International Journal of Computer Science Issues
Research one security policy in the internet GSM or other possible environments based on the uniqueness and uniformity of RFID chips code and EPC. Its basic process: the data in RFID chips - products database - verification. Its technological process: the reader reads encrypted data in RFID chips some kind of products corresponding and uploads the data to public networks. The EPC database on line returns user verification after data processing. According to the strategy of anti-counterfeiting technology, the introduction of PKI technology on digital certificate management, system describes the digital certificate application and verification process.