CN107895131B - RFID label checking method in accordance with ISO15693 protocol - Google Patents

RFID label checking method in accordance with ISO15693 protocol Download PDF

Info

Publication number
CN107895131B
CN107895131B CN201711078730.3A CN201711078730A CN107895131B CN 107895131 B CN107895131 B CN 107895131B CN 201711078730 A CN201711078730 A CN 201711078730A CN 107895131 B CN107895131 B CN 107895131B
Authority
CN
China
Prior art keywords
tags
inventory
data table
labels
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711078730.3A
Other languages
Chinese (zh)
Other versions
CN107895131A (en
Inventor
孙国
郑彦斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Yintian Electronic Technology Co ltd
Original Assignee
Xiamen Yintian Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Yintian Electronic Technology Co ltd filed Critical Xiamen Yintian Electronic Technology Co ltd
Priority to CN201711078730.3A priority Critical patent/CN107895131B/en
Publication of CN107895131A publication Critical patent/CN107895131A/en
Application granted granted Critical
Publication of CN107895131B publication Critical patent/CN107895131B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10019Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
    • G06K7/10108Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. interrogating only those RFIDs that fulfill a predetermined requirement, e.g. selecting all RFIDs having the same speed and moving in a cloud like fashion, e.g. on the same train; interrogating only RFIDs having a certain predetermined temperature, e.g. in the same fridge, another possibility being the active ignoring of a group of tags that fulfill a predetermined requirement, equivalent to the Boolean NOT operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10297Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092

Abstract

The invention discloses an RFID label checking method conforming to ISO15693 protocol, when an application scene is 1) a large number of labels exist, checking needs to be repeated frequently; 2) the number of label changes per inventory is only a small fraction of the large number of labels; 3) a certain requirement is imposed on the counting speed; the following method is adopted: s1, setting a memory, and establishing a data table in the memory for storing all the tags UID checked each time; s2, when checking each time, reading all the tags UID in the data table by the card reader for traversing, checking whether the tags in the data table have reduced parts, and setting the tags which still exist as a silent state; s3, continuously checking the possibly existing newly added tags by adopting the existing search algorithm; and S4, updating the data table in the memory according to the checking result. The invention can greatly improve the speed of repeated inventory and can be well applied to occasions such as intelligent bookshelves in libraries, self-help borrowing and returning equipment of books and the like.

Description

RFID label checking method in accordance with ISO15693 protocol
Technical Field
The invention relates to the technical field of RFID (radio frequency identification) tag identification, in particular to an RFID tag checking method conforming to an ISO15693 protocol.
Background
In the field of RFID tag identification, certain applications require a large number of tags to be identified quickly, and a major bottleneck affecting the speed of identification is the solution of the so-called collision avoidance problem.
When the rfid system is operating, it cannot be excluded that more than one tag may be in the range of the reader at the same time. Generally, all tags in the same system use the same operating frequency, so that there is a problem of collision during transmission. When a plurality of tags send their own stored information to the reader at the same time, the information is lost, which is a so-called collision problem.
There are several methods for solving the collision problem, and the general radio technology methods include: space division multiplexing, frequency division multiplexing, code multiplexing, and time division multiplexing. In the field of RFID tag identification, time division multiplexing is generally used based on the consideration of hardware complexity and cost.
An anti-collision algorithm based on the ISO15693 protocol is introduced as follows:
the main specifications of the ISO1593 protocol:
1. the transmission data from the tags to the card reader adopts Manchester coding, the negative jump of the Manchester coding in a half bit period is 1, and the positive jump is 0, and the data collision of a plurality of tags can be identified by the card reader by adopting the coding mode.
2. A Unique identification number (UID), or a Unique serial number and a Unique card number. The card reader identifies the tag by a 64-bit unique card number. This is a precondition for the collision avoidance process.
3. All tags that satisfy the protocol support two types of mandatory instructions: an Inventory instruction and a Stay Quiet instruction. The Inventory instruction (Inventory instruction) refers to: checking whether an electronic tag conforming to the protocol exists in the effective range; a Stay Quiet instruction means that a tag receiving this instruction no longer responds to an inventory instruction (unless powered off or re-entered out of range of the reader).
Anti-collision procedure of ISO1593 protocol:
the whole anti-collision process is the process that the card reader modifies the MASK value (MASK value), the MASK length (MASK length) and then resends the inventory command.
For convenience of description, the inventory command parameters are set as follows: the Slot (i.e. the number of time slots) is 0, the MASK length (i.e. the MASK length) is n (the value range is 0-64), and the MASK value (MASK value) is 0-64-bit binary number K. If n is 0, all tags that receive an inventory instruction will respond (except for tags that are in a silent state). If n is not 0, all tags receiving the inventory instruction will compare the lowest n bits of their card number to the mask value K. Only the tags with the lowest n bits of the card number identical to K respond (except for the tags in the silent state), and the other tags do not respond.
The card reader carries out corresponding processing according to the response result, namely: if data collision is detected, a plurality of tags are indicated to respond simultaneously, the mask length and the mask value need to be modified (usually, the mask length is increased), and the checking instruction is sent again to continue checking; if a correct response signal is received, which indicates that there is only one tag response, the card reader can record the UID of the tag, send a silent instruction to set the UID in a silent state, modify the mask length and the mask value (usually increase the mask length), and resend the inventory instruction to continue inventory; if no response is found within a certain time, indicating that no tag meets the response condition, if the current mask length is 0, the card reader should finish the inventory, otherwise, the mask length and the mask value are modified (usually, the mask length is reduced), and the inventory command is sent again to continue the inventory.
In order to improve the checking efficiency, people think of various search algorithms, and aim to pertinently and dynamically adjust the mask length and the mask value and reduce the times of sending checking instructions by a card reader as much as possible.
Push-pull binary search algorithm based on ISO1593 protocol1For example, the number of times of sending the inventory command per inventory is related to the number of tags and the card number of each tag, and without a simple formula, it can be determined that the larger the number of tags, the more times of searching, and the more time is consumed, and the time consumption does not increase linearly with the number, but increases exponentially. For example, under the same algorithm, the collision-proof reading time of 1000 tags is not 10 times that of 100 tags, and is usually much greater than 10 times.
Other algorithms have similar features.
Therefore, when the number of tags is larger, the more times of searching are needed for one inventory, and the longer the time is consumed.
Reference 1: zhao Ling Jun, Zhou Qiao Ying, anti-collision algorithm based on ISO1593 protocol and its implementation, journal, microcomputer information, 24 th volume, 9 nd-2 nd phase in 2008.
Disclosure of Invention
The inventor finds that in the applications of intelligent bookshelves in libraries, self-help borrowing and returning equipment of books and the like, each book is provided with a corresponding label, and the application scenes show the following characteristics:
1) a large number of tags exist, and the inventory needs to be repeated frequently;
2) only a small part of the inventory labels change each time;
3) there is a certain requirement on the speed of inventory.
The inventors want to devise some algorithm to meet the inventory speed requirement but are stranded. Because, regardless of the algorithm, when the number of tags is larger, the more searches are needed for one inventory, the longer it takes.
In combination with the above background art, the inventor further explores that the internal root cause of "when the number of tags is large, checking once requires multiple searches and takes a long time" is: it is directed to multiple ambiguous tags. The nature and number of the indeterminate number of tags determines the goodness of an algorithm. The larger the number of indeterminate tags results in a longer time for final inventorying.
The invention is produced by discovering the essential reasons and the characteristics of application scenes such as intelligent bookshelves in libraries, self-help borrowing and returning equipment of books and the like.
The invention aims to provide an RFID tag inventory method based on an ISO1593 protocol, which can improve the inventory speed.
The adopted technical scheme is as follows:
an RFID label checking method conforming to ISO15693 protocol is disclosed, when an application scene presents the following characteristics:
1) a large number of tags exist, and the inventory needs to be repeated frequently;
2) the number of label changes per inventory is only a small fraction of the large number of labels;
3) a certain requirement is imposed on the counting speed;
the following inventory method is adopted:
s1, setting a memory, and establishing a data table in the memory for storing unique serial numbers of all labels checked each time;
s2, when checking each time, reading the unique serial numbers of all the labels in the data table by the card reader for traversing, checking whether the labels in the data table have reduced parts, and setting the labels still existing in a silent state;
s3, continuously checking the possibly existing newly added tags by adopting a search algorithm in the prior art;
and S4, updating the data table in the memory according to the checking result.
Further, the unique serial numbers and the total number of the tags of all the tags are recorded one by one in the data table of S1; and S4, updating the unique serial numbers and the total number of the labels of all the labels after the inventory on the recording table to form a new data table.
Further, the step of traversing in S2 is as follows:
s21, reading the total number of the tags in the data table, and recording the total number as M; setting a counter N and setting the initial value of the counter N to be 0;
s22, if N is equal to M, ending the traversal process; otherwise, reading the unique serial number of the Nth label in the data table, and marking as UIDn;
s23, the card reader sends an Inventory instruction specified by an ISO15693 protocol, the Slot of the parameter is 1, the MASK length of the parameter is 64, and the MASK value of the parameter is UIDn read in the step S22; if the card reader receives a correct response signal of the tag, the tag is judged to be still in the induction area, the card reader sends a Stay Quiet instruction specified by an ISO15693 protocol, the UID is UIDn, and the tag is enabled to store a silent state; otherwise, judging that the label leaves the sensing area;
s24, adding 1 to the counter N, and jumping back to the step S22 to continue the traversal process.
Further, in a feature of the application scenario, the large number of tags is at least 50 tags.
Further, in the feature of the application scenario, the number of tag changes per inventory is 20% or less of the large number of tags.
Further, the memory is a RAM, an EEPROM or a FLASH FLASH memory.
Further, the memory is integrated on the card reader.
The invention has the beneficial effects that:
because the number of label changes per inventory is only a small fraction of the large number of labels; that is, most tags are invariant; the invention is provided with the memory for storing UIDs of all labels, so that a card reader can quickly read most labels according to the UIDs in the memory; if a small part of the tags are added, the tags can be quickly read by a search algorithm in the prior art. A prior art search algorithm such as a binary search algorithm based on bits is sufficient.
Therefore, the invention can rapidly count all tags repeatedly (for example, once every minute), and can be well applied to scenes such as intelligent bookshelves in libraries, self-help borrowing and returning equipment of books and the like.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a block diagram of a card reader;
FIG. 2 is a flow chart of an RFID tag inventory method in accordance with ISO 15693;
FIG. 3 is a flow chart of a reader traversing inventory.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
A self-help book borrowing and returning device is provided, 100 books are arranged in the device, and each book is provided with a corresponding label.
The book self-help borrowing and returning equipment is provided with a card reader, as shown in figure 1, the card reader is provided with a RAM (or an EEPROM or a FLASH FLASH memory), a Microcontroller (MCU) and a radio frequency circuit, and the RAM, the Microcontroller (MCU) and the radio frequency circuit are integrated on the card reader; the radio frequency range of the card reader can cover all tags in the book self-help borrowing and returning equipment.
During the use process of the book self-help borrowing and returning device, although the position of each book is frequently changed, so that the labels on the books are frequently changed, the book self-help borrowing and returning device has the following characteristics:
1) a large number of tags exist, and the inventory needs to be repeated frequently;
2) the number of label changes per inventory is only a small fraction of the large number of labels;
3) there is a certain requirement for the counting speed, for example, the counting is finished within 5S.
The following RFID tag inventory method conforming to ISO15693 protocol is adopted: as shown with reference to figure 2 of the drawings,
s1, a memory is arranged, and a data table is established in the memory and used for storing the unique serial numbers UID and the total number of the labels of all labels checked each time.
When the data table is established for the first time, UIDs of all labels can be recorded in advance through software; it is also possible to count all tags by an existing algorithm, such as a binary search algorithm, and then save the UIDs and tag totals for all tags. The first step of building a data table holding the unique serial numbers UID of all tags and the total number of tags, either by means of a pre-software entry or by means of prior art algorithms, is generally performed only once and is the most primitive first time. The next time the inventory is made, the updated data table that has already been made is used.
S2, when checking each time, reading the unique serial numbers of all the labels in the data table by the card reader for traversing, checking whether the labels in the data table have reduced parts, and setting the labels still existing in a silent state;
when checking each time, the card reader reads UIDs of all labels in the memory to traverse the checking; the step of traversing inventory is based on ISO1593 protocol RFID tag traversing inventory, and the step of traversing inventory includes the following steps S21-S24, which can be seen in combination with FIG. 3:
s21, reading the total number of the tags in the data table, and recording the total number as M; setting a counter N and setting the initial value of the counter N to be 0;
s22, if N is equal to M, ending the traversal process; otherwise, reading the unique serial number of the Nth label in the data table, and marking as UIDn;
s23, the card reader sends an Inventory instruction specified by an ISO15693 protocol, a parameter Slot is 1, a parameter MASK length is 64, and a parameter MASK value is UIDn read in the step S22; if the card reader receives a correct response signal of the tag, the tag is judged to be still in the induction area, the card reader sends a Stay Quiet instruction specified by an ISO15693 protocol, the UID is UIDn, and the tag is enabled to store a silent state; otherwise, judging that the label leaves the sensing area;
s24, adding 1 to the counter N, and jumping back to the step S22 to continue the traversal process.
And S3, continuously checking the possible newly added labels by adopting a search algorithm in the prior art.
And S4, updating the data table in the memory according to the checking result. And updating UIDs and total numbers of the tags of all the tags after the inventory is recorded on the updated data table. For example, in this embodiment, the book self-help borrowing and returning device finds that 5 tags (corresponding to 5 books) are less than the original record in the data table in the current inventory, and 3 tags (corresponding to 3 books) are added; the total number of tags is then saved on the updated record table as well as the UIDs for the 98 tags.
The next time the count is made, the above steps S2-S4 are performed on the data table updated each time.
The speed of each inventory can be completed within 5S.
Example 2
Referring to example 1, unlike example 1, in which 200 books were loaded in the book self-help borrowing and returning apparatus, it was found that the speed per inventory can be completed within 5S as long as the number of the tags changed per inventory is 20% or less of the number of the tags (200 in this example).
The above description is only exemplary of the present invention and should not be taken as limiting the invention, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (5)

1. An RFID label checking method in compliance with ISO15693 protocol is characterized in that when an application scene presents the following characteristics:
1) a large number of tags exist, and the inventory needs to be repeated frequently;
2) the number of label changes per inventory is only a small fraction of the large number of labels;
3) a certain requirement is imposed on the counting speed;
the following inventory method is adopted:
s1, setting a memory, and establishing a data table in the memory for storing unique serial numbers of all labels checked each time; recording the unique serial numbers and the total number of the labels of all the labels one by one in a data table;
s2, when checking each time, reading the unique serial numbers of all the labels in the data table by the card reader for traversing, checking whether the labels in the data table have reduced parts, and setting the labels still existing in a silent state; the steps of traversal are as follows:
s21, reading the total number of the tags in the data table, and recording the total number as M; setting a counter N and setting the initial value of the counter N to be 0;
s22, if N is equal to M, ending the traversal process; otherwise, reading the unique serial number of the Nth label in the data table, and marking as UIDn;
s23, the card reader sends an Inventory instruction specified by an ISO15693 protocol, the Slot of the parameter is 1, the MASK length of the parameter is 64, and the MASK value of the parameter is UIDn read in the step S22; if the card reader receives a correct response signal of the tag, the tag is judged to be still in the induction area, the card reader sends a StayQuiet instruction specified by an ISO15693 protocol, the parameter UID is UIDn, and the tag is enabled to store a silent state; otherwise, judging that the label leaves the sensing area;
s24, adding 1 to the counter N, and returning to the step S22 to continue traversing the process;
s3, continuously checking the possibly existing newly added tags by adopting a search algorithm in the prior art;
and S4, updating the data table in the memory according to the inventory result, and updating the unique serial numbers and the total number of the labels of all the inventoried labels on the record table to form a new data table.
2. The ISO15693 protocol-compliant RFID tag inventory method of claim 1, wherein the large number of tags is at least 50 tags in a characteristic of an application scenario.
3. The ISO15693 protocol-compliant RFID tag inventory method of claim 2, wherein the number of tag changes per inventory is 20% or less of a large number of tags in a feature of an application scenario.
4. The ISO15693 protocol-compliant RFID tag inventory method as recited in claim 1, wherein the memory is RAM, EEPROM or FLASH memory.
5. The ISO15693 protocol-compliant RFID tag inventory method of claim 4, wherein the memory is integrated on a card reader.
CN201711078730.3A 2017-11-06 2017-11-06 RFID label checking method in accordance with ISO15693 protocol Active CN107895131B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711078730.3A CN107895131B (en) 2017-11-06 2017-11-06 RFID label checking method in accordance with ISO15693 protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711078730.3A CN107895131B (en) 2017-11-06 2017-11-06 RFID label checking method in accordance with ISO15693 protocol

Publications (2)

Publication Number Publication Date
CN107895131A CN107895131A (en) 2018-04-10
CN107895131B true CN107895131B (en) 2021-08-13

Family

ID=61804124

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711078730.3A Active CN107895131B (en) 2017-11-06 2017-11-06 RFID label checking method in accordance with ISO15693 protocol

Country Status (1)

Country Link
CN (1) CN107895131B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109002743B (en) * 2018-07-24 2022-01-25 深圳市成为信息技术有限公司 Anti-collision method for label checking and reader-writer
CN109512158B (en) * 2018-09-26 2021-02-26 威海北洋光电信息技术股份公司 RFID intelligent storage cabinet and application thereof
CN113792833A (en) * 2021-09-10 2021-12-14 厦门印天电子科技有限公司 Impedance self-adjusting ISO15693 label reading-writing device and adjusting method thereof
CN113988100B (en) * 2021-10-28 2023-09-22 厦门印天电子科技有限公司 Layer frame positioning device and method for high-frequency RFID book label

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1484187A (en) * 2002-07-30 2004-03-24 ŷķ����ʽ���� RFID -tag, RFID-tag and interrogator (reader/writer) data processing method
CN1499412A (en) * 2002-10-29 2004-05-26 欧姆龙株式会社 Article management system, non-contact electronic label, article management method and computer readable medium
CN103136877A (en) * 2012-12-31 2013-06-05 深圳市海恒智能技术有限公司 Library movable point inspection vehicle and book searching, stocktaking and shelf tidying methods thereof
CN103559606A (en) * 2013-10-24 2014-02-05 江苏迅捷装具科技有限公司 Article management method and article storage device based on RFID technology
CN104933458A (en) * 2015-07-07 2015-09-23 南京大学 Ultrahigh frequency RFID trolley type book intelligence putaway checking equipment
CN107194573A (en) * 2017-05-18 2017-09-22 郝继英 Asset source manages method concentratedly

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1484187A (en) * 2002-07-30 2004-03-24 ŷķ����ʽ���� RFID -tag, RFID-tag and interrogator (reader/writer) data processing method
CN1499412A (en) * 2002-10-29 2004-05-26 欧姆龙株式会社 Article management system, non-contact electronic label, article management method and computer readable medium
CN103136877A (en) * 2012-12-31 2013-06-05 深圳市海恒智能技术有限公司 Library movable point inspection vehicle and book searching, stocktaking and shelf tidying methods thereof
CN103559606A (en) * 2013-10-24 2014-02-05 江苏迅捷装具科技有限公司 Article management method and article storage device based on RFID technology
CN104933458A (en) * 2015-07-07 2015-09-23 南京大学 Ultrahigh frequency RFID trolley type book intelligence putaway checking equipment
CN107194573A (en) * 2017-05-18 2017-09-22 郝继英 Asset source manages method concentratedly

Also Published As

Publication number Publication date
CN107895131A (en) 2018-04-10

Similar Documents

Publication Publication Date Title
CN107895131B (en) RFID label checking method in accordance with ISO15693 protocol
US9754143B2 (en) Radio frequency identification readers, methods and computer program products for adjusting a query command slot-counter parameter Q
EP2022275B1 (en) Data format for efficient encoding and access of multiple data items in rfid tags
US7612672B2 (en) Query tree based tag identification method in RFID systems
JP4907268B2 (en) Wireless IC memory, access device for wireless IC memory, and access control method
US20080106382A1 (en) Bi-slot tree based tag identification method in RFID systems
US7429912B2 (en) Method for multi-reading a plurality of IDs
CN113361293A (en) Card swiping method, card controller, electronic device and storage medium
CN109472177B (en) Inventory method capable of reading TID (terminal identification) number of electronic tag
CN113553870A (en) NFC tag identification method and device, NFC equipment and storage medium
KR100693006B1 (en) ID anti-collision method using data structure to be applied to RFID system
US8786408B2 (en) Method for searching a plurality of RFID tags and apparatus
Choi et al. Scanning-Based Pre-Processing for En hanced Tag Anti-Collision Protocols
US20150161421A1 (en) Apparatus and method for controlling supply of power to radio frequency identification tag
CN106503600B (en) A kind of RFID active anti-collision method based on timing
JP5157793B2 (en) RFID system
CN106354694B (en) A kind of conflict position anti-collision method based on Type A
CN103902944A (en) Multi-tag collision prevention method of internet of things
CN104134052A (en) RFID anti-collision method based on self-adaptive dividing mechanism
CN107798270B (en) A kind of computer readable storage medium and the radio-frequency identification reader using the medium
CN113657131B (en) Label checking method of UHF handheld terminal and UHF handheld terminal
JP2005208779A (en) Device, reading device, and id (identifier) communication system
KR101051393B1 (en) Tag set and how to read data in the tag set
Qing et al. A collecting collision tree protocol for RFID tag identification with capture effect
US20160283755A1 (en) Radio frequency identification (rfid) reader, rfid tag, and method thereof for performing write check of tag data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant