Friday 19th of April 2024
 

Based on RFID Products Information Tracing Anti-counterfeiting Strategy Design and Application


Jiao Yabing

Research one security policy in the INTERNET GSM or other possible environments based on the uniqueness and uniformity of RFID chips code and EPC. Its basic process: the data in RFID chipsproducts databaseverification. Its technological process: the READER reads encrypted data in RFID chips some kind of products corresponding and uploads the data to public networks. The EPC database on line returns user verification after data processing. According to the strategy of anti-counterfeiting technology, the introduction of PKI technology on digital certificate management, system describes the digital certificate application and verification process. Finally, the introduction of the hash algorithm, design implementation process RFID tag-based anti-counterfeiting, and various algorithms and comparative analysis of tags, readers secure communications mechanism.

Keywords: radio frequency identification; security policy; guarding against fakes; Public Key Infrastructure; hash algorithm

Download Full-Text


ABOUT THE AUTHOR

Jiao Yabing
JIAO YABING: Shandong Yingcai University teacher, Master\'s degree in 2008, since 2012 in Dhurakij Pundit University PhD,the major professional direction information management.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »