• Title/Summary/Keyword: Tag-out

Search Result 214, Processing Time 0.021 seconds

A Study on Authentication Protocol for Secure RFID Tag (RFID Tag 보안을 위한 인증 프로토콜에 관한 연구)

  • Jung, Yong-Hoon;Kim, Jung-Jae;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.8B
    • /
    • pp.805-811
    • /
    • 2009
  • Firstly, this dissertation suggests the tag ID transfer method using two-dimensional arrangement. Secondly, provide better and stable security system compare to existing one by transferring tag; ID using established two-dimensional arrangement. Thirdly, provide operating module, which possible to descramble two-dimensional arrangement, with a character set when descrambling in a tag and a server. Lastly, suggest safe key transfer using a character set and two-dimensional arrangement. In order to embody suggested system and assess, transferred two-dimensional arrangement several times to carry out the experiment. Confirmed that it is impossible for suggested system to decode key patterns compare to existing RFID systems.

Production Control System Based on RFID (RFID를 기반으로한 생산공정관리 시스템)

  • Park, In-Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.25-31
    • /
    • 2009
  • In this paper, the implementation of a production control system based on RFID has been studied in order to obtain an exact Cost Center data such as the name of workers included a process of work and a time period to finish the process. The cost center of a worker will be correctly obtained by checking the work time using RFID tag data and by transmitting the data to a server of ERP or POP system. And also warming up time, cleaning time, power failure, and out of order sign will be checked and calculated using the data stored in RFID tags attached in workers and machine facilities. Therefore, exact Cost Center data will be obtained by the production control system with touch screens entering the data according to the situation in real time.

  • PDF

Comparison of Memoryless Anti-collision Protocols for Tag Identification (태그 인식을 위한 무기억 충돌 방지 프로토콜의 비교 분석)

  • Yang, Eui-Sik;Lim, In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.565-568
    • /
    • 2005
  • RFID system allows contactless identification of objects, where small tags are attached to objects and information of objects are transferred using radio frequency. In recent years, industries have incorporated several identification systems to its production processes, which allow collecting automatically information about goods. In order to communicate with a single tag out of a group of tags, the target tag has to be identified. Therefore the read has to attempt to obtain the unique identification code of each tag within its read range. This paper presents performance results of QT and QT-sl protocols, which are tag identification protocols incorporating memoryless property. The memoryless property is that the current response of each tag only depends on the current query of the reader but not on the past history of the reader's queries.

  • PDF

Design of the Coated Layer Suitable with Conductive Ink for RFID(II) - Effect of coating color components on the surface resistance of conductivity ink - (RFID용 전도성 잉크에 적합한 도공층 설계 (제1보) -도공액 성분에 따른 전도성잉크의 표면저항의 변화-)

  • Jung, Hae-Sung;Kim, Chang-Geun;Lee, Yong-Kyu
    • Journal of Korea Technical Association of The Pulp and Paper Industry
    • /
    • v.43 no.1
    • /
    • pp.17-22
    • /
    • 2011
  • The conventional coated paper has many functional problems for printed RFID tag. This study was carried out in order to evaluate the effect of coating color components on conductivity of printed coated paper. It has been well known that the efficiency of printed RFID tag is influenced by surface properties of substrate. The required properties for suitable substrate of printed RFID tag are high smoothness and waterproof property. In this study high grammage base paper surface sized with PVA was used. Coated paper was manufactured with five different formulations. Types of coating pigments and dosage of latex were varied. It was obtained high smoothness and also less binder demand with clay than GCC. On the other hand, suitable surface resistance and smoothness of coated paper for RFID tag was obtained with 20% of latex. Besides it shows the possibility of using coated paper for printed RFID tag.

Development of Simulation System For Real-Time Location Tracking In Global Shipping Logistics (글로벌 해운물류 실시간 위치 추적 시뮬레이션 시스템 개발)

  • Park, Byung-Kwon;Choi, Hyung-Rim;Kim, Chae-Soo;Lee, Kang-bae;Park, Min-Seon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1235-1242
    • /
    • 2015
  • In global shipping logistics, it is important for users to keep track of the location of their continuously moving cargos. Analyzing the GPS data stream coming from the tag which is attached to the cargo, we are able to keep track of the cargo location in terms of going into or out of a certain logistics area using the information of the spatial relationship change between the tag and the logistics area. In this paper, we propose a simulation system for measuring the precision and false alarm rate of the cargo location tracking algorithm which generates spatial events over the global logistics areas. Due to the difficulty of experiment with a real tag, we developed a tag emulator to create a virtual tag which operates exactly like a real tag. We show the cargo location tracking system works correctly with the tag emulator which communicates with it using the same protocol as the real tag.

Passive UHF RFID Propagation Characteristics and Reconsideration of Link budget on Practical Communication Area (수동형 UHF RFID 인터페이스에 대한 Link budget의 재해석 및 전파 환경 요소 분석)

  • Jung, Jin-Woo;Park, Kyoung-Tae;Roh, Hyoung-Hwan;Park, Jun-Seok;Kim, Hyeong-Seok
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.469-472
    • /
    • 2008
  • In this paper, we discuss the recent trends on the passive UHF RFID tag chip design techniques and several important system parameters. We also summarize link budget studies on both conventional and modem UHF RFID communications. The paper highlights the reverse link limited case, which has known to be the minor concern if reader continuous wave (CW) can reach the tag in sufficient level. This makes sense when the tag sensitivity is rather high (over 10-12${\mu}W$); however, since the tag chip fabrication technologies have been developed by time, the tag chip threshold levels are now less-dominant in determining link margin. If the tag limitation can be alleviated, the forward link limited case can be resolved; thus, we rather focus on the path-loss problem. Since the path-losses are still exist in both forward and reverse links, and it can be doubled while CW travels the reader-tag-reader path because forward link and reverse link are on the same distance. Consider if reader receiver sensitivity is very high in the worst case. In this case, weaken tag response (i.e., backscatters) cannot reach the level that reader receiver can process tag data; bit-error rate can be higher. Overall, backscatter levels should be high enough so that reader receiver can correctly function. After discussing link budget, we carried out practical measurements on fading effects between two circularly polarized UHF RFID antennas in a small scale area.

  • PDF

A Study on 2.45GHz RFID Active Tag and Reader Using Various Radio Frequency (다양한 전파 세기를 이용한 2.45GHz RFID Active Tag 및 Reader에 관한 연구)

  • You, Chi Hyung;Kim, Jung Jae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.31-39
    • /
    • 2008
  • RFID diffusion and origin technique being developed gradually, according to the various branch application solutions are coming out plentifully. Developed distance variable style 2.45 Ghz Active Tag from the present paper and according to century of corresponding frequency the distance of the leader and the tag between should have been falling as will freeze, will be able to grasp in order. The experimental result plan develops the data which measures from field test and the electromagnetic waves laboratory with base.

An XML Tag Indexing Method Using on Lexical Similarity (XML 태그를 분류에 따른 가중치 결정)

  • Jeong, Hye-Jin;Kim, Yong-Sung
    • The KIPS Transactions:PartB
    • /
    • v.16B no.1
    • /
    • pp.71-78
    • /
    • 2009
  • For more effective index extraction and index weight determination, studies of extracting indices are carried out by using document content as well as structure. However, most of studies are concentrating in calculating the importance of context rather than that of XML tag. These conventional studies determine its importance from the aspect of common sense rather than verifying that through an objective experiment. This paper, for the automatic indexing by using the tag information of XML document that has taken its place as the standard for web document management, classifies major tags of constructing a paper according to its importance and calculates the term weight extracted from the tag of low weight. By using the weight obtained, this paper proposes a method of calculating the final weight while updating the term weight extracted from the tag of high weight. In order to determine more objective weight, this paper tests the tag that user considers as important and reflects it in calculating the weight by classifying its importance according to the result. Then by comparing with the search performance while using the index weight calculated by applying a method of determining existing tag importance, it verifies effectiveness of the index weight calculated by applying the method proposed in this paper.

An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency (강한 프라이버시와 연산 효율성을 제공하는 암호 퍼즐 기반 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.9-18
    • /
    • 2012
  • In 2010, Pedro et al. proposed RFID distance bounding protocol based on WSBC cryptographic puzzle. This paper points out that Pedro et al.'s protocol not only is vulnerable to tag privacy invasion attack and location tracking attack because an attacker can easily obtain the secret key(ID) of a legal tag from the intercepted messages between the reader and the tag, but also requires heavy computation by performing symmetric key operations of the resource limited passive tag and many communication rounds between the reader and the tag. Moreover, to resolve the security weakness and the computation/communication efficiency problems, this paper also present a new RFID distance bounding protocol based on WSBC cryptographic puzzle that can provide strong security and high efficiency. As a result, the proposed protocol not only provides computational and communicational efficiency because it requires secure one-way hash function for the passive tag and it reduces communication rounds, but also provides strong security because both tag and reader use secure one-way hash function to protect their exchanging messages.

FolkRank++: An Optimization of FolkRank Tag Recommendation Algorithm Integrating User and Item Information

  • Zhao, Jianli;Zhang, Qinzhi;Sun, Qiuxia;Huo, Huan;Xiao, Yu;Gong, Maoguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.1-19
    • /
    • 2021
  • The graph-based tag recommendation algorithm FolkRank can effectively utilize the relationships between three entities, namely users, items and tags, and achieve better tag recommendation performance. However, FolkRank does not consider the internal relationships of user-user, item-item and tag-tag. This leads to the failure of FolkRank to effectively map the tagging behavior which contains user neighbors and item neighbors to a tripartite graph. For item-item relationships, we can dig out items that are very similar to the target item, even though the target item may not have a strong connection to these similar items in the user-item-tag graph of FolkRank. Hence this paper proposes an improved FolkRank algorithm named FolkRank++, which fully considers the user-user and item-item internal relationships in tag recommendation by adding the correlation information between users or items. Based on the traditional FolkRank algorithm, an initial weight is also given to target user and target item's neighbors to supply the user-user and item-item relationships. The above work is mainly completed from two aspects: (1) Finding items similar to target item according to the attribute information, and obtaining similar users of the target user according to the history behavior of the user tagging items. (2) Calculating the weighted degree of items and users to evaluate their importance, then assigning initial weights to similar items and users. Experimental results show that this method has better recommendation performance.