Safety Design of Automatic Number Identification System for Automobile Number Plate

As early as the early 1980s, Radio Frequency Identification (I-ID) was first proposed and researched by the US Department of Defense and Wal-Mart, the world's largest commodity retailer. This is a technique that uses radio frequency signals to achieve contactless information transfer through spatial coupling (alternating magnetic or electromagnetic fields) and to achieve identification purposes through the transmitted information. It is a non-contact automatic identification technology that automatically recognizes target objects and acquires relevant data through radio frequency signals. The identification work can work in various harsh environments without manual intervention.

At present, with the continuous development of RFID technology, RFID-related applications are also emerging, widely used in industrial automation, commercial automation and transportation control management, real-time monitoring of traffic such as cars and trains, highway toll collection systems, parking lots. Management systems, logistics management, assembly line automation, safe access check, warehousing management, animal management, vehicle burglary and many other areas. The most successful areas of application today are logistics management and commodity circulation.

However, in the actual use process, the security of RFID has also begun to emerge. The security incidents caused by the security of RFID tags are also increasing. To solve the above security and privacy issues, people have proposed a variety of technologies. Programs, each of which has its own characteristics and deficiencies, must be flexibly selected and combined for different applications.

In the design and implementation of RFID-based automatic identification system for car number plates, based on the research of various technical solutions proposed by others, combined with the characteristics of the system itself, two new initial addresses, random number initialization and random number initialization are proposed. The method also adopts the conventional methods such as MD5 encryption algorithm and label locking, and effectively combines these methods to ensure the security and reliability of the number data in the system.

Through many experiments and long-term operation of the system, the method adopted in this paper is practical, safe and effective. Further research can ensure that the number plate reaches the security level of the second generation ID card.

1 car number plate automatic identification system

Automatic Vehicle Identification System (AVI) can automatically identify and collect the identity information and legal management information of the running vehicles in the road network, so that the vehicle information can enter the computer instantaneously, which can provide a vehicle and traffic management department. Real-time, dynamic vehicle information collection platform. In this paper, RFID technology is used to design and implement the automatic identification system of the car number plate. The hardware of the system is composed of the reading and writing unit (tag reader) and the tag number plate. The reader communicates with the RS32 interface of the computer through the line.

The program controls the reader to read and write the tag through the computer. The reader sends electromagnetic pulses through the antenna. The tag receives the pulses and sends the stored information to the reader as a response, and then the signal is processed by the reader and transmitted to the computer. Realize automatic identification and management of car license plates in different states (still, mobile, and even harsh environments).

The reader in the system uses a model of the 8801 model produced by a manufacturer. The reader has a long read/write distance, fast reading and writing speed, and strong anti-interference ability.

The tag contains an RFID circuit with an RFID chip and an ultra-thin antenna loop RFID chip that is embedded in the tag along with a plastic sheet. Tags are generally credit card sizes, so they can be integrated into other products. The system integrates the tags into the license plate and forms the tag number plate, so that no additional hardware is added at the transceiver end, and the user's overhead is not increased.

The system software adopts VB programming, and the VB program controls the reader to read the number plate information in the number plate label and access the background database to complete the identification of the number plate data.

The system has strong adaptability to the environment, is affected by rain, snow, hail, dust, etc. It can work around the clock, complete automatic identification, tracking and management without contact, and has the ability to penetrate non-metallic objects for identification and strong anti-interference ability. advantage.

2 system security design and implementation

Safety is the lifeblood of the management system. For the automatic identification system of the car number plate, safety is especially important. Since the car number plate is the most obvious sign of the car, in reality, people use the number plate to identify illegal vehicles and vehicles, so the system It must be ensured that the number plate data in the label cannot be read or even falsified at will. However, the security of the label itself is very weak, so it is necessary to adopt a reasonable and effective method to ensure the security of the system.

The integrated RFID system is actually a computer network application system, so the security issue is similar to the security problem of computers and networks, but because of the two characteristics of the RFID system: First, the communication between the RFID tag and the back-end system is non-contact and wireless. To make them vulnerable to eavesdropping; secondly, the computing power and programmability of the tag itself are directly limited by cost requirements. Therefore, in addition to the similarities with computer networks, RFID security threats include the following three types:

(1) Security threats on the communication link

When data is transmitted between the tag and the reader, its data communication link is a wireless communication link, and the wireless signal itself is open. This brings convenience to the interception of illegal users. Common threats include: hackers illegally intercepting communication data (unauthorized access to data), business-rejected attacks (illegal users block the communication link by transmitting interference signals, making the reader overloaded, unable to receive normal tag data), and impersonation of tags Replace, emit a specific electromagnetic wave to destroy the tag, and the like.

(2) Reader security threats

Physically detect or modify the hardware of the reader; modify the configuration parameters of the reader to cause false positives, under-report tag data, or forward tag data to other application systems; eavesdrop or interfere with communication between the reader and the computer.

(3) Security threats to data in the tag

Due to cost constraints, the tag itself is difficult to have enough to ensure security. Therefore, an illegal user can directly communicate with the tag by using a legitimate reader or by constructing a reader. This makes it easy to get the data stored in the tag. For literacy tags, there is also the risk of data being tampered with.

There are many researches on the security of communication and the security of readers, and many effective methods are also proposed. These methods include: using secure communication protocols or proprietary communication protocols, such as Hash2Lock protocol, Hash chain protocol, Hash-based ID change protocol, query. Respond to the authentication protocol, re-encryption mechanism, and more. Use detectors to detect the presence of other RFID readers and send interfering signals to prevent the data on the tags from being exposed; programming the tags so that they only communicate with authorized RFID readers; stronger for tags and readers Encryption and security features; in addition to the Kill tag, Faraday net cover, smart tags, blocking tags and other methods. These methods are very mature, and each has its own characteristics and deficiencies, and must be flexibly selected and combined for different applications.

For data security in tags, everyday applications use encryption. However, different encryption algorithms have different levels of complexity, different hardware performance requirements, and different security levels.

In order to ensure the safety in the automatic identification system of the car number plate, the system adopts corresponding high security measures in the communication and reader system. For the data security in the tag, the system not only adopts some conventional encryption methods, but also comprehensively measures the readable and writable tags. The size of the space, read and write efficiency and read and write errors and other factors have proposed a new security design. This multi-level security measure is sufficient to ensure that the number plate data in the tag cannot be read or even falsified at will.

This article refers to the address: http://

About Silicone Tea Infuser:
As we know,Tea is a traditional culture in China,we have many tools for making tea.There are some teas that go through many processes,one of the processes is filtering.But sometimes we wanna drink tea when we go travel or go outside,but we don't have any tools,how we can solve this problem?
How about take a Silicone Tea Strainer? It's Food Grade material,you don't worry about its security.

And it's portability,nice style at the same time,can give it to friends as a gift or put it in bag,wherever you go,you can drink tea anytime,anywhere.


Silicone tea infuser introduction:
1.Product name:silicone tea infuser,silicone tea strainer, Tea Leaf Strainer , Tea Infuser Set ,Silicone Tea Filter,travel tea infuser
2.Place of origin:Guangdong China
3.Color:any pantone color
4.Logo:Printing,debossed,embossed
5.MOQ:500pcs.
6.Package:1 pcs/opp,customized design is available.
7.Design:Customized/stock
8.Certification:FDA,LFGB,SGS,ROHS,etc.
9.Usage:Use for tea making

10.Silicone tea infuser photos for reference.

silicone tea infuser

Slicone Tea Infuser

Silicone Tea Infuser,Silicone Tea Filter,Silicone Tea Strainer,Tea Leaf Strainer,Tea Infuser Set,Travel Tea Infuser

OK Silicone Gift Co., Ltd. , http://www.oemsiliconegift.com