RFID (Radio Frequency Identification) is a wireless communication technology, the radio signal can identify a specific target and to read and write data, and the establishment of contact between the mechanical or optical recognition system and without a specific target. RFID is an easy manipulation, simple and practical application flexibility and is particularly suitable for automation and control technology. Advantages of RFID technology A quick scan. For the purposes of the barcode can only scan a bar code; and a non-contact manner using RFID, non-directional requirements, labeling one into the magnetic field, the reader can instantly read the information, usually in a few milliseconds to complete a read and write, using anti-collision mechanism, such that it can simultaneously handle multiple labels, to achieve mass recognition, up to simultaneously identify up to 50 / s, and can be identified in the movement. 2, the volume size, shape diversification. RFID on the reading is not affected by the size and shape restrictions, without in order to read the accuracy and with a fixed size and print quality of the paper. In addition, RFID tags can go smaller and more diverse forms of development, to apply to different products. 3, contamination resistance and durability. Conventional bar code carrier is paper, and therefore susceptible to contamination, but the RFID of water, oil and chemicals and other substances having a strong resistance. In addition, because the bar code is attached to a plastic bag or on the packaging carton, it is particularly vulnerable to breakage; RFID tags are the data in the chip, it can be free from contamination. 4, can be reused. Today's bar code can not be changed after the printed up, RFID tags can be repeated to add, modify or delete data stored in the RFID tags, easy to update the information. 5, penetrating and no barriers to read. In the case of covered, RFID can penetrate paper, wood and other non-metallic or non-transparent plastic material, and capable of penetrating communicate. The bar code scanner at close range and there is no need to stop the situation under objects can only be legible barcode. 6, large memory capacity of the data. The capacity of the one-dimensional bar code 50B, a two-dimensional bar code can store a maximum capacity of 2 ~ 3000B, RFID has the greatest capacity to 294 or more. With the development of memory support, data capacity is also growing trend. Future articles will be required to carry the amount of information increases, the demand for labels that can expand capacity also increased. 7, safety. RFID is in accordance with international unified electronic product code encoding system cured at the factory in the chip, not repeated within 40 unique identification code, not copied and changed. Data can be encrypted, the sector can be independently locked at one time, and the user can lock the important information. The technology is difficult to counterfeit, invasion, make homemade chips safer. RFID system to be solved 1, RFID coding standard selection. There is no unified on electronic tags (RFID) standards worldwide. In terms of our standards, national standards committee has joint Science and Technology, Ministry of Information Industry and the Shanghai Institute of Standardization and other 14 units to study Chinese RFID standards, draft standards for animal RFID application has been completed by the Shanghai launched the "Animal electronic common technical specification label", but also just the initial formation of the specification, is still improving, but a short time in order to promote the country as well as a certain degree of difficulty. The RFID standards of animal husbandry in addition to other types of agricultural products remains to be studied. 2, RFID information security problems. RFID data security issues are also a compelling topic. As electronic tag save some data, so privacy has become a very important issue, and even affect key business applications promising. Since the electronic tag data is read by the reader can radiate radio frequency trigger, that is, as long as the reader of the same transmission frequency, i.e. the tag transponder will make the same reaction, transmit the same data, which will exploited by criminals. To solve this problem, it must be restricted to read the ID. The most successful approach is the use of encryption, encryption embedded in the electronic tags can be monitored in real-time data is written to the database. If some system parameters to work in a non-normal state, it must give a warning message in the interface, and the monitoring system regulation. To allow the user to facilitate observation and intuitive understanding, the acquired data needs to be converted into an intuitive, easy for the user to accept a form is displayed, in which data is represented in graphical form. VC in the GUI can easily support the achievement expressed graphically.