CN105550121A - Structure of RFID (Radio Frequency Identification) label user area and user area reading and writing method - Google Patents

Structure of RFID (Radio Frequency Identification) label user area and user area reading and writing method Download PDF

Info

Publication number
CN105550121A
CN105550121A CN201510883355.4A CN201510883355A CN105550121A CN 105550121 A CN105550121 A CN 105550121A CN 201510883355 A CN201510883355 A CN 201510883355A CN 105550121 A CN105550121 A CN 105550121A
Authority
CN
China
Prior art keywords
subarea
read
space
cipher mode
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510883355.4A
Other languages
Chinese (zh)
Other versions
CN105550121B (en
Inventor
杜江
曾祥希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin IOT Xinyuan Technology Development Co., Ltd
Original Assignee
Tianjin Zhihui Xinyuan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Zhihui Xinyuan Technology Co Ltd filed Critical Tianjin Zhihui Xinyuan Technology Co Ltd
Priority to CN201510883355.4A priority Critical patent/CN105550121B/en
Publication of CN105550121A publication Critical patent/CN105550121A/en
Application granted granted Critical
Publication of CN105550121B publication Critical patent/CN105550121B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/02Addressing or allocation; Relocation
    • G06F12/0223User address space allocation, e.g. contiguous or non contiguous base addressing
    • G06F12/0284Multiple user address space allocation, e.g. using different base addresses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a structure of an RFID (Radio Frequency Identification) label user area. Multiple index signs are arranged in an index area; the number of bits L of each index sign is greater than or equal to log2(M/N) and is an integer; M is user area space; N is minimum distributable space; the number G of the index signs is less than or equal to M/N and is an integer; and all the index signs are numbered in sequence according to the natural numbers and sequentially correspond to all the N. In the structure of the RFID label user area, the user area is dynamically distributed to sub-applications for use, sub-areas are distributed according to space required by the sub-applications, big continuous space can be distributed to relatively big sub-applications, and small space can be distributed to relatively small sub-applications, so that the situations such as discontinuous used space of the sub-applications and space waste in the prior art are avoided; furthermore, an encryption mode is set for each sub-area, and three password storage modes are distributed for the sub-applications which require a high encryption level, so that a relatively high safety level is realized, and no space of the sub-areas is wasted.

Description

A kind of structure of RFID label tag user area and user area reading/writing method
Technical field
The invention belongs to configuring technical field, ultra-high-frequency passive RFID user area, especially a kind of structure of RFID label tag user area and user area reading/writing method.
Background technology
Ultra-high-frequency passive RFID (RadioFrequencyIdentification) technology, also known as radio frequency identification, it is a kind of communication technology, read and write related data by radio signals identification specific objective, and without the need to setting up machinery or optical contact between recognition system and specific objective.Current ultra-high-frequency passive RFID label tag storage area can be divided into four kinds, be respectively: label information district, code area, place of safety, user area, label information district is wherein used for the unique identification of storage tags, for label manufacturer writes when label chip dispatches from the factory, can not revise; Code area is used for the coded data of storage tags, and user can encode to label according to respective application rule; Place of safety is used for password and the safe mode parameter of storage tags; User area is for storing user data.User area can be divided into again one or more user subareas, and there is respective access code in each user subarea, access privilege control.
Above-mentioned each user area storage space mean allocation and can not dynamic adjustments, under the application demand of complexity, for the demand of data security isolation, require son application independent partitions, and the memory headroom needed for son application differs greatly, distribution two is possibly applied for the son needing memory headroom large or more uses many user subareas, and each subarea data need separately access not cross the border, the time of data access is lengthened, speed slows down, and need the application of memory headroom very little son also will distribute an independently user subarea, son application with less than the occupied waste causing memory source of memory headroom, efficiency is low.Each user subarea is assigned with independently access code memory block simultaneously, separate according to the read-write password of agreement 32, take storage space 64, no matter apply the need of read-write password access control authority, this region all fixed allocation, can not be used for storing user data, cause the waste of data space.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, provide and carry out allocation of space according to sub-application size and the structure of carrying out a kind of RFID label tag user area of read-write password setting according to sub-application encipher rank.
The technical scheme that the present invention takes is:
A structure for RFID label tag user area, arranges index area in described place of safety, it is characterized in that: arrange multiple index mark in index area, and the figure place L of each index mark is more than or equal to log2 (M/N)and L be integer, M is space, user area, N is assignable minimum space, the quantity G of index mark is less than or equal to M/N and G is integer, and each index mark is numbered successively according to natural number and is corresponding in turn to all N;
Divide space, user area according to the quantity order of son application, every height applies the called after subarea, space that takies and subarea marks successively according to natural number, and each subarea takies the space of at least one N and the summation in space that all subareas take is less than or equal to M;
The end position numbering in a upper subarea in first subarea equals-1, the end position in each subarea remaining is numbered the numbering of index mark corresponding to last N that this subarea takies, the end position numbering in each subarea writes in index mark successively, and the index mark that last subarea takies all index marks below fill in identical numerical value and this numerical value equals the numbering of index mark corresponding to last N that last subarea takies;
Each subarea starts to arrange a cipher mode mark, this cipher mode mark is for showing the cipher mode in this subarea, cipher mode is divided into and separates and read-write password unification without password, read-write password, be memory block without the whole spaces removed in the subarea of password beyond cipher mode mark, read-write password separately and the space in subarea unified of read-write password be the summation of cipher mode mark, password area and memory block.
Another object of the present invention is to provide a kind of division methods of structure of RFID label tag user area, it is characterized in that: comprise the following steps:
(1) divide space, user area according to the quantity order of son application, every height applies the called after subarea, space that takies and subarea marks successively according to natural number, and each subarea takies the space of at least one N and the summation in space that all subareas take is less than or equal to M;
(2) the end position numbering in a upper subarea in first subarea equals-1, the end position in each subarea remaining is numbered the numbering of index mark corresponding to last N that this subarea takies, and the end position numbering in each subarea writes in index mark successively;
(3) index mark all index marks below that last subarea takies fill in identical numerical value and this numerical value is more than or equal to the numbering of index mark corresponding to last N that last subarea takies;
(4) each subarea starts to arrange a cipher mode mark, and this cipher mode mark is for showing the cipher mode in this subarea, and cipher mode is divided into and separates and read-write password unification without password, read-write password;
(5) according to step cipher mode (4), space allocation is carried out to every sub-application area, be memory block without the whole spaces removed in the subarea of password beyond cipher mode mark, read-write password separately and the space in subarea unified of read-write password be the summation of cipher mode mark, password area and memory block.
Another object of the present invention is to provide a kind of reading/writing method of structure of RFID label tag user area, it is characterized in that: comprise the following steps:
(1) read the index mark in index area, place of safety, obtain the end position numbering in each subarea, calculate the formula that each subarea takes up room: after the numbering of each subarea end position deducts a sub-end of extent Position Number, be multiplied by N again;
(2) whether judgment formula result is 0,
If be not 0, obtain the information in each subarea, enter next step;
If be 0, return address Access Violation, exits;
(3) judge cipher mode, read the cipher mode mark in each subarea, judge the cipher mode in each subarea;
When cipher mode is without password, carry out the read-write operation of memory block, and return successful operation information;
When cipher mode is read-write password unification, enter step (4);
When cipher mode be read-write password separate time, enter step (5);
(4), when cipher mode is read-write password unification, judge that whether 32 read-write passwords are correct,
Time correct, carry out the read-write operation of memory block, and return successful operation information;
Return cryptographic acess mistake time incorrect, exit;
When cipher mode be read-write password separate time, judge that current operation is read or write operation, and respectively judge read password or write password whether correct;
Time correct, carry out read operation or the write operation of memory block, and return successful operation information;
Return cryptographic acess mistake time incorrect, exit.
Advantage of the present invention and good effect are:
In the present invention, user area is distributed to son application dynamically and is used, it carries out the distribution in subarea according to son application requisite space, each subarea takies the space of at least one N and the summation in space that all subareas take is less than or equal to M, the numbering of the index mark that last N that the beginning in each subarea and end position are taken by it is corresponding determines, distribute continuous print large space can to thus larger son application, and less son application distributes little space, avoid the discontinuous and situation of space waste of prior art neutron application usage space, and each subarea all can arrange cipher mode, for needing son application distribution three kinds of password storage modes of high secret grade, the son application lower for secret grade provides memory block large as far as possible, achieve higher level of security, also can not waste the space in subarea.
Accompanying drawing explanation
Fig. 1 is the graph of a relation of the numbering of each N in existing user area and index mark;
Fig. 2 is that the present invention carries out the schematic diagram of dynamic assignment according to sub-application size;
Fig. 3 is the schematic diagram that in the subarea of Fig. 2, password area and memory block are distributed;
Fig. 4 is the read-write flow process in the subarea of Fig. 2.
Embodiment
Below in conjunction with embodiment, the present invention is further described, and following embodiment is illustrative, is not determinate, can not limit protection scope of the present invention with following embodiment.
A structure for RFID label tag user area, as shown in Figure 1,2,3, 4, arrange index area in described place of safety, innovation of the present invention is: arrange multiple index mark in index area, and the figure place L of each index mark is more than or equal to log2 (M/N)and L be integer, M is space, user area, N is assignable minimum space, the quantity G of index mark is less than or equal to M/N and G is integer, and each index mark is numbered successively according to natural number and is corresponding in turn to all N;
Divide space, user area according to the quantity order of son application, every height applies the called after subarea, space that takies and subarea marks successively according to natural number, and each subarea takies the space of at least one N and the summation in space that all subareas take is less than or equal to M;
The end position numbering in each subarea writes in index mark successively, the end position numbering in a upper subarea in first subarea equals-1, the end position in each subarea remaining is numbered the numbering of index mark corresponding to last N that this subarea takies, and the assignment of index mark all index marks below that this last N is corresponding is more than or equal to the numbering of index mark corresponding to last N that last subarea takies;
Each subarea starts to arrange a cipher mode mark, this cipher mode mark is for showing the cipher mode in this subarea, cipher mode is divided into and separates and read-write password unification without password, read-write password, be memory block without the whole spaces removed in the subarea of password beyond cipher mode mark, read-write password separately and the space in subarea unified of read-write password be the summation of cipher mode mark, password area and memory block.
Said structure is described as follows:
As shown in Figure 1, L=4=log2 is set (M/N)the total volume of user area is M=4096bits, the assignable minimum space in subarea is N=256bits, the quantity G in subarea is less than or equal to M/N, and G is that the remainder of above formula rounds downwards, result of calculation G=16, i.e. subarea 0 ~ 15, namely index mark has 16, and its numbering is 0 ~ 15 and corresponding with 16 N order respectively, and the smallest blocks 0 ~ 15 in figure is N0 ~ N15.
As shown in Figure 2, the actual son of user area that will use is applied as 5, if distributed according to above-mentioned 16 N, certainly will have a little application needs to take discontinuous space, so distribute according to the following rules:
Distribute according to the space consumption of son application: son application 0 takies a N, called after subarea 0; Son application 1 takies 2 N, called after subarea 1; Son application 2 takies 3 N, called after subarea 2; Son application 3 takies 4 N, called after subarea 3; Son application 4 takies 5 N, called after subarea 4; Remain a N unallocated.
Upper subarea-1 end position in subarea 0 and index mark-1 are non-existent, thus index mark corresponding to last N of taking of the upper subarea-1 of artificial regulation be numbered-1, namely subarea-1 end position be numbered-1.
Subarea 0 takies a N, so its end position is numbered the numbering of index mark corresponding to last N, namely the end position in subarea 0 is numbered 0, in like manner last N of subarea 1 index mark be numbered 2, the end position in subarea 1 is numbered 2; The end position in subarea 2 is numbered 5; The end position in subarea 3 is numbered 9; The end position in subarea 4 is numbered 14; The end position in subarea 0 ~ 4 numbering is write index mark 0 ~ 4 successively, completes the division in subarea.
N is multiplied by again, specifically: the size in subarea 0 is 0 deduct-1, and it takies 1 subarea, and allocation of space is 0 ~ 255bits after the numbering that the size in space, each subarea equals current subarea end position deducts the numbering of a sub-end of extent position; The size in subarea 1 is 2 deduct 0, it takies 2 subareas, allocation of space 256 ~ 767bits, the like, subarea 2 allocation space is 768 ~ 1535bits, subarea 3 allocation space is 1536 ~ 2559bits, and sub-application area 4 allocation space is 2560 ~ 3839bits, and the space of last remaining N is 3840 ~ 4095bits.
In order to avoid the impact that follow-up index mark 5 ~ 15 calculates space, subarea, all index marks 5 ~ 15 after the index mark 4 taken in subarea 4 extend this as the numbering of index mark 14 corresponding to last N14 that subarea 4 takies, specifically equal 14, the difference of adjacent in such index mark 5 ~ 15 two index marks numbering (being equivalent to subarea end position numbering) be 0 and the numerical value filled in of index mark 5 and the subarea 4 end position difference of numbering (numerical value filled in index mark 4) be also 0, represent not corresponding any subarea in these index marks 5 ~ 15, also unallocated any space.
Each subarea starts to arrange a cipher mode mark, this cipher mode mark is for showing the cipher mode in this subarea, cipher mode is divided into and separates and read-write password unification without password, read-write password, be memory block without the whole spaces removed in the subarea of password beyond cipher mode mark, read-write password separately and the space in subarea unified of read-write password be the summation of cipher mode mark, password area and memory block.
As shown in Figure 3, cipher mode mark takies 2bits, and numerical value is respectively 00,01,10 and 11, and specifically: the cipher mode in subarea 0 is masked as 00, meaning subarea 0 is without password; The cipher mode in subarea 1 is masked as 01, and reading and writing password separates and is 16; The cipher mode in subarea 2,3 is masked as 10, and read-write password unifies and length is 32; The cipher mode in subarea 4 is masked as 11, and reading and writing password separates and is 32.
The division methods of the structure of above-mentioned RFID label tag user area comprises the following steps:
(1) divide space, user area according to the quantity order of son application, every height applies the called after subarea, space that takies and subarea marks successively according to natural number, and each subarea takies the space of at least one N and the summation in space that all subareas take is less than or equal to M;
(2) the end position numbering in a upper subarea in first subarea equals-1, the end position in each subarea remaining is numbered the numbering of index mark corresponding to last N that this subarea takies, and the end position numbering in each subarea writes in index mark successively;
(3) index mark all index marks below that last subarea takies fill in identical numerical value and this numerical value equals the numbering of index mark corresponding to last N that last subarea takies;
(4) each subarea starts to arrange a cipher mode mark, and this cipher mode mark is for showing the cipher mode in this subarea, and cipher mode is divided into and separates and read-write password unification without password, read-write password;
(5) according to step cipher mode (4), space allocation is carried out to every sub-application area, be memory block without the whole spaces removed in the subarea of password beyond cipher mode mark, read-write password separately and the space in subarea unified of read-write password be the summation of cipher mode mark, password area and memory block.
The reading/writing method of the structure of above-mentioned RFID label tag user area comprises the following steps:
(1) read the index mark in index area, place of safety, obtain the end position numbering in each subarea, calculate the formula that each subarea takes up room: after the numbering of each subarea end position deducts a sub-end of extent Position Number, be multiplied by N again;
(2) whether judgment formula result is 0,
If be not 0, obtain the information in each subarea, enter next step;
If be 0, return address Access Violation, exits;
(3) judge cipher mode, read the cipher mode mark in each subarea, judge the cipher mode in each subarea;
When cipher mode is without password, carry out the read-write operation of memory block, and return successful operation information;
When cipher mode is read-write password unification, enter step (4);
When cipher mode be read-write password separate time, enter step (5);
(4), when cipher mode is read-write password unification, judge that whether 32 read-write passwords are correct,
Time correct, carry out the read-write operation of memory block, and return successful operation information;
Return cryptographic acess mistake time incorrect, exit;
When cipher mode be read-write password separate time, judge that current operation is read or write operation, and respectively judge read password or write password whether correct;
Time correct, carry out read operation or the write operation of memory block, and return successful operation information;
Return cryptographic acess mistake time incorrect, exit.
In the present invention, user area is distributed to son application dynamically and is used, it carries out the distribution in subarea according to son application requisite space, each subarea takies the space of at least one N and the summation in space that all subareas take is less than or equal to M, the numbering of the index mark that last N that the beginning in each subarea and end position are taken by it is corresponding determines, distribute continuous print large space can to thus larger son application, and less son application distributes little space, avoid the discontinuous and situation of space waste of prior art neutron application usage space, and each subarea all can arrange cipher mode, for needing son application distribution three kinds of password storage modes of high secret grade, the son application lower for secret grade provides memory block large as far as possible, achieve higher level of security, also can not waste the space in subarea.

Claims (3)

1. a structure for RFID label tag user area, arranges index area in described place of safety, it is characterized in that: arrange multiple index mark in index area, and the figure place L of each index mark is more than or equal to log2 (M/N)and L be integer, M is space, user area, N is assignable minimum space, the quantity G of index mark is less than or equal to M/N and G is integer, and each index mark is numbered successively according to natural number and is corresponding in turn to all N;
Divide space, user area according to the quantity order of son application, every height applies the called after subarea, space that takies and subarea marks successively according to natural number, and each subarea takies the space of at least one N and the summation in space that all subareas take is less than or equal to M;
The end position numbering in a upper subarea in first subarea equals-1, the end position in each subarea remaining is numbered the numbering of index mark corresponding to last N that this subarea takies, the end position numbering in each subarea writes in index mark successively, and the index mark that last subarea takies all index marks below fill in identical numerical value and this numerical value equals the numbering of index mark corresponding to last N that last subarea takies;
Each subarea starts to arrange a cipher mode mark, this cipher mode mark is for showing the cipher mode in this subarea, cipher mode is divided into and separates and read-write password unification without password, read-write password, be memory block without the whole spaces removed in the subarea of password beyond cipher mode mark, read-write password separately and the space in subarea unified of read-write password be the summation of cipher mode mark, password area and memory block.
2. the division methods of the structure of a kind of RFID label tag user area according to claim 1, is characterized in that: comprise the following steps:
(1) divide space, user area according to the quantity order of son application, every height applies the called after subarea, space that takies and subarea marks successively according to natural number, and each subarea takies the space of at least one N and the summation in space that all subareas take is less than or equal to M;
(2) the end position numbering in a upper subarea in first subarea equals-1, the end position in each subarea remaining is numbered the numbering of index mark corresponding to last N that this subarea takies, and the end position numbering in each subarea writes in index mark successively;
(3) index mark all index marks below that last subarea takies fill in identical numerical value and this numerical value equals the numbering of index mark corresponding to last N that last subarea takies;
(4) each subarea starts to arrange a cipher mode mark, and this cipher mode mark is for showing the cipher mode in this subarea, and cipher mode is divided into and separates and read-write password unification without password, read-write password;
(5) according to step cipher mode (4), space allocation is carried out to every sub-application area, be memory block without the whole spaces removed in the subarea of password beyond cipher mode mark, read-write password separately and the space in subarea unified of read-write password be the summation of cipher mode mark, password area and memory block.
3. the reading/writing method of the structure of a kind of RFID label tag user area according to claim 1, is characterized in that: comprise the following steps:
(1) read the index mark in index area, place of safety, obtain the end position numbering in each subarea, calculate the formula that each subarea takes up room: after the numbering of each subarea end position deducts a sub-end of extent Position Number, be multiplied by N again;
(2) whether judgment formula result is 0,
If be not 0, obtain the information in each subarea, enter next step;
If be 0, return address Access Violation, exits;
(3) judge cipher mode, read the cipher mode mark in each subarea, judge the cipher mode in each subarea;
When cipher mode is without password, carry out the read-write operation of memory block, and return successful operation information;
When cipher mode is read-write password unification, enter step (4);
When cipher mode be read-write password separate time, enter step (5);
(4), when cipher mode is read-write password unification, judge that whether 32 read-write passwords are correct,
Time correct, carry out the read-write operation of memory block, and return successful operation information;
Return cryptographic acess mistake time incorrect, exit;
When cipher mode be read-write password separate time, judge that current operation is read or write operation, and respectively judge read password or write password whether correct;
Time correct, carry out read operation or the write operation of memory block, and return successful operation information;
Return cryptographic acess mistake time incorrect, exit.
CN201510883355.4A 2015-12-04 2015-12-04 A kind of RFID tag and user area reading/writing method Expired - Fee Related CN105550121B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510883355.4A CN105550121B (en) 2015-12-04 2015-12-04 A kind of RFID tag and user area reading/writing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510883355.4A CN105550121B (en) 2015-12-04 2015-12-04 A kind of RFID tag and user area reading/writing method

Publications (2)

Publication Number Publication Date
CN105550121A true CN105550121A (en) 2016-05-04
CN105550121B CN105550121B (en) 2019-01-25

Family

ID=55829315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510883355.4A Expired - Fee Related CN105550121B (en) 2015-12-04 2015-12-04 A kind of RFID tag and user area reading/writing method

Country Status (1)

Country Link
CN (1) CN105550121B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112101502A (en) * 2020-08-28 2020-12-18 智汇芯联(厦门)微电子有限公司 RFID (radio frequency identification) tag chip and EPC (electronic product code) area and user area size distribution method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090153308A1 (en) * 2007-12-17 2009-06-18 Electronics And Telecommunications Research Institute Apparatus and method for managing user memory of rfid tag
CN104142979A (en) * 2014-07-15 2014-11-12 武汉理工大学 Index method for realizing RFID (Radio Frequency Identification Devices) tag storage management
CN104281529A (en) * 2013-07-12 2015-01-14 北京金辉东方科技有限公司 High-capacity RFID (radio frequency identification device) electronic tag dynamic partitioning method as well as electronic tag and application

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090153308A1 (en) * 2007-12-17 2009-06-18 Electronics And Telecommunications Research Institute Apparatus and method for managing user memory of rfid tag
CN104281529A (en) * 2013-07-12 2015-01-14 北京金辉东方科技有限公司 High-capacity RFID (radio frequency identification device) electronic tag dynamic partitioning method as well as electronic tag and application
CN104142979A (en) * 2014-07-15 2014-11-12 武汉理工大学 Index method for realizing RFID (Radio Frequency Identification Devices) tag storage management

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112101502A (en) * 2020-08-28 2020-12-18 智汇芯联(厦门)微电子有限公司 RFID (radio frequency identification) tag chip and EPC (electronic product code) area and user area size distribution method thereof
CN112101502B (en) * 2020-08-28 2022-06-21 智汇芯联(厦门)微电子有限公司 RFID (radio frequency identification) tag chip and EPC (evolved packet core) area and user area size distribution method thereof

Also Published As

Publication number Publication date
CN105550121B (en) 2019-01-25

Similar Documents

Publication Publication Date Title
RU2014136699A (en) MULTI-ELEMENTED SECURITY ELEMENT SECTION ARCHITECTURE FOR NFC-SUPPLIED DEVICES
CN105346256A (en) Printer chip, ink box and storage allocation method for printer chip
US9870316B2 (en) Bidirectional counter in a flash memory
CN105280215A (en) Refreshing method for dynamic random access memory (DRAM), equipment and system
CN209402526U (en) The key storage device of safety chip
CN106937275A (en) A kind of equipment that system unique identifier and hardware ID are preserved under Android system
CN104407983A (en) Modbus address remapping method used for electric quantity module
CN108073146A (en) The automatic business processing control hardware engineering of the requirement represented using framework is planned
CN104714894A (en) Layered phase-change memory abrasion equilibrating method and system based on random mapping
CN104866456A (en) Electronic device and communication method
CN1932784B (en) Information processing method and information processing apparatus
CN103377135B (en) Addressing method, Apparatus and system
CN105550121A (en) Structure of RFID (Radio Frequency Identification) label user area and user area reading and writing method
CN103138932A (en) Allocation method of mifare card sector secret key and allocation system of mifare card sector secret key
CN102306128A (en) Disk management method and device and network equipment
CN104281529A (en) High-capacity RFID (radio frequency identification device) electronic tag dynamic partitioning method as well as electronic tag and application
CN104521174A (en) User-selectable IEEE 1588 clock class and quality level mapping
CN103064794A (en) Method for realizing efficient multiple protocol label switching (MPLS) label management
CN105095101A (en) Method and device for writing data in memorizer and intelligent card
CN102486719B (en) Intelligent memory card and transaction-writing method thereof
CN102651079A (en) IC (integrated circuit) card management method occupying memory space for a short time and IC card management system
CN103297849A (en) Method for generating two-direction set top box MAC address
CN111131291B (en) Protocol implementation method using upper computer software as lower computer equipment
CN105631362A (en) Encryption method of microcontroller unit
CN203773958U (en) One time programmable (OTP) register read-write device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191121

Address after: 300308 unit 1, floor 4, building 7, Zhongxing Industrial base, No. 2, Dongqi Road, free trade zone (Airport Economic Zone), Binhai New Area, Tianjin

Patentee after: Tianjin IOT Xinyuan Technology Development Co., Ltd

Address before: 300308, Tianjin Binhai New Area Airport Economic Zone business park on the eastern side of E10 building, 5 floor

Patentee before: TIANJIN ZHIHUI XINYUAN TECHNOLOGY CO., LTD.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190125

Termination date: 20201204

CF01 Termination of patent right due to non-payment of annual fee