IPB

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Fun with RFID tags
Caine Hazen
post May 5 2006, 04:55 PM
Post #1


MechRigger Delux
***

Group: Retired Admins
Posts: 1,151
Joined: 26-February 02
From: Hanger 18, WPAFB
Member No.: 1,657



So there are things I think a few GM will find useful in this article, and the rest of us techie professionals might find it interesting anyway.

http://www.wired.com/wired/archive/14.05/r...rfid&topic_set=
Go to the top of the page
 
+Quote Post
Glayvin34
post May 5 2006, 05:07 PM
Post #2


Moving Target
**

Group: Members
Posts: 351
Joined: 17-February 06
From: San Francisco
Member No.: 8,275



Neat-o.
Did this from page 256 make anyone else's tastebuds stand up and say "HOWDY"?

"Marking systems are designed to tag intruders with a discreet marking so that they can be later identified if captured. Marking methods include ultraviolet dye, RFID tags, DNA encoded material, or even nanite tags. The markers are typically sprayed unobtrusively over exitways and other traffic areas."

RFID tags are fun!
Go to the top of the page
 
+Quote Post
hobgoblin
post May 5 2006, 05:22 PM
Post #3


panda!
**********

Group: Members
Posts: 10,331
Joined: 8-March 02
From: north of central europe
Member No.: 2,242



the start of the article just shows how bad a single part id system is.

it should not be the rfid alone as any data that can be read can be copyed. what is needed is some kind of biometric or passcode in adition, hell maybe both.

say you need a palmprint and a rfid tag at the same time. put the tag inside the hand, and have it be read when the wearer press his hand to the print reader.

the content of a rfid should allso somwho be tied to the specific rfid, so that you can just copy the data onto a diffrent rfid. maybe using a special serial embedded in the rfid, in combo with a encryption algorithm and a secret key used by the company that writes the data into the rfid.

that way you need the algorithm and the key to decrypt the content of the rfid, and can verify that the rfid its stored in is the rfid the data was originaly written to. this key would be stored inside the companys reader and writer equipment.

it will not be 100%, as there is still the risk of someone getting hold of a device or the key. but its better then the current free for all...
Go to the top of the page
 
+Quote Post
Rotbart van Dain...
post May 5 2006, 05:40 PM
Post #4


Hoppelhäschen 5000
*********

Group: Members
Posts: 5,807
Joined: 3-January 04
Member No.: 5,951



Transponders that only answer to correct querys are pretty old - those are called Stealth Tags in SR4... but encrypting the signals won't help too much, especially in SR4.

Broadcast communicaation is insecure by default on the long run.
Go to the top of the page
 
+Quote Post

Reply to this topicStart new topic

 



RSS Lo-Fi Version Time is now: 28th April 2024 - 01:08 PM

Topps, Inc has sole ownership of the names, logo, artwork, marks, photographs, sounds, audio, video and/or any proprietary material used in connection with the game Shadowrun. Topps, Inc has granted permission to the Dumpshock Forums to use such names, logos, artwork, marks and/or any proprietary materials for promotional and informational purposes on its website but does not endorse, and is not affiliated with the Dumpshock Forums in any official capacity whatsoever.