• Title/Summary/Keyword: national product identifier

Search Result 4, Processing Time 0.015 seconds

Design of the Identifier Structure for Ubiquitous National Product Asset Management (U-국가물품자산관리를 위한 식별코드체계 설계)

  • Kim, Sun-Ho;Yun, Ji-Ho;Kim, Jin-Yong;Ann, Chong-Hwan
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.227-234
    • /
    • 2007
  • The national product identifier(NPI) currently used in the national product asset management system does not accommodate ISO or EPC standards due to the limitation of tag memory. For this reason, we propose a new NPI which accommodates not only ISO item identification standards but also the memory capacity of ISO tags. First of all, memory structures of ISO/IEC 18000-6C and EPC tags are analyzed from the view point of product identifier structure. Second, ISO/IEC 15459 and EPC identification standards as item identifier structures for the product asset management are analyzed. Third, based on these analyses, the NPI used for the current RFID-based product asset management system is analyzed and its problems are presented. Finally, a new NPI structure is proposed suitable for ISO/IEC 18000-6C and ISO/IEC 15459.

The Operational Method of the RFID Identification System for National Product Asset Management (국가물품자산관리를 위한 RFID 식별코드체계 운용방안)

  • Kim, Sun-Ho;Kim, Jin-Yong;Park, Jeong-Jae;Song, Ju-Hyung;Kim, Hyun-Min;Ann, Chong-Hwan
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.19-31
    • /
    • 2007
  • In this research, we propose the operational method of the RFID-based NPI (National Product Identifier) which can manage product assets for the Korean government in the future. First of all, we present the operational concept of the national product asset management. Second, we suggest the structure of the NPI which accommodates ISO/IEC 15459 and the method to encode NPI and related data to ISO/IEC 18000-6C tags. Finally, we propose the operational business processes to generate and manage NPI in the stages of product procurement and product asset management.

  • PDF

Design of National Product Identifier and its Encoding based on RFID (RFID기반의 국가물품식별코드체계 및 인코딩 방안 설계)

  • Kim, Jin-Yong;Park, Jung-Jae;Song, Joo-Hyung;Kim, Hyun-Min;Ann, Chong-Hwan;Kim, Sun-Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.1
    • /
    • pp.25-40
    • /
    • 2007
  • As memory-extended RFID tags are recently developed, various types of item identification structures can be stored in the tags. In this paper, we propose a new national product identifier(NPI) which accepts not only ISO item identification standards but also the memory capacity of ISO tags. First of all, item identification structures of ISO/IEC 15459 and EPC, and memory structures of ISO/IEC 18000-6C and EPC tags are analyzed. Based on these analyses, the NPI currently used is analyzed and its problems are described from the viewpoint of standardization. To overcome the problems, a new NPI structure suitable for ISO/IEC 15459 is proposed. Finally, data related to the NPI is designed for encoding to tags.

  • PDF

Design and Implementation of Digital Signature on Pedigree Using ECDSA (ECDSA를 사용한 Pedigree 디지털 서명의 설계 및 구현)

  • Khosiawan, Yohanes;Kwon, Joon-Ho;Hong, Bong-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06c
    • /
    • pp.286-288
    • /
    • 2012
  • Facing the counterfeiting acts towards various products, many manufacturers implement ePedigree system to secure their supply chain. Using ePedigree, a distribution history including a valid product identifier from the manufacturer until the final retailer is recorded. And this ePedigree is signed by each involved supply chain party using digital signature. With this digital signature, any unauthorized alteration to the ePedigree document would generate a failed verification process. If there is a counterfeit product using a fake ePedigree document, it wouldn't be able to pass the verification process either. Hence, there wouldn't be any counterfeit product that could enter the legal supply chain and bought by the consumer. We are proposing to use ECDSA instead of RSA since it has faster performance and shorter key size. At a certain same security level, ECDSA only needs 163 bits, while RSA needs 1024 bits.