• Title/Summary/Keyword: Bar-code Tag

Search Result 36, Processing Time 0.025 seconds

A RFID Privacy protection system using H/W friendly security algorithm Environment (하드웨어 친화적인 암호 알고리즘을 사용한 RFID 프라이버시 보호 시스템)

  • Kim, Jin-mook;Ryou, Hwang-Bin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.280-284
    • /
    • 2005
  • In ubiquitous computing environment, An RFID system will be the important way that recognizing an object instead of Bar-code system. But a privacy infringement problem is predicted between a tag and leader to be serious. There is many difficulty that just uses an existing research method because it has an Hardware restriction. Therefore we will suggest that A RFID Privacy Protect system using Hareware friendly security algorithm. we will use RC5 and CBC_MAC because the tag has hardware restriction .To implement, We will simulate and test on One chip microprcessor environment. In the result of the experiment, We will know that a suggested system solves privacy problem on RFID system that it was using CBC-MAC and RC5 security algorithm.

  • PDF

A Study on RFID System with Secure Service Availability for Ubiquitous Computing

  • Seo, Dae-Hee;Lee, Im-Yeong
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.96-101
    • /
    • 2005
  • Spotlighted as an innovative information technology environment, ubiquitous computing has been actively researched on recently. Especially, domestic and global researches focus on the RFID system, which is being eyed to replace the existing bar-code system. As an essential technology for ubiquitous computing, the RFID system can be applied for various purposes. The security issues of the RFID system focus on how the low-priced tag type could have reasonable price competitiveness. The Auto-ID Center in the U.S. is spearheading the research on distribution service and omni-directional security. As for Japan, the researches on omni-directional security and EPC application are necessary in securing the technology for ubiquitous computing with support from the Ministry of Public Management Home Affairs, Posts, and Telecommunication. In this paper, a method of ensuring the availability of the RFID system service will be presented based on the ubiquitous computing environment with the existing omni-directional security and user-friendly interface. While the existing researches focus on the RF reader system and tag-based security, this paper's suggestion also considers the availability of a sen ice to suggest ways of increasing the practical usage of a low-priced RF tag.

Design of Ubiquitous Reference Point for Location Service (위치정보 제공 서비스를 위한 유비쿼터스 기준점 설계 연구)

  • Park, Jae-Min;Oh, Yoon-Seuk;Kang, Jin-A;Kim, Byung-Guk
    • Spatial Information Research
    • /
    • v.15 no.3
    • /
    • pp.301-310
    • /
    • 2007
  • There are 21,000 National Surveying Control Points (NSCP) made of stone for precise surveying nationwide. NSCPs that provide location information are usually buried at the top of a mountain for view points that cannot be used by the public. Recently, according to the growing ubiquitous computing generation, location-based information has become very important and a service that can be easily accessed by the public is needed. In this research, a new type of reference point for a location information service is proposed. It is an Intelligent Reference Point (IRP) equipped with RFID tags and a two-dimensional bar-code system. The IRP system is composed of an electronic tag component, a tag identification component, and an IRP service component. We designed the IRP receiver identifying RFID tag and two-dimensional barcode was designed using a PDA, digital camera, and an RFID receiver. Also designed was IRP input data and input information. Furthermore, the operation software was developed in a PDA for identifying IRP and using IRP the service, and the IRP positioning method was developed using a GIS spatial analysis.

  • PDF

A Study on Ubiquitous Convention using RFID (RFID를 활용한 유비쿼터스 컨벤션에 관한 연구)

  • Noh, Young;Byun, Jeung Woo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.175-184
    • /
    • 2009
  • We are entering into a era of enterprise computing that is characterized by an emphasis on broadband convergence, knowledge s haring, and calm services. Some people refer to this as the "ubiquitous" computing because its focus is on a high degree of connectivity between a company and its customers, suppliers, and channel partners. Ubiquitous computing technology, "RF" stands for "radio frequency"; the "ID" means "identifer". The tag itself of a computer chip and an antenna. The shortest metaphor is that RFID is like a bar-code but is read with an electromagnetic field rather than by a laser beam. Much has already been written about the use of RFID. But there is no has written about the use of RFID in the convention industry. Therefore this study have specific objectives as follows. 1. To give details on the use of RFID in convention. 2. To introduces the key concepts behind RFID technology. 3. To identify advantage & disadvantage of RFID technology using a BEXCO CASE study. 4. To study on ubiquitous convention using RFID and effective operation methods such as entrance identification system, session management, machine management, CRM management, visitor management, and contents management. This results provide into the current status of ubiquitous computing technology in convention industries. Specific advantages by using ubiquitous computing technology(RFID) are one-stop differentiate service, wireless internet service, use of visitor management system, entrance by tag, and U-logistics. On other side, disadvantages are security, stabilization of RFID system, higher price of RFID tag, and commercial scale. Convention by using of RFID technology is currently at an early stage. Convention company as BEXCO need to have the capabilities to adapt, to customize, to commercialize, and to modify technology to suit our circumstances.

Multi-hop RFID Reader and Tag Communication Architecture for Port Logistics (항만 물류용 RFID 리더-태그 간 다중 홉 통신 구조)

  • Yoo, Young-Hwan;Kim, Jin-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.532-541
    • /
    • 2009
  • The RFID technology has attracted much attention these days due to the far better efficiency than the bar-code and magnetic card system. As an important usage, the 433 MHz active RFID tag was already adopted to the container ports in the United States and Europe for container loading/unloading automation and equipment location. However, there is one problem to be solved for the complete automation. RFID readers support only the direct communication with tags within their RF communication range. Then there are a lot of containers and equipments such as crane, yard tractor, and forklift in ports; and because they are made of metal, they interfere the RF communication, resulting in the occurrence of the dead-zone. In the dead-zone, RFID tags cannot receive any signal from readers. There may be several solutions to resolve the dead-zone problem. Among them, this paper suggests the most economical solution where RFID tags in the dead-zone can communicate with readers via neighbor tags in the multi-hop manner The new RFID communication architecture should be carefully designed in order to maintain the compatibility with the previous standard. Our experiment shows that the proposed architecture works well even in the case where some tags are out of the RF range of reader.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

A Study on the Application of RFID to Container Terminals

  • Kim Sung-Soo;Lee Myoun-Soo;Song Yong-Seok;Nam Ki-Chan;Kwak Kyu-Suk
    • Journal of Navigation and Port Research
    • /
    • v.29 no.9
    • /
    • pp.789-793
    • /
    • 2005
  • The container terminals in Korea usually adopts both the bar code and the image recognition systems at the gate complex to capture necessary information on containers passing through the gate. With the rapid advancement of Information Technology(IT) these systems, however, seem to make the user not satisfied due to the inherent limitations such as the long process time taken, low rate of recognition etc., This paper, therefore, examines the adoption of Radio Frequency Identification (RFID) technology to container terminals, and tried to get some implication for the way to improve the productivity of the terminal. The results imply that some improvement in the gate and storage yard operation is feasible by the benefit of using the information of vehicles and containers collected in advance by RFID technology.

Estimation of Cycle Time for Construction Process of NATM Tunnel by using RFID Technology (RFID기술을 이용한 NATM터널 작업 프로세스의 사이클타임 산정방안 연구)

  • Park, NamJin;Kim, HyounSeung;Moon, HyounSeok;Kang, LeenSeok
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.1D
    • /
    • pp.41-49
    • /
    • 2012
  • Radio Frequency Identification(RFID) technology, which replace BAR CODE technology that has been widely utilizing in the field of the manufacturing industry for a long time, has been proven in the whole industries including national defense, transportation, and construction as well as manufacturing industry. Recently, with this trend, researches for adapting the RFID technology have been attempting continually centering on the architectural project in the construction industry. However, those researches are mainly focusing on the experimental utilization such as simple activity and material management. To solve these issues, this study demonstrated methodologies for adapting the RFID technology by the construction steps aiming to analyze cycle time of five types of construction process to the NATM method of tunneling work. Besides, the application of RFID technology in civil engineering work was verified by demonstrating the suggested methodology to actual sites. Therefore, it is expected that the suggested methodology will be utilized for predicting the progress rate and establishing of follow-up work plans, and the site applicability of the RFID technology will be expanded to the civil engineering projects.

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2581-2585
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security. instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.

A Study on Implementation of Frameworks for Archives Management Based on RFID (RFID기반 기록관리체계 도입방안에 관한 연구)

  • Kim, Sung-Hwan;Oh, Hyo-Jung;Kim, Yong
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.4
    • /
    • pp.127-152
    • /
    • 2017
  • RFID technology that is one of the ways to enhance productivity and competitiveness across diverse sectors of IT, is being hailed as a technology that replaces the bar code system and brings more convenience to the system. RFID system have been already applied to libraries, and archive, and is expected to bring advancements in the development of more effective records management systems. However, the system is still in the initial stage of the introduction, and it has been difficult to introduction because of trivial problems and unsafe elements, and studies have not been conducted to identify the detailed problems of the system. So, In this study, conducted interviews and surveys of executives of archive who operate the RFID based records management system. Based on this, we found the operational status of the RFID based records management system operating in the current archive, and the problems in the RFID based records management system. In conclusion, we suggest improvements in efficient operation methods.