What About Security?

Feb. 15, 2007
You may have heard about how researchers at the University of Massachusetts tested contactless Visa, MasterCard, and American Express cards by skimming sensitive data from wallets and purses. The homemade device was put together from off-the-shelf parts.

You may have heard about how researchers at the University of Massachusetts tested contactless Visa, MasterCard, and American Express cards by skimming sensitive data from wallets and purses. The homemade device was put together from off-the-shelf parts.

Published last year and picked up by The New York Times and other media outlets, the study gave ammunition to groups like Consumers Against Supermarket Privacy Invasion and Numbering (CASPIAN) that have voiced concern about the security of RFID. (To see Caspian’s proposed RFID labeling legislation, see www.spychips.com/right-to-know-bill.html.)

Executives of the credit-card companies responded to the study to say that the contactless cards in circulation use a higher security standard than the cards that were tested. They also said that their cards transmit an encrypted number that can only be unlocked with a corresponding encryption key.

As the controversy underscores the importance of security in RFID design, vendors are taking different approaches to address vulnerabilities.

Encryptakey has beta tested a portable USB thumb drive that couples a biometric fingerprint scanner with RFID and Bluetooth. The technology moves the exchange of sensitive data to the EncryptaKey portal, a highly secure data-exchange environment that can be used at point-of-sale as well as online transactions.

Certicom Corp. has launched Certicom Security for RFID Product Authentication, which prevents counterfeiting in the supply chain. Certicom is collaborating with Texas Instruments on using elliptic curve cryptography to add item-level RFID tag security to TI’s family of ISO 15693 RFID tags.

TetraGate, developed by epcSolutions, targets advanced checkpoint security. The system couples Fulcrum Biometrics’ facial recognition with RFID to verify the identity of an ID badge holder.

SkyeTek stresses that a key advantage to its embedded RFID readers is the integration of full security libraries, leveraging security from the traditional IT systems such as built-in hashing algorithms. SkyeTek uses open standards, including AES 128- and 256-bit encryption, to secure its RFID transactions.

In announcing its 631 near-field-communication (NFC) phone, Nokia points out that the phone allows an extra layer of security: The handset can be set to permit payment information only when the user expressly authorizes the transaction via a password, unlike a card or tag that can be used by whoever has it.

Other NFC phones and devices, such as those from LG, are integrating AuthenTec’s FingerLoc and EntrePad biometric readers, which incorporate TruePrint fingerprint recognition.

Sponsored Recommendations

Near- and Far-Field Measurements

April 16, 2024
In this comprehensive application note, we delve into the methods of measuring the transmission (or reception) pattern, a key determinant of antenna gain, using a vector network...

DigiKey Factory Tomorrow Season 3: Sustainable Manufacturing

April 16, 2024
Industry 4.0 is helping manufacturers develop and integrate technologies such as AI, edge computing and connectivity for the factories of tomorrow. Learn more at DigiKey today...

Connectivity – The Backbone of Sustainable Automation

April 16, 2024
Advanced interfaces for signals, data, and electrical power are essential. They help save resources and costs when networking production equipment.

Empowered by Cutting-Edge Automation Technology: The Sustainable Journey

April 16, 2024
Advanced automation is key to efficient production and is a powerful tool for optimizing infrastructure and processes in terms of sustainability.

Comments

To join the conversation, and become an exclusive member of Electronic Design, create an account today!