05毕业设计论文.doc

基于RFID射频技术的宿舍用电刷卡消费系统设计【说明书论文开题报告外文翻译】

收藏

压缩包内文档预览:(预览前20页/共77页)
预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图 预览图
编号:10276623    类型:共享资源    大小:23.57MB    格式:ZIP    上传时间:2018-07-09 上传人:小*** IP属地:福建
50
积分
关 键 词:
基于 rfid 射频 技术 宿舍 用电 刷卡 消费 系统 设计 说明书 仿单 论文 开题 报告 讲演 呈文 外文 翻译
资源描述:
基于RFID射频技术的宿舍用电刷卡消费系统设计【说明书论文开题报告外文翻译】,基于,rfid,射频,技术,宿舍,用电,刷卡,消费,系统,设计,说明书,仿单,论文,开题,报告,讲演,呈文,外文,翻译
内容简介:
毕 业 设 计(论 文)任 务 书1本毕业设计(论文)课题应达到的目的:通过毕业设计,使学生受到电气工程师所必备的综合训练,在不同程度上提高各种设计及应用能力,具体包括以下几方面: 1. 调查研究、中外文献检索与阅读的能力。 2. 综合运用专业理论、知识分析解决实际问题的能力。 3. 定性与定量相结合的独立研究与论证的能力。 4. 实验方案的制定、仪器设备的选用、调试及实验数据的测试、采集与分析处理的能力。 5. 设计、计算与绘图的能力,包括使用计算机的能力。 6. 逻辑思维与形象思维相结合的文字及口头表达的能力。 2本毕业设计(论文)课题任务的内容和要求(包括原始数据、技术要求、工作要求等):1.本课题设计的磁卡系统包括硬件阅读器部分和上位机查询软件部分,主要用于充值、实时消费、消费查询、打卡服务等功能。13.56Mhz RFID 电感耦合天线设计,阅读器与应答器的线圈形式的天线相当于电感,电感包括自感和互感。阅读器线圈、应答器线圈分别都有自感,而且他们之间也形成互感从而可以进行数据的传输。上位机查询软件部分,提供的功能有,查询当前进入磁卡消费系统的活动对象的时间信息和费用信息;增加和删除运行磁卡系统的对象。 2.设计系统的硬件电路和软件程序,包括详细的硬件设备配置,系统连接,程序调试等详细步骤; 3.最终完成一篇符合金陵科技学院毕业论文规范的系统技术文档,包括各类技术资料,电路图纸,程序等; 4.系统要有实际的硬件展示,并能够通电运行; 5.本子系统要与整个系统能够配合运行; 6.能够完成各项任务,参加最后的毕业设计答辩。 毕 业 设 计(论 文)任 务 书3对本毕业设计(论文)课题成果的要求包括图表、实物等硬件要求: 1.按期完成一篇符合金陵科技学院论文规范的毕业设计说明书(毕业论文) ,能详细说明设计步骤和思路; 2.能有结构完整,合理可靠的技术方案; 3.能有相应的电气部分硬件电路设计说明; 4.有相应的图纸和技术参数说明。 5.要求控制系统能在实验室现有的设备基础上调试成功,并在答辩时完成实际系统展示。 4主要参考文献: 1 V. Yu. Teplov,A. V. Anisimov. Thermostatting System Using a Single-Chip Microcomputer and Thermoelectric Modules Based on the Peltier EffectJ ,2002. 2 Meehan Joanne,Muir Lindsey.SCM in Merseyside SMEs:Benefits and barriers J. TQM Journal. 2008 3 郁汉琦.电气控制与可编程序控制应用技术M.南京:东南大学出版社,2009. 4 Behzad Razavi.Design of Analog CMOS Integrated CircuitsM. . 2001 5 姜玉春.PID 控制器参数的整定J.莱钢科技,2006,(02). 6 何芝强.PID 控制器参数整定方法及其应用研究D.浙江大学,2005. 7 丁芳.智能 PID 算法在液位控制系统中的应用J.微计算机信息,2006. 8 江春红.基于 PLC 的液位模糊控制系统设计D.合肥工业大学,2008. 9 原继萍,刘海亮.数字式 PID 控制算法研究J.航天控制,2010,(05). 10 岳庆来.变频器,可编程序控制器及触摸屏综合应用技术M.北京:机械工业出版社,2006. 11 魏巍.水箱液位控制系统建模与其 PID控制器设计J.中国科技信息,2008. 12 张燕宾.变频调速应用实践M.北京:机械工业出版社,2004. 13 魏克新.自动控制综合应用技术M.北京:机械工业出版社,2007. 14 刘美俊.变频器应用与维护技术M.北京:中国电力出版社,2008. 15 罗庚兴.基于 PLC 的液位模糊自适应 PID 控制研究与应用J.佛山职业技术学院,2012. 毕 业 设 计(论 文)任 务 书5本毕业设计(论文)课题工作进度计划:2015.11.04-2015.11.28:在毕业设计管理系统里选题 2015.11.29-2015.12.16:与指导教师共同确定毕业设计课题 2015.12.17-2016.01.10:查阅指导教师下发的任务书,准备开题报告 2016.02.25-2016.03.09:提交开题报告、外文参考资料及译文、论文大纲 2016.03.09-2016.04.28:进行毕业设计(论文) ,填写中期检查表,提交论文草稿等 2016.04.29-2016.05.09:按照要求完成论文或设计说明书等材料,提交论文定稿 2016.05.09-2016.05.13:教师评阅学生毕业设计;学生准备毕业设计答辩 2016.05.14-2016.05.21:参加毕业设计答辩,整理各项毕业设计材料并归档 所在专业审查意见:通过 负责人: 2016 年 1 月 12 日 毕 业 设 计(论文) 开 题 报 告 1结合毕业设计(论文)课题情况,根据所查阅的文献资料,每人撰写不少于1000 字左右的文献综述: 当前,很多高校的校园电控系统与学生一卡通系统通过数据表进行同步共享,实现应用整合,通过“校园一卡通”的自助服务队宿舍的电表进行购电操作,不仅提高了“校园一卡通”系统的服务能力,而且是“校园电控系统”的购电过程更加智能,提高了宿舍用电管理的工作效率。但是,事实上这样便利的一卡通圈存电子消费系统,在学生们看来还是不那么“方便” 。当宿舍用电达到用电额度时,学生们需要到一卡通机器给宿舍交电费,才能继续用电。这个过程不仅麻烦,而且容易造成学生操作错误,误给其他宿舍充电费。自 2004 年起,全球范围内掀起了一场无线射频识别技术(RFID)的热潮,包括沃尔玛、宝洁、波音公司在内的商业巨头无不积极推动 RFID 在制造、物流、零售、交通等行业的应用。RFID 技术及其应用正处于迅速上升的时期,被业界公认为是本世纪最具潜力的技术之一,它的发展和应用推广将是自动识别行业的一场技术革命。考虑到,现在许多高校采用宿舍用电、门禁分离的模式,不仅不利于节约人力资源成本,而且似乎并不受大学生欢迎。一、RFID 技术简介 (1)RFID 是什么? RFID 是 Radio Frequency Identification 的缩写,即射频识别,俗称电子标签。 (2)什么是 RFID 技术? RFID 射频识别是一种非接触式的自动识别技术,它通过射频信号自动识别目标对象并获取相关数据,识别工作无须人工干预,可工作于各种恶劣环境。RFID 技术可识别高速运动物体并可同时识别多个标签,操作快捷方便。RFID 是一种简单的无线系统,只有两个基本器件,该系统用于控制、检测和跟踪物体。系统由一个询问器(或阅读器)和很多应答器(或标签)组成。 (3)RFID 的基本组成部分? 标签(Tag):由耦合元件及芯片组成,每个标签具有唯一的电子编码,附着在物体上标识目标对象; 阅读器(Reader):读取(有时还可以写入)标签信息的设备,可设计为手持式或固定式; 天线(Antenna):在标签和读取器间传递射频信号。 (4)RFID 技术的基本工作原理?RFID 技术的基本工作原理并不复杂:标签进入磁场后,接收解读器发出的射频信号,凭借感应电流所获得的能量发送出存储在芯片中的产品信息(Passive Tag,无源标签或被动标签) ,或者主动发送某一频率的信号(Active Tag,有源标签或主动标签) ;解读器读取信息并解码后,送至中央信息系统进行有关数据处理。 (5)射频识别系统构架? 一套完整的 RFID 系统, 是由阅读器(Reader)与电子标签(TAG)也就是所谓的应答器(Transponder)及应用软件系统三个部份所组成,其工作原理是 Reader 发射一特定频率的无线电波能量给Transponder,用以驱动 Transponder 电路将内部的数据送出,此时 Reader 便依序接收解读数据,送给应用程序做相应的处理。以 RFID 卡片阅读器及电子标签之间的通讯及能量感应方式来看大致上可以分成,感应耦合(Inductive Coupling) 及后向散射耦合(Backscatter Coupling)两种,一般低频的 RFID 大都采用第一种式,而较高频大多采用第二种方式。阅读器根据使用的结构和技术不同可以是读或读/写装置,是 RFID 系统信息控制和处理中心。阅读器通常由耦合模块、收发模块、控制模块和接口单元组成。阅读器和应答器之间一般采用半双工通信方式进行信息交换,同时阅读器通过耦合给无源应答器提供能量和时序。 在实际应用中,可进一步通过 Ethernet 或 WLAN 等实现对物体识别信息的采集、处理及远程传送等管理功能。应答器是 RFID 系统的信息载体,目前应答器大多是由耦合原件(线圈、微带天线等)和微芯片组成无源单元。二、RFID 技术的发展历史 从信息传递的基本原理来说,射频识别技术在低频段基于变压器耦合模型(初级与次级之间的能量传递及信号传递),在高频段基于雷达探测目标的空间耦合模型(雷达发射电磁波信号碰到目标后携带目标信息返回雷达接收机)。1948 年哈里斯托克曼发表的“利用反射功率的通信”奠定了射频识别射频识别技术的理论基础。1940 年,雷达的改进和应用催生了射频识别技术,1948 年奠定了射频识别技术的理论基础。1950-1960 年:早期射频识别技术的探索阶段,主要处于实验室实验研究。1960-1970 年:射频识别技术的理论得到了发展,开始了一些应用尝试。1970-1980 年:射频识别技术与产品研发处于一个大发展时期,各种射频识别技术测试得到加速,出现了一些最早的射频识别应用。1980-1990 年:射频识别技术及产品进入商业应用阶段,各种规模应用开始出现。1990-2000 年:射频识别技术标准化问题日趋得到重视,射频识别产品得到广泛采用,射频识别产品逐渐成为人们生活中的一部分。2000 年后:标准化问题日趋为人们所重视,射频识别产品种类更加丰富,有源电子标签、无源电子标签及半无源电子标签均得到发展,电子标签成本不断降低,规模应用行业扩大。2010 年以来,由于经济形势的好转和物联网产业发展等利好因素推动,全球 RFID 市场也持续升温,并呈现持续上升趋势。同时,RFID 的应用领域越来越多,人们对 RFID 产业发展的期待也越来越高。目前RFID 技术正处于迅速成熟的时期,许多国家都将 RFID 作为一项重要产业予以积极推动。目前中国无源射频市场还处于发展的初期,核心技术急需突破,商业模式有待创新和完善,产业链需要进一步发展和壮大,只有核心问题得到有效解决,才能够真正迎来 RFID 无源射频市场发展。三、基于 RFID 技术的宿舍用电消费系统设计 本课题,希望可以将通过 RFID 射频技术将宿舍用电消费系统和门禁系统结合在一起,不仅方便学生在宿舍进行缴纳电费而且通过绑定门禁系统可以最低限度的避免宿舍失窃。 参考文献: 1 胡一凡.RFID 射频识别技术综述J.计算机时代.2006,12. 2 张纲,马庆容,沈磊.射频识别技术的现状和发展研究J.半导体技术.2004,29. 3 程晨.浅谈射频识别技术在中国的发展J.单片机与嵌入式系统应用.2004,06. 4 张航.面向物联网的 RFID技术研究D.东华大学,2011. 5 蒋皓石,张成,林嘉宇.无线射频识别技术及其应用和发展趋势J.电子技术应用.2005,05. 6 郑学洪.一卡通智能管控高校宿舍用电J.中国教育网络.2011,12. 7 刘勇,陈祈邦,巫辉东.基于 RFID技术的门禁系统研究J.电子设计工程.2014,19. 8 张明涛.用于 RFID 系统的天线设计D.西安电子科技大学,2007. 9 陈品杉.RFID 读写器收发天线隔离技术研究D.南京邮电大学,2011. 10 秦维.RFID 标签片上天线的研究D.华东师范大学,2009. 11 刘文飞.改进的高频 RFID 识读器设计与实现D.哈尔滨工程大学,2010. 12 李宝山,张慧元,侯宇.13.56MHz RFID 读卡器天线的设计J.内蒙古科技大学学报.2009,04. 13 尹应增.微波射频识别技术研究D.西安电子科技大学,2002. 14 刘彩凤,曹彬.RFID 标签天线的制造方案J.包装世界.2011,06. 15 缪健,熊孟英.无线射频识别技术 RFID 及应用J.科技和产业.2005,11. 16 Christophe Jechlitschek.A Survey Paper on Radio Frequency Identification (RFID) TrendsJ. IEEE Transactions on Automatic Control. 2006,40(4). 毕 业 设 计(论文) 开 题 报 告 2本课题要研究或解决的问题和拟采用的研究手段(途径): 本课题要研究或解决的问题是: 1.13.56Mhz RFID 电感耦合天线电路理论设计到 PCB 印刷版的过程。 2.FM1702SL 阅读器的 51 单片机控制程序。 3.PC 与 51单片机串口通信的问题。 4.上位机查询数据库的功能实现。 研究手段(途径): 1.去图书馆查阅高频、RFID 相关产品实例等资料; 2.充分利用网络资源,搜索 RFID 射频的技术资料如原理图,天线电路图等; 3.以小组讨论的形式展开对课题的研究; 4.焊接主控板,天线模块,调试是否可以对 IC 卡进行阅读数据。 5.系统完成后,进行全程模拟调试,直达完成预期目标。 毕 业 设 计(论文) 开 题 报 告 指导教师意见:1对“文献综述”的评语:该生通过大量搜集和查阅文献资料,对与“RFID 射频识别技术”相关的国内外前人工作较好地进行了综合分析和归纳整理,并主要介绍了 RFID 射频识别技术的工作原理及其发展趋势,但在国内外 RFID 射频识别技术发展比较水面的叙述相对不足。从“文献综述”全文来看,基本达到了学校对“文献综述”的要求。2对本课题的深度、广度及工作量的意见和对设计(论文)结果的预测:该生对于所开课题进行了较为详尽的市场调研,参考了一定数量的文献资料,最后确定的课题“基于 RFID 射频技术的宿舍用电刷卡消费系统设计”具有一定的实用和参考价值。本课题是学生所学专业知识的延续,符合学生专业发展方向,对于提高学生的基本知识和技能、提高学生的研究设计能力有一定的锻炼和提升作用;本课题研究目标清晰,研究手段基本合理,工作量适当,难度适中,学生能够在预定时间内完成该课题的设计研究工作。 3.是否同意开题: 同意 不同意指导教师: 2016 年 03 月 07 日所在专业审查意见:同意 负责人: 2016 年 03 月 08 日译文题目:A Survey Paper on Radio Frequency Identification (RFID) Trends 射频识别(RFID)趋势的调查报告 A Survey Paper on Radio Frequency Identification (RFID) TrendsAbstract: This paper provides a survey on radio frequency identification (RFID) technology. Initially RFID tags were developed to eventually replace barcodes in supply chains. Their advantages are that they can be read wirelessly and without line of sight, contain more information than barcodes, and are more robust. The paper describes the current technology, including the frequency ranges used and standards. With the increasing ubiquity of RFID tags, however, privacy became a concern. The paper outlines possible attacks that can violate ones privacy and it also describes counter measures. The RFID technology did not stop at item-level tagging. The paper also presents current research that focuses on locating and tracking labeled object that move. Since the uses for RFID tags are so widespread, there is a large interest in lowering the costs for producing them. It turns out that printing tags might become a viable alternative to traditional production. The paper reviews the current progress.1. IntroductionRFID tags, or simply “tags“, are small transponders that respond to queries from a reader by wirelessly transmitting a serial number or similar identifier. They are heavily used to track items in production environments and to label items in supermarkets. They are usually thought of as an advanced barcode. However, their possible area of use is much larger. This paper presents a few new applications that are possible using RFID technology such as locating lost items, tracking moving objects, and others. RFID tags are expected to prolife rate into the billions over the next few years and yet, they are simply treated the same way as barcodes without considering the impact that this advanced technology has on privacy. This paper presents possible exploits of RFID systems and some proposed solutions as well.2. Historic Development of RFIDThe first RFID application was the “Identification Friend or Foe“ system(IFF) Wiki-RFIDWizard Wars and it was used by the British in the Second World War. Transponders were placed into fighter planes and tanks, and reading units could query them to decide whether to attack. Successors of this technology are still used in armies around the world.The first commercial RFID application was the “Electronic Article Surveillance“ (EAS). It was developed in the seventies as a theft prevention system. It was based on tags that can store a single bit. That bit was read when the customer left the store and the system would sound alarm when the bit was not unset. In the end-seventies RFID tags made its way into the agriculture for example for animal tagging.In the eighties RFID technology got a boost when Norway and several US states decided to uses RFID for toll collection on roads EZ-Pass. In addition to toll collection the following decade brought a vast number of new applications, such as ski passes, gasoline cards Speed Pass, money cards, etc.In 1999 the Auto-ID Center at MIT was founded. Its task was to develop a global standard for item-level tagging. The Auto-ID was closed in 2003 after completing the work on the Electronic Product Code (EPC). At the same time the newly founded EPC global Inc. continues the work.The probably first paper related to RFID technology was the landmark paper by Harry Stock man, “Communication by Means of Reflected Power“ in October 1948. The first patent on RFID was issued in 1973 for a passive radio transponder with memory US. Patent 3,713,148.3. Current RFID TechnologyThis section describes out of which parts RFID tags consist of, how they work in principle, and what types of tags do exist. It focuses on how tags are powered and what frequency ranges is used. The section concludes by covering a few important standards.RFID transponders (tags) consist in general of: Micro chip, Antenna, Case, Battery (for active tags only)The size of the chip depends mostly on the Antenna. Its size and form is dependent on the frequency the tag is using. The size of a tag also depends on its area of use. It can range from less than a millimeter for implants to the size of a book in container logistic. In addition to the micro chip, some tags also have rewritable memory attached where the tag can store updates between reading cycles or new data like serial numbers.A RFID tag is shown in figure 1. The antenna is clearly visible. As said before the antenna has the largest impact of the size of the tag. The microchip is visible in the center of the tag, and since this is a passive tag it does not have an internal power source.In principle an RFID tag works as follows: the reading unit generates an electro-magnetic field which induces a current into the tags antenna. The current is used to power the chip. In passive tags the current also charges a condenser which assures uninterrupted power for the chip. In active tags a battery replaces the condenser. The difference between active and passive tags is explained shortly. Once activated the tag receives commands from the reading unit and replies by sending its serial number or the requested information. In general the tag does not have enough energy to create its own electro-magnetic field, instead it uses back scattering to modulate (reflect/absorb) the field sent by the reading unit. Because most fluids absorb electro-magnetic fields and most metal reflect those fields the reading of tags in presence of those materials is complicated.During a reading cycle, the reader has to continuously power the tag. The created field is called continuous wave, and because the strength of the field decreases with the square of the distance the readers have to use a rather large power. That field overpowers any response a tag could give, so therefore tags reply on side-channels which are located directly below and above the frequency of the continuous wave.3.1 Energy SourcesWe distinguish 3 types of RFID tags in relation to power or energy: Passive, Semi-passive, Active Passive tags do not have an internal power source, and they therefore rely on the power induced by the reader. This means that the reader has to keep up its field until the transaction is completed. Because of the lack of a battery, these tags are the smallest and cheapest tags available; however it also restricts its reading range to a range between 2mm and a few meters. As an added benefit those tags are also suitable to be produced by printing. Furthermore their lifespan is unlimited since they do not depend on an internal power source.The second type of tags is semi-passive tags. Those tags have an internal power source that keeps the micro chip powered at all times. There are many advantages: Because the chip is always powered it can respond faster tore quests, therefore increasing the number of tags that can be queried per second which is important to some applications. Furthermore, since the antenna is not required for collecting power it can be optimized for back scattering and therefore increasing the reading range. And last but not least, since the tag does not use any energy from the field the back scattered signal is stronger, increasing the range even further. Because of the last two reasons, a semi-active tag has usually a range larger than a passive tag.The third type of tags is active tags. Like semi-active tags they contain an internal power source but they use the energy supplied for both, to power the micro chip and to generate a signal on the antenna. Active tags that send signals without being queried are called beacons. An active tags range can be tens of meters, making it ideal for locating objects or serving as landmark points. The lifetime is up to 5 years.3.2 Frequency BandsRFID tags fall into three regions in respect to frequency: Low frequency (LF, 30- 500kHz), High frequency (HF, 10 - 15MHz), Ultra high frequency (UHF, 850- 950MHz, 2.4 - 2.5GHz, 5.8GHz)Low frequency tags are cheaper than any of the higher frequency tags. They are fast enough for most applications, however for larger amounts of data the time a tag has to stay in a readers range will increase. Another advantage is that low frequency tags are least affected by the presence of fluids or metal. The disadvantage of such tags is their short reading range. The most common frequencies used for low frequency tags are 125 - 134.2 kHz and 140 -148.5 kHz.High frequency tags have higher transmission rates and ranges but also cost more than LF tags. Smart tags are the most common member of this group and they work at 13.56MHz. UHF tags have the highest range of all tags. It ranges from 3-6 meters for passive tags and 30+ meters for active tags. In addition the transmission rate is also very high, which allows to read a single tag in a very short time. This feature is important where tagged entities are moving with a high speed and remain only for a short time in a readers range. UHF tags are also more expensive than any other tag and are severely affected by fluids and metal. Those properties make UHF mostly useful in automated toll collection systems. Typical frequencies are 868MHz (Europe), 915MHz (USA), 950MHz (Japan), and 2.45GHz.Frequencies for LF and HF tags are license exempt and can be used worldwide; however frequencies for UHF tags differ from country to country and require a permit.3.3 StandardsThe wide range of possible applications requires many different types of tags, often with conflicting goals (e.g. low cost vs. security). That is reflected in the number of standards. A short list of RFID standards follows: ISO 11784, ISO 11785, ISO 14223, ISO 10536, ISO 14443, ISO 15693, ISO 18000. Note that this list is not exhaustive. Since the RFID technology is not directly Internet related it is not surprising that there are no RFCs available. There cent hype around RFID technology has resulted in an explosion in patents. Currently there are over 1800 RFID related patents issued (from 1976 to 2001) and over 5700 patents describing RFID systems or applications are backlogged.3.4 RFID SystemsA RFID reader and a few tags are in general of little use. The retrieval of a serial number does not provide much information to the user nor does it help to keep track of items in a production chain. The real power of RFID comes in combination with a backend that stores additional information such as descriptions for products and where and when a certain tag was scanned. In general a RFID system has a structure as depicted in figure 2. RFID readers scan tags, and then forward the information to the backend. The backend in general consists of a database and a well defined application interface. When the backend receives new information, it adds it to the database and if needed performs some computation on related fields. The application retrieves data from the backend. In many cases, the application is collocated with the reader itself. An example is the checkout point in a supermarket (Note that the given example uses barcodes instead of RFID tags since they are more common; however, the system would behave in exactly the same way if tags were used). When the reader scans the barcode, the application uses the derived identifier to look up the current price. In addition, the backend also provides discount information for qualifying products. The backend also decreases the number of available products of that kind and notifies the manager if the amount falls below a certain threshold.This section describes how RFID tags work in general, what types of tags exist and how they differ. The three frequency ranges that RFID tags typically use are LF, HF, and UHF. Also the difference between passive, semi-passive, and active tags was explained and their advantages and disadvantages were compared. The section concluded by looking at different standards and showed the great interest of the industry by counting the number of issued and backlogged patents US Patent Office.4. SecurityThe expected proliferation of RFID tags into the billions has raised many privacy and security concerns. A common concern is the loss of privacy when companies scan tags to acquire information about customers and then using data mining techniques to create individual profiles. This section describes possible scenarios where RFID tags can be exploited. Then it describes what mechanisms exist to defeat those threats or at least make them harder to execute. After that the section concentrates on attacks that are directed against RFID systems.As RFID technology becomes more sophisticated and item level tagging promises more control and large savings in the supply chain management, companies are tagging items within their production process. To maximize the benefits companies start to require their suppliers to label all items delivered to the company. For example, Wal-Mart, Proctor & Gamble, and the US Department of Defense require their suppliers to phase in item-level tagging. However, products are not the only entity tagged. Animal tagging is quite common at large farms to keep track of their moving “property“. Also, tagging of humans started to appear. In the Spanish Baja Beach Club, VIP members can get an implant that they can use to pay for their drinks in the club. The implanted tag is a Very Chip.Anti-RFID activists created a few scenarios to show possible exploits if no precautions are taken. The most common one the unauthorized scanning of tags in order to create user profiles. Other scenarios are scanning the medication a person is carrying to conjecture what illness the person might suffer, or a mugger scanning a crowd of people and singling out a person carrying many valuable items (even money, if tagged as proposed). If tags are replacing credit cards eavesdropping becomes also a problem and must be addressed. The above mentioned issues are privacy concerns, but they are not the only issue. Authentication is also needed. For example, newer tags have rewritable memory available to store extra information during the production process. If stores rely on that information to determine the sales price for example, care must be taken so that customers do not change the type of the item to a cheaper one using portable readers. Also the kill command, a mechanism to permanently disable a tag, must be protected from unauthorized access. Recently a paper raised some concerns in the RFID community that claimed that cell phones can be reprogrammed to disable HF tags. In case that tags carry personal information (such as medical history, credit card numbers) a reader has to be authenticated and authorized before it is allowed access the data. In the previous examples the reader has to authenticate to the tag, there are also scenarios when the tag has to authenticate to the reader, for example to detect forged tags.4.1 PrivacyThis section describes methods to ensure privacy. This are usually mechanisms that kick in after the customer bought the product. They are either enabled at time of purchase or controlled by a user-owned device.Kill command: A command supported by the EPC Class 1 and 2 tags. The command will render the tag unusable once received. To prevent an adversary to call those commands they are password protected, EPC Class 1 tags have 8 bit passwords and EPC Class 2 tags have 32 bit passwords. A theoretical paper described how to reprogram a cell phone with a firmware update to make it scan for tags and once found to quickly enumerate over all possible passwords. Amore intelligent approach is described in Oren06 where the password for the kill command can be discovered by using power analysis on the back scattered signal. The power analysis works since the strength of the back scattered signal depends on how much power the chip on the tag drains which in turn depends on the amount and
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
提示  人人文库网所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。
关于本文
本文标题:基于RFID射频技术的宿舍用电刷卡消费系统设计【说明书论文开题报告外文翻译】
链接地址:https://www.renrendoc.com/p-10276623.html

官方联系方式

2:不支持迅雷下载,请使用浏览器下载   
3:不支持QQ浏览器下载,请用其他浏览器   
4:下载后的文档和图纸-无水印   
5:文档经过压缩,下载后原文更清晰   
关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

网站客服QQ:2881952447     

copyright@ 2020-2025  renrendoc.com 人人文库版权所有   联系电话:400-852-1180

备案号:蜀ICP备2022000484号-2       经营许可证: 川B2-20220663       公网安备川公网安备: 51019002004831号

本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知人人文库网,我们立即给予删除!