The Research of RFID System's Authentication Based on the Information Hiding Feature

碩士 === 萬能科技大學 === 資訊管理與數位商業研究所 === 97 === For recent years, the technology of Radio Frequency Identification (RFID) was concerned and focused by organizations and businesses. In the global market of severe competition, the condition of real-time process and fast response was required for the living...

Full description

Bibliographic Details
Main Authors: Shih-Liang Chuang, 莊世良
Other Authors: Jonathan, Jen Rong Chen
Format: Others
Language:zh-TW
Published: 2009
Online Access:http://ndltd.ncl.edu.tw/handle/79500882030511523759
Description
Summary:碩士 === 萬能科技大學 === 資訊管理與數位商業研究所 === 97 === For recent years, the technology of Radio Frequency Identification (RFID) was concerned and focused by organizations and businesses. In the global market of severe competition, the condition of real-time process and fast response was required for the living and competition between organization and business. Therefore, to promote the ability of competition and to achieve the object of real-time process &; fast response, organizations and businesses are all try to use the character and technology of RFID. In the area of RFID’s application, various technology and scheme were proposed. And also, many research papers were published in the field of data encryption and transmission. But, there exist many weakness of data’s fast transmission, operation’s complexity to be studied to match the optimal balance. Especially, to compare with the wired data transmission, there are much more considerations through the wireless data transmission of RFID. The key points of this paper are to let the RFID system more safety, to promote the applications of RFID’s technology. To achieve the above purpose, we try to use the mutual operations between tags and servers , and to verify the whole system’s safety. In the same time , our scheme will not increase the cost of system’s implementation and the burden of system’s operation.