![]() This would not be an ideal solution, however, since it would slow the boarding process down, and one of the big selling points of RFID is that it speeds up boarding processes by eliminating the need to find change and deposit it in a collection box.Īnother option would be to use the tag ID (TID) in the transponder along with the serial number. You could put the card-holder’s picture on the card, for instance, and bus drivers could then ask to see each card after it was used to pay for a fare. One would be in the physical design of the card. However, there are ways to prevent this kind of fraud. ![]() ![]() This would not require a lot of technical skill. If a transit company is issuing transponders with unique serial numbers and allowing people to ride its busses as long as the ID in a transponder appears valid, then a criminal could buy an RFID card on the Internet, write the ID of a legitimate card to the transponder with an RFID reader-writer and then use it like the original. The security of an RFID system, as with almost any payment or information technology system, depends on how it is set up. If it were cloned, would the cloned card work like the original-in other words, if it were scanned, would it be authorized? How difficult is the cloning process? Let’s say there’s a scenario in which an individual has an RFID bus card or pass.
0 Comments
Leave a Reply. |