How to prevent sabotage and ensure consumer privacy with RAIN RFID Tjibbe van der Laan
� 2
Hardware independent � 3
780 stores 4 countries project start in 2017, roll-out in 2018 � 4
280 stores United Kingdom, some other countries roll-out in 2017 � 5
50 stores 23 countries from Japan to USA roll-out completed in three months � 6
Better customer service Product availability Stock accuracy
Full supply chain coverage 🏸 🚛 🏭 (Source) Tagging Store Logistics and DCs • Independent RFID label • Covering all store stock • Nedap consults and leads performance quality control processes • Partnered approach • Purchasing assistance • Intuitive solution including training manuals, videos • !D Cloud DC Connector to • Validation of label- and support portal connect supply chain encoding, serialisation and together security/privacy • Open platform to integrate with 3rd parties (customer interaction e.g.) � 8
By default, RAIN RFID tags are not protected Everybody is able to re-write the EPC and other memory contents Everybody is able to kill the tags � 9
There are two ways to protect RAIN RFID tags 🔒 🔓 Passwords Lock � 10
Two passwords 🔒 Access password used for (preventing) reading and writing specific memories in the chip Kill password used for (preventing) killing the chip � 11
Lock provides four options 1. Write (and read) the memory - without Access 🔓 Password 2. Write (and read) the memory - when providing Access Password 3. Impossible to write (and read) the memory - even while having the Access Password 4. Always write (and read) the memory Independent setting for both passwords, EPC, User and TID memory � 12
Privacy is getting more and more important Consumer attention is growing Retailers move from tickets to embedded tags � 13
RAIN RFID poses privacy risk Longe range identification Globally unique number (TID) Associated with or integrated in physical product ‘Indirectly identifiable personal information’ � 14
RAIN RFID privacy features ‘Untraceable’ • Read Range Reduction Read only at short distance • Hide Memory Only read privacy-sensitive data when knowing the Access Password Works even with permanently locked memories; protected with Access Password � 15
Want to know more? Tjibbe van der Laan | tjibbe.vanderlaan@nedap.com
Recommend
More recommend