Methods and software architecture for managing a system for verifying the authenticity of branded products

Radio frequency identification (RFID) holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight and it can be used for a wide range of pervasive computing applications. The elaboration of new methods and software architectures for the management of an infrastructure with a large number of RFID tags has a special importance, especially in the context of software extension for many manufacturers. The development of the technology, mainly the Internet allowed to companies to develop their own systems for the identification and monitoring of products. In order to verify the authenticity of products, it is important that different applications to communicate and interact. For such heterogeneous computing environments, large and geographically, a centralized approach is difficult or even impossible. A simple, but safe method will be provided for the ordinary citizen to authenticate directly the products in the stores.

[1]  Jukka Riekki,et al.  Requesting Pervasive Services by Touching RFID Tags , 2006, IEEE Pervasive Computing.

[2]  Roy Want,et al.  RFID. A key to automating everything. , 2004, Scientific American.

[3]  Lori Driscoll,et al.  RFID SYSTEMS , 2006 .

[4]  Seon Wook Kim,et al.  Software architecture for a multi-protocol RFID reader on mobile devices , 2005, Second International Conference on Embedded Software and Systems (ICESS'05).

[5]  Lee Jongyoung,et al.  Performance Test Tool for RFID Middleware: Parameters, Design, Implementation, and Features , 2006, 2006 8th International Conference Advanced Communication Technology.

[6]  Cheng-Ming Jimmy Li An integrated software platform for RFID-enabled application development , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[7]  Roy Want,et al.  An introduction to RFID technology , 2006, IEEE Pervasive Computing.

[8]  Heikki Huomo,et al.  Virtual product design case study: the Nokia RFID tag reader , 2005, IEEE Pervasive Comput..

[9]  Roy Want,et al.  RFID Technology and Applications , 2006, IEEE Pervasive Computing.

[10]  Ron Weinstein,et al.  RFID: a technical overview and its application to the enterprise , 2005, IT Professional.

[11]  Frédéric Thiesse,et al.  RFID-based maintenance at Frankfurt airport , 2006, IEEE Pervasive Computing.

[12]  J. Landt,et al.  The history of RFID , 2005, IEEE Potentials.