期刊文献+

基于RFID技术的防伪平台的设计与实现 被引量:5

Design and Implementation of Anti-Counterfeit System Based on RFID
下载PDF
导出
摘要 针对商品市场传统防伪手段的缺陷,提出基于射频识别(RFID)技术的防伪机制。该防伪平台利用公钥基础设施技术建立身份认证体系,将数字签名技术应用到电子标签的识别验证中来,设计了防伪流程和验证方法,以此搭建商品防伪追溯模型,并做了模型的安全性分析,最后实现了以酒类为代表的防伪系统。该系统采用Java EE设计开发,以第三方可信防伪平台为基础,支持手机RFID扫描查询、网站查询、短信查询、RFID终端查询等方式,通过商品信息的共享达到防伪验证的目的。 Due to the shortcoming of the traditional anti-counterfeiting means in commercial field, an RFID-based( Radio Frequency Identification) anti-counterfeit mechanism was presented. It realizes an anti-counterfeit system for wine products, which designes a PKI ( Public Key Infrastructure ) identification system to help trace back the product source, and safety analysis for this model is also included The security process and verification method are in details. In order to offer convenient and efficient anti-counterfeit services, the manufactures information is shared with consumers through an reliable third-party platform. The system is written in Java EE, which supports RFID cellphone scanning query, website query, SMS query and RFID terminal query etc.
出处 《计算机技术与发展》 2012年第5期233-236,241,共5页 Computer Technology and Development
基金 国家科技部计划项目:互联网潜在犯罪组织侦查与分析系统(2009GJE00035)
关键词 防伪 射频识别 公钥基础设施 加密机制 anti-counterfeit radio frequency identification public key infrastructure encryption mechanism
  • 相关文献

参考文献11

二级参考文献26

  • 1李湛.一种改进的椭圆曲线密码实现算法[J].电子科技,2004,17(7):31-33. 被引量:13
  • 2冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:101
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 4梁鹏斌,张晓凌,耿志刚.基于RFID的物流应用解决方案[J].电脑应用技术,2006(2):25-27. 被引量:10
  • 5Schneier Bruce 吴世忠译.应用密码学[M].北京:机械工业出版社,2000..
  • 6StallingsW 杨明 胥光辉 齐望东 等译.Cryptography and network security principles and practice(2nded)[M].北京:电子工业出版社,2001.154-157.
  • 7[1]Pedro Peris-Lopez,Julio Cesar Hernandez-Castro,Juan M.Estevez-Tapiador,and Arturo Ribagorda.RFID Systems:A Survey on Security Threats and Proposed Solutions.In:P.Cuenca and L.Orozco-Barbosa (Eds.).Personal Wireless Communications LNCS 4217.Berlin:Springer,-Verlag,2006:159~170.
  • 8[2]Rhee K,Kwak J,Kim S,Won D.Challenge-response based RFID authentication protocol for distributed database environment In:Hutter D.,Ullmann M.(eds.).Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005).Lectures Notes in Computer Science 3450.Berlin:Springer-Verlag,2005:70~84.
  • 9[3]Molnar D,Wagner D..Privacy and Security in Library RFID:Issues,Practices,and Architectures.In:Proceedings of the 11th ACM Conference on Computer and Communication Security (CCS' 04),Washington.New York:ACM Press,2004:210~219.
  • 10[4]Martin Feldhofer,Sandra Dominikus,Johannes Wolkerstorfer.Strong Authentication for RFID Systems Using the AES Algorithm in:M.Joye and J.-J.Quisquater (Eds.).CHES 2004,LNCS 3156.Berlin:Springer-Verlag,2004:357~370.

共引文献38

同被引文献41

  • 1高毓航,龚俭.基于LDAP目录服务的PKI证书库研究与设计[J].计算机工程,2000,26(S1):164-169. 被引量:4
  • 2欧若风,文超,陈睿,凌力.一种基于椭圆曲线加密算法解决物联网网络安全和效率问题的设计[J].微型电脑应用,2011(3):14-17. 被引量:5
  • 3游战清,李苏剑.无线射频识别技术(RFID)理论与应用[M].北京:电子工业出版社,2005.
  • 4Liu F L,Ning H S,Yang H P,et al. RFID-based EPC System and Information Services in Intelligent Transportation System [ C ]//The 6th International Conference on ITS Telecommuni- cations Proceedings. Chengdu: IEEE Press ,2006:26-28.
  • 5Medaglia C M, Serbanati A. An Overview of Privacy and Secu- rity Issues in the Internet of Things [ C ]//Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Berlin, Germany: Springer- Verlag, 2010 : 389 -394.
  • 6刘宴兵,胡文平,杜江.基于物联网的网络信息安全体系[J].中兴通讯技术,2012,22(5):233-236.
  • 7Atzori L, Iera A, Morabito G. The Intemet of Things : A Survey[ J]. Computer Networks ,2010,54( 1 ) :2787-2805.
  • 8Weber R H. Imernet of things-New security and privacy chal- lenges[ J]. Computer Law & Security Review, 2010,26 ( 1 ) : 23 -30.
  • 9http://developer, android, com/guide/ topics/connectivity/nfc/nfc, html.
  • 10http://developer, android, com/refer- ence/android/nfc/tech/MifareClassic. htrnl.

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部