The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we describe an innovative system providing services for tourism based on Near Field Communication technology. This work is part of the SIESTA project, co-funded by the Tuscany Region in Italy, to develop applications relying on mobile phones to support tourists visiting cities of art. Near Field Communication mixes the functionalities of RFID systems with the communication capabilities...
There are a very wide range of application prospects in various industries that integrating RFID technology into mobile communication terminals. This paper presents NFC mobile phone system solutions as well as the radio frequency module identification solutions of NFC mobile phone. The achievement of this technology will bring great convenience to people's lives.
NFC is one of the latest wireless communication technologies, making possible variety of business opportunities. StoLPaN, a pan-European consortium of companies, universities and user groups aims to define open commercial and technical frameworks for the remote management of NFC-enabled services on mobile devices. These frameworks will facilitate the deployment of NFC-enabled mobile applications regardless...
Advances in wireless communication and embedded electronic systems have revolutionized everyday life via inter-networking sophisticated tiny and useful devices. Mobile RFID (mRFID) systems make it possible to get information about entities through portable devices including mobile handsets, PDAs, laptops, etc. RFID tags consist of secret information that can be accessed by an authorized mobile user...
With promising progress of wireless network technology and mobile devices, the mobile commerce is becoming a feasible extension of electric commerce. However, Research on mobile commerce based on RFID is still in leading strings. In this paper, we firstly analyzed the current mobile commerce situation in China, and introduce how to improve m-commerce utilizing mobile RFID technology; Then we discussed...
The RFID technology (radio frequency identification) is used in the view of data transmission, by the help of mobile transponders, known as tags and for receiving that information, by means of reading devices, known as readers. Radio frequency identification (RFID) has become specific for tracking the items and carrying out solutions of data achieving within the supply chains of enterprises, factories,...
Recently, mobile RFID has been studied actively as a primary technology in computing environments. Mobile RFID service is defined as a special type of mobile service using RFID tag packaging objects and RFID readers attached to mobile RFID terminals. While the mobile RFID system has many advantages, it may make new intrusions to the userpsilas privacy. We propose the policy-based dynamic privacy protection...
The RFID and sensor network based ubiquitous computing has great potential in medical and healthcare services. Most of medical accidents around patients are depended on misidentification of patient or medical articles. The accidents can be reduced, if information about the patient is managed automatically. In this aspect, the mobile device with RFID reader is useful device as a medical assistant....
We propose electronic pedigree (e-pedigree) discovery system (PDS) and its e-pedigree verification service for consumer's mobile device. The PDS provides securities such as access control, authentication, and privacy protection for the e-pedigree. It also supports an e-pedigree document query service and a verification service on a consumer's mobile RFID device like a mobile phone or a PDA which can...
In this paper, we present some cases which raise security vulnerability in the forthcoming mobile RFID environment and discuss some security considerations to prevent such cases. We also describe other security requirements related with authentication of the EPC tags through the mobile RFID devices. The mobile RFID environment means that mobile RFID devices like mobile (cellular) phone and PDA employing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.