Last week we released some details about work we did for the Morgan’s Wonderland fun park for special-needs children. One of the exciting aspects of that project was the integration with the park’s RFID tracking system. The RFID system itself was built by RFIDTec, based in California, and we integrated their work with the online reservation platform we constructed.
RFID Journal did a write-up on the Morgan’s Wonderland RFID system, including some comments from Denim Group’s Sheridan Chambers.
An important aspect of securing this integration was the use of Threat Modeling to proactively identify potential security problems during the design stage so they could be addressed early in the development process. Understanding the communication channels in a system as well as trust boundaries between parts of the system is critical to creating secure applications. This applies to RFID systems, Web 2.0 mashups, software as a service (SaaS) and smartphone applications – any system that is composed of multiple independent subsystems.
Here are some photos of different aspects of the RFID tracking system:
The tracking wristband
A closed location station.
Identifying a user to the location station.
Contact us for help developing security-critical applications.
–Dan
dan _at_ denimgroup.com
I’m interested in discussing similar RFID integration projects with your partner, RFIDTec, how can I contact them?
With the state and rendering ‘plumbing’ now done we can start doing some fun stuff by adding graphics to our game and displaying them on the screen. This will guard against potential fines for disturbing nests or injuring the birds. To start, get your small containers and fill them up with apple cider vinegar.