Your SlideShare is downloading. ×
CEP and SOA: An Open Event-Driven Architecture  for Risk Management  March 14, 2007  IT Financial Services 2007  Lisbon, P...
Our Agenda <ul><li>Key Takeaways, Market and Business Drivers </li></ul><ul><li>TIBCO’S Solution Architecture </li></ul><u...
Key Takeaways of Presentation <ul><li>Next generation security and enterprise risk management solutions require the fusion...
<ul><li>Firewall, IDS, IPS, Cryptography, Access Control are Simply Not Sufficient. </li></ul><ul><li>Malicious Users  are...
Background – the Current state of IDS Intrusion Detection Systems Simply Don’t Work! “ Today over  70%  of attacks against...
Risk and Compliance  Business Drivers and Market Trends <ul><li>Business Drivers:   Organizations face mounting pressures ...
Our Agenda <ul><li>Key Takeaways, Market and Business Drivers </li></ul><ul><li>TIBCO’S Solution Architecture </li></ul><u...
Event-Driven Operational Risk Management An Active Predictive Business™ System of Risk and Asset Management Control evalua...
How TIBCO Delivers for Customers Accelerate projects, initiatives, and  go-to-market cycles Increase operational efficienc...
Complex Event Processing  &quot; Events in several forms, from simple events to complex events, will become very widely us...
TIBCO BusinessEvents™ Solutions Overview BusinessEvents™ Solutions Space Data: Events & Databases -Real-Time & Historical ...
Rule-Based Security Event Management Complex Event Processing for Enterprise Security Event Integration/Correlation Rule-B...
Event-Driven SOA, CEP and BPM Enterprise Integration, Correlation and Management of Security Events Two Minute  Explainer
TIBCO’s Real-Time Agent-Based SEM Approach A Multisensor Data Fusion Approach to Security Event Management Intrusion and F...
CEP Reference Architecture Next-Generation Functional Architecture for SOA / BPM / EDA  24 EVENT PRE-PROCESSING EVENT SOUR...
Event-Driven Complex Event Processing <ul><li>Multi-level inference in a distributed, event-driven architecture </li></ul>...
Event-Driven CEP and SEM - Summary Flexible SOA and Event-Driven Architecture
Security Event Management High Level Event-Driven Architecture (EDA) for SEM JAVA  MESSAGING SERVICE  (JMS) DISTRIBUTED EV...
Overview of TIBCO’s Solutions Architecture <ul><li>Fusion of IDS and FDS information across Customer’s Enterprise, includi...
Potential Extensions to Solutions Architecture <ul><li>Extension of EDA/SEM to rules-based access control </li></ul><ul><u...
Key Takeaways of Presentation <ul><li>Next generation security and enterprise risk management solutions require the fusion...
RFID for Automatic Baggage Handling & Reconciliation
Hong Kong International Airport <ul><li>2 runways </li></ul><ul><li>1 PTB </li></ul><ul><li>75 airlines, 143 destinations ...
Airport Profile <ul><li>41 M passengers (2005) over 110,000 per day </li></ul><ul><li>20M departure baggage (2005) </li></...
HKIA RFID Project -  Background <ul><li>In 2003, HKIA adopted to apply RFID  t echnology to improve the Baggage Handling a...
RFID Components RFID Chip Inlay / Label Reader, Antenna
Type of RFID Tags - Wal-Mart HKIA Octopus User Small Small Moderate Size ~1.5m ~ 5 m < 0.7m Read Range Fast Fast Moderate ...
Comparison of UHF RFID Tags √ √ Low cost √ Access security √ √ Kill security √ √ Reads > 500 tags / sec √ Dense-reader ope...
RFID benefits <ul><li>Customers </li></ul><ul><li>Reduce mishandling of bags </li></ul><ul><li>Airports </li></ul><ul><li>...
Hong Kong International Airport Business Case of RFID <ul><li>Lower cost for ABRS  </li></ul><ul><li>(Phase 1 – Read Only ...
 
BHS Capacity Check-in Transfer primary  sorters Early bag store Early bag Baggage Handling System secondary  sorters Bag t...
Automatic Baggage Reconciliation System (ABRS) <ul><li>BHS – sort bags to lateral + x-ray screening </li></ul><ul><li>ABRS...
Automatic Baggage Reconciliation System (ABRS) Transfer (at Belt A) Primary Sorter No Read MCS Secondary Sorter Lateral Ba...
Lateral Operation RFID readers Containers RFID Readers at Lateral RFID Reader at Lateral
Dual Mode Handheld Terminal
RFID System Configuration <ul><li>RF Readers and Antenna </li></ul><ul><ul><li>200+ Readers : Symbol AR400 </li></ul></ul>...
RFID Performance Data <ul><li>RFID operation started at 1-Aug-05 </li></ul><ul><li>20M Class 0 RFID label used per year </...
Challenges <ul><li>Standardization of airline bag tag </li></ul><ul><li>Ways to affix RFID label on bag </li></ul><ul><li>...
Challenge – RF Power Tuning <ul><li>Different RF Coverage caused by type of ULD </li></ul><ul><li>Absorbed RF reflection i...
Challenges (Cont’) <ul><li>Old label from multi-trips (additional reader required) </li></ul><ul><li>Bag content/design i....
Phase 2 Implementation – Gen2 RFID <ul><li>Implement an “open standards” encoding solution using Gen-2 R/W RFID tag  </li>...
Phase 2 – Stage 1 Transfer <ul><li>Use 2”x4” Gen2 RFID with label </li></ul><ul><li>Barcode scanner scans LPN and passes t...
Phase 2 – Stage 1
Phase 2 – Stage 2 Local Check-in <ul><li>Use Gen2 RFID integrated baggage tag </li></ul><ul><li>Standardize baggage tag as...
Phase 2 – Stage 3 User Data <ul><li>Use Gen2 RFID integrated baggage tag </li></ul><ul><li>Standardize airlines Pectab </l...
Future Direction <ul><li>More added values services for passengers and airlines using RFID </li></ul><ul><li>Cooperation w...
Thank You! Tim Bass, CISSP Principal Global Architect, Director Emerging Technologies Group Event Processing at TIBCO
Upcoming SlideShare
Loading in...5
×

CEP and SOA: An Open Event-Driven Architecture for Risk Management

4,505

Published on

CEP and SOA: An Open Event-Driven Architecture for Risk Management, March 14, 2007, IIT Financial Services 2007, Lisbon, Portugal, Tim Bass, CISSP, Principal Global Architect, Director Emerging Technologies Group

Published in: Technology, Economy & Finance
1 Comment
14 Likes
Statistics
Notes
  • I like it! Can I have it?
    Please...

    Thx
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
4,505
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
1
Likes
14
Embeds 0
No embeds

No notes for slide
  • Transcript of "CEP and SOA: An Open Event-Driven Architecture for Risk Management"

    1. 1. CEP and SOA: An Open Event-Driven Architecture for Risk Management March 14, 2007 IT Financial Services 2007 Lisbon, Portugal Tim Bass, CISSP Principal Global Architect, Director Emerging Technologies Group
    2. 2. Our Agenda <ul><li>Key Takeaways, Market and Business Drivers </li></ul><ul><li>TIBCO’S Solution Architecture </li></ul><ul><ul><li>Event-Driven Operational Risk Management </li></ul></ul><ul><ul><li>Security Event Management and TIBCO BusinessEvents™ </li></ul></ul><ul><ul><li>TIBCO’s Reference Architecture for CEP and SEM </li></ul></ul><ul><ul><li>Example High Level Architecture </li></ul></ul><ul><li>Wrap Up </li></ul>
    3. 3. Key Takeaways of Presentation <ul><li>Next generation security and enterprise risk management solutions require the fusion of information from numerous event sources across the enterprise: </li></ul><ul><ul><li>Model all Security Devices, Log Files, Sniffers, etc. as Sensors and Event Processors </li></ul></ul><ul><ul><li>Use Secure Standards-based Messaging for Communications </li></ul></ul><ul><li>Next-Gen Enterprise Risk Management (ERM) Requires a Number of Technologies: </li></ul><ul><ul><li>Distributed Computing, Publish/Subscribe and SOA </li></ul></ul><ul><ul><li>Hierarchical, Cooperative Inference Processing </li></ul></ul><ul><ul><li>High Speed, Real Time Rules Processing with State Management </li></ul></ul><ul><ul><li>Event-Decision Architecture for Identification and Mitigation of Security Situations </li></ul></ul><ul><li>Solution Expandable to Compliance and Incident Management (BPM) </li></ul>
    4. 4. <ul><li>Firewall, IDS, IPS, Cryptography, Access Control are Simply Not Sufficient. </li></ul><ul><li>Malicious Users are Using Legitimate Application Protocols, such as HTTP, HTTPS and SOAP. </li></ul><ul><li>An CSI/FBI Study Showed that Almost 50% of Security Breaches came from Internal Resources. </li></ul><ul><ul><li>Recently fired employees </li></ul></ul><ul><ul><li>Unscrupulous traders </li></ul></ul><ul><ul><li>Compromised partners </li></ul></ul><ul><ul><li>And disgruntled or curious employees </li></ul></ul>Industry and Business Drivers A Sample of the Problems with Network Security malicious users malicious users
    5. 5. Background – the Current state of IDS Intrusion Detection Systems Simply Don’t Work! “ Today over 70% of attacks against a company’s website or web application come at the ‘Application Layer’ not the Network or System layer.” - Gartner Group Most of Firewalls, IDS (Intrusion Detection System), IPS (Intrusion Prevention System) are act at the Network/System Layer, not at the “ Application Layer ”.
    6. 6. Risk and Compliance Business Drivers and Market Trends <ul><li>Business Drivers: Organizations face mounting pressures driving them toward a structured approach to enterprise risk and compliance management. </li></ul><ul><ul><li>Complexity, diversity and multiplicity of risk </li></ul></ul><ul><ul><li>Increased accountability and regulatory compliance </li></ul></ul><ul><ul><li>Fragmentation and duplication of efforts </li></ul></ul><ul><li>Market Trends: Business drivers resulted in the following trends as organizations begin to build their new approaches to risk and compliance management: </li></ul><ul><ul><li>Adoption of an enterprise risk management framework </li></ul></ul><ul><ul><li>Managed and measured regulatory compliance </li></ul></ul><ul><ul><li>Risk and compliance tool consolidation, application integration and SOA </li></ul></ul><ul><ul><li>Integration into business process management </li></ul></ul><ul><ul><li>Establishment of a chief risk officer </li></ul></ul>
    7. 7. Our Agenda <ul><li>Key Takeaways, Market and Business Drivers </li></ul><ul><li>TIBCO’S Solution Architecture </li></ul><ul><ul><li>Event-Driven Operational Risk Management </li></ul></ul><ul><ul><li>Security Event Management and TIBCO BusinessEvents™ </li></ul></ul><ul><ul><li>TIBCO’s Reference Architecture for CEP and SEM </li></ul></ul><ul><ul><li>Example High Level Architecture </li></ul></ul><ul><li>Wrap Up </li></ul>
    8. 8. Event-Driven Operational Risk Management An Active Predictive Business™ System of Risk and Asset Management Control evaluation (SOX) Operational Risk (Basel II) Security Outsourcing Privacy Business Continuity Planning Event-Driven Operational Risk Assessment & Management
    9. 9. How TIBCO Delivers for Customers Accelerate projects, initiatives, and go-to-market cycles Increase operational efficiency and effectiveness. Improve operational visibility, security, collaboration and responsiveness
    10. 10. Complex Event Processing &quot; Events in several forms, from simple events to complex events, will become very widely used in business applications during 2004 through 2008 &quot; --- Gartner July 2003
    11. 11. TIBCO BusinessEvents™ Solutions Overview BusinessEvents™ Solutions Space Data: Events & Databases -Real-Time & Historical Data Models: Statistical Financial Optimization Comms: Pub/Sub Messaging Queues Topics UIs Knowledge: Facts & Rules
    12. 12. Rule-Based Security Event Management Complex Event Processing for Enterprise Security Event Integration/Correlation Rule-Based <ul><li>Pattern Recognition </li></ul><ul><li>Anomaly Detection </li></ul><ul><li>Track and Trace </li></ul><ul><li>Monitoring (BAM) </li></ul><ul><li>Dynamic Resource Allocation </li></ul><ul><li>Adaptive Resource Allocation </li></ul><ul><li>Constraint Satisfaction (CSP) </li></ul><ul><li>Dynamic Control </li></ul><ul><li>Situation Identification </li></ul><ul><li>Fraud Prediction </li></ul><ul><li>Impact Assessment </li></ul>Detection Prediction Scheduling <ul><li>Fraud Detection </li></ul><ul><li>Intrusion Detection </li></ul><ul><li>Fault Detection </li></ul><ul><li>Rule-Based Access Control </li></ul><ul><li>Exception Management </li></ul><ul><li>Compliance Work Flow </li></ul><ul><li>Risk Management </li></ul><ul><li>Fault Analysis </li></ul><ul><li>Impact Assessment </li></ul>Security Event Management Across the Enterprise
    13. 13. Event-Driven SOA, CEP and BPM Enterprise Integration, Correlation and Management of Security Events Two Minute Explainer
    14. 14. TIBCO’s Real-Time Agent-Based SEM Approach A Multisensor Data Fusion Approach to Security Event Management Intrusion and Fraud Detection Systems Detection Approach Systems Protected Architecture Data Sources Analysis Timing Detection Actions IDS FDS Hybrid Audit Logs Net Traffic System Stats Real Time Data Mining Anomaly Detection Signature Detection Centralized Distributed Active Passive Agent Based Next-Generation Fusion of Security “Stovepipes”
    15. 15. CEP Reference Architecture Next-Generation Functional Architecture for SOA / BPM / EDA 24 EVENT PRE-PROCESSING EVENT SOURCES EXTERNAL . . . LEVEL ONE EVENT TRACKING Visualization, BAM, User Interaction CEP Reference Architecture DB MANAGEMENT Historical Data Profiles & Patterns DISTRIBUTED LOCAL EVENT SERVICES . . EVENT PROFILES . . DATA BASES . . OTHER DATA LEVEL TWO SITUATION DETECTION LEVEL THREE PREDICTIVE ANALYSIS LEVEL FOUR ADAPTIVE BPM
    16. 16. Event-Driven Complex Event Processing <ul><li>Multi-level inference in a distributed, event-driven architecture </li></ul><ul><ul><li>User Interface </li></ul></ul><ul><ul><ul><li>Human visualization, monitoring, interaction and situation management </li></ul></ul></ul><ul><ul><li>Level 4 – Process Refinement </li></ul></ul><ul><ul><ul><li>Decide on control feedback, for example resource allocation, sensor and state management, parametric and algorithm adjustment </li></ul></ul></ul><ul><ul><li>Level 3 – Impact Assessment </li></ul></ul><ul><ul><ul><li>Impact assessment, i.e. assess intent on the basis of situation development, recognition and prediction </li></ul></ul></ul><ul><ul><li>Level 2 – Situation Refinement </li></ul></ul><ul><ul><ul><li>Identify situations based on sets of complex events, state estimation, etc. </li></ul></ul></ul><ul><ul><li>Level 1 – Event Refinement </li></ul></ul><ul><ul><ul><li>Identify events & make initial decisions based on association and correlation </li></ul></ul></ul><ul><ul><li>Level 0 – Event Preprocessing </li></ul></ul><ul><ul><ul><li>Cleansing of event-stream to produce semantically understandable data </li></ul></ul></ul>Level of Inference Low Med High
    17. 17. Event-Driven CEP and SEM - Summary Flexible SOA and Event-Driven Architecture
    18. 18. Security Event Management High Level Event-Driven Architecture (EDA) for SEM JAVA MESSAGING SERVICE (JMS) DISTRIBUTED EVENTS (TIBCO EMS) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE) HIGH PERFORMANCE RULES-ENGINE (TIBCO BE ) SENSOR NETWORK RULES NETWORK FDS BW JMS LOGFILE JMS BW LOGFILE JMS BW LOGFILE JMS BW IDS JMS BW FDS JMS BW SQL DB BW JMS ADB SQL DB BW JMS ADB MESSAGING NETWORK SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM SYSTEM
    19. 19. Overview of TIBCO’s Solutions Architecture <ul><li>Fusion of IDS and FDS information across Customer’s Enterprise, including: </li></ul><ul><ul><li>Log files </li></ul></ul><ul><ul><li>Existing Customer’s IDS and FDS (host and network based) devices </li></ul></ul><ul><ul><li>Network traffic monitors (as required) </li></ul></ul><ul><ul><li>Host statistics (as required) </li></ul></ul><ul><li>Secure, standards-based JAVA Messaging Service (JMS) for messaging: </li></ul><ul><ul><li>Events parsed into JMS Application Properties </li></ul></ul><ul><ul><li>SSL transport for JMS messages </li></ul></ul><ul><li>TIBCO technology for next-generation detection, prediction, rule-based intrusion response, and adaptive control </li></ul><ul><ul><li>TIBCO Business Works™ as required, to transform, map or cleanse data </li></ul></ul><ul><ul><li>TIBCO BusinessEvents™ for real-time rule-based analytics </li></ul></ul><ul><ul><li>TIBCO Active Database Adapter as required </li></ul></ul>
    20. 20. Potential Extensions to Solutions Architecture <ul><li>Extension of EDA/SEM to rules-based access control </li></ul><ul><ul><li>Integration of IDS and FDS with access control </li></ul></ul><ul><ul><li>TIBCO BusinessEvents™ for rule-based access control </li></ul></ul><ul><li>Extension of EDA/SEM and access control to incident response </li></ul><ul><ul><li>Event-triggered work flow </li></ul></ul><ul><ul><li>TIBCO iProcess™ BPM for incident response </li></ul></ul><ul><ul><li>TIBCO iProcess™ BPM security entitlement work flow </li></ul></ul><ul><li>Extensions for other risk, compliance & reporting requirements </li></ul><ul><ul><li>Basel II, SOX, and JSOX - for example </li></ul></ul><ul><li>Extensions for IT management requirements </li></ul><ul><ul><li>Monitoring and fault management, service management </li></ul></ul>
    21. 21. Key Takeaways of Presentation <ul><li>Next generation security and enterprise risk management solutions require the fusion of information from numerous event sources across the enterprise: </li></ul><ul><ul><li>Model all Security Devices, Log Files, Sniffers, etc. as Sensors and Event Processors </li></ul></ul><ul><ul><li>Use Secure Standards-based Messaging for Communications </li></ul></ul><ul><li>Next-Gen Enterprise Risk Management (ERM) Requires a Number of Technologies: </li></ul><ul><ul><li>Distributed Computing, Publish/Subscribe and SOA </li></ul></ul><ul><ul><li>Hierarchical, Cooperative Inference Processing </li></ul></ul><ul><ul><li>High Speed, Real Time Rules Processing with State Management </li></ul></ul><ul><ul><li>Event-Decision Architecture for Identification and Mitigation of Security Situations </li></ul></ul><ul><li>Solution Expandable to Compliance and Incident Management (BPM) </li></ul>
    22. 22. RFID for Automatic Baggage Handling & Reconciliation
    23. 23. Hong Kong International Airport <ul><li>2 runways </li></ul><ul><li>1 PTB </li></ul><ul><li>75 airlines, 143 destinations </li></ul><ul><li>More than 700 flights per day </li></ul>
    24. 24. Airport Profile <ul><li>41 M passengers (2005) over 110,000 per day </li></ul><ul><li>20M departure baggage (2005) </li></ul><ul><li>3.4M ton cargo (2005) </li></ul><ul><li>2 Runways; single largest terminal building </li></ul><ul><li>55,000 staff work for over 240 organisations </li></ul><ul><li>AA staff - 950 </li></ul>
    25. 25. HKIA RFID Project - Background <ul><li>In 2003, HKIA adopted to apply RFID t echnology to improve the Baggage Handling and Management System </li></ul><ul><li>In mid 2004, RFID equipment installation commenced at baggage handling areas </li></ul><ul><li>In Aug 2005, RFID mode operation in service </li></ul>
    26. 26. RFID Components RFID Chip Inlay / Label Reader, Antenna
    27. 27. Type of RFID Tags - Wal-Mart HKIA Octopus User Small Small Moderate Size ~1.5m ~ 5 m < 0.7m Read Range Fast Fast Moderate Read Speed 13.56MHz HF 860 – 960MHz UHF 2.45GHz Frequency UHF(2) Type
    28. 28. Comparison of UHF RFID Tags √ √ Low cost √ Access security √ √ Kill security √ √ Reads > 500 tags / sec √ Dense-reader operation Proprietary √ Class 0 + Proprietary Class 1 √ Standardization √ Read Write Gen2 Feature
    29. 29. RFID benefits <ul><li>Customers </li></ul><ul><li>Reduce mishandling of bags </li></ul><ul><li>Airports </li></ul><ul><li>Lower baggage management cost </li></ul><ul><li>Enhanced security </li></ul><ul><li>Airlines </li></ul><ul><li>Lower loss baggage costs </li></ul><ul><li>Greater visibility of baggage </li></ul>
    30. 30. Hong Kong International Airport Business Case of RFID <ul><li>Lower cost for ABRS </li></ul><ul><li>(Phase 1 – Read Only RFID) </li></ul><ul><li>Delay expansion of baggage system </li></ul><ul><li>(Phase 2 – R/W RFID) </li></ul>
    31. 32. BHS Capacity Check-in Transfer primary sorters Early bag store Early bag Baggage Handling System secondary sorters Bag to Lateral 60% Early Bag 15% No-Read Bag 25% Laterals No-read
    32. 33. Automatic Baggage Reconciliation System (ABRS) <ul><li>BHS – sort bags to lateral + x-ray screening </li></ul><ul><li>ABRS – baggage management </li></ul><ul><ul><li>All screened bags delivered to the loading lateral </li></ul></ul><ul><ul><li>Baggage loading locations recorded by RF readers automatically </li></ul></ul><ul><ul><li>Baggage manifest produced using data captured within ABRS </li></ul></ul>
    33. 34. Automatic Baggage Reconciliation System (ABRS) Transfer (at Belt A) Primary Sorter No Read MCS Secondary Sorter Lateral Barcode Reader RF Reader Stick RFID Gen 2 Label Check-in Barcode Reader RF Reader CTF MCS Track baggage loading into ULD Read License Plate Number (LPN) Encode in Gen2 Label RF Printer to print LPN in baggage tag with Gen2 inlay X-ray Read Barcode or RF tag For sorting bag
    34. 35. Lateral Operation RFID readers Containers RFID Readers at Lateral RFID Reader at Lateral
    35. 36. Dual Mode Handheld Terminal
    36. 37. RFID System Configuration <ul><li>RF Readers and Antenna </li></ul><ul><ul><li>200+ Readers : Symbol AR400 </li></ul></ul><ul><ul><li>500+ Antennas </li></ul></ul><ul><ul><li>200+ Dual Mode Handheld Terminal : Symbol MC9600 </li></ul></ul><ul><ul><li>Operated with 4 watts power level (HK OFTA) </li></ul></ul><ul><li>RFID read only tag </li></ul><ul><ul><li>Class 0 tag with 96 bits pre-encoded UID </li></ul></ul><ul><ul><li>Adopts frequency band 920 ~ 925 MHz </li></ul></ul>
    37. 38. RFID Performance Data <ul><li>RFID operation started at 1-Aug-05 </li></ul><ul><li>20M Class 0 RFID label used per year </li></ul><ul><li>95% - 97% RFID read rate at Induction units </li></ul><ul><li>92% RFID read rate at Laterals </li></ul>
    38. 39. Challenges <ul><li>Standardization of airline bag tag </li></ul><ul><li>Ways to affix RFID label on bag </li></ul><ul><li>Tag quality </li></ul><ul><li>RF power tuning </li></ul><ul><ul><li>Cross read </li></ul></ul><ul><ul><li>RF interference between RF readers </li></ul></ul>
    39. 40. Challenge – RF Power Tuning <ul><li>Different RF Coverage caused by type of ULD </li></ul><ul><li>Absorbed RF reflection in Filled ULD </li></ul>
    40. 41. Challenges (Cont’) <ul><li>Old label from multi-trips (additional reader required) </li></ul><ul><li>Bag content/design i.e. metal, water </li></ul><ul><li>Learning curve of operator </li></ul><ul><li>RF health issue </li></ul>
    41. 42. Phase 2 Implementation – Gen2 RFID <ul><li>Implement an “open standards” encoding solution using Gen-2 R/W RFID tag </li></ul><ul><li>Adopt IATA RP1740c, ISO 18000-6C (Gen2) and ISO/IEC 15961 and 15962 </li></ul><ul><li>Improving the overall RF performance </li></ul><ul><li>Increasing the overall baggage delivery throughput </li></ul>
    42. 43. Phase 2 – Stage 1 Transfer <ul><li>Use 2”x4” Gen2 RFID with label </li></ul><ul><li>Barcode scanner scans LPN and passes to RFID reader to encode </li></ul><ul><li>Manual Coding Station to re-encode LPN for exception case </li></ul><ul><li>RFID readers reads both Class 0 & Gen 2 (memory bank 01 only) RFID tags </li></ul><ul><li>Operation by Jun-06 </li></ul>
    43. 44. Phase 2 – Stage 1
    44. 45. Phase 2 – Stage 2 Local Check-in <ul><li>Use Gen2 RFID integrated baggage tag </li></ul><ul><li>Standardize baggage tag as CUSS standard (21” in length) </li></ul><ul><li>RF Printers encode the LPN & Date </li></ul><ul><li>RFID readers are operating with all Gen 2 (with memory bank 01 only) RFID tags. </li></ul><ul><li>Operation by Dec-06 </li></ul>
    45. 46. Phase 2 – Stage 3 User Data <ul><li>Use Gen2 RFID integrated baggage tag </li></ul><ul><li>Standardize airlines Pectab </li></ul><ul><li>RF Printers encode the LPN, Date & User Data </li></ul><ul><li>Integrated with X-Ray to encode security screening result </li></ul><ul><li>RFID readers are operating with all Gen 2 (with memory bank 11 field) RFID tags. </li></ul><ul><li>Operation by Mar-07 </li></ul>
    46. 47. Future Direction <ul><li>More added values services for passengers and airlines using RFID </li></ul><ul><li>Cooperation with airport and airlines </li></ul><ul><li>Bulk purchase of RFID tags </li></ul>
    47. 48. Thank You! Tim Bass, CISSP Principal Global Architect, Director Emerging Technologies Group Event Processing at TIBCO

    ×