC vendors</a> and recalls that despite years of talk, NFC remains a technology on trial.</p>
<p>Yet, Apple thinks about embracing the technology. The Register, in the article, states that including NFC is a real step in the unknown, more than what Apple did before. Here, I don&#8217;t completely agree. In fact, it depends on what part of NFC they push forward. And here, Apple has plenty of ways to do things better than Nokia or others.</p>
<p>In many trials, the emphasis has been put on card emulation applications, in which a NFC phone replaces a payment card or a public transportation token, dematerialized into a NFC application, on some secure element bundled with the phone. This sounds very exciting for card people, but I am not sure how compelling such closed applications are to the general public, or at least, to the technophile crowd.<br />
<span id="more-502"></span></p>
<p>However, NFC also includes the ability to read and write tags, as well as the ability to perform peer-to-peer transactions. Although this has not been the main focus of NFC trials so far, it opens the door to many new applications. Apple filed two patents around RFID: one is an application, in which each <a href="http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&#038;Sect2=HITOFF&#038;p=1&#038;u=/netahtml/PTO/search-bool.html&#038;r=1&#038;f=G&#038;l=50&#038;co1=AND&#038;d=PG01&#038;s1=20090167699&#038;OS=20090167699&#038;RS=20090167699" class="liexternal">network device is identified</a> by a RFID tag, and inserted in a local network by presenting the tag to a reader included in the router (or maybe, on a NFC phone). The other one is about <a href="http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&#038;Sect2=HITOFF&#038;d=PG01&#038;p=1&#038;u=/netahtml/PTO/srchnum.html&#038;r=1&#038;f=G&#038;l=50&#038;s1=%2220070054616%22.PGNR.&#038;OS=DN/20070054616&#038;RS=DN/20070054616" class="liexternal">mixing a touch device and a RFID reader</a>.</p>
<p>With its Application Store, Apple has the power to distribute applications that actually make innovative use of RFIDs. If Apple gets some inspiration from <a href="http://www.violet.net/_nanoztag-the-programmable-RFID-rabbit.html" class="liexternal">Nano:ztag</a> or other fun devices, maybe that some of these applications can be really useful. And in addition, there are no deployment issues, like the ones that plague the card emulation NFC applications (Who owns the secure element? Who pays who?).</p>
<p>So, to make things short, although the smart card industry tends to think that NFC is a smart card technology, there are good chances that the part of NFC that in which the value really is is the RFID reader, because it enables innovative applications, without complex deployment schemes. In that vision, card emulation is not useless, it just holds more value. It is the cherry on the RFID cake: when NFC devices will be pervasive, and when deployment models will be clarified, this is quite likely to be a successful application of NFC.</p>
<p>But once again, not necessarily the application that makes NFC a success.</p>
]]></content:encoded>
			<wfw:commentRss>https://javacard.vetilles.com/2009/11/11/we-are-the-cherry-on-the-nfc-cake/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
