The rampant era of fake talk about RFID technology in product security applications
Along with the development of the market economy in our country, with the rapid development of the national economy, the production and circulation of counterfeit and shoddy products have also become increasingly rampant, seriously damaging the interests of the country, collectives, consumers and famous product manufacturers. Some also directly endanger citizens The physical health and personal safety of property. The application of traditional anti-counterfeiting technology for many years, fake and shoddy products still arrogant arrogant manufacturers deeply hurt the country. Effectively combat counterfeiting. To ensure product safety, the establishment of product tracking system, by the widespread concern.
RFID makes the product more secure
Traditional anti-counterfeiting technology has many problems that can not effectively combat fake and shoddy: In addition, it takes a lot of effort to make timely response when there is a problem in the product. When people do nothing, the emergence of RFID radio frequency identification technology makes the problem solved There has been a turning point. The source of fake and shoddy products is in the field of production, but its proliferation is in circulation. Therefore, establishing a safe product supply chain and establishing a product tracking and tracing system will be a very important and challenging task.
How to make the product more secure
The ultimate goal of any anti-counterfeiting system is to ensure that the final product - the product itself - is not fake or shoddy products. The best solution is that every organization and individual involved in the supply chain can accurately and quickly verify the authenticity of the product directly, as the government organizes.
Quality Supervision Bureau, like wine, can open each bottle of wine for verification. However, this is very unrealistic in the near future. So, how can we be regarded as a safe product supply system, so that we believe that the immediate product is a real, safe product yet. If we can do the following three points, we will be very confident about the safety and authenticity of the product:
(1) credible packaging, verify the packaging is real.
(2) the integrity of the package, the package has not been opened, the product inside has not been replaced.
(3) Product circulation history to ensure that products are handled by trusted participants throughout their lifecycle.
1.1 other anti-counterfeiting technology
Traditional anti-counterfeiting technology, such as laser anti-counterfeiting, fluorescent anti-counterfeiting, temperature-changing security, special plate-making generally attach importance to the unforgeability of product packaging, due to these anti-counterfeiting technology is low, after some time being counterfeit, the other for large quantities of goods , Need one by one, the workload is too fire; SMS security, telephone security, and bar code security generally require input serial number, and then check with the data in the database to determine whether the true and false, there are the same problems in the circulation of the verification products When the amount is relatively large, the work efficiency is very low; moreover, these serial numbers are all visible, so the security of serial numbers can not be guaranteed and may even be the amulet to protect counterfeit products. These anti-counterfeit measures can not be used when there is a problem in the products Make a very timely response.
1.2 RFID anti-counterfeiting technology advantages
At present, the anti-counterfeiting trend of using RFID radio frequency identification technology has gradually arisen in the field of international anti-counterfeiting. Its advantages have attracted widespread attention: non-contact, multi-objects and mobile identification; enterprises have simple anti-counterfeiting functions; ; Anti-counterfeiting process invisible label data, no mechanical wear, anti-fouling; support data bi-directional reading and writing; and information encryption technology, making RFID tags easy to counterfeit; easy to use in combination with other anti-counterfeiting technology for security. At present, UHF (860MHz.960MHz) radio frequency identification technology, reading and writing distance of 10 meters, and passive passive RFID tags low cost, so in the field of supply chain management has received widespread attention. The use of RFID radio frequency identification technology to establish the entire supply chain, the establishment of product tracking and tracing system, the time is ripe. Here we look at RFID automatic identification technology how to do these three points:
1.2.1 Trusted packaging
RFID tags with verification capabilities. First of all, since the RFID radio frequency tag supports two-way information transmission, the digital signature information of the base PIG can be written into the RFID radio frequency tag I. This digital signature can strongly prove which radio frequency tag is processed by the organization. Secondly, RFID tags can verify the reader who wants to read and write it, prevent unauthorized readers from reading the contents of it, and the security is increased because the information is not visible. The use of RFID radio frequency identification technology, you can PIG-based digital signature written to the RF tag, making the package on the RF tag authentication security settings increased by a level, if the radio frequency tag in the production process and then add some unique security features, It is possible to further increase the credibility of the product package.
1.2.2 package integrity
The integrity of the package means that the package has not been opened and the product inside the package has not been tampered with. Add an indication to the package that the product has not been opened, such as an indication of failure once opened, and an indication if the package has been opened. The reliability of the integrity of the product package will be increased to c + if the integrity of the package is verified automatically, RFID tags can be disabled by opening the package, or RFID tags can be automatically removed after being sold In the digital signature information, so that product packaging can not be illegally reused, then the credibility of product packaging integrity will be increased to B.
1.2.3 product circulation history
Product circulation history, record the product from production to distribution, and then to use the entire process. Equivalent to the establishment of a product tracking and tracing mechanism, with such a reliable record of the circulation of products can be implemented effectively monitor the product problems, the prompt pursuit.
In addition, the recipient can refer to the circulation history of the product and compare it with the circulation information carried in the RF tag to confirm that the tag does not, and to forge the product while confirming that the product is circulated among the trusted organizations, thereby greatly improving the receiver's understanding of the real product Sexual credibility
1.3 results contrast
Before and after the adoption of RFID radio frequency identification technology participants on the credibility of the product comparison:
A. said the use of electronic and physical means extremely difficult to be counterfeit, the highest credibility
B. said the use of high-tech means for a high level of authentication settings, difficult to counterfeit, high credibility
C. Indicates a low level of anti-counterfeiting settings that can be easily counterfeited or counterproductive with minimal effort.
O. means no physical features or electrons
Motorcycle Power Switch ,Motorcycle Switch,Motorcycle On Off Switch,Motorbike Switches
Ruian Leimeng locomotive parts Co., Ltd , https://www.leimenglocomotive.com