• 沒有找到結果。

RFID應用於人員辨識與資產防竊

N/A
N/A
Protected

Academic year: 2021

Share "RFID應用於人員辨識與資產防竊"

Copied!
7
0
0

加載中.... (立即查看全文)

全文

(1)

RFID























































































































































































E-mail : acliu@fcu.edu.tw

Abstract

This paper investigates the use of RFID in admission control and asset management. Admission control keeps track of the attendees in a conference and asset management monitors and reports the status of expensive equipment. Experiments are conducted to verify the reliability of the system, using parameters such as number of antennas. The system is implemented via JAVA using the Sun RFID Middleware.

















RFID                      ! " # $ %& ' ( )* +  , - . / 0 1 2 345 6 7 5 8 - 9 : ; <

= > ? @ : ; A B C Sun RFIDD EFG H I

JKJAVAL M 8 N O : ; , P   Q R SRFIDT U V T 

1.

















W XY B Z [ \ B ] ^ [ _ ` a b c b d  e B  f g8 h i  j k lTm n  o p q ? r < N 1 s t B u ;   v w x y z a { | } ~ 8 h i  € x 4 o ‚ ƒ „… U V  † ‡ 4 8 ˆ x ‰ 4Š } K‹ Œ >  8 h Ž   u ;  ‘ P „c 8 ˆ ’ “  v wA B ” Fz t • –— ‡ y ˜ ™š › ‡ 4˜ ™B gx Š } 8 h œ  s žz a { | e B s . 7 Ÿ 8 h i K  ¡ ¢ £ X¤ ¥„¦ < § • x y ¨ ©  ª « ‡ 4˜ ™B ¬ i   ¡ r ž­ ® s  N  ¯ s .  , ° 5 ± 6    t y  ² B   ¡ = ” r ž ¢ £  ³ « Xt 4 ´µ žŒ x ¶ 8 ¶ ·  ¸ ¹ Xº ž» ¼ } ½ ¾ ] e B ¿ À Á  ¾ à º w. / F— t y ¼ ~ XÄ . Å · ¾ Æ Ç›x 5 È É ¾ ÆÊ Ë — · Ì Í * + Î Ï: Ð Ñ T{ Ò À Á Ó…6 ' Š Ô Õ t y * + Ö ¢ ¾ ] ׄ…T×x Ø Ù ÚÛ Ü Fš $ %& '  –— Ý ’ ˜ ™¬ i Þß † t y ˜ ™8 à f Ïá ¿ RFIDâ ^ 8 ã ä ' Š å æç è ´–¯ Ïá x Ø é ê š å æÙ 

2.

RFID

















































!

!

!

!

ß † u ;  ë –‡ y ˜ ™¬ i < ¿ RFID  â ^ 8 ì N í î ³ â ^ ¬ i < r žï ð ls  o K®  › N   ç è , ° 7  5    ñ — < ò   v wן ó ô Ç« Û § Ö õ ö p q ×F„ … ÷Þø ù ¬ i ¿ RFIDú Í * +  X  : ; : ; I J ³ : ;   û P v wü ý — þ *  ‘ P ¯ ¬ i ë *   8  ¡ ø ù 

2.1 







X÷1  4 B RFIDú Í @    F   € RFID Tag  

(2)

FRFIDn@ ü  RFIDn)¯ 2 3

  F )@ T  @  )@ ü 

RIFD Meeting )To  RIFD Meeting

 ). ü  Sun RFID Software¯ ¬ i   

  U V   o  ! B  Ë    )  @ ! ü  ¬ i ï ð   ¯ s     [456]     1       

2.2   



















2.2.1  













(1) F›X «  .   Ê 2 32 3  „c I *  !  (2)" # 2 3$ %³ $ %Ü þ Ü & Y 'Ö ¢ 42 3ë nRFID Tag( )  X * x ‡ É + , - < Ö 2 3ÞX Y ' žÉ É + Ç.  nlRFID Tagë ´  . 

(3)Reader n RFID Tag  / É + žÉ F‡

0 RFID TagY Ž 2 3nÉ + 1 2 ³ 3 x  4 

2.2.2 







(1)  k lÇ? m n ë ¼ Ç   o ¯  V 9  (2) €  V 9 .  ‡ 5 UHF RFID Tag „c 6 7  8 9 : . r < N 1 s 

(3)RFID ú Í * +  n l RFID Tag . Ç

EPC(Electronic Product Code); <  )@ 

KXo  n¢ 8 h Ç   KLPDF  ¡ 8 = > N  Þ / ; <   @  (4)  @ Xs . ? @ A r žï ð 1 s 8 h ÇB ‚ TC  TN   Tls 5 D E 8 h Ç1 s      2      

2.3 LPDF   



















2.3.1  













³  ¡  RFID : ; F  . 2 3(G) « 2 3(G)nRFID Tagë H u  / = >  N 1 e I  Js KŸ ;  s 5 K L[1]

2.3.2    























































[1]

4o M  < C JAVAVectorN 

,  Ï3ë ð 

 ¡ Ï÷S

Case1 “« 2 3nlRFID Tag”

Check . 2 3M  

ÏO x P EPC

Œ  “ J”

Q . 2 3M  ›R ñ P EPC

(3)

ÞP EPC 1 « 2 3M  

Case2 “. 2 3nlRFID Tag”

Check « 2 3M   ÏO x P EPC Œ  “N 1 ” Q « 2 3M  ›R ñ P EPC S x P EPC ÞP EPC 1 . 2 3M      3 LPDF          4     

3.

RFID









"

"

"

"

#

#

#

#

$

$

$

$









!

!

!

!

ß † T å ˜ ™¬ i ¿ RFID  â ^ 8 ì N í î ³ â ^ ¬ i < r ž" · Ì Í ¾ Æ. K® U * TVW6 ç è ñ — < XY T å ˜ ™« Û § Ö · Ì Í ¾ Æ* + U Wx ×r ž  õ ö   ÷Þø ù ¬ i ¿ RFIDú Í * +  X ã æ: ; : ; I J ³ : ;   û P v wü ý — þ *  ‘ P ¯ ¬ i ë *   8 „¡ ø ù 

3.1 







X÷5  4 B RFIDú Í @    FZ RFID Tag   FRFIDn@ ü  RFIDn)¯ 2 3   F )@ T  @  )@ ü 

RFIDã æ )To  RFIDã æ

 ). ü  Sun RFID Software¯ ¬ i ë   

ã æ: ; o  F Ë   )  @ ! ü  — [£ e RFID n)\ _  SMS : ; ¯ 8  " ] ^ )[45 6]     5     

3.2   



















3.2.1  













(1)X  * _ Ê 2 32 3D Ë „c I *  ! „ (2)" # 2 3| Ö ¢ 2 3ë n Tag ( ) ` a # 4 * Xb ¡ [c * žnl Tagë ´  . 

3.2.2 















     

³ . / ǛÞPetri Nets Models[7]8 ø ù ¬

i : ; v w d e f g RFIDz } x

÷hid e j k T" T\ _ TVWTå æT

(4)

    6          n o ð d e p „q ð rst u v  ð Çwx d e y 3! ð v w„z  { | Tj k RFIDÇv w  › ³ d e |  Çu v } î RFIDã æ

: ; Çj k ~ § Z RFID Tag FRFID

d e €  Fj k ›RFIDB ‚  Z x RFID TagKx    o  ›Ç? Þ RFIDƒ < · Ì Í ¾ ÆRFID d e Þf  „ _ "   · Ì Í ¾ Æ€  d e F„ _ " › FǛÇn ë ð X³ d e < § } î … 4r sÞd e ì f ›ï ð d e f F\ _ TV WTl mÏO Ž b ¡ †  d e Þf  \ _ ‡ ˆ މ l‡  Ç? Þx Š _  ÏO _  Ç? ‹ å æ! Œ d e Þf Få æ ÏO S x ! \ B „ _ " ›ÏO N O VW d e Þì  VW¥VWj Ž Ç? d e Þì  „ _ " ›l mv wÏ÷{ | ÞRFID · Ì Í ›} î : ; l mÇ?  Þƒ <  ›r < j  l mw 

4.

%

%

%

%

&

&

&

&

4.1    

























‘ X : ; , ° ‘ P ç è '‡ žÉ { < · N 1 s Ø ’ Ïá  , ° Ö ã æ: ; žš „ “ > Fá K” • : ; – — ~ § B ˜ ™ š *  

4.2  













, - þ › * x œ  sÏ÷ , - ­ v :ž Ÿ ? ]   ¡ ¢ 609Æ , - * + :£ %50cm¤1920cm ¥220cm! Ï7ë ð     7 !!!! """"    2 3Ê * $ %: 30%( : ; , - ) 2 3Ê * | : (1) : ; :  I *  !  (2)ã æ: ; : D Ë  ! „ ! ¤%< / 0 Ç 5 : 3

(5)

ñ ³ Ç« , - ë ¼ * + Ï÷1F,

-ë Ö RFIDú Í * + Ǧ %

# # #

#1 RFID$$$$ %%%% &&&& ''''

§ ƒ * + q . 5 ¨

Alien n) ALR-9780 1E

Alien 2 3 ALA-97C 44

Alien © ª ALL-9340-02 104

RFID   ) Ç ú Í ¦ % F CPU: Intel

Pentium4 3.4GHzTRAM:1GB« Í ü  ›ø « Í

Sun RFID Software 2.0Java JDK 1.4.2_09OSF

Turbo Linux 10.0Sybaseo   )Çú Í ¦

%FCPU: Intel Pentium4 3.4GHzTRAM:512MB

o  F Sybase ASE 12.5OS F Windows XP

SP2  @ Û B ¬ O  Sybaseo   ) , - FVersaViewÀ Á Ӈ Ewx ­x Ö ‡ 5 RFID Tag8 N O , - 

4.3      



















































4.3.1 ! 

!

!

!







 , ° ‘ P ç è '‡ žÉ < § î { e B T… N 1 s [c * * RFID2 3 nTag  ® ¯  ‘ P ç è , - „c Ï÷: (1), -    € Y 'Tag (2), -  F‡ 4ž” • O ° ± %B ˜ Á ² 2 3nTagØ ’  (3), -  F³ 4e B … 4ž K´ µ ¶  „c N 1 s ‘ X· 'žN 1 s 2 3nTagd · B ˜ ¸   3 ¹ º

4.3.2   "   #













"

"

"













#

#

#

÷2F, - » O ” • — wÏ ë ¼    42 3T½42 38  ” • Ü F! ¤% x ¾ ‡ ­§ / 0 … 4N  ë ­§ / 0 l … 4'žN   # # # #2   (((( ))))  ****

4.4  $ % &  







$

$

$

%

%

%

&

&

&













4.4.1 ! 

!

!

!







® ¯ b ¡ O FÞ†  · Ì Í ¾ Æ[c * * RFID2 3nTag  , - „c Ï÷: (1)ÞTagZ XÀ Á Ó« ¿  (2), -  b ¡ Þ†  · Ì Í ¾ Æ (3)ÞRFIDn)½ À y 3Á >  š ” • » O 7 5 Ï÷: (1)b ¡ Þ†  · Ì Í ¾ Æ~ § B ˜ „ _ ¯ H  žÉ  (2)RFID n)½ À y 3Á > ~ § B ˜ „ _ ¯ H  žÉ 

4.4.2  













"

"

"

"

















#

#

#

#

~ § ” • # # # #3++++ ,,,, ---- ....  ****  . ” • — w , - » O 1 b ¡ [c * p Óà ‰ l \ _ Ä  2 RFID Reader ½ À > 3 p Óà ‰ l Reader\ _ Ä   ~ Ù ” • — w 42 3 ½42 3 ‡ 4O ° 100% 100% ‡ 4Å Æ 83% 100% 4O ° KO 90% 100% 4O ° ¶  95% 100% … 4O ° KO 75% 100% … 4O ° ¶  100% 100%

(6)

p Óà ‰ l\ _ žÉ ” • # # # #4//// 0000 1111 2222 3333   4444 5555 6666 7777 ---- ....  **** 5 žÉ (second) 1 25 2 25 3 25 4 32 5 34 D Ç 28.2 p Óà ‰ lReader\ _ žÉ ” • # ## #5//// 0000 1111 2222 3333 Reader4444 5555 6666 7777 ---- ....  **** 5 žÉ (second) 1 27 2 34 3 37 4 33 5 44 D Ç 35.0 TagZ  * + « “ e È  Ç . É ” à f : } c ¬ i ” • ´W TagZ X* + . “ ž} Ê Ë Ì Í Î ÏŒ ÏÎ Ï:Ð 3Ð Y JÁ ² lTagŽ nØ § Ê Ë Ñ ¾ Ò ? ¬ i Þ TagZ X* + « “ µ È  8 N O , - » O Reader  n« “ e È  Tag Ó %KS x Ô ? Õ 

4.5   ' ( ) * + , ! 













'

'

'

(

(

(

)

)

)

*

*

*

+

+

+

,

,

,

!

!

!







RFIDú Í ‡ y Œ  Ö > Ö ¢ 2 3Xn ž× y , - ” • x ØÙ Ú Ûç · ´–Ü Ý RFID Tag  ¡ Ž „ _ nì Þ „¡ FX, °  ž»  P — X, ° þ ¯ RFIDú Í Ð ß ë ` a ( ) Ê à ò RFID Tag_  Ù Ú |  RFID    N  ÇU V e B ã ægTag= á Í žÍ ⠉ RFIDÐ ß  ã  RFIDnØ Ù é ê ì Þ „¡ F¦ 7    „ “  € RFID TagÊ à µ Í  à à ä 

X' Š · ¦ Z 5 4RFID Tagg× ‡ ¦ Tag

¸ lÍ Ã ä å x š æ TagÞŽ 2 3É ” l Ö  42 3  *  * 1 * { ã    3  ç è lRFIDÐ ß ç è ´–ì Þ „¡ X2, - » O < é k Ÿ < ½42 3  Gb 4 * . «  « e . Ý U  !   Ö š n„z § ê · d ë ò b i v ì ® c ײ § ê Ž „ “  n Xã æ: ; „¦ ¬ i   ¡ ¢ £ Eí 6 ½ Server_  Ä  ´; ç è ã  p Óà ‰ \ _ ‡  žÉ   ¡ ® î ì Þ „¡ F × É Ð ï Z I ð 9 ñ ¤ò ¬ i \ _ Ä  § ò | _  XY   ¡ r žÃ ‰ ˜ ™

5.

'

'

'

'

(

(

(

(

)

)

)

)

*

*

*

*

+

+

+

+

,

,

,

,

-

-

-

-

.

.

.

.

/

/

/

/

¿ RFIDâ ^ ò u ;  Y  ­§ = ” 8 N O š v wXY —   ¡ r ž¢ l N  ¯  5 ® ˜ ™Ÿ ó —  v wÛ ò 7  8 h i ¢ lô Š õ D E ö ÷ ? ? ­ œ ø —   Ï ã æY  ­= ” 8 N O š " XY — ã æ¼ } ? ¨ ” p žÉ " # 6 ˜ ™×N ‡ Æ x Ø ® î š Ö     ù ú RFID« ú Í   N Æ RFID Þ×û 1 –ü g›X g›Q  l lTE h TN  Ò Tý v m nTþ 6 6 ² § ‡ 4RFID Tagj  ò  N O ×x Ø Ù  Xã ä b ¡ O FÞ' Š †  · Ì Í ¾ Æ g›í î F  TagN ‡ Æ <   v  õ ö Ý U    r ž £ V  á žá ­ x  « d · ´–Û ò   §  ¸   ⠆ 8 „… 8 Þ  z ì c ú Í * + ‘ Xš > § Ž ì c F  z ì c ú Í F  GIS: ;  Þ< ù ž7 | ' Š v ì „| 

(7)

0

1

0

0

1

1

0

1

]  š É Ö ö ž Ÿ ? ]  _ œ RFID  * + Kö ] p   

2

3

4

5

2

2

3

3

4

4

5

5

2

3

4

5

[1]  „  T ’  T   T   RFID    Ä   ---ã æ: ;  : ; 2005 6 [2]    RFID   3 ñ V © V : ; à f ()(÷) [3]   T! " # T$ % & Ð ' (  Ü ^ - RFID â ^ ‘ P ) } ›* +RFID Middleware, h- ,È ½. 1-6/20049

[4] J. L. Peterson,“Petri Net Theory and the Modeling

of Systems”, Prentice Hall, June 1981.

[5] Sean Clark, Ken Traub, Dipan Anarkat, and Ted Osinski ,“Auto-ID Center Savant Specification 1.0”, September 2003.

[6] “The SUN Java System RFID Software Architecture, A Technical White Paper”, SUN Microsystems, January 2005.

參考文獻

相關文件

Students are asked to collect information (including materials from books, pamphlet from Environmental Protection Department...etc.) of the possible effects of pollution on our

220V 50 Hz single phase A.C., variable stroke control, electrical components and cabling conformed to the latest B.S.S., earthing through 3 core supply cable.. and 2,300 r.p.m.,

Wang, Solving pseudomonotone variational inequalities and pseudocon- vex optimization problems using the projection neural network, IEEE Transactions on Neural Networks 17

Define instead the imaginary.. potential, magnetic field, lattice…) Dirac-BdG Hamiltonian:. with small, and matrix

Microphone and 600 ohm line conduits shall be mechanically and electrically connected to receptacle boxes and electrically grounded to the audio system ground point.. Lines in

Two cross pieces at bottom of the stand to make a firm base with stays fixed diagonally to posts. Sliding metal buckles for adjustment of height. Measures accumulated split times.

n Media Gateway Control Protocol Architecture and Requirements.

Based on the defects of the safety control in the semiconductor electric circuit industry and the application of swarm Intelligence and knowledge management SECI model, the