跳到主要內容

臺灣博碩士論文加值系統

(44.192.22.242) 您好!臺灣時間:2021/08/01 11:34
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:温子增
研究生(外文):Tzu-Tseng Wen
論文名稱:以RFID 為基礎之商品防偽系統實作
論文名稱(外文):Implementation of an Anti-counterfeiting System for Products Based on RFID
指導教授:黃國軒黃國軒引用關係
指導教授(外文):Kuo-Hsuan Huang
口試委員:黃國軒
口試委員(外文):Kuo-Hsuan Huang
口試日期:2015-07-22
學位類別:碩士
校院名稱:大同大學
系所名稱:資訊工程學系(所)
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2015
畢業學年度:103
語文別:中文
論文頁數:66
中文關鍵詞:無線射頻辨識近場通訊商品防偽電子產品碼
外文關鍵詞:Near Field Communication (NFC)Electronic Product Code (EPC)Anti-counterfeitingRadio Frequency Identification (RFID)
相關次數:
  • 被引用被引用:1
  • 點閱點閱:105
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
隨著科技進步,偽造技術也一同提升強大。仿造品與真品連專業鑑識人員都難以分辨其真偽,各種行業如食品業、服飾業、珠寶業、醫藥業等,都是仿冒品的受害者。仿冒品不但造成各行各業經濟損失,更對於消費者的人身安全亦是相當的疑慮。將RFID運用在防偽技術上已經探討多年,而現今因為NFC手持裝置佔有率大幅度的提升,使得RFID防偽技術的未來更有發展性。使用NFC手持裝置讀取RFID標籤,進行商品的驗證,不僅可以保護商品不被偽造,還能與物流結合提升企業效率。RFID防偽技術相較於其他防偽技術,例如光學辨識、生物辨識等,RFID防偽技術在鑑定辨識上更為迅速、簡單。
RFID商品防偽是使用電子的方式用來鑑別商品的真偽, 鑑別的方法如下所提,RFID標籤附著於商品上,使用RFID讀取器在一定的距離內讀取RFID標籤,讀取器從RFID標籤上獲得商品驗證訊息以及商品識別碼等,開始進行驗證商品驗證,藉由來至標籤上的訊息鑑別此商品的真偽。RFID商品防偽相較於傳統商品防偽,可以更有效的打擊仿冒品的侵害,保護顧客以及廠商的權益。本研究使用低成本RFID標籤以及提供顧客端驗證服務的商品防偽系統,為消費者以及廠商建立一個阻擋仿冒品侵害的高牆。
As technology advances, counterfeiting technology also become more powerful, even appraiser can’t verify the counterfeit product easily. The counterfeit products can be found everywhere, such as food, apparel, jewelry, medicine, and so on. It not only cause economic damage, moreover it cause life-threatening to people. The anti-counterfeiting using RFID have been researched for many years, and the portable devices with NFC have increased dramatically, making the future of RFID anti-counterfeiting is promising. Using NFC devices to verify products by reading RFID tags, that is not only protect the products to be counterfeited but also improve the efficiency of enterprise by combining with logistic chain. Besides, RFID anti-counterfeiting technology compares with other technologies, such as optical identification, biometrics, etc., RFID is more easy and fast to verify the products.

RFID anti-counterfeiting identify the authenticity of the products electronically. And how it verify the authenticity of products, the first, RFID tags are attached to the products, and then read RFID tags by using RFID reader to catch the identification and verification message codes from RFID tags. Hence, using these message codes can authenticate the products. RFID anti-counterfeiting can effectively against from counterfeits, and also can protect the rights of customers and vendors. The purpose of this research mainly provides a consumer level anti-counterfeiting system with low-cost RFID tags, to establish a barrier wall against counterfeits for consumers and manufacturers.
第一章 緒論 1
1.1 前言 1
1.2 研究動機 2
1.3 安全目標 3
1.4 設計目標 4
1.5 章節介紹 5
第二章 相關研究 6
2.1 國內外研究情形 6
2.1.1 C.L Chen等人提出的研究 [8] 6
2.1.2 M.Q Saeed等人提出的研究 [9] 8
2.1.3 M.H Eldefrawy等人提出的研究 [10] 12
2.1.4 Z Bilal等人提出的研究 [11] 15
2.2 相關技術 18
2.2.1 Near Field Communication (NFC) 18
2.2.2 Radio Frequency Identification (RFID) 19
2.2.3 Electronic Product Code (EPC) 20
2.2.4 Public Key Infrastructure (PKI) 20
第三章 系統設計及架構 21
3.1 系統架構設計 21
3.1.1 驗證機制設計 21
3.1.2 顧客端架構 23
3.1.3 廠商端架構 25
3.1.4 驗證伺服器架構 26
3.2 方法流程 28
第四章 商品防偽系統實作 41
4.1 標籤實作 41
4.2 驗證伺服器實作 44
4.3 顧客端實作 50
4.4 廠商端實作 54
第五章 安全分析 59
5.1 安全分析 59
5.2 相關比較 61
第六章 結論與未來展望 62
6.1 結論 62
6.2 未來展望 64
參考文獻 65
[1]S. Miles , “Consumerism Then and Now,” in Consumerism: As a Way of Life, CA: SAGE, pp. 1-14, 1998
[2]React(2015). News & Events [Online]. Available: http://www.react.org/news-a-events
[3]G. Avinash, J. Ondrus, and K. Lyytinen. "A Post-Failure Analysis of Mobile Payment Platforms." System Sciences (HICSS), IEEE, 2015
[4]T. Staake, F. Thiesse and E. Fleisch, “Extending the EPC network: the potential of RFID in anti-counterfeiting,” Proceedings of the 2005 ACM Symposium on Applied Computing, ACM, pp. 1607-1612, 2005
[5]ICC Counterfeiting Intelligence Bureau, Anti-Counterfeiting Technology Guide, ICC Commercial Crime Services, 2005
[6]M.J Hatch and M Schultz, “What Is Corporate Branding,” in Taking brand initiative: How companies can align strategy, culture, and identity through corporate branding, New York:John Wiley & Sons, pp. 3-20, 2008
[7]S.F Wamba and E.W Ngai, “Importance of issues related to RFID-enabled healthcare transformation projects: results from a Delphi study,” Production Planning & Control, pp. 19-33, 2015
[8]C.L Chen, Y.Y Chen, Y.C Huang, C.S. Liu, C.I Lin and T.F Shih, “Anti-counterfeit ownership transfer protocol for low cost RFID system,” WSEAS Transactions on Computers, 7(8), pp. 1149-1158, 2008
[9]M.Q Saeed, Z Bilal and C.D Walter, “An NFC based consumer-level counterfeit detection framework,” Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference, IEEE, pp. 135-142, IEEE, 2013
[10]M.H Eldefrawy and M.K Khan, “Banknote Validation through an Embedded RFID Chip and an NFC-Enabled Smartphone.” Mathematical Problems in Engineering, 2014
[11]Z. Bilal, and Martin, “ A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain Using RFIDs,” In Foundations and Practice of Security , Springer International Publishing, pp. 291-305, 2014
[12]D Engels, M.J.O Saarinen, P Schweitzer and E.M Smith, “The Hummingbird-2 lightweight authenticated encryption algorithm,” RFID, Security and Privacy, Springer Berlin Heidelberg, pp. 19-31, 2012
[13]J Vanderkay(2004). Nokia, Philips And Sony Establish The Near Field Communication (NFC) Forum[Online]. Available: http://nfc-forum.org/newsroom/nokia-philips-and-sony-establish-the-near-field-communication-nfc-forum
[14]NFC Forum (2015). NFC Forum Technical Specifications[Online]. Available: http://members.nfc-forum.org/specs/spec_list/
[15]D Sen, P Sen and A.M Das, “RFID Technology,” in RFID For Energy and Utility Industries, Tulsa: PennWell, pp. 1-48, 2005
[16]S.A Weis(2007). Rfid (radio frequency identification): Principles and applications[Online]. Available: http://www.ingenuityworking.com/cfs-file.ashx/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-25/0880.harvard-rfid_2D00_article.pdf
[17]T. Staake, F. Thiesse, E. Fleisch, Extending the EPC Network—the Potential of RFID in Anti-counterfeiting, In Proceedings of the ACM Symposium on Applied Computing, pp. 1607–1612, 2005
[18]Net Security Training (2015). What is a Public Key Infrastructure? [Online]. Available: http://www.net-security-training.co.uk/what-is-a-public-key-infrastructure
[19]Microsoft (2015). Public Key Infrastructure [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/desktop/bb427432(v=vs.85).aspx
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
1. 洪榮照、何東墀(1999)。兒童攻擊行為的認知與家庭因素之研究。特殊教育學報,13,395-432。
2. 江文慈(2004)。正視校園中的欺凌事件。諮商與輔導,221,6-10。
3. 江文雄(1999)。師生關係重要法則。測驗與輔導,152,3159-3163。
4. 林玉枝(1992)。單親家庭(破碎家庭)對青少年行為問題的探討。菁莪季刊,11,55-64。
5. 周煌智、龍佛衛、郭壽宏(1995)。精神疾患與暴力綜說。公共衛生,22(3),189-199。周素琴(1999)。校園暴力之防範與因應。諮商與輔導,167,2-5。
6. 包瑛子(1997)。青少年暴力行為的成因與輔導。諮商與輔導,137,20-23。
7. 王淑女(1995)。校園暴力行為之社會學分析。學生輔導,37,50-59。
8. 王儀玲(1995)。點一盞燈,照亮青春的歧路。學生輔導,37,60-63。
9. 車煒堅(1985)。台中地區少年不良幫派之研究。警政學報,8,86-101。
10. 吳瓊洳(2001)。家庭因素與國中學生反抗學校行為之關係研究。教育研究資訊,9(5),149-174。
11. 吳武典(1992)。校園暴力行為的防治與輔導。現代教育,7(25),27-34。
12. 宋宗德(1994)。訓導處(人員)在校園「自我傷害」防治中的職責與措施。學生輔導通訊,42,52-55。
13. 李玉嬋(1996)。校園暴力問題與防治計劃。諮商與輔導,129,6-12。
14. 洪福源(2003)。校園欺凌行為的本質及其防治策略。教育研究月刊,110,88-98。
15. 胡淑貞、林坤松(2001)。校園暴力盛行率及危險因子研究-以台南市國中學生為例。學校衛生,38,32-55。
 
無相關點閱論文