EFFICIENCY MANAGEMENT EFFECTIVE PRODUCTION

EFFICIENCY MANAGEMENT EFFECTIVE PRODUCTION

Thinking about the security of RFID electronic tag in the future


Release Time:

2020-12-30

Nowadays, a large number of digital identification cards such as credit cards, telephone cards, and financial IC cards are closely related to people's daily life, and their application makes various transactions more convenient and faster. But most of these identification cards adopt magnetic stripe to swipe the card or IC chip, and do contact connection with the card reader to read the data information. Under long-term use, it is easy to cause data discrimination errors due to wear and tear, and the contact identification card has specific contact points, and the card has directionality, so the convenience of operation needs to be improved.

With the expansion of applications, the security of RFID systems all over the world in the future may test people's wisdom just like the current network security problem.

Nowadays, a large number of digital identification cards such as credit cards, telephone cards, and financial IC cards are closely related to people's daily life, and their application makes various transactions more convenient and faster. But most of these identification cards adopt magnetic stripe to swipe the card or IC chip, and do contact connection with the card reader to read the data information. Under long-term use, it is easy to cause data discrimination errors due to wear and tear, and the contact identification card has specific contact points, and the card has directionality, so the convenience of operation needs to be improved.

 

 

In the 1990s, to improve the shortcomings of the contact identification system, an automatic identification technology - Radio Frequency Identification (RFID) gradually emerged and gradually matured. It uses radio frequency to carry out non-contact two-way communication in order to achieve the purpose of identifying and exchanging data.

The most basic RFID system consists of three parts: electronic tags, readers, and antennas. The tag is composed of a coupling element and a chip. The tag contains a built-in antenna for communication with the radio frequency antenna; the reader is used to read or write tag information ; the antenna plays the role of transmitting radio frequency signals between the tag and the reader.

Since each electronic tag has a globally unique ID number - UID (UID is placed in ROM when the chip is made and cannot be modified or copied ) , the data part can be safely managed by some encryption algorithms, and the reader and tag A mutual security authentication process can be set between them. Therefore, RFID technology has achieved rapid development in applications such as anti-counterfeiting and achieved certain breakthroughs.

First applied in certificate anti-counterfeiting

At present, RFID tags can be embedded in the cover of standard passports or documents in the world in terms of passport anti-counterfeiting and electronic wallets. The chip also provides security functions and supports hardware encryption to ensure security. A considerable scale of application has also been formed in this field in China, and the ID card of the new era is just for this purpose.

Followed by packaging anti-counterfeiting

Manufacturers of narcotic drugs in the United States announced that they will use RFID on the drug bottles to realize the electronic monitoring of the whole process of drugs from production to pharmaceutical factories, combat the growing phenomenon of drug counterfeiting, and manage and control the circulation of drugs. The Chinese government has also begun to use RFID technology to manage the production, transportation and sales of drugs, food, dangerous goods and other items with the help of domestic manufacturers in the field of radio frequency identification.

In the field of identification, traditional barcode technology is relatively mature and has been widely used all over the world. As a means of computer data collection, bar codes are widely used in various fields such as commodity circulation, automatic control, and file management with many advantages such as fastness, accuracy, and low cost. It is also the most widely used data identification method in my country.

However, because the traditional barcode is one-dimensional, it does not carry any information in the vertical direction, the information density is low, and it is easy to be rejected due to wear or wrinkle, which greatly limits the application range of the traditional barcode.

The emergence of RFID technology has changed the way that barcode technology relies on " tangible " one-dimensional or two-dimensional geometric patterns to provide simple information. RFID provides information with a larger amount of data through its own chip, and the introduction of RFID technology is not just as simple as increasing the information capacity. From the perspective of data encryption, information transmission methods, and processing efficiency and accuracy, RFID is a computer automatic identification technology. A revolution in technology.

RFID is easy to operate and has the characteristics of non-contact automatic identification, which is suitable for applications such as automatic control, multi-target identification in harsh environments, and moving target identification. And because this technology is difficult to be counterfeited and invaded, it has high security protection capabilities, and it is also used in the field of authenticity identification.

Texas Instruments based on RFID technology was once considered the world's most successful automotive electronic anti-theft system, and Texas Instruments sales data shows that at least 150 million sets of the system have been sold. Compared with the early electronic keys, this system is difficult to be counterfeited. But several students from Johns Hopkins University in the United States cracked the security system. They claim that as long as the data is extracted from the real car electronic key through wireless communication, and after about an hour of calculation, the password of the electronic key can be deciphered.

In the future development of the electronic tag, it will continue to improve along the direction of large capacity, high speed, smaller size, lower price and being applicable to various applications. After solving the standardization problem, promoting safety legislation for RFID applications will play an important role in promoting the safe application and market promotion of this technology.

Reprinted from RFID World Network