Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/90803
標題: 以電子保固書為基礎結合工商憑證之B2B、B2C、C2C所有權證明及移轉系統實作
A Study of B2B, B2C and C2C Ownership Proof and Transfer System Based on E-Warranty and MOEACA
作者: Chia-Hung Lin
林家弘
關鍵字: Ownership Transfer
Ownership Proof
MOEACA
NFC
RFID Tag
所有權移轉
所有權證明
工商憑證
NFC
RFID電子標籤
引用: [1] 蘋果日報, '女大生揪團 被騙63萬', 2013, http://www.appledaily.com.tw/appledaily/article/headline/20130121/34784585/(查詢日期:2014/05/15) [2] 內政部警政署165全民防詐騙, '少女時代來臺,再現網購門票假賣家! ', 2013, http://165.gov.tw/fraud.aspx?id=213 (查詢日期:2014/05/15) [3] 蘋果日報, '網拍建仔商品 空包騙300萬', 2006, http://www.appledaily.com.tw/appledaily/article/headline/20061124/3055653/ (查詢日期:2014/05/15) [4] 星島日報, '警拘7人涉網上拍賣騙案', 2013, http://std.stheadline.com/breakingnews/20130917a122713.asp (查詢日期:2014/05/15) [5] 蘋果日報, '網拍詐騙謊稱「賊仔貨」', 2004, http://www.appledaily.com.tw/appledaily/article/headline/20041130/1418402/ (查詢日期:2014/05/15) [6] Xuite日誌, '[詐騙] 我在yahoo拍賣被騙了9149元!! ', 2010, http://blog.xuite.net/chihho32/blog/33399298-%5B%E8%A9%90%E9%A8%99%5D+%E6%88%91%E5%9C%A8yahoo%E6%8B%8D%E8%B3%A3%E8%A2%AB%E9%A8%99%E4%BA%869149%E5%85%83!! (查詢日期:2014/05/15) [7] 新浪新聞, '網路購物詐騙案件屢有所聞 消費糾紛居高不下', 2014, http://news.sina.com.tw/article/20140414/12203931.html (查詢日期:2014/05/15) [8] 卡優新聞網, '露天下單慘遭詐騙 女大生投訴購物平台', 2014, http://www.cardu.com.tw/news/detail.php?nt_pk=28&ns_pk=22269 (查詢日期:2014/05/15) [9] 內政部警政署165全民防詐騙, '財損排名', 2014, http://165.gov.tw/loss_rank.aspx (查詢日期:2014/04/17) [10] 內政部警政署165全民防詐騙, '詐騙排名',2014, http://165.gov.tw/fraud_rank.aspx (查詢日期:2014/04/17) [11] 內政部警政署165全民防詐騙, '165反詐騙專線報案排行榜',2014, http://165.gov.tw/UploadFiles/file/%E5%8F%8D%E8%A9%90%E9%A8%99flash.swf (查詢日期:2014/04/17) [12] 倪煒瑜, NFC技術發展概況綜述(1)——技術簡介, http://www.libnet.sh.cn:82/gate/big5/www.istis.sh.cn/list/list.aspx?id=7949 (查詢日期:2014/03/31) [13] 維基百科, 近場通訊, http://zh.wikipedia.org/zh-tw/近場通訊 (查詢日期:2014/03/31) [14] 開南大學行動商務研發營運中心, 'NFC的運作方式', 2012, http://ecbc.knu.edu.tw/?p=104 (查詢日期:2014/03/31) [15] 王文宏, 網路通訊雜誌第168期, 近距離無線通訊技術-Near Field Communication, 2006, http://media.iii.org.tw/itpd/itis/epaper/9503/9503_03.htm (查詢日期:2014/03/31) [16] DigiTimes電子時報, ISO 14443 A/B非接觸式智慧卡應用, 2009, http://www.digitimes.com.tw/tw/dt/n/shwnws.asp?CnlID=13&Cat=&Cat1=&id=129338 (查詢日期:2014/03/31) [17] DIGILION EasyATM, '自然人憑證與工商憑證有什麼不同? ', 2008, http://www.easyatm.com.tw/faq/2008/0527/article_47.html (查詢日期:2013/12/28) [18] 前成記帳士事務所, '什麼是工商憑證呢? ', 2012, http://www.xn--3kq74gbmo4relhs8fzjz33y.tw/qa-content.php?id=1145&c=237 (查詢日期:2013/12/28) [19] 經濟部工商憑證, 2011, http://web.customs.gov.tw/public/attachment/211291035171.pdf (查詢日期:2013/12/28) [20] 財政部新聞稿 - 善用工商憑證,網路申報方便安全又快速, 2009, http://www.mof.gov.tw/ct.asp?xItem=54790&ctNode=407&mp=1 (查詢日期:2013/12/28) [21] iThome 技術專題 - 政府廣發工商憑證,企業線上交易如何運用?, 2009, http://www.ithome.com.tw/itadm/article.php?c=57185&s=2 (查詢日期:2013/12/28) [22] 工商憑證之網路商店身分認證平台, https://eshopid.g2b.net.tw/SIDP/ (查詢日期:2013/12/28) [23] 李駿偉,陳姿樺,謝東明, '以工商憑證實現網路商店身分認證系統',資訊安全通訊18 卷 2 期, p92-113, 2012 [24] 賴韋誠, '基於NFC與RFID之所有權證明及移轉系統實作', 中興大學資訊科學與工程碩士論文, 2012. [25] EE Times Asia, 'NFC delivers intuitive, connected consumer experience', http://www.eetasia.com/ARTICLES/2006MAY/PDF/EEOL_2006MAY01_STECH_RFD_TA.pdf?SOURCES=DOWNLOAD (查詢日期:2014/03/31) [26] mf1s703x Datasheet, http://www.datasheetlib.com/datasheet/953744/mf1s703x_nxp-semiconductors.html (查詢日期:2014/03/31) [27] J. Saito, K. Imamoto, K. Sakurai, 'Reassignment scheme of an RFID tag's key for owner transfer', Embedded and Ubiquitous Computing - Euc 2005 Workshops, Proceedings, vol. 3823, pp. 1303-1312, 2005. [28] D. Molnar, A. Soppera, D. Wagner, 'A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags', Selected Areas in Cryptography, vol. 3897, pp. 276-290, 2005. [29] X. Wang, C. W. Yuan, 'Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanism', Iet Information Security, vol. 8, pp. 161-170, 2014.(No) [30] S. Kardaş, S. Celik, A. Arslan, A. Levi, 'An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer', Lecture Notes in Computer Science, vol. 8162, pp. 130-141, 2013.(NO) [31] C. L. Chen, C. F. Chien, 'An Ownership Transfer Scheme Using Mobile RFIDs', Wireless Personal Communications, vol. 68, pp. 1093-1119, 2013.(Both) [32] G. Kapoor, S. Piramuthu, 'Single RFID Tag Ownership Transfer Protocols', Ieee Transactions on Systems Man and Cybernetics Part C-Applications and Reviews, vol. 42, pp. 164-173, 2012.(Both) [33] J. Munilla, F. C. Guo, W. Susilo, 'Cryptanalaysis of an EPCC1G2 Standard Compliant Ownership Transfer Scheme', Wireless Personal Communications, vol. 72, pp. 245-258, 2013.(No) [34] R. Doss, W. L. Zhou, S. Yu, 'Secure RFID Tag Ownership Transfer Based on Quadratic Residues', IEEE Transactions on Information Forensics and Security, vol. 8, pp. 390-401, 2013.(No) [35] G. Kapoor, S. Piramuthu, 'Vulnerabilities in some recently proposed RFID ownership transfer protocols', IEEE T Communications Letters, vol. 14, pp. 260-262, 2010. [36] J. Munilla, A. Peinado, G. Yang, W. Susilo, 'Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model', IACR Cryptology ePrint Archive, vol.2013, 2013. [37] G. Kapoor,W. Zhou, and S. Piramuthu, 'Multi-tag and multi-owner RFID ownership transfer in supply chains', Decision Support Systems, vol. 52, pp.258-270, 2011.(8) [38] B. Y. Song and C. J. Mitchell, 'Scalable RFID security protocols supporting tag ownership transfer', Computer Communications, vol. 34, pp.556-566, 2011.(5) [39] P. Peris-Lopez, J. C. Hernandez-Castro, J. M. E. Tapiador, T. Y. Li, and Y. J. Li, 'Vulnerability analysis of RFID protocols for tag ownership transfer', Computer Networks, vol. 54, pp. 1502-1508, 2010.(7) [40] M. H. Yang and H. Y. Hu, 'Protocol for ownership transfer across authorities with the ability to assign transfer target', Security and Communication Networks, Vol.0, 2011.(15) [41] N.W. Lo and K.H. Yeh, 'Mutual RFID Authentication Scheme for Resource-constrained Tags', Journal of Information Science and Engineering, Vol. 26, pp. 1875-1889, 2010.(19) [42] M. H. Yang, 'Across-authority lightweight ownership transfer protocol', Electronic Commerce Research and Applications, vol. 10, 2011.(13) [43] Y. J. Zuo, 'Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags', Hawaii International Conference on System Sciences, pp. 1-10, 2010.(20) [44] Flavio D. Garcia, Gerhard Koning Gans, Ruben Muijrers, Peter Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs, 'Dismantling MIFARE Classic', In: Jajodia, S., Lopez, J.(Eds.) ESORICS 2008. LNCS, vol. 5283, pp. 97–114, 2008.
摘要: Because of the mature of RFID technology and low cost of RFID tags, more and more companies start using RFID tag with their products to manage supply chain efficiently. As the result, some related topic like ownership transfer in RFID has become a popular topic in literatures in recent year. In this paper, RFID tag can be seen as electronic warranty when the product with RFID tag transferred in supply chain. The signature which generated by manufacturer and retailer are store in RFID tag. Therefore, the owner can prove his ownership by verifying the signature in the electronic warranty before the product is sold. In order to commercialize this system instantly, we design an APP, which can use in B2B, B2C and C2C commercial mode, to transfer ownership in supply chain, and help manufacturer and retailer produce signature by using MOEACA. We also propose an application in Second-Hand purchase environment that seller can prove the ownership first to buyer before selling the product. It can not only increase the online purchasing but also reduce the probability of online fraud.
隨著RFID技術日漸成熟,RFID電子標籤成本越來越低,有越來越多的企業將商品嵌入RFID,提高供應鏈上的管理效率,因此也越來越多學者對商品在RFID環境下的所有權移轉模式進行探討。 本篇論文基植於所有權移轉系統實作上,當商品嵌入了RFID電子標籤在商品供應鏈上進行移轉,電子標籤被視作為電子保固書的載體,內部儲存了商品製造商及零售商在製造和銷售時所做出的簽章,因此電子保固書在商品移轉前可以驗證簽章的真偽性提供所有權證明的功能,為了讓這項系統能夠立即商品化,本論文提出利用工商憑證來協助產生製造商及零售商在電子保固書上寫入的簽章內容,在這系統中開發B2B、B2C、C2C這三種交易模式下,能夠在供應鏈上進行所有權移轉所使用的APP。由其是電子保固書具有所有權證明的功能,在本論文中設想了可以運用的環境,提出一個方法將這項功能套用在C2C網路拍賣交易之前,讓賣家提出他要販售物品的所有權證明,透過證明商品的所有權,便可以提高消費者的的購買意願,並減少網路詐騙發生的機會。
URI: http://hdl.handle.net/11455/90803
其他識別: U0005-0807201413500400
文章公開時間: 2016-07-14
Appears in Collections:資訊科學與工程學系所

文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.