How to prevent sabotage and ensure consumer privacy with RAIN RFID
Tjibbe van der Laan
How to prevent sabotage and ensure consumer privacy with RAIN RFID - - PowerPoint PPT Presentation
How to prevent sabotage and ensure consumer privacy with RAIN RFID Tjibbe van der Laan 2 Hardware independent 3 780 stores 4 countries project start in 2017, roll-out in 2018 4 280 stores United Kingdom, some other countries
How to prevent sabotage and ensure consumer privacy with RAIN RFID
Tjibbe van der Laan
2
Hardware independent
3
4
780 stores 4 countries project start in 2017, roll-out in 2018
280 stores United Kingdom, some other countries roll-out in 2017
50 stores 23 countries from Japan to USA roll-out completed in three months
Stock accuracy Better customer service Product availability
Full supply chain coverage
8
(Source) Tagging
performance quality control
encoding, serialisation and security/privacy
Logistics and DCs
connect supply chain together
Store
processes
training manuals, videos and support portal
with 3rd parties (customer interaction e.g.)
By default, RAIN RFID tags are not protected
Everybody is able to re-write the EPC and other memory contents Everybody is able to kill the tags
9
There are two ways to protect RAIN RFID tags
10
Passwords Lock
Access password used for (preventing) reading and writing specific memories in the chip Kill password used for (preventing) killing the chip
11
Two passwords
Password
Access Password
while having the Access Password
12
Lock provides four options
Independent setting for both passwords, EPC, User and TID memory
Privacy is getting more and more important
13
Consumer attention is growing Retailers move from tickets to embedded tags
RAIN RFID poses privacy risk
Longe range identification Globally unique number (TID) Associated with or integrated in physical product ‘Indirectly identifiable personal information’
14
RAIN RFID privacy features
‘Untraceable’
Read only at short distance
Only read privacy-sensitive data when knowing the Access Password Works even with permanently locked memories; protected with Access Password
15
Want to know more?
Tjibbe van der Laan | tjibbe.vanderlaan@nedap.com