Font Size: a A A

Research Of Merchandise Anti-counterfeiting Technology Based On Rfid-tag

Posted on:2010-03-01Degree:MasterType:Thesis
Country:ChinaCandidate:X Z LiFull Text:PDF
GTID:2198330338978982Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the rapid economic development, the counterfeit products are also increasi- ng while the goods are more and more diverse types. Fake and shoddy goods will not only affect the healthy development of the economy, but also damage the interests of businesses and consumers. The traditional paper-based materials, anti-counterfeiting technology are easy to grasp, easy to reproduce, and do not have the exclusivity and uniqueness, the security can no longer play a real role to prohibit the Fake and shoddy goods. With the extensive application of RFID technology, RFID tags in the field of product security application have received extensive attention. The RFID tags used in the field of product security, it can correctly identify the authenticity of goods to ensure the safety of goods in circulation.This paper analyzes the causes of fake and shoddy goods, the current use of anti-counterfeiting technology and its product security needs of various theories of knowle- dge, proposed the use of RFID tags for merchandise security system. In this system, the RFID tag data security authentication algorithm is which based on hash functions to guarantee the security of RFID tag data in order to ensure that a legal product is not counterfeiting, for the security of RFID tag data were analyzed, then using the BAN logic to analyses ongoing formal the algorithm. We put forward a compression algor- ithm(LZW# algorithm) in order to solve problems such as tags and data storage space shortage and high repeatability. The LZW# compression algorithm used two-tree data struct- ure and operations of the improved method to determine the threshold. Through the comparative analysis of several compression algorithms, it shows the obvious advant- age on the compress time and compression efficiency. It also improves the RFID tag space utilization, cost-saving labels. Finally, the algorithm has demonstrated using BAN logic. The result proofs it has the safety and feasibility of algorithm. This method solves commendably the RFID tag data security risk issues, ensures the safety of legitimate goods. This project is subsidized with the National natural science fund project (607430 08) and the scientific and technological project of Henan Province (072302210010) and the natural science basic research program fund project of Education Department of Henan Province (2007520013).
Keywords/Search Tags:RFID, Anti-counterfeiting, Data Compression, Data Security, RFID-tag
PDF Full Text Request
Related items