Application of RFID technology in. Net Micro Framework

Source: Internet
Author: User

RFID radio frequency identification is a non-contact automatic identification technology. It uses RF signals to automatically identify the target object and obtain relevant data. It can work in various harsh environments without human intervention. RFID technology can recognize high-speed moving objects and recognize multiple tags at the same time for quick and convenient operations. RFID is a simple wireless system with only two basic devices. It is used to control, detect, and track objects. The system consists of an inquiry device (or reader) and many Responder (or tag. (For details, see Baidu encyclopedia RFID.)

For RFID product providers, it is unlikely to design, develop, and fully master the RFID technology, because a complete RFID industry chain includes standards, chips, antennas, tag encapsulation, read/write devices, middleware, application software, and system integration, the most critical technology is chip design and manufacturing. General chip design and manufacturing technologies are widely used in Phillips, TI, Amtech, and other foreign companies.

For our general development users, the reader is operated through the serial port (even if the physical interface is USB, most of them are converted to serial port operations) to read nearby RFID tags, extract the ID number and read and write data on the EEROM sector.

Because RFID tags are embedded with CPU units and communicate with readers in a response mode, RFID tags are relatively easy to protect data on the EEROM sector from unauthorized read/write, A valid reader must provide a specified KEY to read and write data on a specified slice (however, I am worried that if a technology can extract the EEROM module, data on the slice is read directly, which bypasses this protection mechanism. Therefore, we recommend that you encrypt the data written on the EEROM slice. I think the actual RFID tag should be to write the encrypted data to the EEROM sector, rather than directly writing the plaintext data provided by the operator. However, this mechanism does not seem to prevent your card from being copied ).

RFID cards or tags are used to produce products of different specifications based on international standards in different application fields. The rfidcard on hand (MF1ICS50) complies with the 1024 3A protocol, and the EEROM capacity is bytes, divided into 16

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.