CN103702332A - Passive/semi-active RFID (radio frequency identification device) mobile terminal and network authentication method thereof - Google Patents
Passive/semi-active RFID (radio frequency identification device) mobile terminal and network authentication method thereof Download PDFInfo
- Publication number
- CN103702332A CN103702332A CN201310740989.5A CN201310740989A CN103702332A CN 103702332 A CN103702332 A CN 103702332A CN 201310740989 A CN201310740989 A CN 201310740989A CN 103702332 A CN103702332 A CN 103702332A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- passive
- route device
- active rfid
- half active
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a passive/semi-active RFID (radio frequency identification device) mobile terminal and a network authentication method thereof. A passive/semi-active RFID label is additionally arranged on a mobile terminal, and the information of the mobile terminal is read through a reader on a routing device. When the passive/semi-active RFID label and the mobile terminal contact each other in a short distance for a certain time, an RFID coil of the mobile terminal transmits an MAC (media access control) address of the mobile terminal to the routing device through an RFID, and the routing device receives the MAC address information of the mobile terminal through the RFID coil and takes the mobile terminal as an authorized user. According to the passive/semi-active RFID mobile terminal and the network authentication method thereof, users in a limited area can conveniently access a WiFi (wireless fidelity) network, and the working efficiency is improved.
Description
Technical field
The present invention relates to moving communicating field, relate in particular to a kind of passive/half active RFID mobile terminal and carry out the method for WiFi network authentication.
Background technology
WiFi is a kind of wireless technology of using morely now.Except in notebook computer, in many network equipments (all route devices and the switch of Cisco), also increased the ability of processing 802.11 agreements at present, just as processing, Ethernet is the same with IP convenient.
Now, many newly developed companies are advancing WiFi mesh network, and in it, AP is used as route device, automatically find each other, can pass through a few redirect sending services.But it is outdoor that mesh network structure is mainly designed for, between AP, require sighting distance, make them be more suitable for service provider, rather than enterprise.The mesh network systems of using in the building of Ye Youliang company's production at present.Zhe Liang company is Strix Systems and Firetide, and they use own proprietary AP connection protocol, but method is different.The AP of Strix comprise separately for mesh network agreement with for 802.11 wireless device, and the Special Equipment of Firetide is only supported its agreement.So Strix scheme is more suitable for new network, the scheme of Firetide is relatively applicable to have the enterprise of standardized A P.Also have some other manufacturers also to intend to provide WiFi mesh network systems, but the current also unrealized interoperability of their system.
Yet, in order to ensure the bandwidth of the user in opposed area, conventionally WiFi network is encrypted.Like this, people, before using WiFi network, or send appointment codes by mobile terminal and arrive assigned number, then return to password of user, or need to inquire the attendant in this region, obtain network cipher.And in order to prevent that network cipher from being stolen easily, the relative complex that often password arranges, from remember input all pretty troublesome.
Summary of the invention
In order to address the above problem, can easier carry out network authentication, even easier access WiFi, the present invention proposes a kind of passive/half active RFID (Radio Frequency Identification Devices, radio-frequency (RF) identification) mobile terminal and carry out method, mobile terminal and the route device of network authentication.
Therefore, according to one aspect of the present invention, a kind of passive/method of half active RFID network by mobile terminal authentication, it comprises the following steps:
When the mobile terminal with electronic tag enters the RFID magnetic field range with the route device of label reader, if described mobile terminal receives the first radiofrequency signal that described route device sends, to described route device, send the first response message;
Described route device is received after described the first response message, to described mobile terminal, launches the second radiofrequency signal, and described the second radiofrequency signal notifies described mobile terminal that the MAC Address of this mobile terminal is sent to described route device;
Described mobile terminal is received after described the second radiofrequency signal, the second response message that carries described mobile terminal MAC Address is sent to described route device;
Described route device obtains the MAC Address of mobile terminal from the second response message, and this MAC Address is added to white list.
Alternatively, also comprise the steps: to start timing after described route device is received described the first response message, if in the given time, described mobile terminal does not leave the RFID magnetic field range of described route device, and described route device is launched the second radiofrequency signal to described mobile terminal.
Alternatively, also comprise the steps: that described route device adds described MAC Address after white list, to described passive/half active RFID mobile terminal transmitting the 3rd radiofrequency signal, described the 3rd radiofrequency signal notify described passive/half active RFID mobile terminal authentication passes through.
Alternatively, also comprise the steps: when described passive/half active RFID mobile terminal receives after the first radiofrequency signal of described route device transmitting, opens WiFi function or prompting user opens WiFi function.
Alternatively, also comprise the steps: when described passive/half active RFID mobile terminal receives after the second radiofrequency signal of described route device transmitting, opens WiFi function or prompting user opens WiFi function.
Alternatively, also comprise the steps: when described passive/half active RFID mobile terminal receives after the 3rd radiofrequency signal of described route device transmitting, opens WiFi function or prompting user opens WiFi function.
Alternatively, described passive/MAC Address of half active RFID mobile terminal is stored in RFID memory module, or is stored in the memory module of described mobile terminal.
Alternatively, obtain authorize access WiFi passive/half active RFID mobile terminal is at interval of the fixed time or disconnect in the time of will using network after WiFi connects at every turn and all must again obtain mandate by close described route device, or have network authorization always.
Alternatively, the successful white list of described route device periodic cleaning RFID authentication, or a user by RFID authentication is as permanent user.
Alternatively, described network authentication refers to WiFi network authentication, described MAC Address refer to described passive/physical address number of half active RFID mobile terminal wireless network card.
As another aspect of the present invention, a kind of passive/half active RFID mobile terminal, it comprises:
Responder module, for after receiving radiofrequency signal, produces induced current;
RFID transceiver module, for receiving and dispatching radiofrequency signal;
WiFi module, for carrying out WiFi network service;
Control module, for when receiving that the second radio frequency disappears signal, launches the MAC Address of the mobile terminal of storage by a described RFID transceiver module.
Alternatively, it also comprises memory module, for store described passive/MAC Address of half active RFID mobile terminal.
Alternatively, described memory module is RFID memory module, or the memory module of mobile terminal.
Alternatively, described control module is further used for after receiving the first radiofrequency signal, or after receiving the second radiofrequency signal, or after receiving the 3rd radiofrequency signal, open described passive/the WiFi function of half active RFID mobile terminal, or prompting user opens WiFi function.
As another aspect of the present invention, a kind of route device, it comprises:
Label reader, for emitting radio frequency signal, receives response message;
Control unit, for obtaining the MAC Address of mobile terminal by described label reader;
Memory cell, it is for adding white list by the described MAC Address of obtaining.
Alternatively, described route device also comprises timing unit, for calculating the time of mobile terminal in described route device RFID magnetic field range.
Alternatively, described control unit is further used for, within the scheduled time of described timing unit, if described mobile terminal does not leave the RFID magnetic field range of described route device, described control unit is launched the second radiofrequency signal by described label reader to described mobile terminal, and described the second radiofrequency signal notifies described mobile terminal that the MAC Address of this mobile terminal is sent to described route device;
Alternatively, described timing unit is further used for authorizing obtaining the mobile terminal of access WiFi to carry out the timing of WiFi access duration, after the time point of degree or user's appointment between the duration that reaches user's setting, the WiFi that described control unit disconnects described mobile terminal connects.
Alternatively, described control unit is further used for, when MAC Address adds after white list, to described mobile terminal transmitting the 3rd radiofrequency signal, described the 3rd radiofrequency signal notify described passive/half active RFID mobile terminal authentication passes through.
Alternatively, described memory cell, periodic cleaning white list or preserve for a long time white list.
According to the embodiment of the present invention a kind of passive/method of half active RFID network by mobile terminal authentication can find out, the disclosure is the RFID user access network in finite region conveniently, and has improved operating efficiency.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, in order to better understand technological means of the present invention, and can be implemented according to the content of specification, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
Accompanying drawing explanation
By reading below detailed description of the preferred embodiment, various other advantage and benefits will become cheer and bright for those of ordinary skills.Accompanying drawing is only for the object of preferred implementation is shown, and do not think limitation of the present invention.And in whole accompanying drawing, by identical reference symbol, represent identical parts.In the accompanying drawings:
Fig. 1 be consistent with the specific embodiment of the invention passive/method of half active RFID network by mobile terminal authentication;
Fig. 2 be based on Fig. 1 principle a kind of passive/a kind of embodiment of the method for half active RFID network by mobile terminal authentication.
Fig. 3 be consistent with the specific embodiment of the invention a kind of passive/half active RFID mobile terminal.
Fig. 4 is a kind of route device consistent with the specific embodiment of the invention.
Specific embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, yet should be appreciated that and can realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order more thoroughly to understand the disclosure that these embodiment are provided, and can by the scope of the present disclosure complete convey to those skilled in the art.
It should be noted that, in the middle of specification and claim, used some vocabulary to censure specific components.Those skilled in the art should understand, and hardware manufacturer may be called same assembly with different nouns.This specification and claims are not used as distinguishing the mode of assembly with the difference of title, but the difference in function is used as the criterion of distinguishing with assembly.If " comprising " mentioned in the middle of specification and claim in the whole text or " comprising " is an open language, therefore should be construed to " comprise but be not limited to "." roughly " refer to that in acceptable error range, those skilled in the art can solve the technical problem within the scope of certain error, reach described technique effect substantially.Specification subsequent descriptions is for implementing better embodiment of the present invention, and right described description is to illustrate that rule of the present invention is object, not in order to limit scope of the present invention.Protection scope of the present invention is when being as the criterion depending on the claims person of defining.
The technology relevant with the present invention:
Electronic product code (EPC) standard of REID principle Auto-ID center exploitation can be identified target, and all data relevant to target.The data basd link that EPC system employs is correct is received EPC code, and manufacturer and retailer can inquire about according to authority, management and alter operation.Once mark is attached on product or equipment, RFID reader just can read the data that are stored in mark.Auto-ID plan becomes global standards by EPC System Development, and this standard mainly comprises: the particular code (EPC) of identification target; Owner's (EPC manager) of definition data; All the other information of definition code and mark; Definition goods parameter, as stock-keeping unit number; By EPC code conversion, be Internet address (object naming service ONS); Target is described to (physical markup language PML); Assemble and processing RF ID data (expert software); Distribute to every classification target particular number (serial number); For the standard minimal set (mark and identification standard) of interoperability, adopting the benefit of RFID technology maximum is to carry out transparent management to the supply chain of enterprise, effectively reduces costs.
RFID technology application form is mark (tag), card and label (label) equipment.Marking arrangement is comprised of RFID chip and antenna, and type is divided into three kinds: self-action, semi-passive and passive type.What on market, develop now is passive type RFID mark substantially, because this kind equipment cost is lower, and is easy to configuration.Passive marker equipment uses radio wave operate and communicate by letter, in the scope that signal must allow at identifier, normally 10 feet (approximately 3 meters).This class mark is suitable for the identification of short distance information, as disposable shaver or these class small item of removable blade packing box.RFID chip can be read-only, and also read/write mode, determines according to application demand.Passive type marking arrangement adopts E2PROM (eeprom), is convenient to use specific electron treatment facility toward writing data above.Generally labeling equipment is all set as read-only mode when dispatching from the factory.In Auto-ID standard, also include deadlock order, suitably to stop trace daemon under situation.
In far distance automatic identification field, as intelligent prison, intelligent hospital, intelligent parking lot, intelligent transportation, wisdom city, there is major application in the fields such as the wisdom earth and Internet of Things.Passive/half active RFID is a dark horse in this field, belongs to far distance automatic recognition category.Groundwork frequency has hyperfrequency 433MHZ, microwave 2.45GHZ and 5.8GMHZ.
Shown as shown in Figure 1 a kind of method of by RFID carrying out network authentication consistent with the present invention, this network can be any wireless network authentication, and such as WiFi network, it comprises the following steps:
Step S110, when the mobile terminal with electronic tag (TAG) enters the RFID magnetic field range with the route device of label reader, if mobile terminal receives the first radiofrequency signal that described route device sends, to route device, send the first response message.Wherein, passive/half active RFID mobile terminal can be the intelligent terminal with passive/half active RFID, and such as mobile phone, panel computer, portable computer, game machine, music player etc., electronic tag can be RFID label; Route device has label reader, can be used for emitting radio frequency signal, its label reader can be in long-term open mode, also can use push-button switch to open, be positioned at label reader on route device can be regularly or when not timing to a plurality of mobile terminal emitting radio frequency signals, make each passive/half active RFID mobile terminal when accessing, be not affected each other.
Passive label does not have internal power supply.Its internal integrated circuit drives by the electromagnetic wave receiving, and these electromagnetic waves are sent by RFID reader.When label receives the signal of sufficient intensity, can send data to reader.These data not only comprise (the unique sign ID in the whole world) No. ID, can also comprise and preexist in the data in EEPROM in label.Because passive label has cheaply, volume is small and exquisite, without the advantage of power supply.
Generally speaking, the antenna of passive label has two tasks, and first: receive the electromagnetic wave that reader sends, use and drive label IC(integrated circuit); Second: during label return path signal, need to lean on the impedance of antenna to do to switch, could produce 0 and 1 variation.Problem is, wanting has best passback efficiency, and antenna impedance must design in " open circuit and short circuit ", can make so again signal reflect completely, cannot be received by label IC, and semi-active label is exactly in order to solve such problem.Half active be similar to passive, but its many compact battery, electric power can drive label IC just, makes the state of IC in work.Such benefit is, antenna can be managed the electromagnetic task that receives, fully as the use of return path signal.Compared with passive, half actively has a reaction speed faster, better efficiency.
Yet from drive principle, be all to be sent after signal by reader, trigger tag feedback corresponding signal.
Step S120, route device are received after the first response message, to mobile terminal, launch the second radiofrequency signal, and described the second radiofrequency signal notifies described mobile terminal that the MAC Address of this mobile terminal is sent to route device.MAC Address (Media Access Control Address) is the physical address number of passive/half active RFID mobile terminal wireless network card.The MAC Address of passive/half active RFID mobile terminal wireless network card can be stored in RFID memory module, also can be stored in the memory module of passive/half active RFID mobile terminal, store the addresses in RFID circuit, often in order to realize quickly authentication.In this step, the MAC Address of mobile terminal being sent to route device, is for quick authentication, thereby makes user can use as early as possible network.Certainly for the ease of management, other information can also be transmitted.
Step S130, mobile terminal is received after the second radiofrequency signal, and the second response message that carries its wireless network card MAC Address is sent to described route device.
Step S140, route device obtains the MAC Address of mobile terminal wireless network card from the second response message of receiving, and this MAC Address is added to white list, and using mobile terminal now as the client that allows access network, network authentication finishes simultaneously.Route device can the successful white list of periodic cleaning RFID authentication, or the user by RFID authentication as permanent user.
Basis based on Fig. 1, further illustrative embodiments is as described below.
Embodiment mono-: as shown in Figure 2, a kind of method of carrying out network authentication by RFID, such as WiFi network, it comprises the following steps:
Step S210, when the mobile terminal with electronic tag enters the RFID magnetic field range with the route device of label reader, if mobile terminal receives after the first radiofrequency signal of route device transmitting, to route device, send the first response message, and automatically open WiFi function or point out user to open WiFi function.
Step S220, route device is received after described the first response message, the timing module of route device starts timing, if mobile terminal does not leave the RFID magnetic field range of route device in the given time, route device is launched the second radiofrequency signal to mobile terminal, and this second radiofrequency signal notifies described mobile terminal that the MAC Address of this mobile terminal is sent to described route device.The scheduled time can be set voluntarily by the user for route device, also can when dispatching from the factory, route device just set, setting the scheduled time is in order to prevent that some mobile terminal from being only the RFID magnetic field range of passing by because of carelessness route device, result personal information is routed device and reads, and causes the situation of personal information security problem to occur.If user stayed in magnetic field range in the scheduled time, represent that like this user need to use local network.For the ease of management, the scope in magnetic field can arrange according to the difference of RFID transmitting power simultaneously.
Step S230, mobile terminal is received after the second radiofrequency signal, and the second response message that carries mobile terminal wireless network card MAC Address is sent to described route device.
Step S240, route device obtains the MAC Address of mobile terminal wireless network card from the second response message of receiving, and this MAC Address is added to white list, and then mobile terminal can use local network, thereby saves flow, and can network fast.This method had both facilitated user, also gave the owner of route device, such as businessman has saved some unnecessary times simultaneously.
Further, obtain authorize access WiFi passive/half active RFID mobile terminal at interval of user's fixed time such as 10 hours after, or disconnect after WiFi connection at every turn, when if this mobile terminal need to reuse this network, all must again in route device RFID magnetic field range, again obtain mandate, or must again in route device RFID magnetic field range and after maintaining a period of time, again obtain mandate.Certainly, obtain and authorize the mobile terminal of access WiFi also can have the mandate of this network forever effective always.
Method according to the present embodiment can be known, the simplest application scenarios is that the mobile terminals such as mobile phone that user can/half active RFID tag passive by having, IPAD are placed in the magnetic field range of the router with RFID reader, park a period of time such as 1 minute after, this mobile terminal obtains the mandate access WiFi of this router automatically.According to method of the present invention, greatly facilitate user and access WiFi, improved efficiency, omitted the existing complicated processes that accesses WiFi by cipher authentication, especially to not too using the old user of loaded down with trivial details access step especially convenient.
Embodiment bis-: a kind of method of carrying out network authentication by RFID, the place different from embodiment mono-is automatically to open WiFi function or prompting user by mobile terminal, and to open opportunity of WiFi function different, therefore do not carry out too much repeating, its concrete steps are summarized as follows:
Step S310, when the mobile terminal with electronic tag enters the RFID magnetic field range with the route device of label reader, if mobile terminal receives the first radiofrequency signal that described route device sends, to described route device, send the first response message.
Step S320, route device is received after described the first response message, the timing module of route device starts timing, if mobile terminal does not leave the RFID magnetic field range of route device in the given time, route device is launched the second radiofrequency signal to mobile terminal, and this second radiofrequency signal notifies described mobile terminal that the MAC Address of this mobile terminal is sent to described route device.
Step S330, mobile terminal is received after the second radiofrequency signal, and the second response message that carries described mobile terminal MAC Address is sent to route device, and automatically opens WiFi function or point out user to open WiFi function.
Step S340, route device obtains the MAC Address of mobile terminal from the second response message of receiving, and this MAC Address is added to white list.
Embodiment tri-, a kind of method of carrying out network authentication by RFID, and its concrete steps are summarized as follows:
Step S410, when the mobile terminal with electronic tag enters the RFID magnetic field range with the route device of label reader, if mobile terminal receives the first radiofrequency signal that described route device sends, to described route device, send the first response message;
Step S420, route device is received after described the first response message, the timing module of route device starts timing, if mobile terminal does not leave the RFID magnetic field range of route device in the given time, route device is launched the second radiofrequency signal to mobile terminal, and this second radiofrequency signal notifies described mobile terminal that the MAC Address of this mobile terminal wireless network card is sent to described route device.
Step S430, mobile terminal is received after the second radiofrequency signal, and the second response message that carries mobile terminal wireless network card MAC Address is sent to route device.
Step S340, route device obtains this MAC Address from the second response message of receiving, and this MAC Address is added to white list.
Step S350, route device adds described MAC Address after white list, to passive/half active RFID mobile terminal transmitting the 3rd radiofrequency signal, described the 3rd radiofrequency signal notify described passive/half active RFID mobile terminal authentication passes through.
Step S360, when described passive/half active RFID mobile terminal receives after the 3rd radiofrequency signal of described route device transmitting, opens WiFi function or prompting user opens WiFi function.
Above, because the quantity of mobile terminal is larger, the present invention is placed in mobile terminal by RFID label.Certainly, as a further improvement on the present invention, the present invention also can be placed in router side by RFID label, and label reader is placed in mobile terminal, and it is only and the execution mode that the present invention is based on same principle not repeat them here.
Embodiments of the invention disclose:
A1, a kind of passive/method of half active RFID network by mobile terminal authentication, it comprises the following steps:
When the mobile terminal with electronic tag enters the RFID magnetic field range with the route device of label reader, if described mobile terminal receives the first radiofrequency signal that described route device sends, to described route device, send the first response message;
Described route device is received after described the first response message, to described mobile terminal, launches the second radiofrequency signal, and described the second radiofrequency signal notifies described mobile terminal that the MAC Address of this mobile terminal is sent to described route device;
Described mobile terminal is received after described the second radiofrequency signal, the second response message that carries described mobile terminal MAC Address is sent to described route device;
Described route device obtains the MAC Address of mobile terminal from the second response message, and this MAC Address is added to white list.
A2, as described in claim A1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that, also comprise the steps:
Described route device starts timing after receiving described the first response message, if in the given time, described mobile terminal does not leave the RFID magnetic field range of described route device, and described route device is launched the second radiofrequency signal to described mobile terminal.
A3, as described in claim A1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that, also comprise the steps:
Described route device adds described MAC Address after white list, to described passive/half active RFID mobile terminal transmitting the 3rd radiofrequency signal, described the 3rd radiofrequency signal notify described passive/half active RFID mobile terminal authentication passes through.
A4, as described in claim A1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that, also comprise the steps:
When described passive/half active RFID mobile terminal receives after the first radiofrequency signal of described route device transmitting, opens WiFi function or prompting user opens WiFi function.
A5, as described in claim A1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that, also comprise the steps:
When described passive/half active RFID mobile terminal receives after the second radiofrequency signal of described route device transmitting, opens WiFi function or prompting user opens WiFi function.
A6, as described in claim A1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that, also comprise the steps:
When described passive/half active RFID mobile terminal receives after the 3rd radiofrequency signal of described route device transmitting, opens WiFi function or prompting user opens WiFi function.
A7, as described in claim A1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that: described passive/MAC Address of half active RFID mobile terminal is stored in RFID memory module, or is stored in the memory module of described mobile terminal.
A8, as described in claim A1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that: obtain authorize access WiFi passive/half active RFID mobile terminal is at interval of the fixed time or disconnect in the time of will using network after WiFi connects at every turn and all must again obtain mandate by close described route device, or have network authorization always.
A9, as described in claim A1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that: the successful white list of described route device periodic cleaning RFID authentication, or the user by RFID authentication as permanent user.
A10, as described in claim A1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that: described network authentication refers to WiFi network authentication, described MAC Address refer to described passive/physical address number of half active RFID mobile terminal wireless network card.
B11, a kind of passive/half active RFID mobile terminal, it comprises:
Responder module, for after receiving radiofrequency signal, produces induced current;
RFID transceiver module, for receiving and dispatching radiofrequency signal;
WiFi module, for carrying out WiFi network service;
Control module, for when receiving that the second radio frequency disappears signal, launches the MAC Address of the mobile terminal of storage by a described RFID transceiver module.
B12, as described in claim B11 a kind of passive/half active RFID mobile terminal, it is characterized in that: it also comprises memory module, for store described passive/MAC Address of half active RFID mobile terminal.
B13, as described in claim B12 a kind of passive/half active RFID mobile terminal, it is characterized in that: described memory module is RFID memory module, or the memory module of mobile terminal.
B14, as described in claim B11 a kind of passive/half active RFID mobile terminal, it is characterized in that: described control module is further used for after receiving the first radiofrequency signal, or after receiving the second radiofrequency signal, or after receiving the 3rd radiofrequency signal, open described passive/the WiFi function of half active RFID mobile terminal, or prompting user opens WiFi function.
C15, a kind of route device, it comprises:
Label reader, for emitting radio frequency signal, receives response message;
Control unit, for obtaining the MAC Address of mobile terminal by described label reader;
Memory cell, it is for adding white list by the described MAC Address of obtaining.
C16, a kind of route device as described in claim C15, is characterized in that: described route device also comprises timing unit, for calculating the time of mobile terminal in described route device RFID magnetic field range.
C17, a kind of route device as described in claim C16, it is characterized in that: described control unit is further used for, within the scheduled time of described timing unit, if described mobile terminal does not leave the RFID magnetic field range of described route device, described control unit is launched the second radiofrequency signal by described label reader to described mobile terminal, and described the second radiofrequency signal notifies described mobile terminal that the MAC Address of this mobile terminal is sent to described route device;
C18, a kind of route device as described in claim C16, it is characterized in that: described timing unit is further used for authorizing obtaining the mobile terminal of access WiFi to carry out the timing of WiFi access duration, after the time point of degree or user's appointment between the duration that reaches user's setting, the WiFi that described control unit disconnects described mobile terminal connects.
C19, a kind of route device as described in claim C15, it is characterized in that: described control unit is further used for, when MAC Address adds after white list, to described mobile terminal transmitting the 3rd radiofrequency signal, described the 3rd radiofrequency signal notify described passive/half active RFID mobile terminal authentication passes through.
C20, a kind of route device as described in claim C15, is characterized in that:
Described memory cell, periodic cleaning white list or preserve for a long time white list.
It should be noted that, said in the embodiment of the present invention " user ", can be the user who holds or set route device, can be also the user who holds mobile terminal, can specifically judge according to concrete linguistic context.
In the description of this specification, the description of reference term " embodiment ", " some embodiment ", " example ", " concrete example " or " some examples " etc. means to be contained at least one embodiment of the present invention or example in conjunction with specific features, structure or the feature of this embodiment or example description.In this manual, the schematic statement of above-mentioned term is not necessarily referred to identical embodiment or example.And the specific features of description, structure or feature can be with suitable mode combination or combinations in any one or more embodiment or example.
Although illustrated and described embodiments of the invention, those having ordinary skill in the art will appreciate that: in the situation that not departing from principle of the present invention and aim, can carry out multiple variation, modification, replacement and modification to these embodiment, scope of the present invention is limited by claim and equivalent thereof.
In addition, according to above method, can be by comprising that software, firmware or the hardware of computer program realizes, but be not limited to the implementation of computer program, can also design entity apparatus corresponding thereto, each hardware capability module is equally also feasible for realizing the fractionation of corresponding function or practical function and merging.The algorithm that the embodiment of the present invention provides is intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration.Various general-purpose systems also can with based on using together with this teaching.According to description above, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.It should be understood that and can utilize various programming languages to realize content of the present invention described here, and the description of above language-specific being done is in order to disclose preferred forms of the present invention.
In the specification that provided herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can not put into practice in the situation that there is no these details.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the above in the description of exemplary embodiment of the present invention, each feature of the present invention is grouped together into single embodiment, figure or sometimes in its description.Yet, the method for the disclosure should be construed to the following intention of reflection: the present invention for required protection requires than the more feature of feature of clearly recording in each claim.Or rather, as reflected in claims below, inventive aspect is to be less than all features of disclosed single embodiment above.Therefore, claims of following embodiment are incorporated to this embodiment thus clearly, and wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can the module in the equipment in embodiment are adaptively changed and they are arranged in one or more equipment different from this embodiment.Module in embodiment or unit or assembly can be combined into a module or unit or assembly, and can put them into a plurality of submodules or subelement or sub-component in addition.At least some in such feature and/or process or unit are mutually repelling, and can adopt any combination to combine all processes or the unit of disclosed all features in this specification (comprising claim, summary and the accompanying drawing followed) and disclosed any method like this or equipment.Unless clearly statement in addition, in this specification (comprising claim, summary and the accompanying drawing followed) disclosed each feature can be by providing identical, be equal to or the alternative features of similar object replaces.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation that do not depart from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed as element or step in the claims.Being positioned at word " " before element or " one " does not get rid of and has a plurality of such elements.The present invention can be by means of including the hardware of some different elements and realizing by means of the computer of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to carry out imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title by these word explanations.
The above; be only the present invention's embodiment preferably, but protection scope of the present invention is not limited to this, is anyly familiar with in technical scope that those skilled in the art disclose in the present invention; the variation that can expect easily or replacement, within all should being encompassed in protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.
Claims (10)
1. a method for passive/half active RFID network by mobile terminal authentication, it comprises the following steps:
When the mobile terminal with electronic tag enters the RFID magnetic field range with the route device of label reader, if described mobile terminal receives the first radiofrequency signal that described route device sends, to described route device, send the first response message;
Described route device is received after described the first response message, to described mobile terminal, launches the second radiofrequency signal, and described the second radiofrequency signal notifies described mobile terminal that the MAC Address of this mobile terminal is sent to described route device;
Described mobile terminal is received after described the second radiofrequency signal, the second response message that carries described mobile terminal MAC Address is sent to described route device;
Described route device obtains the MAC Address of mobile terminal from the second response message, and this MAC Address is added to white list.
As claimed in claim 1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that, also comprise the steps:
Described route device starts timing after receiving described the first response message, if in the given time, described mobile terminal does not leave the RFID magnetic field range of described route device, and described route device is launched the second radiofrequency signal to described mobile terminal.
As claimed in claim 1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that, also comprise the steps:
Described route device adds described MAC Address after white list, to described passive/half active RFID mobile terminal transmitting the 3rd radiofrequency signal, described the 3rd radiofrequency signal notify described passive/half active RFID mobile terminal authentication passes through.
As claimed in claim 1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that, also comprise the steps:
When described passive/half active RFID mobile terminal receives after the first radiofrequency signal of described route device transmitting, opens WiFi function or prompting user opens WiFi function.
As claimed in claim 1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that, also comprise the steps:
When described passive/half active RFID mobile terminal receives after the second radiofrequency signal of described route device transmitting, opens WiFi function or prompting user opens WiFi function.
As claimed in claim 1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that, also comprise the steps:
When described passive/half active RFID mobile terminal receives after the 3rd radiofrequency signal of described route device transmitting, opens WiFi function or prompting user opens WiFi function.
As claimed in claim 1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that: described passive/MAC Address of half active RFID mobile terminal is stored in RFID memory module, or is stored in the memory module of described mobile terminal.
As claimed in claim 1 a kind of passive/method of half active RFID network by mobile terminal authentication, it is characterized in that: obtain authorize access WiFi passive/half active RFID mobile terminal is at interval of the fixed time or disconnect in the time of will using network after WiFi connects at every turn and all must again obtain mandate by close described route device, or have network authorization always.
9. passive/half active RFID mobile terminal, it comprises:
Responder module, for after receiving radiofrequency signal, produces induced current;
RFID transceiver module, for receiving and dispatching radiofrequency signal;
WiFi module, for carrying out WiFi network service;
Control module, for when receiving that the second radio frequency disappears signal, launches the MAC Address of the mobile terminal of storage by a described RFID transceiver module.
10. a route device, it comprises:
Label reader, for emitting radio frequency signal, receives response message;
Control unit, for obtaining the MAC Address of mobile terminal by described label reader;
Memory cell, it is for adding white list by the described MAC Address of obtaining.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310740989.5A CN103702332A (en) | 2013-12-27 | 2013-12-27 | Passive/semi-active RFID (radio frequency identification device) mobile terminal and network authentication method thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310740989.5A CN103702332A (en) | 2013-12-27 | 2013-12-27 | Passive/semi-active RFID (radio frequency identification device) mobile terminal and network authentication method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103702332A true CN103702332A (en) | 2014-04-02 |
Family
ID=50363706
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310740989.5A Pending CN103702332A (en) | 2013-12-27 | 2013-12-27 | Passive/semi-active RFID (radio frequency identification device) mobile terminal and network authentication method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103702332A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104093147A (en) * | 2014-06-30 | 2014-10-08 | 广东九联科技股份有限公司 | Automatic connection and authorization method for close-range WIFI |
CN104410949A (en) * | 2014-12-22 | 2015-03-11 | 上海斐讯数据通信技术有限公司 | System and method for adding mobile equipment into white list of router |
CN104507088A (en) * | 2014-12-22 | 2015-04-08 | 上海斐讯数据通信技术有限公司 | Wireless network authentication method and system |
CN105228146A (en) * | 2014-06-30 | 2016-01-06 | 北京奇虎科技有限公司 | A kind of In-vehicle networking equipment based on RFID and authentication method thereof |
CN105282741A (en) * | 2014-06-30 | 2016-01-27 | 北京奇虎科技有限公司 | RFID-based vehicle-mounted system and authentication method thereof |
CN105338165A (en) * | 2014-08-07 | 2016-02-17 | 国民技术股份有限公司 | Terminal and wireless communication method |
CN106060767A (en) * | 2016-05-31 | 2016-10-26 | 成都数聚云信息技术有限公司 | Mobile terminal connection wireless network hot spot method and system |
CN106792469A (en) * | 2016-12-28 | 2017-05-31 | 太仓红码软件技术有限公司 | A kind of wireless local area network access method based on RFID technique |
CN107071700A (en) * | 2017-03-10 | 2017-08-18 | 重庆科邦尼尼科技有限公司 | Advertisement sending method based on router |
CN107067279A (en) * | 2017-03-10 | 2017-08-18 | 重庆科邦尼尼科技有限公司 | A kind of advertisement push system of utilization router |
CN107454557A (en) * | 2017-07-28 | 2017-12-08 | 上海斐讯数据通信技术有限公司 | A kind of router connection method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101810036A (en) * | 2007-09-28 | 2010-08-18 | 符号技术有限公司 | RFID based network admission control |
CN102547699A (en) * | 2010-12-24 | 2012-07-04 | 广州盛华信息技术有限公司 | System and method for achieving binding of media access control address |
CN102769482A (en) * | 2011-05-03 | 2012-11-07 | 中兴通讯股份有限公司 | Method, equipment, device and system of link target WLAN (Wireless Local Area Network) equipment based on NFC (Near Field Communication) technology |
CN103369707A (en) * | 2012-03-27 | 2013-10-23 | 华为终端有限公司 | Wireless network connection establishing method and terminal equipment |
-
2013
- 2013-12-27 CN CN201310740989.5A patent/CN103702332A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101810036A (en) * | 2007-09-28 | 2010-08-18 | 符号技术有限公司 | RFID based network admission control |
CN102547699A (en) * | 2010-12-24 | 2012-07-04 | 广州盛华信息技术有限公司 | System and method for achieving binding of media access control address |
CN102769482A (en) * | 2011-05-03 | 2012-11-07 | 中兴通讯股份有限公司 | Method, equipment, device and system of link target WLAN (Wireless Local Area Network) equipment based on NFC (Near Field Communication) technology |
CN103369707A (en) * | 2012-03-27 | 2013-10-23 | 华为终端有限公司 | Wireless network connection establishing method and terminal equipment |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104093147A (en) * | 2014-06-30 | 2014-10-08 | 广东九联科技股份有限公司 | Automatic connection and authorization method for close-range WIFI |
CN105228146A (en) * | 2014-06-30 | 2016-01-06 | 北京奇虎科技有限公司 | A kind of In-vehicle networking equipment based on RFID and authentication method thereof |
CN105282741A (en) * | 2014-06-30 | 2016-01-27 | 北京奇虎科技有限公司 | RFID-based vehicle-mounted system and authentication method thereof |
CN105338165A (en) * | 2014-08-07 | 2016-02-17 | 国民技术股份有限公司 | Terminal and wireless communication method |
CN104410949A (en) * | 2014-12-22 | 2015-03-11 | 上海斐讯数据通信技术有限公司 | System and method for adding mobile equipment into white list of router |
CN104507088A (en) * | 2014-12-22 | 2015-04-08 | 上海斐讯数据通信技术有限公司 | Wireless network authentication method and system |
CN106060767A (en) * | 2016-05-31 | 2016-10-26 | 成都数聚云信息技术有限公司 | Mobile terminal connection wireless network hot spot method and system |
CN106792469A (en) * | 2016-12-28 | 2017-05-31 | 太仓红码软件技术有限公司 | A kind of wireless local area network access method based on RFID technique |
CN106792469B (en) * | 2016-12-28 | 2020-01-03 | 南京贝娇瑞信息科技有限公司 | Wireless local area network access method based on RFID technology |
CN107071700A (en) * | 2017-03-10 | 2017-08-18 | 重庆科邦尼尼科技有限公司 | Advertisement sending method based on router |
CN107067279A (en) * | 2017-03-10 | 2017-08-18 | 重庆科邦尼尼科技有限公司 | A kind of advertisement push system of utilization router |
CN107454557A (en) * | 2017-07-28 | 2017-12-08 | 上海斐讯数据通信技术有限公司 | A kind of router connection method and system |
CN107454557B (en) * | 2017-07-28 | 2020-12-22 | 台州市吉吉知识产权运营有限公司 | Router connection method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103702332A (en) | Passive/semi-active RFID (radio frequency identification device) mobile terminal and network authentication method thereof | |
CN103686730A (en) | Active RFID (radio frequency identification devices) mobile terminal and method for utilizing active RFID mobile terminal to perform network authentication | |
US8769030B2 (en) | Device event notification registration through direct interaction with mobile device | |
US10733395B1 (en) | Location-based access to RFID tag information | |
Chetouane | An overview on RFID technology instruction and application | |
US11232340B1 (en) | Digital identities for physical items | |
CN101810036A (en) | RFID based network admission control | |
EP2800403A1 (en) | Communication tag, system and method | |
CN101089872A (en) | Communication method for reader and tag in RFID system | |
US20080129463A1 (en) | RFID tag including ROM, method of impeding an RFID tag from being killed, and method of manufacturing an RFID tag | |
CN104994595A (en) | Cell phone terminal and intelligent hardware networking control method thereof | |
CN203191973U (en) | Electronic device with dual systems | |
EP4052183A1 (en) | Rfid ics with privacy modes | |
US9405941B2 (en) | Simultaneous programming of selected tags | |
CN103974375A (en) | Wireless network access method, device and system | |
CN103235923A (en) | Method and device for acquiring authentication identities | |
CN106797393B (en) | Method for assigning actions to tags within a network, corresponding network and control device | |
CN104102610A (en) | Method for using electronic device with two systems | |
CN111148084A (en) | Information transmission method, information transmission device, storage medium, and electronic device | |
EP2777214B1 (en) | Method and apparatus for optimizing management and configuration of radio frequency identification readers | |
KR20080004801A (en) | System and method for authenticating rfid reader(or terminal), secure rfid tag for authenticating rfid reader(or terminal) and recording medium | |
CN104933453A (en) | Information management system and method of ring main unit (RMU) | |
CN109347979B (en) | Query method and server | |
CN101841614A (en) | Telephone fax information management system and method | |
US20130201004A1 (en) | Proximity Devices and Systems that Support Multiple Formats |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140402 |