Home > News > Content
Products Categories
Contact Us

Dongguan Chengxinxing Smart Card Co.,Ltd

Add: No.25, Jinfu Road, Jinxia Community, Chang'an Town, Dongguan, China

TEL: +86-769-85313437

FAX: +86-769-87006556

Web: http://www.lycarder.com/en

http://dgtrustingcard.en.alibaba.com

Nicole Lai (Export Manager)

Phone: +8613450794559 (Whatspp)

Wechat: cyfonglsf

E-mail: lsfnicole@hotmail.com

Skype: nicole-lsf

RFID Tag The Identification
Jul 25, 2017

RFID is the same as the bar code, IC card and other identification methods, RFID Tag the basic function is to identify the target object unique identifier (UID), RFID Tag the difference is to radio transmission to complete the non-contact automatic identification , And to achieve the movement of goals and multi-target identification. RFID is also a data communication technology, with the basic components of communication systems such as sending, receiving and channeling and transmission of information and other basic functions, RFID Tag the difference is that the transmission of information is man-made, with the set. With its storage capacity, identify the target, read distance, RFID Tag data encryption and other advantages and development potential, RFID is known as one of today's important technology. RFID system application and development of the key is the electronic label, the paper focuses on the key technology of electronic tags and research status at home and abroad, RFID Tag and put forward our country at this stage of the application and development of electronic tags of the basic countermeasures.

 In the design of RFID tag antennas, miniaturization has always been a concern. It is also an important research direction to extend the application range, miniaturized antenna bandwidth and gain characteristics and cross polarization characteristics. The current RFID tags still use off-chip independent antennas, the advantage of high antenna Q value, easy to manufacture, cost is moderate, RFID Tag but the larger, easy to break, not qualified for security or biomarker in the form of implantation of animals and other tasks. If the antenna can be integrated in the tag chip, without any external devices can work, can reduce the size of the entire label, and simplifies the label production process, reducing costs, which led to the on-chip antenna technology research. In addition, the current focus of the tag antenna research also includes antenna matching technology, structural optimization technology, covering a wide range of broadband antenna design, multi-tag antenna optimization technology, RFID Tag anti-metal design technology, consistency and anti-jamming technology.

Electronic packaging of the package, including chip assembly, antenna production and other major links. With the development of new packaging technology, in the label packaging technology have emerged a new processing technology, such as flip chip bump generation (Bunping), antenna printing and so on. Compared with the traditional line connection or carrier connection, flip chip technology has the advantage of high packaging density, with good electrical and thermal performance, good reliability, low cost. RFID Tag The use of conductive ink printing label antenna instead of the traditional corrosion method of making label antenna, significantly reducing the cost of electronic label production. In addition, the label packaging technology research hot spots include low-temperature hot-pressing packaging technology, precision mechanism design optimization, multi-physical detection and control, high-precision high-speed motion control, RFID Tag on-line detection technology.

Research and the use of security mechanisms are mainly physical methods, cryptography and the combination of the two. Physical methods are usually used in low cost tags, RFID Tag through the electrostatic shielding or active interference to achieve the protection of label information. Compared with the hardware security mechanism based on the physical method, the software security mechanism based on the cryptographic technology is favored. RFID Tag It mainly uses the mature cryptographic scheme and mechanism to design the cryptographic protocol which meets the RFID security requirement


Related News