**1. Introduction**

Radio Frequency identification (RFID) is the popular wireless induction system [1-7]. The same as the general bar code identification, each RFID tag in an RFID system is assumed that equips a unique ID (UID) itself. A standard RFID system is consisted of Tag, Reader, and Application. When an independent RFID tag approaches the RFID antenna, the induc‐ tion between RFID tag and antenna happens. The RFID antenna reads the information and content recorded in the tag. Then the information is translated into the computational data by the RFID reader. Due to the portable RFID tag and untouched data transmission, many local or small area wireless applications for track and trace based on RFID systems were proposed.

RFID today is the popular wireless induction system [2-3,8-11]. Each RFID tag in RFID sys‐ tem is given a unique ID (UID) which records the on demand information. When an inde‐ pendent RFID tag approaches the RFID antenna, the induction between RFID tag and antenna happens. The information and content recorded in the tag is transmitted to the RFID antenna and translated into the computational data. Following up the data translation, the tag recognition can be completed and related applications are provided.

The RFID applications about agriculture that are now in widespread use such as the Animal Identification, the Product Record, and the Manufacturing process management. First, users identify products or materials via the tag and the reader of RFID system, and followed that recorded the data of products or materials on database in foregoing proposals. In a subse‐ quent process, an especial function chose some suitable data from databases for analyzing, integration and description. This process helps users to understand the position and situa‐ tion about products or materials. Therefore, by using the RFID, the main contributions in ag‐ riculture can be described as follows:

© 2013 Jian and Wu; licensee InTech. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. © 2013 Jian and Wu; licensee InTech. This is a paper distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**1.** The data of manufacturing record was transformed from artificial process to electrical process.

considered as the hardware/software encryption/decryption key corresponding to the files or applications. In the next section, we give some descriptions for related RFID applica‐

RFID Applications and Challenges http://dx.doi.org/10.5772/53368 3

Some researchers presented that the embedding RFID can be plugged into a small device such as handheld host [1]. The handheld device users can plug in the SD or CF interface of reader card. Hence, the users can scan and induct the RFID tag everywhere. In other words, to integrate the RFID system hardware into the mobile devices is practicable. Furthermore, the RFID system including RFID induction antenna, RFID parser and reader, RFID tag, etc., today is cheap. In addition, the RFID hardware including antenna and reader is not only cheap but also can be a PnP device. It means that the RFID hardware can be used as a nor‐

Since the RFID systems are popular and ripe for distinguishing treatment of individual tar‐ get [16, 17], the unique characteristic or identification of RFID can be the solution of intellec‐ tual property protection. Many researches proposed the possible way to protect the intellectual property, products, or applications. In some applications [18], the RFID chips are embedded in the cap of bottle. The medicine can be differentiated between fake and true. In addition, the RFID chip can be placed in the CD or DVD disk. The CD-ROM can accesses and reads the information of the RFID for valid identification check. Only the CD or DVD with the authorized RFID can be played. Although the content is protected, the self-made content that burned in the CD-R/RW or DVD-R/RW may not provide the authorized RFID information. In other words, the private, non-business, or free digital content made by the individual may be limited and cannot be transmitted free. In addition, even the CD or DVD disks are protected, the digital content such as files or data still can be copied from the disk to other devices such as hard disc or MP3 player. Therefore, how to separate the right of the digital content for each user and how to protect the digital content from illegal use become

Due to the demand of existed system integration, some applications related to *RFID Encryp‐ tion and Decryption for Intellectual Property Protection* includes: PnP Middleware, RFID Hard‐ ware, End User RFID Device and End User RFID Tag, and Encryption/Decryption

For a normal user, there are two types of RFID devices for the encryption/decryption on RFID system (E/DonRFID system): End User RFID Device for digital content or multimedia

information gaining, and End User RFID Tag for indentifying the legal user.

**2.1. RFID encryption and decryption for intellectual property protection**

tion and system.

*2.1.1. Application*

the important issues.

Procedure. The system framework is shown as follows.

**2. Related application and system**

mal user device such as the card-reader.


Many tracking applications based on ubiquitous computing and communication technolo‐ gies have been presented in recent years such as RFID systems [4,5,7]. Therefore, RFID can be used to trace objects and asset worldwide. In addition, some warehouse systems or sup‐ ply chain management systems can be combined with RFID to form goods tracking systems. The tracking systems help enterprises to manage their raw materials and products that re‐ duce the cost of operation budget. However, more and more applications of RFID system that were introduced by people, and that the agriculture is the one of them.

Due to the popularity of RFID, many local or small area wireless applications were also pro‐ posed. The RFID tags were proposed to be used in hospital or health care [12-15]. Patients should always wear the RFID tag is designed for identification. The patient's current loca‐ tion and condition is monitored every time and everywhere within the hospital. It means that patients are under cared even an emergency state happens. Some entrance guard sys‐ tems are also based on RFID system. The RFID ticket or RFID card [2, 3, 8, 10] is used to identify that a user is legal or not. According to the short-distance wireless signal, the RFID tag users can be monitored within the specific area. In other words, the RFID systems are generally used to be the hardware identification in many applications. In opposition to us‐ ing the RFID system as the hardware identification, many software applications adopt soft‐ ware encryption as the identifications to protect the intellectual property of the applications or files. Considering the serious situations of pirate, intellectual property protection is im‐ portant and becomes a famous issue.

Password protection is the popular encryption method to protect the applications. Each ap‐ plication or file of software is assigned an on demand given serial numbers or calculation function. People who use this application have to input the correct serial number then ena‐ ble the application. Considering today's applications, personal multimedia services or soft‐ ware applications are popular. Customers use the personal multimedia devices such as MP3, PDA, iPod, Laptop, etc., to download the multimedia or application files from the server or website via Internet. In other words, many files or data are disseminated and ex‐ changed via Internet. In addition, many hackers can crash the software encryption with few‐ er costs (Only program tools or applications needed). It makes that the piratical files are transmitted widely and the protection of intellectual property exists in name only.

For the purpose that the right of intellectual property and the right of the valid users are further protected and maintained, integration of the software and hardware encryption is needed. Since each RFID tag with a unique ID (UID) which records the on demand infor‐ mation can be used as the individual identification, the small and cheap RFID tag can be considered as the hardware/software encryption/decryption key corresponding to the files or applications. In the next section, we give some descriptions for related RFID applica‐ tion and system.
