CN100501758C - Communication method for reader and tag in RFID system - Google Patents

Communication method for reader and tag in RFID system Download PDF

Info

Publication number
CN100501758C
CN100501758C CNB2006100872265A CN200610087226A CN100501758C CN 100501758 C CN100501758 C CN 100501758C CN B2006100872265 A CNB2006100872265 A CN B2006100872265A CN 200610087226 A CN200610087226 A CN 200610087226A CN 100501758 C CN100501758 C CN 100501758C
Authority
CN
China
Prior art keywords
label
reader
state
instruction
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB2006100872265A
Other languages
Chinese (zh)
Other versions
CN101089872A (en
Inventor
王宏刚
周丽敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Intelligent IoT Technology Co Ltd
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CNB2006100872265A priority Critical patent/CN100501758C/en
Priority to PCT/CN2006/003740 priority patent/WO2007147306A1/en
Publication of CN101089872A publication Critical patent/CN101089872A/en
Application granted granted Critical
Publication of CN100501758C publication Critical patent/CN100501758C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer

Landscapes

  • Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Near-Field Transmission Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A communicating method between reader and countermark in RFID system includes detecting whether there is countermark in operation region or not by reader, changing relevant flag bit of detected countermark according to command parameter of reader, querying selected countermark by reader, switching unique countermark in reader at one moment, carrying out right certification by reader and countermark with each other then carrying out write/read operation on countermark by reader.

Description

The communication means of reader and label in a kind of rfid system
Technical field
The present invention relates to the radio RF recognition technology field, the communication means of reader and label in particularly a kind of rfid system.
Background technology
In article identification, the use of bar code is very general, because it has very low cost, however but very restricted, such as the influence that is subjected to light, spot, shelter etc.The appearance of RFID technology has overcome these shortcomings fully, and RFID can discern single very concrete object, also can distinguish a plurality of objects simultaneously.
Rfid system can be made up of reader and an electronic tag at least one.Communicate by wireless mode between reader and the label.Reader can send interrogating signal and read relevant information from label to label.Along with the development of RFID technology, label from read-only little memory space constantly to writing large buffer memory development.Label can be divided into active label (active tag) and passive label (passive tag), and active label inside has power supply, can be initiatively and reader communication; The inner non-transformer of passive label is drawn electric energy from the electromagnetic wave that reader is issued, as the power supply of its work, and in the mode of back reflection, relevant information is sent to reader, finishes the communication of label to reader.
At present, the RFID technology is in the critical stage that international standard forms, and the standard about ultrahigh frequency (Ultra-high frequency is hereinafter to be referred as UHF) RFID air interface mainly contains two standards in the world: EPCglobal GEN2 and ISO 18000-6.EPCglobal GEN2 is the second generation UHF air-interface standard (being called for short GEN2) that non-commercial standardization body-global product electronic code (Electronic Product Code is hereinafter to be referred as EPC) administrative center (being called for short EPCglobal) formulates.In GEN2; in the communication process of reader and label; decided justice with regard to reader three process: Select (selection), Inventory (checking), Access (visit); corresponding tag state is Ready (ready), Arbitrate (arbitration), Reply (replying), Acknowledged (affirmation), Open (opening), Secured (protection), Killed (killing), and whole communication process is finished between these operations and state.The design of GEN2 is to center on reading of EPC sign indicating number, and the information and the mutual consideration thereof of carrying other type for label are not enough.The effect that is simple and easy to realize has been played in three operating process of reader, but comparatively speaking, tight inadequately on functional mechanism, such as, security mechanism, there are 16 at random or the proof procedure of pseudo-random data (RN16), but do not consider there is not the space of technology upgrading fully from mechanism yet.Distinct inadequately on the corresponding relation of the state of the operating process of reader and label.In GEN2, there be not the power saving of consideration for handheld terminal.
Summary of the invention
The present invention is to propose a kind of efficient, safe communication method that is used between reader and a plurality of label at these problems just, make between reader and the label communicate by letter more perfect and powerful on framework and mechanism, make the state transitions of label more flexible, corresponding clearer and more definite with the operating process of reader, help promoting the performance of RFID comprehensively.
In view of above-mentioned, the object of the present invention is to provide the communication means between the reader and label in a kind of rfid system, provide the framework of communicating by letter between a kind of new reader and the label and new functional mechanism in the method, it comprises the steps:
The first step, when label enters effective radio frequency active region, after perhaps reader entered label and has the district, reader sent detection signal, carries out detecting operation, so that whether label is arranged in the surveyed area exists:
When label existed, label powered on, and sent response signal simultaneously, and entered ready state, carried out for second step;
Do not have label to exist if response is just thought, reader no longer carries out other operation;
Second step, the corresponding zone bit of parameter change that the selection operation that above-mentioned detected responding tags is sent according to reader instructs, selected label changes selection mode over to;
In the 3rd step, reader carries out query manipulation to above-mentioned selected label;
The 4th step, above-mentioned selected label responds the query manipulation instruction of reader, as the label of a plurality of selection modes during simultaneously at same channel response, above-mentioned these labels enter arbitrate state, utilize the method for arbitration, unique tags is inserted reader a moment, and this moment, reader carried out access operation;
The 5th step, after unique tags inserts successfully, reader carries out authentication operations to label, after authentication is passed through, send the instruction that has key, request label authentication to label, this moment, label was in authentication status, after label is received the instruction of reader requests authentication, it is carried out authentication, change open state over to by the back label; When not needing authentication between reader and the label, omit this step, directly went into for the 6th step by the 4th stepping;
In the 6th step, after the label that inserts reader entered open state, reader was operated label, comprised to read child-operation, write child-operation and " killing " child-operation; Reader can be selected the mode of operation to label:
If reader is selected read operation, at first send instruction, label changes read states over to after instruction is verified, and reader carries out read operation to label afterwards; Here read operation can be a plurality of different read operations, by the key difference of different rights in reading instruction, after the label checking instruction, sends the information of reader demand to reader;
If reader is selected write operation, at first send instruction, label changes the state of writing over to after instruction is verified, and reader carries out write operation to label afterwards, and write operation can be a plurality of different write operations here, by the key difference of different rights in the write command;
When the reader selection was carried out " killing " operation to label, reader sent the instruction that has key, and label changes the state of killing over to after instruction is verified.
Further, when reader carries out query manipulation to selected label in above-mentioned the 3rd step, by instruction selected label is carried out initialization, and initiate to check, check and be meant that the selection label arrives the whole process to the EO of label.
Further, when the authentication success, reader is the unique identification sign indicating number of reading tag at first, as identify label in above-mentioned the 5th step.
Further, label is under open state in above-mentioned the 6th step, different operating instruction according to reader, selection enter label read states, write state or kill state, remove the situation of outage, be in read states and can return open state or directly enter the state of killing by the reader instruction with the label of writing state.
Further, in above-mentioned the 6th step label at open state, read states, write state and kill when shifting between the state, need by other key authentication of different rights level in the reader instruction.
Further, label can not be again to other any state transitions under the state of killing.
Further, label is under any one state, after outage, must restart from ready state.
Further, when mistake appears in label under arbitration, authentication and open state, change ready state automatically over to; When label in reading and writing with kill under the state and to occur changing open state automatically over to when wrong.
Below in conjunction with accompanying drawing, concrete enforcement of the present invention is described in further detail.For those skilled in the art that, from the detailed description to the inventive method, above-mentioned and other purposes of the present invention, feature and advantage will be apparent.
Description of drawings
The operating process figure of reader among Fig. 1 the present invention.
The state transition diagram of label among Fig. 2 the present invention.
The communication process figure of reader and label among Fig. 3 the present invention.
Embodiment
Below in conjunction with accompanying drawing concrete enforcement of the present invention is described in detail below.
(logic) operation and the defined declaration thereof of the reader that the present invention relates to as shown in Figure 1, are as follows:
S0: detect (being Detection)
After reader entered a perform region, reader sent one and detects instruction, and whether be used for has label to exist in the surveyed area.
S1: select (being Selection)
Reader is selected the label in the effective coverage by certain instruction and is classified.Here allow to use a plurality of selection instructions that label is repeatedly selected, until finishing the preset selection task.
S2: inquiry (being Query)
Reader is inquired about selected label, and here reader carries out initialization by instruction to selected label, and initiates to check.Checking here is meant from being chosen to the whole process to the EO of label.
S3: insert (being Access)
If there are a plurality of labels to respond at same channel, will bump, at this moment will take certain referee method to avoid a conflict, to guarantee that unique tags successfully inserted a moment.
S4: authentication (being Authentication)
Reader and label both sides authenticate to after the legal identity mutually by certain authentication mechanism, have just set up a safe communication link between reader and the label.
S5: operation (being Operation)
Reader comprises S5R to the operation of label: read (Read) child-operation, and S5W: write (Write) child-operation and S5D: " killing " child-operation.
As shown in Figure 2, the tag state and the defined declaration thereof that the present invention relates to are as follows:
S6: ready (being Ready)
Ready state can be counted as a waiting status, does not also accept any read-write operation of reader in order to represent one, does not yet enter a state of checking the label that has powered on of process.After a label entered the radio frequency active region, except the state of killing, power down just changed this state over to.Label can keep this state always, receives selection instruction from reader until it.
S7: select (being Selection)
Before reader is checked label, can select according to demand label, when reader sends selection instruction, responding tags changes selection mode automatically over to, produce the corresponding sign of selecting simultaneously, promptly change corresponding marker bit, the label that only enters this state just can enter arbitrate state, responds follow-up query statement.
S8: arbitration (being Arbitration)
Arbitrate state is a hold mode, is used to represent that those participate in the current process of checking, but does not also obtain an available channel and the label of unique access reader.The label that is in this state can receive that reader sends variously is used to realize the instruction arbitrated, just leaves this state when successfully inserting, and enters authentication status.
S9: authentication (being Authentication)
After label was successfully inserted, except power down or Dead state, label entered authentication status.Under this state, the various instructions that are used for authentication that label response reader is sent are legal with the identity that guarantees both sides, could set up the safe communication link, make that follow-up information interaction is safe.
S10: open (being Open)
After label and the success of reader mutual authentication, label enters open state.Under this state, label is selected to enter reading and writing or kill state according to the different instruction of reader.Remove outage or kill state, the label that is in the read and write state can return open state by the reader instruction.
S11: read (being Read)
After label enters open state, can enter this state according to the instruction of reader.Under this state, the have the right relevant information of reading tag of reader for the information of zones of different, needs with different instructions, and these have the key that difference reads authority in instructing.Under this state, can change over to according to the different instruction of reader and write or kill state, or return open state.
S12: write (being Write)
After label enters open state, can enter this state according to the reader instruction.Under this state, reader has the right label is carried out write operation.Write operation for zones of different needs different instruction, has the key of different write permissions in these instructions, to finish different write operations.Under this state, label can change over to according to different instructions to be read and kills) state, or return open state.
S13: kill (being Dead)
After label enters open state, can enter this state according to the reader instruction.Under this state, label no longer responds any other instruction of reader, and can be called is the state of killing.Under this state, label can not shift down to other any state again.
As shown in Figure 3, the detailed process of the communication means of reader provided by the invention and label comprises the steps:
First step reader detects the perform region, place, and whether detect has label to exist
When label enters effective radio frequency active region, after perhaps reader enters label existence district, reader carries out as the SO among Fig. 1: detect (Detection) operation: at first send detection signal by reader, such as a specific continuous carrier, label carries out demodulation to its signal, and back reflection goes out a specific response signal, guarantees that reader can determine the existence of label, i.e. S14 to S15 among Fig. 3.When label existed, label powered on, and sent response signal simultaneously, and entered as S6 among Fig. 2: ready (Ready) state, i.e. S15 to S16 among Fig. 3.
The second step reader is selected detected pre-communication tags
When having detected label and exist, label is selected, i.e. S16 to S17 among Fig. 3.This moment, reader carried out the S1 among Fig. 1: select (Selection) operation.Label is according to the corresponding zone bit of the parameter change of selection instruction, and changes the S7 among Fig. 2 over to: select (Selection) state.More particularly, here reader can be selected the label in the effective coverage and classifies by one or more selection instructions.This instruction can comprise information specific in instruction, select label by parameter.Can comprise a specific sequence in this instruction, and the specific part of canned data carries out logical operation in appointment and the label, and identifies with the part that this result changes label, to reach the purpose of selection.Such as in instruction, comprising information sequence 101010, and be used to select certain section label that canned data is identical with it of label.In concrete the application, such as, in the warehouse, certain based food of selecting certain all authorized manufacturers to produce, reader can require to match in instruction, and then identify this class article, so that subsequent operation according to the pairing coding characteristic of these features so.
The 3rd step reader is inquired about selected label
Reader carries out S2 among Fig. 1 to selected label: inquiry (Query) operation, i.e. S18 to S19 among Fig. 3.And selected label is carried out initialization, and begin to check label by certain instruction.
The 4th step label inserts reader
Selected label responds the query statement of reader,, will clash during simultaneously at same channel response as a plurality of labels, at this, can adopt certain referee method, such as avoiding conflict with the ALOHA algorithm.This moment, label was in the S8 among Fig. 2: arbitration (Arbitration) state.After arbitration, the S3 that this moment, reader carried out among Fig. 1 inserts (Access) operation, unique label is inserted reader a moment, i.e. S19 to S20 among Fig. 3.
The 5th step reader and label mutual authentication
After unique tags inserted successfully, reader carried out authentication to label, after authentication is passed through, sent the instruction that has key to label, request label authentication, i.e. S20 to S21 among Fig. 3.At this moment, reader be operating as S4 among Fig. 1: authentication (Authentication), label is in the S9 among Fig. 2: authentication (Authentication) state.Label carries out authentication to it after receiving the instruction of request authentication, by after change S10 over to: open (Open) state, i.e. S21 to S22 among Fig. 3.After discerning legal identity mutually by authentication, reader is the legal unique identification sign indicating number of reading tag at first, as unique identification ISN (Unique identifier is called for short the UID sign indicating number).More particularly, can at first send an instruction of being with key, in instruction, comprise a random number simultaneously, after reader is received instruction, key be verified, after checking is passed through, return the random number of receiving such as label.After both sides authenticate to legal identity by certain authentication mechanism mutually, just set up a safe communication link between reader and the label.
The 6th step reader is read and write label
When label enters S10: behind open (Open) state, reader can be selected the mode of operation to label.If S5R among selection Fig. 1: read (Read) operation, at first send instruction, make label change S11 among Fig. 2 over to: to read (Read) state, reader carries out read operation to label afterwards, here read operation can be a plurality of different read operations, by the key difference of different rights in reading instruction, i.e. S22 to S23 among Fig. 3.After the label checking instruction, send the information of reader demand to reader, i.e. S23 to S24 among Fig. 3, such as, the EPC information of label, user profile etc.If reader is selected the S5W among Fig. 1: write (Write) operation, at first send instruction, make label change S12 among Fig. 2 over to: write (Write) state, reader carries out write operation to label afterwards, and write operation can be a plurality of different write operations here, key difference by different rights in the write command, be S24 to S25 among Fig. 3, such as, EPC information, user profile etc. can be rewritten by different instruction or parameter, for the rewriting of some important informations, need to have key in the instruction.When reader is selected S5D among Fig. 1: " killing " (Dead) when operate, the reader transmission has the instruction of key, and label is verified instruction, and changed over to as the S13 among Fig. 2: kill (Dead) state, this process is the S26 to S27 among Fig. 3.This operation can make label no longer respond any instruction.
In addition, opening under (Open) state, label can enter according to the reader Instruction Selection and read (Read), write (Write) and kill in (Dead) state any one, reading (Read), writing under (Write) state, can instruct mutual transition status according to reader, or change over to and kill (Dead) state, perhaps return open (Open) state.Kill (Dead) state when entering after, label no longer changes other state over to.In a specific application scenario, not all must carry out read operation or write operation or carry out read-write operation simultaneously, so can select to all labels.Such as, in the Item Management process in supermarket or warehouse, article are that the unique identity code (Identification is hereinafter to be referred as ID) by label attached to it goes to discern, the ID of this label reserves in advance, and is unique.Management process to article, be to serve as theme with the management of ID, like this in management system based on RFID, real-time existing article are monitored of database meeting on backstage, such as, when article when newly advancing article, must read its Item Information, as title, material, size, shelf-life, storage environment or the like.When these article after long-term storage, such as, adjust its price, so when with label set up communicate by letter after, just can directly carry out write operation, rewriting pricing information memory block.When the article storage time greater than the shelf-life after, directly it is carried out " killing " operation, and does not need to enter again other state of operation.Because these monitorings are ready-made in advance in background data base.
In the present invention, the 5th step can not use when system design, promptly can allow directly to enter for the 6th step from the 4th step.Such as on the production line of factory, be not have danger to the identification of product, therefore, it can be omitted for raising the efficiency.But if be used for gate control system, then to pay attention to the communication security of its system, keep for the 5th step.
In the present invention, state shown in Figure 2 is a kind of logic state of label, and each logic state may corresponding a plurality of physical states.Such as in arbitration (Arbitration) state,, can produce a plurality of physical responses states according to response to different instruction.Such as, writing under (Write) state,, have different physical states according to the different content that writes.Label is under any one state, after power down, must restart from ready (Ready) state.When label mistake occurs under arbitration (Arbitration), authentication (Authentication) and open (Open) state, change ready (Ready) state automatically over to.Reading (Read), writing (Write) and kill under (Dead) state and mistake occurs when label, changing open (Open) state automatically over to.
More than describe embodiments of the present invention in detail, but the example of this imagery of just lifting for the ease of understanding should not be considered to be limitation of the scope of the invention.Equally; the ordinary skill of technical field all can be according to the description of technical scheme of the present invention and preferred embodiment thereof under any; make various possible being equal to and change or replacement, but all these changes or replacement all should belong to the protection domain of claim of the present invention.

Claims (7)

1, the communication means of reader and label in a kind of rfid system, it comprises the steps:
The first step, when label enters effective radio frequency active region, after perhaps reader entered label and has the district, reader sent detection signal, carries out detecting operation, so that whether label is arranged in the surveyed area exists:
When label existed, label powered on, and sent response signal simultaneously, and entered ready state, carried out for second step;
Do not have label to exist if response is just thought, reader no longer carries out other operation;
Second step, the corresponding zone bit of parameter change that the selection operation that above-mentioned detected responding tags is sent according to reader instructs, selected label changes selection mode over to;
In the 3rd step, reader carries out query manipulation to above-mentioned selected label;
The 4th step, instruction responds above-mentioned selected label to the query manipulation of reader, and during simultaneously at same channel response, above-mentioned these labels enter arbitrate state as a plurality of labels, utilize referee method that unique tags is inserted reader a moment, this moment, reader carried out access operation;
The 5th step, after unique tags inserts successfully, reader carries out authentication operations to label, after authentication is passed through, send the instruction that has key, request label authentication to label, this moment, label was in authentication status, after label is received the instruction of reader requests authentication, it is carried out authentication, change open state over to by the back label; When not needing authentication between reader and the label, omit this step, directly went into for the 6th step, and label directly changes open state over to by the 4th stepping;
In the 6th step, after the label that inserts reader entered open state, reader was operated label, comprised to read child-operation and write child-operation, " killing " child-operation; Reader can be selected the mode of operation to label:
If reader is selected read operation, at first send instruction, label changes read states over to after instruction is verified, and reader carries out read operation to label afterwards; Here read operation can be a plurality of different read operations, by the key difference of different rights in reading instruction, after the label checking instruction, sends the information of reader demand to reader;
If reader is selected write operation, at first send instruction, label changes the state of writing over to after instruction is verified, and reader carries out write operation to label afterwards, and write operation can be a plurality of different write operations here, by the key difference of different rights in the write command;
When the reader selection was carried out " killing " operation to label, reader sent the instruction that has key, and label changes the state of killing over to after instruction is verified.
2, method according to claim 1, when it is characterized in that reader carries out query manipulation to selected label in above-mentioned the 3rd step, by instruction selected label is carried out initialization, and initiate to check, check and be meant from selecting label to whole process to the EO of label.
3, method according to claim 1 is characterized in that in above-mentioned the 5th step that reader is the unique identification sign indicating number of reading tag at first, as the identify label of label in authentication when success.
4, method according to claim 1, it is characterized in that label is under open state in above-mentioned the 6th step, different operating instruction according to reader, selection enter label read states, write state or kill state, remove the situation of outage, be in read states and can return open state or directly enter the state of killing by the reader instruction with the label of writing state.
5,, it is characterized in that label can not be again to other any state transitions under the state of killing according to claim 1 or 4 described methods.
6, method according to claim 1 is characterized in that label is under any one state, after outage, must restart from ready state.
7, method according to claim 1 is characterized in that changing ready state automatically over to when mistake appears in label under arbitration, authentication and open state; When label in reading and writing with kill under the state and to occur changing open state automatically over to when wrong.
CNB2006100872265A 2006-06-13 2006-06-13 Communication method for reader and tag in RFID system Active CN100501758C (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNB2006100872265A CN100501758C (en) 2006-06-13 2006-06-13 Communication method for reader and tag in RFID system
PCT/CN2006/003740 WO2007147306A1 (en) 2006-06-13 2006-12-30 A communication method between reader and label in the rfid system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2006100872265A CN100501758C (en) 2006-06-13 2006-06-13 Communication method for reader and tag in RFID system

Publications (2)

Publication Number Publication Date
CN101089872A CN101089872A (en) 2007-12-19
CN100501758C true CN100501758C (en) 2009-06-17

Family

ID=38833057

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2006100872265A Active CN100501758C (en) 2006-06-13 2006-06-13 Communication method for reader and tag in RFID system

Country Status (2)

Country Link
CN (1) CN100501758C (en)
WO (1) WO2007147306A1 (en)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101470795B (en) * 2007-12-27 2012-04-25 华为技术有限公司 Communication method and apparatus in wireless radio frequency recognition system
TWI455037B (en) 2008-09-12 2014-10-01 Mstar Semiconductor Inc Controlling method for rfid tag and rfid system thereof
CN101685494B (en) * 2008-09-25 2014-04-16 晨星软件研发(深圳)有限公司 Control method of radio frequency identification tag and radio frequency identification system using same
CN101751540B (en) * 2008-12-09 2012-02-22 晨星软件研发(深圳)有限公司 Method for processing work together by utilizing radio frequency identification label and system
CN102043934B (en) * 2009-10-12 2014-12-10 中兴通讯股份有限公司 Radio frequency identification system and operating method thereof
CN102081744A (en) * 2009-11-30 2011-06-01 中兴通讯股份有限公司 Path identification system and secure interaction method thereof
WO2012027898A1 (en) * 2010-09-02 2012-03-08 北京智捷通科技发展有限公司 Method and device for radio frequency identification(rfid) access control
CN101976365B (en) * 2010-11-05 2012-09-19 中国航天科工集团第二研究院七○六所 Safe radio frequency identification system
CN102122340A (en) * 2010-11-16 2011-07-13 北京中电华大电子设计有限责任公司 Method for preventing radio from being exposed in radio frequency identification system
HK1145128A2 (en) * 2010-11-25 2011-04-01 Kwai Sang Danny So Device and method for detecting water level, and device adapted for such method and container adapted for such device
CN102087697B (en) * 2011-02-25 2013-08-14 深圳市中兴长天信息技术有限公司 Data transmission method of reader and wireless tags
CN102129541B (en) * 2011-03-01 2015-04-01 中国电子技术标准化研究所 Radio frequency identification system, reader-writer, tag and communication method
CN102169537B (en) * 2011-04-07 2014-03-26 工业和信息化部电子工业标准化研究所 Method for processing security information data received by electronic tag
CN102682313B (en) * 2011-06-10 2015-08-19 中国人民解放军国防科学技术大学 The communication means of read write line and label in radio-frequency recognition system
CN102314585A (en) * 2011-07-22 2012-01-11 上海聚星仪器有限公司 Method suitable for testing secure communication of radio frequency identification tag
CN103164718B (en) * 2011-12-13 2016-10-05 天津中兴智联科技有限公司 RF identification exchange method and radio-frequency recognition system
CN102510348A (en) * 2011-12-27 2012-06-20 杭州电子科技大学 Real-time self-adaptive detecting and processing method for radio frequency identification devices (RFID) super-concurrent signal
CN103379487B (en) 2012-04-11 2018-08-24 西安西电捷通无线网络通信股份有限公司 Air-interface security method and apparatus
CN104091184B (en) * 2014-06-16 2017-09-15 上海实甲智能系统有限公司 Electronic label detecting method and system
CN106228211B (en) * 2016-07-25 2020-06-19 吕永根 Target searching system and searching method thereof
CN106408673A (en) * 2016-08-26 2017-02-15 天津七二通信广播股份有限公司 Vehicle-mounted unit applied to path identification system and safe method of vehicle-mounted unit
US10474938B2 (en) * 2017-04-24 2019-11-12 Flockstock Pty Ltd Inventory management system
CN108768464B (en) * 2018-04-08 2021-06-22 深圳市盛路物联通讯技术有限公司 Radio frequency data transmission method and system
CN110334553B (en) * 2019-05-08 2023-03-24 广东识芯微电子科技有限公司 Link method for radio frequency identification sensing data and sensing label node
CN112528688B (en) * 2019-09-19 2023-08-15 浙江悦和科技有限公司 Radio frequency tag control method, response method and device, storage medium, reader and radio frequency tag
CN114830600A (en) * 2020-02-22 2022-07-29 南京大学 Authentication method and device of passive RFID (radio frequency identification) tag
CN113496127A (en) * 2020-04-02 2021-10-12 太原理工大学 Method, device and storage medium for performing selection and write operations on multiple CRFID tags
CN116157800A (en) * 2020-08-18 2023-05-23 赤多尼科两合股份有限公司 Data calibration method and driver

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5963134A (en) * 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags
US20020038267A1 (en) * 2000-09-05 2002-03-28 Necmettin Can System and method for using radio frequency identification in retail operations

Also Published As

Publication number Publication date
CN101089872A (en) 2007-12-19
WO2007147306A1 (en) 2007-12-27

Similar Documents

Publication Publication Date Title
CN100501758C (en) Communication method for reader and tag in RFID system
US8717145B2 (en) RFID portal system with RFID tags having various read ranges
EP1677228B1 (en) Radio frequency identification (RFID) tag, portable terminal, and server for RFID tag
KR100721520B1 (en) Apparatus and Method for Information Protection of RFID System
US7982611B1 (en) Dealing with rogue RFID readers using reader attributes
US20080001724A1 (en) Using read lock capability for secure RFID authentication
US7663486B2 (en) RFID tag user memory indication
CA2325712A1 (en) Rfid tagging system for network assets
US20080129463A1 (en) RFID tag including ROM, method of impeding an RFID tag from being killed, and method of manufacturing an RFID tag
CN102122365A (en) Method for accessing label storage area in radio frequency identification system and label
CN102034068A (en) Method and system for access control of radio frequency identification tag
US9058551B2 (en) RFID tag and operating method thereof
US20210350092A1 (en) Control protocol for multi-protocol transponder
KR101112535B1 (en) Method for Authenticating RFID Readers by Using Flags in RFID Tag
US20150161421A1 (en) Apparatus and method for controlling supply of power to radio frequency identification tag
CN102708393B (en) Transponder, method and reader for monitoring access to application data in the transponder
JP2004248310A (en) Data processing method for rfid tag and interrogator (reader/writer)
CN103632173A (en) Tag access and access processing method and device
TWI695323B (en) Radio frequency identification reader
US20110215907A1 (en) Radio frequency identifcation (rfid) tag and operation method thereof, and system and method for controlling network access based on mobile rfid
US20210203483A1 (en) Secure rfid communication method
KR101018681B1 (en) System for Authenticating RFID Readers by Using Flags in RFID Tag
KR20060001122A (en) Rfid tag, and wireless identification method using the same
Nemade et al. Security Issues in RFID systems
CN104680206A (en) Access processing method for label

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20160909

Address after: 300308 Tianjin Airport Economic Zone, Binhai New Area seven East Road No. 2 Zhongxing Industrial Base

Patentee after: ZTE INTELLIGENT IOT TECHNOLOGY Co.,Ltd.

Address before: 518057 Nanshan District high tech Industrial Park, Guangdong, South Road, science and technology, ZTE building, legal department

Patentee before: ZTE Corp.

CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Room 401, building 12, east area, airport business park, No. 80, Huanhe North Road, free trade zone (Airport Economic Zone), Binhai New Area, Tianjin 300000

Patentee after: Gaoxing Zhilian Technology Co.,Ltd.

Address before: 300308, Zhongxing Industrial base, 2 East seven, Airport Economic Zone, Tianjin Binhai New Area

Patentee before: ZTE INTELLIGENT IOT TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Room 401, building 12, East Airport Business Park, 80 Huanhe North Road, Tianjin Binhai New Area pilot free trade zone (Airport Economic Zone)

Patentee after: Zte Intelligent Iot Technology Co.,Ltd.

Address before: Room 401, building 12, East Airport Business Park, 80 Huanhe North Road, Tianjin Binhai New Area pilot free trade zone (Airport Economic Zone)

Patentee before: Gaoxing Zhilian Technology Co.,Ltd.