RFID Technology Has Broad Prospects &Nbsp; Efforts Should Be Made To Crack Down On Shanzhai.
As an advanced automatic identification and data acquisition technology, RFID technology is considered to be one of the 10 important technologies in twenty-first Century, and has broad application prospects in manufacturing, public safety and other fields.
With the improvement of technology reliability and availability, it has gradually become an essential technical means and tool to improve the level of logistics and supply chain management, reduce production costs, improve the level of information management of public safety management, and enhance international competitiveness.
RFID technology is a revolutionary automatic recognition technology which directly inherited the concept of radar and developed from it.
In twenty-first Century, with the pparency and efficiency of the supply chain, WalMart, Metro, Tesco and other large retailers in the world announced their respective RFID plans and received support from suppliers.
Since then, RFID technology has opened up a new huge market.
With the continuous reduction of costs and the unification of standards, RFID technology will also open up new markets in wireless sensor networks, real-time positioning, security and anti-counterfeiting, personal health, product lifecycle management and other fields.
The RFID system consists of the following parts
(1) electronic tags consist of chips and tag antennas, and communicate with readers through inductive coupling or electromagnetic backscattering.
Reader is a device for reading / writing label information. As the terminal of data acquisition, reader and reader also need to exchange data with middleware.
Antenna is a device that provides RF signal space pmission for tags and reader.
Middleware is the link between RFID devices and enterprise applications, and also the core of RFID application system.
The principle is: first, write the information about the unique characteristic of the product to the chip in the tag, which is stored in the database of the server.
In the process of product circulation, when it approaches the reader, the reader sends the electromagnetic wave to provide energy for the tag to activate the chip. The chip pfers the product information through the antenna to the reader. The reader receives the information pmitted to the server through the middleware, and the server passes the information to the reader to complete the confirmation of the product.
The principle of RFID determines its security, because the data of the tag is only a unique encoding, which can not be encrypted completely, and the data that represents the special meaning corresponding to this unique encoding is stored in the security database.
After reading the tag data, the reader sends the unique encoding of the label to the security server. After the security server carries out the security verification of the request, it searches the database and pfers the required data. The data is encrypted by the server and sent to the reader.
In this way, as long as the attacker can not enter the database, malicious code information is meaningless. Without security verification, no useful information will be obtained, and the product content can be protected.
RFID and barcode comparison: barcode information is visual and easy to copy.
Because RFID carries electronic information, it is not easy to be copied.
At present, most of the anti-counterfeiting technologies used in the domestic market are still on paper based materials. The common anti-counterfeiting technologies are holographic designs, discolourable ink, concealed markings on products and packages.
These technologies do not have uniqueness and exclusiveness. They often lead to a counterfeit product or technology will soon be copied, resulting in forgery against counterfeiting technology, and can not play a real anti-counterfeiting role.
RFID technology application and anti-counterfeiting technology, its electronic tag built-in chip and contains the world's only code or commodity coding information, the code can only be recognized by authorized reader, and the information inside the tag and the reader's unique encoding are sent to the anti-counterfeiting database server through the communication network to authenticate. In addition, when the label is damaged, the information will not be read, which will protect the contents of the tag from being stolen, so as to achieve the purpose of anti-counterfeiting.
The Swiss watch industry adopts RFID technology.
The Swiss Winwatch company is committed to developing and applying for intellectual property licensing patents and applying RFID technology to the Swiss patent solutions franchise patent. Taking into account the influence of metal case on antenna frequency reception, Winwatch sets the RFID tag into the watch surface glass to carry out the anti-counterfeiting, identification and tracking of watches.
The technology was certified by the Swiss government in 2003.
In the production process and product production, the RFID anti fake label is placed in the relative position of the product by manual or automatic method, or the label is placed in the product packaging box.
Before the product is released, the product's order number, production date, product type and other valuable information are written in the RFID tag, which is combined with the old number of the RFID tag. The product can generate the only information, and it can also be encrypted to prevent other reading and writing equipment from changing the information in the label.
The RFID system, which is placed at the entrance of the warehouse, automatically collects data to record where the products will be sent to.
In this way, the product can achieve normal sales, and eventually reach the customers through distributors or distributors.
Because the information inside the label is encrypted in the process of writing, the encrypted information in the label can only be read by the device authorized by the manufacturer.
If there is a sale of fake and inferior products in the market, the salesperson will use the handheld sales inspection PDA to read the information in the product label, then determine whether the product is the product produced by the company, and stop the flow of counterfeit products into the sales network in time.
For example, the anti-counterfeiting system implemented by RFID technology is a combination of RFID technology and hardware and software to prevent counterfeit. This system can be used for commodity anti-counterfeiting of containers with bottle caps, and the anti-counterfeiting of commodities can be realized through bottle body structure design and background authentication system.
The system has a RF chip embedded in the bottle cap, and obtains commodity information through RFID reader, communication network and anti-counterfeiting database server.
The anti-counterfeiting database server returns the information corresponding to the chip production date, the manufacturer, the number of inquiries, and the registrant corresponding to the reader code to the RFID reader, so as to achieve the purpose of anti-counterfeiting authentication.
Finally, when the bottle is opened, the cutting device at the mouth of the bottle will cut off the connection between the antenna and the chip, resulting in the RFID reader unable to read the encoding of the chip on the top of the wine bottle cap, and can not be copied again, thereby effectively preventing the counterfeit of such goods.
China's anti-counterfeiting technology has been developed for more than ten years, especially in recent years, and has reached the market scale of ten billion yuan. Its absolute value is quite large.
However, from the harm of fake and shoddy products, the demand for anti-counterfeiting technology products will continue to grow in t.
There are many kinds of anti-counterfeiting technology, including printing anti-counterfeiting technology, chemical material anti-counterfeiting technology, physical anti-counterfeiting technology, digital information anti-counterfeiting technology, structure and packaging anti-counterfeiting technology, human body and biometric anti-counterfeiting technology. These technologies have been widely applied in various fields, especially in areas such as currency, securities, certificates, seals, medicine, food, cosmetics, clothing, agricultural products, auto parts, software and computer chips, forgery and infringement.
RFID will be more and more used in certificates and anti-counterfeiting technology, and eventually become an important field of RFID industry.
Source: HC net
- Related reading
Ke Chuang Center Settled In Tongxiang To Help The Development Of Wool Textile Industry
|- Shoemaking technology | Footwear Export Data Have Been Counted Out.
- Leather knowledge | Clothing Surplus Leather Can Also Be Used As Edible Gelatin?
- Frontier invention | The Soul Of Electronic Information Industry Revitalization Lies In Innovation.
- Frontier invention | 2009中國大連進出口商品交易會開幕
- Management treasure | Individual Tax Extension Insurance Will Be Standardized.
- Management treasure | Is There A Career Assessment For College Students?
- effective communication | Make Management Easier Communication Skills
- Subordinates | Nine Words And Expressions That Affect Colleague Relationship
- Management treasure | How Can 12 Constellations Be Appreciated By The Boss?
- Telephone answering | The Key Points And Taboo Of Receiving Customer Calls
- Carbon Fiber Composite Brake Disc Sample Test Successful
- Four Top Brands Staged Splendid Extravagant Fashion Show
- Deconstructing The New Brand Of Li Lang, "Fast Selling Fashion" L2 Style
- Use Labor Shortage To Guide Enterprises To Improve Working Environment
- Nike Borrows Chicken To Lay Eggs To Integrate External Resources
- Korea'S Import And Export Situation In March 2010
- Quanzhou'S Public Enterprises Are Coming To The Capital Market.
- Shoe Stores Need To Overcome Sales Pressure
- The Way Of Anta Marketing Affects The Brand Strategy Of Men'S Clothing
- CUBA Anta Basketball Carnival Opens