Welcome![Sign In][Sign Up]
Location:
Search - rfid security system

Search list

[Other resourceRFID_98798798698698

Description: jsp网页,开发环境Eclipse3.2+Tomcat5.0+Myeclipse开发的RFID射频识别模拟系统,模拟了酒类产品从生产,存储,销售,到防伪识别一系列过程-jsp website Development Environment Eclipse3.2 Tomcat5.0 Myeclipse development of the RFID - Simulation frequency identification system to simulate the alcoholic products from the production, storage, sale, a series of security identification process
Platform: | Size: 3945112 | Author: 河南 | Hits:

[RFIDRFID_98798798698698

Description: jsp网页,开发环境Eclipse3.2+Tomcat5.0+Myeclipse开发的RFID射频识别模拟系统,模拟了酒类产品从生产,存储,销售,到防伪识别一系列过程-jsp website Development Environment Eclipse3.2 Tomcat5.0 Myeclipse development of the RFID- Simulation frequency identification system to simulate the alcoholic products from the production, storage, sale, a series of security identification process
Platform: | Size: 3944448 | Author: 河南 | Hits:

[RFIDTI_RFID_security

Description: 文章中系统的论述的TI公司是如何实现在医药系统中防止假冒的,这对于国内RFID安全应用有很好的借鉴意义。-Article in the discussion of the TI system is how to achieve in the medical system to prevent counterfeiting, which the domestic security of the application of RFID has a very good reference.
Platform: | Size: 587776 | Author: wangweiyang | Hits:

[WEB CodeRFID-Security

Description: Radio Frequency Identification [RFID] systems have become popular for automated identification and supply chain applications. This article describes the technical fundamentals of RFID systems and the associated standards. Specifically, we address the security and privacy aspects of this relatively new and heterogeneous radio technology. We discuss the related security requirements, the threats and the implemented mechanisms. Then the current security and privacy proposals and their enhancements are presented. Finally we discuss the role of this technology in Ubiquitous Computing-The automated identification of objects with electromagnetic fields is the major purpose of the RFID [Radio Frequency Identification] technology. An RFID system basically consists of transponders [tags], readers [scanners] and application systems for further processing of the acquired data. There is a large variety of different RFID systems: they may use low, high or ultra high frequencies, the transponder may emit only a fixed identifier or possess significant memory and processing capabilities. Transponders may incorporate no security features at all or realise effective security protocols similar to smartcards. Most transponders are passively powered by the radio field emitted by the reader but there are also active tags with a separate power supply. The transponder design is also little uniform: there are e.g. tiny tags with a size of several millimetres, very thin “smart labels” or standard ID-1 cards
Platform: | Size: 357376 | Author: 胡利建 | Hits:

[Otherbb

Description: 基于AES和RSA加密算法的RFID安全机制 考虑到对国内应用最广泛的Mifarel系列标签的安全手t一级, 在建立以 MFRC500为读卡核心的RFID读卡系统的基础上,提出了一种基于非 对称加密与对称加密算法相结合的RFID安全机制。利用一1卜对称力11密算法对对称 加密算法的密钥的二次加密,做到只有特定的读写器才能拥有读写卡的权利。该 安全机制跳过RFID在开放环境中传输所面临的各种威胁,通过利少月安全性和稳 定性久经考验的公开安全加密算法对存入智能卡信息的重加密,解决了RFID所 面临的安全和隐私泄露问题 -Taking into account the most widely used domestic Mifarel series of labels t a safe hand, In the establishment of MFRC500 as the reader, RFID reader system, the core was proposed based on a based on non- Symmetric encryption and symmetric encryption algorithm is a combination of RFID security mechanism. The use of a one-Bu symmetry edge 11 close to the symmetric algorithm The key encryption algorithm for re-keying, so that only certain card reader in order to have the right to read and write. The Skip RFID security mechanisms to transfer in an open environment faced by a variety of threats, through the pros on the security and stability Qualitative time-tested public security encryption algorithm into the smart card information, re-encryption, solved by RFID Faced with the problem of security and privacy leaks
Platform: | Size: 5257216 | Author: wupiao | Hits:

[Other Embeded programRFID-security-system

Description: This project aimed to develop a wireless system to detect and allow only the authorized persons. The system was based on Radio Frequency Identification (RFID) technology and consists of a passive RFID tag. The passive micro transponder tag collects power from the 125 KHz magnetic field generated by the base station, gathers information about the Tag ID and sends this information to the base station. The base station receives, decodes and checks the information available in its Database and Manchester code was used to send those information. The system performed as desired with a 10cm diameter antenna attached to the transponder. The Base Station is built by using the Popular 8051 family Microcontroller. It gets the tag ID and if the tag ID is stored in its memory then the microcontroller will allow the person inside. RFID Reader Module, are also called as interrogators.
Platform: | Size: 111616 | Author: Binu | Hits:

[RFIDRFIDElectricStudetsID

Description: 将RFID技术应用于「教育机构的自动点名系统」上,这将取代传统费时的点名制度,并透过网络、手机简讯通知学生家长该学生目前的出席状况。为确保教师的隐私权以及个人数据安全性,系统透过数据库来管理个人数据文件。在读取器与标签之间进行相互认证同时,卡号与数据库数据相符者,系统会将持卡人照片显示于屏幕之上,做进一步的资料比对。-RFID technology will be applied to the " automatic naming system of educational institutions" , this name will replace the traditional time-consuming system, and through the Internet, cell phone text message notify parents of students attending the current status of the student. To ensure a right to privacy and personal data security, the system through a database to manage personal data files. Reader and tag in the mutual authentication between the same time, the card number matches with the database data, system will be the cardholder photo displayed on the screen above for further information comparison.
Platform: | Size: 348160 | Author: lwqq | Hits:

[RFIDRFID

Description: rfid application for security system
Platform: | Size: 484352 | Author: kaiser_0986 | Hits:

[RFIDrfid

Description: rfid商品防伪系统,基于对RFID系统建设的研究-rfid security system products, based on the construction of RFID system
Platform: | Size: 3194880 | Author: 小丫 | Hits:

[Education soft systemmy-webset

Description: VS08开发的校园安全管理系统,应用物联网安全管理,基于RFID技术-VS08 campus safety management system development, application security management of things, based on RFID technology
Platform: | Size: 6074368 | Author: 文章 | Hits:

[RFIDairport

Description: 机场无线定位解决方案介绍。包括利用RTLS、RFID系统进行人员和资产管理的介绍。-Airport wireless location solutions for introduction. Including the use of RTLS, RFID and asset management system for staff presentation.
Platform: | Size: 2241536 | Author: 金波 | Hits:

[RFIDRFID-security-key-technology

Description: 。重点研究了RFID 防伪体系中关键技术的设计,利用RFID 中间件实现射频标签 和读写器相互认证;-Focuses on key technologies in the RFID security system design, the use of RFID tags RFID middleware And the reader mutual authentication
Platform: | Size: 621568 | Author: bxfg | Hits:

[Other Embeded programRF-ID-ACCESS

Description: rfid accessing system is nothing but it is used for security purpose we can use this sytem in office, classroom, college purpose
Platform: | Size: 6704128 | Author: charan | Hits:

[Software Engineeringdiv-id

Description: source code for security system based on RFID
Platform: | Size: 18432 | Author: NAMRATA | Hits:

[Other2008-RFID-Security---Techniques--Protocols-and-Sy

Description: RFID Security - Techniques, Protocols and System-on-Chip Design
Platform: | Size: 6103040 | Author: Benjamin | Hits:

[OtherPractical-Arduino-Cool-Projects-For-Open-Source-H

Description: Practical Arduino Cool Projects. Cool Projects for Open Source Hardware. Appliance Remote Control. Time-Lapse Camera Controller. Virtual USB Keyboard. PS/2 Keyboard or Mouse Input. Security/Automation Sensors. Online Thermometer. Touch Control Panel. Speech Synthesizer. Water Flow Gauge. Oscilloscope/Logic Analyzer. Water Tank Depth Sensor. Weather Station Receiver. RFID Access Control System. Vehicle Telemetry Platform. Resources.
Platform: | Size: 7976960 | Author: Carlos | Hits:

[Technology Managementrfid

Description: 首先介绍实数域上的椭圆 曲线及其运算规则,在此基础上引入有限域上的椭圆曲线及其困难性问题;然后 介绍了 Edwards 曲线的数学基础,以及方案构建所需的可证明安全理论;最后介 绍了移动 RFID 系统及其安全需求、移动 RFID 安全认证等基础知识。-First of all introduce real number domain ellipse Curve and its operation rules, on the basis of the introduction of the elliptic curve over finite field and its difficulty problem then Introduces the mathematical basis of Edwards curve, and plan to build the required to prove that security theory The final interface For mobile RFID system and its security requirements, basic knowledge of mobile RFID security certification.
Platform: | Size: 1829888 | Author: 孔繁月 | Hits:

CodeBus www.codebus.net