a天堂v在线观看免费

Security-Information

Security Exhibition Network > Information > Viewpoint Tracking > Text

New Application of Electronic Label Technology in Chinese New Year Consumption

2020-01-17 09:47:55-chi of things: Jin Xiao Hits: 11007
[ Security Exhibition Network Perspective Tracking ] The Spring Festival of 2020 is approaching. The Chinese Consumers Association released the Spring Festival Consumption Tips on January 6. The focus is on online transactions. Do not provide personal information at will, do not scan the code, protect personal privacy, and do not trust. "Flying to Yokohama" and "Winning Information".
With the development of the times, China has already entered the "code scanning era", and every time the Spring Festival, the "code scanning trap" is staged as scheduled. Especially before and after the Spring Festival in shopping malls and other public places, there are often similar activities such as code scanning and downloading APPs to send gifts. Some people have the mentality of "deleting APPs when they get benefits" and scan the code. In fact, it seems to be simple. During the harmful download process, the information in the mobile phone has been leaked. CCTV once reported the news of “scanning a QR code, 40,000 yuan was missing”; many netizens on the Internet also said that after scanning some QR code scanning gifts, the mobile phone will automatically give QQ and WeChat Friends sent a group of advertising messages.
At the same time, criminals forged product verification pages and printed fake QR codes on fake packaging. Consumers are often blinded by criminals once they have been verified after purchase. For criminals, the cost of two-dimensional code disguise verification is much lower than the cost of disguising traditional phone anti-counterfeit verification, but the probability of falsehood is greatly increased.
Coincides with the New Year, RFID electronic tags help shopping peace of mind
Electronic tags are also called radio frequency tags, transponders, and data carriers; readers are also called readout devices, scanners, readers, communicators, and readers (depending on whether the electronic tags can wirelessly rewrite data). The spatial (non-contact) coupling of radio frequency signals is achieved between the electronic tag and the reader through a coupling element; in the coupling channel, energy transfer and data exchange are achieved according to the timing relationship.
Unlike two-dimensional codes, RFID embeds a chip on the package and uses radio signals to identify and read target data. RFID tags have good anti-pollution, durability and confidentiality, which can realize long-term tracking of items. At the same time, the inspection of electronic tags is also better than the traditional two-dimensional code. It does not need to be aligned and scanned. It has a faster read and write speed and can be used for multi-target recognition and motion recognition. At present, high-value products such as "Moutai" and "Wuliangye" have applied this technology. At the same time, relying on the unique chip of the electronic tag, the unique serial number, and the difficulty of copying, it once blocked most counterfeiters.
Two-dimensional code hidden dangers remain, NFC protects wallet
QR code payment represented by Alipay and WeChat payment. However, convenience and security do not seem to be in direct proportion. Users enjoy the convenience while also bearing risks. Security risks continue to appear in QR code payment. At this stage, Alipay's countermeasures for stealing are mainly Alipay insurance. Once the loss of stealing time occurs, it will be paid by the buyer . If the relevant state departments do not include the QR code in the safe market supervision in the future, and only rely on the enterprise to protect the user's payment information security, then whether the QR code payment can continue to leap forward is also a question.
NFC, Near Field Communication (NFC), is a short-range, high-frequency wireless communication technology that allows non-contact point-to-point data transmission and exchange of data between electronic devices. This technology evolved from contactless radio frequency identification (RFID) and was jointly developed by Philips and Sony. It is based on RFID and interconnect technology. Near field communication is a short-range high-frequency radio technology that operates at a distance of 20 cm at a frequency of 13.56 MHz. Its transmission speed is available in 106 Kbit / s, 212 Kbit / s or 424 Kbit / s.
Compared with QR code payment, NFC technology has a higher level of payment security, is more convenient, and the technology is more mature. First, the NFC payment distance is within 10cm, and the confidentiality and security of data transmission are guaranteed. Secondly, the NFC mobile phone adopts a combination of hardware encryption and software encryption of the SE chip. Data transmission such as ID and key can be completed in less than 0.1 seconds, and the security of payment is greatly guaranteed.
With the upgrade of smartphones, NFC has gradually become standard. At the end of June last year, China UnionPay joined hands with OPPO, Huawei, Xiaomi and other six major mobile phone manufacturers to promote mobile phone flash payment, liberating people from many cards, and the technology needed It's NFC.
Conclusion
Although the technology is good, it still takes time to popularize it. During this time, you should improve your awareness of self-prevention. Do n’t be greedy and cheap, especially if the QR code technology is not difficult. At the moment, the code is easy for criminals. It is not advisable to scan the code.
At the same time, with the advancement of technology, iterative update of mobile payment methods is inevitable. Although the road is long, NFC technology is still expected to succeed with its outstanding advantages.

Disclaimer: The copyright of the article marked “Security Exhibition Network” from the source is owned by this site. If you need to reprint it, please indicate the source. Violators of this website will be held responsible for the relevant legal responsibility; The purpose of the article is to convey more information, which does not represent the position and opinions of this website. "Security Exhibition Network" does not make any guarantee or bear any responsibility for these third-party content or links; if it involves copyright issues, please start from the date of content publication Contact this website within one week, otherwise it is deemed to waive relevant rights.

I want to comment

Civilize the Internet and speak rationally. (You can also enter 200 characters)
expression

All comments represent the opinions of netizens and have nothing to do with this stand.


Xiamen Dashou Control Technology Co., Ltd.

Security Journal

More

Information Video Conference Association

advisory Center

QQ交谈 Service consulting QQ chat

QQ交谈 Online customer service QQ chat

QQ交谈 Media cooperation QQ chat

QQ交谈 Exhibition cooperation QQ chat

Back to Home