A Two-Factor Product Anti-Counterfeiting and Secure Tracing Management System Based on RFID and Two-Dimensional Bar Code

Article Preview

Abstract:

The progress of market economy and information technology makes fake and in-ferior a chance, much attention has been paid to research the safe and practical anti-counterfeiting means. Aimed at the defects of traditional and RFID anti-counterfeiting, this paper is to design a two-factor product anti-counterfeiting and secure tracing management system which can realize the functional requirements of brand anti-fake and quality traceability based on RFID and two-dimensional bar code. This paper starts from the significance of constructing the system, puts forward design ideas based on the traceability requirements of common model of the supply chain, builds a multi-level, multi-user rights and the whole process of dynamic management and a traceability of anti-counterfeiting validation service platform, designs double identify traceability system security management with a function of information query, quality tracking, production management, security authentication, tracking, feedback evaluation, basic to meet the needs of some merchandise to the supply chain, to achieve the purpose of the security and traceability.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

490-493

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] H.H. Cheung, S.H. Choi: Computers in Industry. Vol. 62( 2011), p.708–718.

Google Scholar

[2] Xu Wenkai: Print Today (2013), pp.51-55.

Google Scholar

[3] S.L. Ting, Albert H.C. Tsang: Computers in Industry. Vol. 11( 2012), pp.1-12.

Google Scholar

[4] Information on http: /tech. rfidworld. com. cn/2009_8/20098111730223407. html.

Google Scholar

[5] Bian Jirong, TSANG Kin wah: Computer Literacy and Technology. Vol. 19( 2010), pp.5342-5345.

Google Scholar

[6] Bian Jirong, Song Yaya: Network Security Technology and Application(2010), pp.39-41.

Google Scholar

[7] Wang Peiqiang: Beijing University of Technology (2012), pp.17-56.

Google Scholar

[8] Zhao Jinshi, Luan Rupeng, Guo Kaijun, Sun Fang: 2008 Year Cattle Industry Progress(2008), pp.266-272.

Google Scholar