Please wait a minute...
Computer & Telecommunication  2016, Vol. 1 Issue (12): 29-31    DOI:
Current Issue | Archive | Adv Search |
Research on the Tracing System of Auto Parts in Fujian Based on RFID Technology
Wu Jin
Fujian Chuanzheng Communications College
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  The research on the tracing system of auto parts in Fujian based on RFID technology can effectively provide a solution for the chaos market of auto parts in Fujian Province by tracing the problematic parts and finding the related company. This study uses the RFID tags fixing on each auto parts to make them have a unique identity, and the fake auto parts can not exist in Fujian Province. So it can improve the vehicle more safety, and protect the rights and interests of auto parts’manufacture enterprises, sales enterprises and customers.
Key wordsRFID      traceability      safety      security     
Published: 15 November 2017
ZTFLH:  TP391.44  
  U468  

Cite this article:

Wu Jin. Research on the Tracing System of Auto Parts in Fujian Based on RFID Technology. Computer & Telecommunication, 2016, 1(12): 29-31.

URL:

http://www.computertelecom.com.cn/EN/     OR     http://www.computertelecom.com.cn/EN/Y2016/V1/I12/29

[1] YE Dong CHEN Chun-tao LI Zong-chen LI Jun-yao. Research on the School-Bureau-Enterprise Collaborative Education Model in the Major of Public Security Audio-visual Technology[J]. 电脑与电信, 2021, 1(8): 30-32.
[2] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[3] HAN Hai. An Integrated Security Monitoring Solution in the Judicial Field Based on 5G Private Network[J]. 电脑与电信, 2021, 1(6): 76-78.
[4] FANG Xin. Research on Security of Rip Routing Protocol Based on Python[J]. 电脑与电信, 2021, 1(5): 1-21.
[5] JIANG Xin WANG Fei. Survey on Blockchain Technology and Application[J]. 电脑与电信, 2021, 1(5): 25-29.
[6] SUN Wen-wen LIU Qing-liang WU Ruo-chen WANG Xin-tong DONGYE Sheng-yi CAO Lu WANG Xin-li. [J]. 电脑与电信, 2021, 1(4): 59-61.
[7] ZHUANG Yuan-xiang. Teaching Research on Network Security in Technical Schools[J]. 电脑与电信, 2021, 1(1): 62-67.
[8] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[9] WANG Yu HE Zhen-xiang. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 1-3.
[10] JIANG Yi ZHU Jun-wu. Research on the Intrusion Detection Method Based on Machine LearningAlgorithm[J]. 电脑与电信, 2020, 1(7): 21-24.
[11] SUN Guo-xian ZHAO Yong-chang. An Optimization Method forArming Power Signal Identification in ESAD[J]. 电脑与电信, 2020, 1(7): 58-61.
[12] LI Jun-tao. Security Research on Internet of Things Based on NB-IoT Network[J]. 电脑与电信, 2020, 1(7): 62-64.
[13] XIE Feng MENG Jin DING Wei REN Zhao-peng . Overview of Network Structure Transformation and Network Security Construction Based on MajorActivities Guarantee[J]. 电脑与电信, 2020, 1(6): 57-62.
[14] ZHONG Yu-ming CHEN Chang-hui. Exploration of Network and Information Security[J]. 电脑与电信, 2020, 1(5): 33-35.
[15] LI Jun-tao. Research on Security Technology of Intelligent Collaborative Network[J]. 电脑与电信, 2020, 1(4): 48-50.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd