Скачать презентацию Applied cryptography Information security 應用密碼學與資安應用 Various Mobile Скачать презентацию Applied cryptography Information security 應用密碼學與資安應用 Various Mobile

7bfca7d4afb93ed3c667aa09c86ff32d.ppt

  • Количество слайдов: 34

Applied cryptography & Information security 應用密碼學與資安應用 Various Mobile Devices and Applications 102/12/19 Dept. Information Applied cryptography & Information security 應用密碼學與資安應用 Various Mobile Devices and Applications 102/12/19 Dept. Information Management Chang Gung University 報告人:張克章教授 1

Applied cryptography & Information security 應用密碼學與資安應用 CONTENTS 1. How about the functions of Barcode, Applied cryptography & Information security 應用密碼學與資安應用 CONTENTS 1. How about the functions of Barcode, QR code, RFID? 2. How about comparison of barcode & RFID 3. RF relay ISO 14443 4. Illustrates the functions of Easy. Card, ATM, GPRS, Wireless credit card machine. 5. Power supply for any mobile devices Dept. Information Management Chang Gung University 報告人:張克章教授 2

Applied cryptography & Information security 應用密碼學與資安應用 1. How about the functions of Barcode, QR Applied cryptography & Information security 應用密碼學與資安應用 1. How about the functions of Barcode, QR code and RFID? n Barcode[1] expressed that a barcode is an optical machinereadable representation of data relating to the object to which it is attached. n Originally barcodes systematically represented data by varying the widths and spaces of parallel lines, and may be referred to as linear or one-dimensional (1 D). n The plates were "read" by a trackside scanner located, for instance, at the entrance to a classification yard while the car was moving past. n The project was abandoned after about ten years because the system proved unreliable after long-term use in the field. [1] Wikipedia, Barcode, http: //en. wikipedia. org/wiki/Barcode Dept. Information Management Chang Gung University 報告人:張克章教授 3

Applied cryptography & Information security 應用密碼學與資安應用 n Barcode has to be: UPC-A-036000291452. png 483 Applied cryptography & Information security 應用密碼學與資安應用 n Barcode has to be: UPC-A-036000291452. png 483 × 350 pixels, file size: 5 KB, MIME type: image/png) Dept. Information Management Chang Gung University 報告人:張克章教授 4

Applied cryptography & Information security 應用密碼學與資安應用 n Format is: UPC-A 條碼有 12位數字,開端的第一個數字是 有特別 意思。 Applied cryptography & Information security 應用密碼學與資安應用 n Format is: UPC-A 條碼有 12位數字,開端的第一個數字是 有特別 意思。 其 意思如下: 0 - 正常 UPC Code 1 - 保留 2 - 商品的價格會 隨著 重量而轉變的 , 如產品 類等。 3 - 藥物及醫藥 用品 National Drug Code (NDC) and National Health Related Items Code (HRI). 4 - 正常 UPC Code 5 - 優惠 卷 6, 7 - 正常 UPC Code 8 , 9 - 保留 最後 5位數字是生產商的編號 (UPC ID number)。由 Uniform Code Council (UUC)所 分配 第 7 至 11 個位的數字由生產自行編製的產品號碼。 最後一個位是終檢 碼 (Check Digit) Dept. Information Management Chang Gung University 報告人:張克章教授 5

Applied cryptography & Information security 應用密碼學與資安應用 n They are many applications on Barcode, some Applied cryptography & Information security 應用密碼學與資安應用 n They are many applications on Barcode, some applications like as hypermarket including “Carrefour, French supermarket chain”, barcode in choice for distributer of books, medical hospitals, etc. n Since there are many kinds of different ideas, like flowchart of manufacture, the output of several processes will have different barcodes to explain. n So the barcode is important to all life now, some usages of barcode will inform us some different concepts. n All although the importance of barcode is particular, disadvantages can be found at different circumstances. Dept. Information Management Chang Gung University 報告人:張克章教授 6

Applied cryptography & Information security 應用密碼學與資安應用 n Advantages & disadvantages [2] 1. 可靠準確:one-to-one mapping;鍵盤輸入數據出錯率為 Applied cryptography & Information security 應用密碼學與資安應用 n Advantages & disadvantages [2] 1. 可靠準確:one-to-one mapping;鍵盤輸入數據出錯率為 1/300,利用光學字元識別技術出錯率為 1/10000,而採用條 形碼技術誤碼率低於 1/1000000。 n 2. 數據輸入速度快 n 3. 經濟便宜 n 4. 靈活、實用 n 5. 自由度大 n n 識別裝置與條形的標簽相對位置的自由度要比 OCR(光學字 元識別 )大得多。 條形碼通常只在一維方向上表達信息,而同一條形碼上所表 示的信息完全相同並且 [2] Krista Martin, What are advantages & disadvantages of a barcode? http: //www. ehow. com/info_8074787_advantages-disadvantages-barcode. html#ixzz 2 n. RNlih. Ik Dept. Information Management Chang Gung University 報告人:張克章教授 7

Applied cryptography & Information security 應用密碼學與資安應用 n The disadvantages of barcode contains [3]: n Applied cryptography & Information security 應用密碼學與資安應用 n The disadvantages of barcode contains [3]: n n Pricing discrepancies and scanning problems Label damage Financial and equipment costs Et al. n There are many items using 1 D barcode to isolate and distribute, it is a good idea. [3] Rob Callahan, The disadvantages of barcodes http: //www. ehow. com/list_6361333_disadvantages-barcodes. html Dept. Information Management Chang Gung University 報告人:張克章教授 8

Applied cryptography & Information security 應用密碼學與資安應用 n QR is the second dimension format, a Applied cryptography & Information security 應用密碼學與資安應用 n QR is the second dimension format, a revised comes from 1 D barcode. n 數位網路社群 [4]說明 QR Code 是二維條碼 (2 D barcode)的一種,它主要是擴展一維條 碼的可儲存內容及增加可辨識性。 n QR Code目前在各國都有實際的商業應用, 台灣大多用在票券及特定商品上。 [4] 數位網路社群, QR Code 是什麼 ? , http: //www. dns. com. tw/? p=399 Dept. Information Management Chang Gung University 報告人:張克章教授 9

Applied cryptography & Information security 應用密碼學與資安應用 n QR Code 是二維條碼,格式入下: n QR為「 Quick Response」,即快速反應的反映。 Applied cryptography & Information security 應用密碼學與資安應用 n QR Code 是二維條碼,格式入下: n QR為「 Quick Response」,即快速反應的反映。 n 很多使用如 APP、內容介紹或攝影的口碑等都 是案例。 Dept. Information Management Chang Gung University 報告人:張克章教授 10

Applied cryptography & Information security n QR碼的主要應用的項目可分成四類 應用密碼學與資安應用 : n 1. 自動化文字傳輸:通常應用在文字的傳輸,利用 快速方便的模式,讓人可以輕鬆輸入如地址、電話 號碼、行事曆等,進行名片、行程資料等的快速交 Applied cryptography & Information security n QR碼的主要應用的項目可分成四類 應用密碼學與資安應用 : n 1. 自動化文字傳輸:通常應用在文字的傳輸,利用 快速方便的模式,讓人可以輕鬆輸入如地址、電話 號碼、行事曆等,進行名片、行程資料等的快速交 換。 n 2. 數位內容下載:通常應用在電信公司遊戲及影音 的下載,在帳單中列印相關的 QR碼資訊供消費者 下載,消費者透過 QR碼的解碼,就能輕易連線到下 載的網頁,下載需要的數位內容。 n 3. 網址快速連結:以提供使用者進行網址快速連結、 電話快速撥號等。 n 4. 身分鑑別與商務交易:許多公司現在正在推行 QR 碼防偽機制,利用商品提供的 QR碼連結至交易網 站,付款完成後系統發回 QR碼當成購買身份鑑別, 應用於購買票卷、販賣機等。 n 到報章或雜誌上使用: QR碼作往後一序列動作。 報告人:張克章教授 Dept. Information Management 11 Chang Gung University

Applied cryptography & Information security 應用密碼學與資安應用 n 就是當每個人的手機都能掃瞄 QR Code,並且 能夠方便的行動上網,那麼 QR Code就能夠發 揮最大的功能。 Applied cryptography & Information security 應用密碼學與資安應用 n 就是當每個人的手機都能掃瞄 QR Code,並且 能夠方便的行動上網,那麼 QR Code就能夠發 揮最大的功能。 n 如果你的實體商品有 QR Code的話,就可以跟 虛擬的網路接上線,所以本站也在網頁的右方 加上該頁面的 QR Code。 n 如果你的手機具有辨識 QR Code的程式的話, 你就可以把網址帶著走。人的手機都能掃瞄 QR Code,並且能夠方便的行動上網。 Dept. Information Management Chang Gung University 報告人:張克章教授 12

Applied cryptography & Information security 應用密碼學與資安應用 n 現在 Google map也將內容顯示成 QR Code,以方 便使用者用手機拍攝而隨時攜帶,而不需要存 到電腦或是抄寫。 Applied cryptography & Information security 應用密碼學與資安應用 n 現在 Google map也將內容顯示成 QR Code,以方 便使用者用手機拍攝而隨時攜帶,而不需要存 到電腦或是抄寫。 Dept. Information Management Chang Gung University 報告人:張克章教授 13

Applied cryptography & Information security 應用密碼學與資安應用 RFID n RFID is the following You. Tube Applied cryptography & Information security 應用密碼學與資安應用 RFID n RFID is the following You. Tube introduction: www. youtube. com/watch? v=g 1 LICEC 6 ams n RFID多媒體創意競賽 -信不信郵你 [5] http: //www. youtube. com/watch? v=-mt 1 VAOZAR 8 n In the 2 nd world war, the RFID was used to track the other flight forward, the tracking flight wanted to shoot down. n Then there are so many devices and social tools who also use the RFID, since it is very easy and flexible to apply. [5] sky 19891220,信不信郵你,第二屆 RFID多媒體創意競賽, 2010/11/25。 Dept. Information Management Chang Gung University 報告人:張克章教授 14

Applied cryptography & Information security 應用密碼學與資安應用 n There are many nations who use RFID Applied cryptography & Information security 應用密碼學與資安應用 n There are many nations who use RFID to apply many applications, especially the Japan is the most. n There are many fields to use RFID. What we can see is the kurios. n A Kurios is a very simple too to use, such as you go to a department, many products under less than amount, a Kurios may help to get. n Even if you want to buy a drink or can, a Kurios may help to get. n When you go in to fields of a manufacture mass, Kurios’ are very popular now. Dept. Information Management Chang Gung University 報告人:張克章教授 15

Applied cryptography & Information security 應用密碼學與資安應用 n who a lot of Kurios applied in Applied cryptography & Information security 應用密碼學與資安應用 n who a lot of Kurios applied in many corners, a body needs to insert any coins into Kurios, you just use the Tag to push, this market completes at all. n Taiwan wants to learn the whole situation from Japan, since the usage of Korios is very popular and it is very easy to all people. n We have 2 D RFID in any ways like Easycard, or other usages of automatic control. But any other applications can be extended. n For elder group citizens, some applications are adaptive to RFID, such as they fall and need other help, monitor person may find at any time. Dept. Information Management Chang Gung University 報告人:張克章教授 16

Applied cryptography & Information security 應用密碼學與資安應用 2. How about comparison of barcode & RFID Applied cryptography & Information security 應用密碼學與資安應用 2. How about comparison of barcode & RFID n They are two not automatic devices to compare of barcode & RFID, the structure is much different. n From the health hospital, Funkhouser [6] expressed that: n What really affects the decision to implement radiofrequency identification (RFID) or barcode scanning technology, and are the two mutually exclusive? [6] Vivian Funkhouser, RFID tracking vs. barcode scanning: how to determine which is essential for your healthcare environment, Intelligent Hospital Today, Aus. 30, 2012. Dept. Information Management Chang Gung University 報告人:張克章教授 17

Applied cryptography & Information security 應用密碼學與資安應用 n RFID involves the collection of mass data, Applied cryptography & Information security 應用密碼學與資安應用 n RFID involves the collection of mass data, whereas barcodes are better suited for singular or individualized data collection. n RFID eliminates the traditionally time-consuming and manual task of locating medical equipment. n But tags that can proactively alert their locations or that can be identified collectively in a group for inventory purposes. n And RFID does not require line of sight for data collection. Dept. Information Management Chang Gung University 報告人:張克章教授 18

Applied cryptography & Information security 應用密碼學與資安應用 n Enter the barcode scanner, some barcode scanner Applied cryptography & Information security 應用密碼學與資安應用 n Enter the barcode scanner, some barcode scanner are used in bleeding room. n A barcode scanner makes an excellent choice for the budget-conscious healthcare provider looking. n A solution to patient identification, chart management, or any other individualized task. n One drawback to barcodes is that each barcode on each item must be aligned with a barcode scanner for its data to be captured. n Some identification of person can also applied the barcode, since it is a tool to certificate. Dept. Information Management Chang Gung University 報告人:張克章教授 19

Applied cryptography & Information security 應用密碼學與資安應用 n Can RFID and barcodes co-exist? This is Applied cryptography & Information security 應用密碼學與資安應用 n Can RFID and barcodes co-exist? This is a problem. n How do you determine which solution is appropriate for your specific healthcare needs? n Several technologies for locating and identifying assets exist today, and each has its place. n As the below indicates, you need to evaluate options like barcodes, passive/active RFID and Wi-Fi to determine which solution sets or combinations give you the appropriate level of insight and visibility to the assets and inventory you wish to track. Dept. Information Management Chang Gung University 報告人:張克章教授 20

Applied cryptography & Information security 應用密碼學與資安應用 n Typically, a technology that has higher tag Applied cryptography & Information security 應用密碼學與資安應用 n Typically, a technology that has higher tag costs will provide more granular location information. n But it might be cost prohibitive for all except the most expensive, most critical-to-track assets. n We can determine that both integration of 1 D barcode and RFID has to exist, because the integration is important to hospital. n Some usages of barcode and RFID can give any values in other fields of applications. n But the difference of barcode and RFID is really truly, the purposes of two kinds have to distinct. Dept. Information Management Chang Gung University 報告人:張克章教授 21

Applied cryptography & Information security 應用密碼學與資安應用 3. RF relay ISO 14443 n Some people Applied cryptography & Information security 應用密碼學與資安應用 3. RF relay ISO 14443 n Some people [7] ISO/IEC 14443 Identification cards , entitled as Contactless integrated circuit cards. n Proximity cards is an international standard that defines proximity cards used for identification, and the transmission protocols for communicating with it. n The transmission protocol specifies data block exchange and related mechanisms: n 1. data block chaining n 2. waiting time extension n 3. multi-activation [7] Wikipedia, ISO/IEC 14443, http: //en. wikipedia. org/wiki/ISO/IEC_14443 Dept. Information Management Chang Gung University 報告人:張克章教授 22

Applied cryptography & Information security 應用密碼學與資安應用 n Four points have to notice: n ISO/IEC Applied cryptography & Information security 應用密碼學與資安應用 n Four points have to notice: n ISO/IEC 14443 -1: 2008 Part 1: Physical characteristics n ISO/IEC 14443 -2: 2010 Identification cards -- Contactless integrated circuit cards -- Proximity cards -- Part 2: Radio frequency power and signal interface n ISO/IEC 14443 -3: 2011 Identification cards -- Contactless integrated circuit cards -- Proximity cards -- Part 3: Initialization and anti-collision n ISO/IEC 14443 -4: 2008 Identification cards -- Contactless integrated circuit cards -- Proximity cards -- Part 4: Transmission protocol Dept. Information Management Chang Gung University 報告人:張克章教授 23

Applied cryptography & Information security 應用密碼學與資安應用 n 拓緯 [8]說明許多繼電器 (RF Relay)產品,固態 繼電器 Solid State Applied cryptography & Information security 應用密碼學與資安應用 n 拓緯 [8]說明許多繼電器 (RF Relay)產品,固態 繼電器 Solid State Relays (S. S. R. )的微小型就是 一例。 n 國內還有很多繼電器的產品提供參考,大家 可以參考。 4. Illustrates the functions of Easy. Card, ATM, GPRS, Wireless credit card machine n Easy. Card is the general device we have many applications, especially there are so many market units. n The year amount for Easy. Card Corp. can increasing [8] 拓緯實業有限公司,各項繼電器產品介紹, http: //www. relays. com. tw/web/tw/about. htm now, but the amount will be continuing. Dept. Information Management Chang Gung University 報告人:張克章教授 24

Applied cryptography & Information security 應用密碼學與資安應用 n Easy. Card is the general device we Applied cryptography & Information security 應用密碼學與資安應用 n Easy. Card is the general device we have many applications, they can list in the following: n They are: n Rapid transit, Various buses, Taiwan railway, Taiwan High speed rail, Parking area, passenger traffic, Bicycle, Taxi, 1 st or 2 nd ambulances, Ferry boat , Aviation transfer, Hospital, TW tourist attractions, Library, Special contract shop designated, etc. n There are other fields for applications having to try, like the Pan Air Passenger(汎航客運 ) includes the Easy. Card reader. Dept. Information Management Chang Gung University 報告人:張克章教授 25

Applied cryptography & Information security 應用密碼學與資安應用 n ATM is a general tool about any Applied cryptography & Information security 應用密碼學與資安應用 n ATM is a general tool about any space which anyone can apply to use, this is a good idea. n 國泰指出 [9]My. ATM 讓您自己編輯常用帳號 清單,可以記下帳號、描述用途、紀錄 E-mail. n 轉帳時就可自動帶出讓您選擇,再也不怕 Key 錯帳號囉。 n 中華郵政又提出,郵政網路 ATM讓大家使用, 並提出客問答讓大家請教。 n 我認為只要是銀行或財務管理機構,就會有 相關的 ATM讓大家使用。 [9]國泰世華銀行,國泰指出 My. ATM, https: //www. mybank. com. tw/myatm_number. asp Dept. Information Management Chang Gung University 報告人:張克章教授 26

Applied cryptography & Information security 應用密碼學與資安應用 GPRS n GPRS[10] is the acronym of general Applied cryptography & Information security 應用密碼學與資安應用 GPRS n GPRS[10] is the acronym of general packet radio service, a packet oriented mobile data service on the 2 G and 3 G cellular communication system's global system for mobile communications (GSM). n GPRS is a best-effort service, implying variable throughput and latency that depend on the number of other users sharing the service concurrently, as opposed to circuit switching. n 2 G cellular technology combined with GPRS is sometimes described as 2. 5 G. [10] Wikipedia, GPRS, http: //en. wikipedia. org/wiki/General_Packet_Radio_Service Dept. Information Management Chang Gung University 報告人:張克章教授 27

Applied cryptography & Information security 應用密碼學與資安應用 n 3 G telecommunication networks support services that Applied cryptography & Information security 應用密碼學與資安應用 n 3 G telecommunication networks support services that provide an information transfer rate of at least 200 kbit/s. n Later 3 G releases, often denoted 3. 5 G and 3. 75 G, two advanced types appear. n Providing mobile broadband access of several Mbit/s to smartphones and mobile modems in laptop computers, most of mobile telephones are belonging to this types. n 3 G finds application in wireless voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile TV. Dept. Information Management Chang Gung University 報告人:張克章教授 28

Applied cryptography & Information security 應用密碼學與資安應用 n 當國內外國家在比較 GPRS相關時速時,許多 國家都比我國進步。 n 在亞洲內,大陸 ‧韓國與日本在 GPRS設計上, Applied cryptography & Information security 應用密碼學與資安應用 n 當國內外國家在比較 GPRS相關時速時,許多 國家都比我國進步。 n 在亞洲內,大陸 ‧韓國與日本在 GPRS設計上, 都已達 100 M Bits/second以上。 n 在美國或歐洲上, GRRS 的時數又比我國超 出很多,這顯現我國在這此還有很多改善空 間。 n 現在我國已開放讓 4 G的頻道讓大家使用,而 許多公司就以高價格去獲得這項特優活動。 n 中華電信指出,估計斥資達 395. 75億元獲取 得 B 2、 C 5頻段,為唯一拿下 35 Mhz的業者。 Dept. Information Management Chang Gung University 報告人:張克章教授 29

Applied cryptography & Information security 應用密碼學與資安應用 n 中華電信目前已 100 M/20 M蒐集新客戶,這讓 個人不容易了解。或許需要時間去建制可是 原因。 n Applied cryptography & Information security 應用密碼學與資安應用 n 中華電信目前已 100 M/20 M蒐集新客戶,這讓 個人不容易了解。或許需要時間去建制可是 原因。 n The first release of the 3 GPP Long Term Evolution (LTE) standard, this is a trend to push using LTE to replace the original lights like bulbs. n 4 G does completely fulfill the ITU 4 G requirements called IMT-Advanced, a new other trend to develop. n The evolution of LTE Advanced is a 4 G technology, some corporations have to setup. n Wi. MAX is another technology verging on or marketed as 4 G, but it fail now. 報告人:張克章教授 Dept. Information Management Chang Gung University 30

Applied cryptography & Information security 應用密碼學與資安應用 Wireless credit card machine n Total Merchant Services[11] Applied cryptography & Information security 應用密碼學與資安應用 Wireless credit card machine n Total Merchant Services[11] described that credit card reader and terminal is necessary, you get a free state-of-the-art, multi-application credit card readers and processing terminals. n Flag merchant services [12] shows a better result from mobile credit merchant process, a lot fun to read. n Mobile credit card processes is necessary if it is available. [11] Total Merchant Services, Free Credit Card Readers & Terminals, http: //acceptwirelesspayments. com/wireless-contact. html [12] Flag merchant services, Mobile credit card processing review, http: //credit-cardprocessing-review. toptenreviews. com/mobile-credit-card-processing/ 報告人:張克章教授 Dept. Information Management Chang Gung University 31

Applied cryptography & Information security 應用密碼學與資安應用 5. Power supply for any mobile devices n Applied cryptography & Information security 應用密碼學與資安應用 5. Power supply for any mobile devices n Power supply is necessary as the devices are on the table or movable, a long-time power supply is required to endure. n Any mobile devices like telephones or i. Pad, etc. Need some long duration of power. n Recharg 4 portable power supply is an idea, some will use to recharge the fallen power. n Some supported power may comes from foreign nations; but most produces of power supply come from various units in my nation. Dept. Information Management Chang Gung University 報告人:張克章教授 32

Applied cryptography & Information security 應用密碼學與資安應用 Discussion n What to understand the 1 D, Applied cryptography & Information security 應用密碼學與資安應用 Discussion n What to understand the 1 D, QR and RFID? n How about the RF relay ISO 14443? n Making a QR for your anything? Dept. Information Management Chang Gung University 報告人:張克章教授 33

Applied cryptography & Information security 應用密碼學與資安應用 Questions And Discussions Dept. Information Management Chang Gung Applied cryptography & Information security 應用密碼學與資安應用 Questions And Discussions Dept. Information Management Chang Gung University 報告人:張克章教授 34