• Title/Summary/Keyword: RFID code system

Search Result 153, Processing Time 0.031 seconds

The printing tag for activation of RFID industry (RFID확산을 위한 Printing TAG)

  • Kim, Ji-Tae
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2007.11a
    • /
    • pp.109-115
    • /
    • 2007
  • Instead of existing bar code system, RFID is now the core sensor technique of Ubiquitous computing and it will bring a revolution of corporation's logistics systems. In recent years, RFID becomes the center of government and other related companies and furthermore, its basic and applied techniques and have been established as various international standards. Many major countries announced application cases in various fields and concentrate their effort to make new RFID technologies as well. Recently Korean government announced the basic plan of u-Korea and all-out plan of activation of RFID/USN. SO in this paper, we will discuss two things; the trends of RFID technologies and the printing tag technique, which is needed to spread of RFID item units.

  • PDF

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

A Study on Implementation of Frameworks for Archives Management Based on RFID (RFID기반 기록관리체계 도입방안에 관한 연구)

  • Kim, Sung-Hwan;Oh, Hyo-Jung;Kim, Yong
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.4
    • /
    • pp.127-152
    • /
    • 2017
  • RFID technology that is one of the ways to enhance productivity and competitiveness across diverse sectors of IT, is being hailed as a technology that replaces the bar code system and brings more convenience to the system. RFID system have been already applied to libraries, and archive, and is expected to bring advancements in the development of more effective records management systems. However, the system is still in the initial stage of the introduction, and it has been difficult to introduction because of trivial problems and unsafe elements, and studies have not been conducted to identify the detailed problems of the system. So, In this study, conducted interviews and surveys of executives of archive who operate the RFID based records management system. Based on this, we found the operational status of the RFID based records management system operating in the current archive, and the problems in the RFID based records management system. In conclusion, we suggest improvements in efficient operation methods.

The development of an EPC Code Auto-Writing and Fault Detection Algorithm for Manufacturing Process of a RFID TAG (RFID 태그 생산 공정 자동화를 위한 부적합품의 자동 검출 및 EPC Code Auto-Writing 알고리즘 개발)

  • Jung, Min-Po;Hwang, Gun-Yong;Cho, Hyuk-Gyu;Lee, Won-Youl;Jung, Deok-Gil;Ahn, Gwi-Im;Park, Young-Sik;Jang, Si-Woong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.321-325
    • /
    • 2009
  • The detection process of defective tags in most of Korean domestic RFID manufacturing companies is handled or treated by on-hand processing after the job of chip bonding, so it has been requesting to reduce the time and cost for manufacturing of RFID tags. Therefore, in this paper, we design and implement the system to perform the functionality of detection of defective tags after the process of chip bonding, and so provide the basis of a related software to establish the foundation of a automation system for the detection of defected RFID tags which is requested in the related Korean domestic industrial field. The developed system in this paper shows the enhancement of 700% in processing speed and 100% in detection rate of defective tags, comparing to the method of on-hand processing.

  • PDF

A Study on Prevention of Collision and Data Loss of the RFID System Using a Full-Length Instruction Code Method (무선인식 시스템의 완전 명령 코드 기법을 이용한 데이터 충돌 및 손실 방지에 관한 연구)

  • 강민수;신석균;이재호;박면규;이기서
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.756-765
    • /
    • 2004
  • Using single carrier frequency RFID system in one-to-multiple wireless communications, might be generated data loss because of data collisions. Conventional Anti-collision method prevent data loss from data collisions which are binary tree method and ALOHA. However, those two preventive measures also have week points which are strongly dependent on the time and space when passing through the recognition area. This paper suggests the full-length instruction code method which fits in to half-duplex method, prevents data collision effectively by calculating the non-transmitting time of multiple tags considering approaching time to the recognition area. After full-length instruction code method test using 13.56MHz bandwidth RFID system shows that full-length instruction code method could make better result than any other methods. Moreover, the record shows O(n) result after analyzing O-notation of conventional time-domain procedure.

Relative Importance Analysis on Technology Adoption Factors of RFID in SCM (SCM에서 무선인식 기술 수용 요인 별 상대적 중요도 분석)

  • Kim, Tae-Young;Choi, Jun-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.6
    • /
    • pp.185-194
    • /
    • 2007
  • Today, there is in the world-wide cognition about RFID technology due to established standard, EPC(Electronic Product Code). RFID technology will have wide influence over various fields. Especially, RFID technology's advantages will have positive influence on logistics field. We can solve limited various problems presented in SCM by applying RFIB technology. We can have higher cantrol system, better benefits and actual decision information. Many organizations, however, still have hesitated now because RFID technology has not been validated and RFID technology is in early stage. Other problems are employee resistance against new technology and lack of academic empirical research on assimilation RFID technology for organization. Above reasons I mentioned make me study on analysis on assimilation RFID technology decision in SCM field. This study attempts to analyze the assimilation RFID technology factor from previous researches by using AHP. This outcomes of study will be helpful when we assimilate RFID technology in SCM fields.

A Study on the Implementation and Performance Analysis of 900 MHz RFID System with Convolution Coding (콘벌루션 부호를 적용한 900MHz 대역 RFID 시스템 구현 및 성능 분석에 관한 연구)

  • Yun Sung-Ki;Kang Byeong-Gwon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.1
    • /
    • pp.17-23
    • /
    • 2006
  • In recent years, RFID has received much attention because of spread usage in industrial applications including factory, material flow, logistics and defense areas. However, there is only CRC-16 for error detection in ISO/IEC 18000-6 Protocols prepared for 860-960 MHz RFID, high error rates are expected in cases of high level of security and noisy envirionment. In this paper, we propose a usage of convolution code as a method for satisfying the high level of security requirement and system error performance.'1'he signal control function is implemented in a microprocessor with RF modulation and the convolutional encoding and Viterbi decoding are implemented in an FPGA chip.'The frame error rates are measured with and without convolution coding under the channel conditions of line-of- sight and non line-of-sight, respectively.

  • PDF

Improvements of the Anti-collision Algorithms for Multi Tag Interrogation in RFID System (RFID 시스템에서 다중 태그 인식을 위한 충돌회피 알고리즘의 성능 개선에 관한 연구)

  • NamGung, Ho-Young;Min, Byoung-Taek;Jeon, Jun-Soo;Kim, Cheol-Sung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1169-1172
    • /
    • 2005
  • In this paper, we propose an improved anti-collision algorithm for multi tag interrogation in ubiquitous sensor network(USN) and show the result of simulation for multi tag interrogation in RFID systems. We have analyzed an EPC(Electronic Product Code) protocol which specifies the physical and logical requirements for a passive-backscatter Reader-Talk-First(RTF) RFID(Radio Frequency Identification) system operating in the $860MHz{\sim}960MHz$ frequency range. We have also designed and implemented the simulator of the RFID system based on the EPC protocol. Finally, we find that proposed algorithm works better than an existing algorithm.

  • PDF

Mobile-IoT System for Payment Efficiency and Convenience of Offline Shopping (오프라인 쇼핑의 결제효율과 편의성 제공을 위한 모바일-IoT 시스템)

  • Lee, Jeong-Hoon;Jeong, Seung-Hun;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.289-294
    • /
    • 2019
  • It easily collects information on purchased goods using IoT(Internet of Things). The collected data is updated directly to the smartphone for verification. The payment information is generated by QR-Code. As a way to implement a system, System was configured with two assumptions: IoT technology using Raspberry-Pi and mobile QR technology. First, RFID tags are attached to the goods instead of barcodes. Second, it has an IoT computer(Raspberry-Pi) built into its shopping cart. This system keeps traditional shopping method of face-to-face payment, but replace time-consuming tarditional barcode tagging method to QR-tagging system for time-efficiency. By debeloping the system of this paper, we maintain pleasures in offline store shopping and it provide convenience due to reduced waiting time for customers and providing prior information about the products.

Encryption scheme suitable to RFID Systems based on EPC Generation2 (Gen2 기반 RFID 시스템에 적합한 암호 기법 설계)

  • Won, Tae-Youn;Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.67-75
    • /
    • 2008
  • RFID(Radio Frequency Identification) system is an automated identification system that consists of tags and readers. They communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to substitute a bar-code system. But RFID system creates new threats to the security and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve privacy problems against attacks, but it is difficult to apply to RFID system based on low-cost Gen2. Therefore, We will propose a new encryption scheme using matrix based on Gen2 in RFID system in paper, and We will analyze our encryption scheme in view of the security and efficiency through a simulation and investigate application environments to use our encryption scheme.