Microsoft Research

Rank: 108 / 1333

4 selected videos

Director of MITΓÇÖs Auto-ID Laboratory and a professor of Information Engineering

This talk will focus on the problems of bringing real time visibility to physical objects by using active and passive RFID. The use of RFID technology to track products through the supply chain was promoted by MITΓÇÖs Auto-ID Center and the concept of the 5 cent tag encouraged companies such as Wall*Mart and Gillette to spearhead RFID adoption. However, to be useful in a supply chain we need to be able to answer the questions of What (Identity), When (timestamp), Where (location) and Why...

View more

Related topics : companies using rfid in supply chain / companies using rfid technology / passive rfid tag uses / active rfid tag uses / active rfid tracking technology

Security and Privacy in Radio Frequency Identification

Radio Frequency Identification (RFID) refers to using tiny devices called tags to carry information about people or things. The technology offers great promise, with applications in everything from supply chain management to library book tracking to more convenient credit cards. Unfortunately, the technology also raises security and privacy problems. For example, without protections, it is possible to clone RFID tags and perform surreptitious tracking via RFID. I will discuss two approaches...

View more

Related topics : radio frequency identification device rfid technology / radio frequency identification tags (rfid) / radio frequency tracking device / rfid applications in supply chain management / what frequency do credit card rfid use

Theory Plus Practice in Computer Security: Radio Frequency Identification and Whitebox Fuzzing [1/4]

I will describe two areas in computer security that demonstrate the wide range of techniques, from both theory and practice, we need to make impact. First, I treat privacy and security in Radio Frequency Identification (RFID). RFID refers to a range of technologies where a small device with an antenna, or tag is attached to an item and can be queried later wirelessly by a reader. While proponents of RFID promise security and efficiency benefits, the technology also raises serious security...

View more

Related topics : radio frequency identification device rfid technology / radio frequency identification technology (rfid) / rfid radio frequency identification tags / rfid security and privacy concerns / privacy and security in library rfid

Off the Beaten Path in Pervasive Computing

Many of our current research projects at MERL are squarely in the pervasive-computing realm, such as: interactive multi-user tabletop displays, operator-identifying automotive controls, digital home networking, location-aware RFID tags, semi-passive RFID tags for sensor networks, novel physical and chemical sensors, speech-based information retrieval for mobile devices, and vision-based person/object tracking.  But because the results of this work have been or will be presented in forums...

View more

Related topics : passive rfid tag sensor / semi passive rfid tags / rfid tag location tracking / rfid tag information