Toshiyuki Kuwana
Hitachi
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Toshiyuki Kuwana.
Archive | 2010
Yuichi Kobayashi; Toshiyuki Kuwana; Yoji Taniguchi; Norihisa Komoda
The RFID tag is equipped with a small IC tip and antenna, and data can be read from or written to it via radio signal. This device has attracted much attention because it is extremely effective for promoting work efficiency in supply chains and for building IT-based systems connecting companies and/or industries. The scope of RFID use is spreading throughout the entire product life cycle, and RFID is now used not only for primary distribution from production to sale, but also for secondary forms of distribution, such as recycling or maintenance. The difference between the scope of primary distribution only and the scope of a product’s entire life cycle is that in the latter a greater number of general companies and people are involved in the distribution process. Therefore, a provision for protecting data written to RFID tag memory must be included when RFID systems are built so that data cannot be illegally read or overwritten. In addition, a solution to RFID privacy problems is required so that items with RFID tags can be safely provided to many consumers (CASPIAN et al., 2003; Albrecht & Mcintyre, 2005). We define the privacy problem as unauthorized persons abusing the radiocommunications function of RFID tags, and we consider two kinds of privacy problem: a. Possession Privacy Problem: This is the problem of unauthorized persons or agents being able to surreptitiously detect items that other persons are carrying because of the item codes recorded in the memory of IC tags. b. Location Privacy Problem: This is the problem of an unauthorized persons or agents knowing where a person is without that person’s knowledge because a unique ID is recorded in an IC tag memory. A guideline for solving privacy problems (GS1 EPCglobal, 2005) states that RFID tags should be removed from products before the products are provided to consumers. However, the requirements for consumers, who want to protect their privacy, conflict with those of industries that want to use RFID tags throughout the entire life cycle of products – satisfying both requirements is very difficult. To protect consumer privacy, some researchers have proposed systems that mount a hash function in the RFID tag which authenticates interrogators (Weis, 2003; Juels.& Pappu, 2003; Source: Radio Frequency Identification Fundamentals and Applications, Bringing Research to Practice, Book edited by: Cristina Turcu, ISBN 978-953-7619-73-2, pp. 278, February 2010, INTECH, Croatia, downloaded from SCIYO.COM
emerging technologies and factory automation | 2007
Yuichi Kobayashi; Toshiyuki Kuwana; Yoji Taniguchi; Norihisa Komoda
The data on RFID tags placed on items must be protected to secure the privacy of that information throughout the item life cycle from production to purchase to recycling. Therefore, we propose low cost RFID tags with an access control function of using a password and a system that assigns and manages a different password for each group of RFID tags. We also explain how using the system could protect consumer privacy, and how the RFID tag could be used throughout the entire life cycle of an item.
Archive | 1987
Yasuhiro Noguchi; Toshiyuki Kuwana; Yukio Funyu
Archive | 1997
Toru Sakaibara; Toshiharu Kawasaki; Toshiyuki Kuwana
Archive | 1993
Toru Sakaibara; Toshiyuki Kuwana; Ryo Fujita
Archive | 2003
Toshiyuki Kuwana; Takehiro Okawa; Yutaka Sato; Hiroshi Yoshiki; 豊 佐藤; 宏 吉木; 武宏 大川; 利幸 桑名
Archive | 2006
Yuichi Kobayashi; Toshiyuki Kuwana; Atsushi Honzawa; Shinichiro Fukushima
Archive | 1995
Shouji Nakamura; Shinji Kimura; Yumiko Sugita; Reki Yamamoto; Eriko Koda; Toshiyuki Kuwana; Masato Manda
Archive | 2004
Takeshi Teramura; Motonobu Saito; Toshiyuki Kuwana
Archive | 2003
Yasuko Fukuzawa; Shoji Imamura; Shuichi Ishida; Toshiyuki Kuwana; Takashi Mizuno; 将司 今村; 利幸 桑名; 高志 水野; 修一 石田; 寧子 福澤