CN117057372B - Multi-target identification method based on radio frequency identification technology - Google Patents

Multi-target identification method based on radio frequency identification technology Download PDF

Info

Publication number
CN117057372B
CN117057372B CN202311325949.4A CN202311325949A CN117057372B CN 117057372 B CN117057372 B CN 117057372B CN 202311325949 A CN202311325949 A CN 202311325949A CN 117057372 B CN117057372 B CN 117057372B
Authority
CN
China
Prior art keywords
rfid
monitoring
protocol
tag
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311325949.4A
Other languages
Chinese (zh)
Other versions
CN117057372A (en
Inventor
夏立军
郭述强
谈超群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Nation Rfid Technology Co ltd
Original Assignee
Shenzhen Nation Rfid Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Nation Rfid Technology Co ltd filed Critical Shenzhen Nation Rfid Technology Co ltd
Priority to CN202311325949.4A priority Critical patent/CN117057372B/en
Publication of CN117057372A publication Critical patent/CN117057372A/en
Application granted granted Critical
Publication of CN117057372B publication Critical patent/CN117057372B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10019Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
    • G06K7/10108Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. interrogating only those RFIDs that fulfill a predetermined requirement, e.g. selecting all RFIDs having the same speed and moving in a cloud like fashion, e.g. on the same train; interrogating only RFIDs having a certain predetermined temperature, e.g. in the same fridge, another possibility being the active ignoring of a group of tags that fulfill a predetermined requirement, equivalent to the Boolean NOT operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0722Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips comprising an arrangement for testing the record carrier
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10297Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for handling protocols designed for non-contact record carriers such as RFIDs NFCs, e.g. ISO/IEC 14443 and 18092
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention discloses a multi-target identification method based on a radio frequency identification technology, which relates to the field of safety control and comprises the following steps: an RFID transmitting module; according to the multi-target identification method based on the radio frequency identification technology, the RFID monitoring protocol input module is used for inputting the RFID monitoring protocol group which accords with the current RFID monitoring use condition, the RFID monitoring protocol selection module is used for inputting the protocol selection requirement of the current RFID monitoring, whether the RFID monitoring protocol group is matched with the protocol selection requirement is judged, if yes, the RFID monitoring protocol queue is output to the RFID monitoring protocol unpacking module, the RFID monitoring protocol unpacking module unpacks the RFID monitoring protocol queue, the RFID monitoring protocol detection unit is used for detecting the interacted RFID monitoring protocol group signals, multiple protocols can be converted into the same type of protocols through the RFID monitoring protocol interaction module, interference caused by protocol monitoring under a plurality of RFID protocols is avoided, and the safety of the tag in the storage process is improved.

Description

Multi-target identification method based on radio frequency identification technology
Technical Field
The invention relates to a safety management and control technology, in particular to a multi-target identification method based on a radio frequency identification technology.
Background
Radio frequency identification technology (Radio Frequency Identification, RFID) was originally an automatic identification technology evolved from radar technology. The radio frequency identification technology is classified into Low Frequency (LF), high Frequency (HF) and Ultra High Frequency (UHF) according to the working frequency. The ultrahigh frequency radio frequency identification technology has the advantages of long working distance, high data rate, high safety, high reliability, low cost and the like, and is successfully applied to the fields of retail industry, medical field, logistics management, anti-counterfeiting field, vehicle management, indoor positioning and the like.
Generally, an uhf rfid system consists of three parts, an interrogator (also called a reader), a transponder (tag), and a host. The UHF RFID system adopts half-duplex mode communication, a host or a control end sends a command to a reader-writer, a radio frequency signal carrying instructions and data is sent to a tag through corresponding protocol processing, the tag returns a corresponding response signal through backscattering modulation after entering a communication process, and the reader-writer returns the response signal to the host or the control end after certain processing.
However, in the using process, because the number base number of the tags is large, the tags cannot be accurately monitored due to the adoption of the read-write protocol of the same RFID, if the read-write protocol of the plurality of RFID is adopted, the requirement on the RFID monitoring protocol is high during RFID monitoring, and the original RFID monitoring protocol cannot meet the current RFID monitoring requirement due to the fact that the number of the RFID devices is increased.
Disclosure of Invention
The invention aims to provide a multi-target identification method based on a radio frequency identification technology, so as to solve the defects in the prior art.
In order to achieve the above object, the present invention provides the following technical solutions: a multi-target identification method based on radio frequency identification technology comprises the following steps:
the RFID transmitting module is arranged on the tag and is used for transmitting an RFID signal bound with the current tag;
the RFID receiving module is used for receiving an RFID signal bound with the current tag;
the RFID monitoring module is used for monitoring RFID signals bound with the current tag;
the security analysis module is used for carrying out security analysis on the tags, determining the influence degree of the use risks of each tag, and setting the security management requirement of each tag based on the influence degree of the use risks;
the parameter setting module is used for setting tag management parameters based on security management requirements of tags, wherein the tag management parameters comprise request verification parameters and use monitoring parameters;
the verification module is used for verifying the tag use request based on the request verification parameter, and generating a use monitoring instruction according to the use monitoring parameter as the verified tag use request;
the image monitoring module is used for calling a monitoring flow according to the use monitoring instruction, and carrying out image monitoring on the positions of a requesting user and a card reading through the image acquisition equipment based on the monitoring flow to obtain a use monitoring image set;
the feature analysis module is used for determining monitoring features according to the monitoring flow, and performing feature traversal analysis on the using monitoring image set based on the monitoring features to obtain feature matching results;
the execution information generation module is used for generating tag execution information when the feature matching result meets the requirement of using the monitoring parameter, and the tag execution information is used for opening tag control operation authority for a requesting user.
Further, the RFID monitoring module includes:
the RFID monitoring protocol input module is used for inputting an RFID monitoring protocol group which accords with the current RFID monitoring use condition by a user and transmitting the RFID monitoring protocol group which accords with the current RFID monitoring use condition to the RFID monitoring protocol selection module;
the RFID monitoring protocol selection module receives an RFID monitoring protocol group meeting the current RFID monitoring use condition sent by the RFID monitoring protocol input module and inputs the current RFID monitoring protocol selection requirement, and the RFID monitoring protocol selection module carries out RFID monitoring protocol selection on the RFID monitoring protocol group according to the protocol selection requirement, wherein the protocol selection requirement comprises RFID monitoring protocol writing speed, RFID monitoring protocol reading speed and RFID monitoring protocol interaction efficiency;
the RFID monitoring protocol interaction module is used for interacting the RFID monitoring protocol queue sent by the RFID monitoring protocol selection module into the RFID monitoring protocol queue available for current RFID monitoring and sending the RFID monitoring protocol queue to the RFID monitoring protocol unpacking module;
the RFID monitoring protocol unpacking module is used for converting the RFID monitoring protocol queues sent by the RFID monitoring protocol interaction module into 64bit data, packet headers and control signals and sending the 64bit data, packet headers and control signals to the RFID monitoring protocol interaction scheduling module;
and the RFID monitoring protocol interaction scheduling module is used for scheduling the protocol interaction queue when the RFID monitoring protocol interaction module performs protocol interaction.
Further, the RFID monitoring protocol selection module includes:
the protocol selection requirement input module is used for manually inputting the protocol selection requirement of RFID monitoring;
the result matching module is used for receiving the RFID monitoring protocol group which accords with the current RFID monitoring use condition and is sent by the RFID monitoring protocol input module, and carrying out result matching on the RFID monitoring protocol group and the protocol selection requirement input by the protocol selection requirement input module, wherein the same RFID monitoring protocol is sent to the result comparison module by the result matching module, and the RFID monitoring protocols which are different in result matching are discarded;
the result comparison module is used for receiving the RFID monitoring protocol sent by the result matching module and comparing the RFID monitoring protocol, wherein the RFID monitoring protocol comparison comprises RFID monitoring protocol writing speed comparison and RFID monitoring protocol reading speed comparison.
Further, the working method of the RFID monitoring module is as follows;
a1, a user inputs an RFID monitoring protocol group which accords with the current RFID monitoring use condition through an RFID monitoring protocol input module;
a2, inputting a protocol selection requirement of current RFID monitoring through an RFID monitoring protocol selection module;
a3, judging whether the RFID monitoring protocol group is matched with the protocol selection requirement;
a4, if the judgment result is yes, outputting an RFID monitoring protocol queue to an RFID monitoring protocol unpacking module;
a5, the RFID monitoring protocol unpacking module unpacks the RFID monitoring protocol queue;
a6, the unpacked RFID monitoring protocol group performs protocol interaction queue scheduling through an RFID monitoring protocol interaction scheduling module;
and A7, monitoring the interacted RFID monitoring protocol group signal through an RFID monitoring signal monitoring unit.
Further, the method comprises the following steps:
s1, carrying out use security analysis on tags, determining the influence degree of use risks of each tag, and setting the security management requirement of each tag based on the influence degree of use risks;
s2, setting tag management parameters based on security management requirements of tags, wherein the tag management parameters comprise request verification parameters and use monitoring parameters;
s3, verifying the tag use request based on the request verification parameter, and generating a use monitoring instruction according to the use monitoring parameter being the verified tag use request;
s4, according to the use monitoring instruction, a monitoring flow is called, and based on the monitoring flow, image monitoring is carried out on the position of a requesting user and a card reading position through image acquisition equipment, so that a use monitoring image set is obtained;
s5, determining monitoring features according to the monitoring flow, and respectively carrying out feature traversal analysis on the using monitoring image set based on the monitoring features to obtain feature matching results;
and S6, when the feature matching result meets the requirement of using the monitoring parameters, generating tag execution information, wherein the tag execution information is used for opening tag control operation authority for a requesting user.
Further, the analyzing the usage security of the tags, determining the usage risk influence degree of each tag, and setting the security management requirement of each tag based on the usage risk influence degree, including the following steps:
b1, when the tag is stored, transmitting an RFID signal bound with the tag;
b2, receiving corresponding RFID signals based on the transmitted RFID signals;
b3, formulating a corresponding RFID monitoring protocol based on the received RFID signals;
when the labels are taken, obtaining label type information and label use range information;
b5, constructing a tag use record database based on the tag type information and the tag use range information;
b6, extracting tag risk events from the tag use record database, and analyzing the robbery frequency, the influence range and the multidimensional influence degree of the influence result according to the tag risk event record information to obtain the multidimensional risk influence degree;
b7, calculating the using risk influence according to the stealing frequency, the influence range, the preset weight value of the influence result and the multidimensional risk influence;
and B8, setting a security management level according to the influence of the use risk, and setting security management requirements of the tag based on the security management level.
Further, based on the request verification parameter, verifying the tag use request, including the steps of:
c1, obtaining user information of a tag use request;
performing authority verification on the user information, and performing level matching according to the user authority and the request verification parameters after passing the authority verification to determine authority level matching parameters;
and C3, generating a verification instruction to verify the tag use request based on the permission level matching parameter.
Compared with the prior art, the multi-target identification method based on the radio frequency identification technology has the advantages that the RFID monitoring protocol group meeting the current RFID monitoring use condition is input through the RFID monitoring protocol input module, the protocol selection requirement of current RFID monitoring is input through the RFID monitoring protocol selection module, whether the RFID monitoring protocol group is matched with the protocol selection requirement is judged, if yes, the RFID monitoring protocol queue is output to the RFID monitoring protocol unpacking module, unpacking processing is carried out on the RFID monitoring protocol queue through the RFID monitoring protocol unpacking module, protocol interaction queue scheduling is carried out on the unpacked RFID monitoring protocol group through the RFID monitoring protocol interaction scheduling module, the interacted RFID monitoring protocol group signals are detected through the RFID monitoring signal detection unit, multiple protocols can be converted into the same type of protocol through the RFID monitoring protocol interaction module, interference caused by protocol monitoring under a plurality of RFID protocols is avoided, and safety of labels in the storage process is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings may be obtained according to these drawings for a person having ordinary skill in the art.
Fig. 1 is a schematic diagram of an overall structure according to an embodiment of the present invention.
Detailed Description
In order to make the technical scheme of the present invention better understood by those skilled in the art, the present invention will be further described in detail with reference to the accompanying drawings.
Referring to fig. 1, a multi-target recognition method based on radio frequency recognition technology includes:
the RFID transmitting module is arranged on the tag and is used for transmitting an RFID signal bound with the current tag;
the RFID receiving module is used for receiving RFID signals bound with the current tag;
the RFID monitoring module is used for monitoring RFID signals bound with the current tag;
the security analysis module is used for carrying out use security analysis on the tags, determining the influence degree of the use risks of each tag, and setting the security management requirement of each tag based on the influence degree of the use risks;
the parameter setting module is used for setting label management parameters based on the security management requirements of the labels, wherein the label management parameters comprise request verification parameters and use monitoring parameters;
the verification module is used for verifying the tag use request based on the request verification parameter and generating a use monitoring instruction according to the use monitoring parameter which is the tag use request passing the verification;
the image monitoring module is used for calling a monitoring flow according to the use monitoring instruction, and carrying out image monitoring on the positions of the requesting user and the card reading through the image acquisition equipment based on the monitoring flow to obtain a use monitoring image set;
the feature analysis module is used for determining monitoring features according to the monitoring flow, and performing feature traversal analysis on the used monitoring image sets based on the monitoring features to obtain feature matching results;
the execution information generation module is used for generating tag execution information when the feature matching result meets the requirement of using the monitoring parameter, and the tag execution information is used for opening tag control operation authority for a requesting user.
The RFID monitoring module includes:
the RFID monitoring protocol input module is used for inputting an RFID monitoring protocol group which accords with the current RFID monitoring use condition by a user and transmitting the RFID monitoring protocol group which accords with the current RFID monitoring use condition to the RFID monitoring protocol selection module;
the RFID monitoring protocol selection module receives an RFID monitoring protocol group meeting the current RFID monitoring use condition sent by the RFID monitoring protocol input module and inputs the current RFID monitoring protocol selection requirement, and the RFID monitoring protocol selection module carries out RFID monitoring protocol selection on the RFID monitoring protocol group according to the protocol selection requirement, wherein the protocol selection requirement comprises RFID monitoring protocol writing speed, RFID monitoring protocol reading speed and RFID monitoring protocol interaction efficiency;
the RFID monitoring protocol interaction module is used for interacting the RFID monitoring protocol queue sent by the RFID monitoring protocol selection module into the RFID monitoring protocol queue available for current RFID monitoring and sending the RFID monitoring protocol queue to the RFID monitoring protocol unpacking module;
the RFID monitoring protocol unpacking module is used for converting the RFID monitoring protocol queues sent by the RFID monitoring protocol interaction module into 64bit data, packet headers and control signals and sending the 64bit data, packet headers and control signals to the RFID monitoring protocol interaction scheduling module;
and the RFID monitoring protocol interaction scheduling module is used for scheduling the protocol interaction queue when the RFID monitoring protocol interaction module performs protocol interaction.
The RFID monitoring protocol selection module comprises:
the protocol selection requirement input module is used for manually inputting the protocol selection requirement of RFID monitoring;
the result matching module is used for receiving the RFID monitoring protocol group which accords with the current RFID monitoring use condition and is sent by the RFID monitoring protocol input module, carrying out result matching on the RFID monitoring protocol group and the protocol selection requirement input by the protocol selection requirement input module, sending the same RFID monitoring protocol to the result comparison module, and discarding the RFID monitoring protocols with different result matching;
the result comparison module is used for receiving the RFID monitoring protocol sent by the result matching module and comparing the RFID monitoring protocol, wherein the RFID monitoring protocol comparison comprises RFID monitoring protocol writing speed comparison and RFID monitoring protocol reading speed comparison.
The working method of the RFID monitoring module is as follows;
a1, a user inputs an RFID monitoring protocol group which accords with the current RFID monitoring use condition through an RFID monitoring protocol input module;
a2, inputting a protocol selection requirement of current RFID monitoring through an RFID monitoring protocol selection module;
a3, judging whether the RFID monitoring protocol group is matched with the protocol selection requirement;
a4, if the judgment result is yes, outputting an RFID monitoring protocol queue to an RFID monitoring protocol unpacking module;
a5, the RFID monitoring protocol unpacking module unpacks the RFID monitoring protocol queue;
a6, the unpacked RFID monitoring protocol group performs protocol interaction queue scheduling through an RFID monitoring protocol interaction scheduling module;
and A7, monitoring the interacted RFID monitoring protocol group signal through an RFID monitoring signal monitoring unit.
The RFID monitoring protocol group meeting the current RFID monitoring use condition is input through the RFID monitoring protocol input module, the current RFID monitoring protocol selection requirement is input through the RFID monitoring protocol selection module, whether the RFID monitoring protocol group is matched with the protocol selection requirement is judged, if yes, the RFID monitoring protocol queue is output to the RFID monitoring protocol unpacking module, unpacking processing is carried out on the RFID monitoring protocol queue by the RFID monitoring protocol unpacking module, protocol interaction queue scheduling is carried out on the unpacked RFID monitoring protocol group through the RFID monitoring protocol interaction scheduling module, the interacted RFID monitoring protocol group signals are detected through the RFID monitoring signal detection unit, multiple protocols can be converted into the same type of protocols through the RFID monitoring protocol interaction module, interference in protocol monitoring under a plurality of RFID protocols is avoided, and the safety of the labels in the storage process is improved.
The method comprises the following steps:
s1, carrying out use security analysis on tags, determining the influence degree of use risks of each tag, and setting security management requirements of each tag based on the influence degree of use risks;
s2, setting tag management parameters based on security management requirements of the tags, wherein the tag management parameters comprise request verification parameters and use monitoring parameters;
s3, verifying the tag use request based on the request verification parameter, and generating a use monitoring instruction according to the use monitoring parameter being the tag use request passing the verification;
s4, according to the use monitoring instruction, invoking a monitoring flow, and based on the monitoring flow, performing image monitoring on the positions of the requesting user and the card reading through the image acquisition equipment to obtain a use monitoring image set;
s5, determining monitoring characteristics according to a monitoring flow, and respectively carrying out characteristic traversal analysis on the used monitoring image set based on the monitoring characteristics to obtain a characteristic matching result;
and S6, when the feature matching result meets the requirement of using the monitoring parameters, generating tag execution information, wherein the tag execution information is used for opening tag control operation authority for a requesting user.
Carrying out use security analysis on the tags, determining the influence degree of use risk of each tag, and setting the security management requirement of each tag based on the influence degree of use risk, wherein the method comprises the following steps:
b1, when the tag is stored, transmitting an RFID signal bound with the tag;
b2, receiving corresponding RFID signals based on the transmitted RFID signals;
b3, formulating a corresponding RFID monitoring protocol based on the received RFID signals;
when the labels are taken, obtaining label type information and label use range information;
b5, constructing a tag use record database based on the tag type information and the tag use range information;
step 6, extracting tag risk events from the tag use record database, and analyzing the robbery frequency, the influence range and the multidimensional influence degree of the influence result according to the tag risk event record information to obtain the multidimensional risk influence degree;
b7, calculating the influence of the using risk according to the theft frequency, the influence range, the preset weight value of the influence result and the multi-dimensional risk influence;
and B8, setting a security management level according to the influence of the use risk, and setting the security management requirement of the tag based on the security management level.
Based on the request verification parameters, verifying the tag use request comprises the following steps:
c1, obtaining user information of a tag use request;
performing authority verification on the user information, and performing level matching according to the user authority and the request verification parameters after passing the authority verification to determine authority level matching parameters;
and C3, generating a verification instruction to verify the tag use request based on the permission level matching parameter.
When the tag is stored, the RFID signals bound with the tag are transmitted, the corresponding RFID signals are received based on the transmitted RFID signals, a corresponding RFID monitoring protocol is formulated based on the received RFID signals, when the tag is taken, tag type information and tag use range information are obtained, a tag use record database is constructed based on the tag type information and the tag use range information, tag risk event extraction is carried out on the tag use record database, and according to the tag risk event record information, the robbery frequency, the influence range and the influence result multidimensional influence degree analysis are carried out, the multidimensional risk influence degree is obtained, the use risk influence degree is calculated according to the robbery frequency, the influence range and the preset weight value and the multidimensional risk influence degree of the influence result, the security management level is set according to the use risk influence degree, and the security management requirement of the tag is set based on the security management level.
Working principle: when the RFID monitoring protocol group detection system is used, the RFID monitoring protocol group meeting the current RFID monitoring use condition is input through the RFID monitoring protocol input module, the protocol selection requirement of the current RFID monitoring is input through the RFID monitoring protocol selection module, whether the RFID monitoring protocol group is matched with the protocol selection requirement is judged, if yes, the RFID monitoring protocol queue is output to the RFID monitoring protocol unpacking module, unpacking processing is carried out on the RFID monitoring protocol queue through the RFID monitoring protocol unpacking module, protocol interaction queue scheduling is carried out on the unpacked RFID monitoring protocol group through the RFID monitoring protocol interaction scheduling module, the interacted RFID monitoring protocol group signals are detected through the RFID monitoring signal detection unit, multiple protocols can be converted into the same type of protocols through the RFID monitoring protocol interaction module, interference caused by protocol monitoring under the RFID protocols with multiple numbers is avoided, and the safety of the labels in the storage process is improved.
While certain exemplary embodiments of the present invention have been described above by way of illustration only, it will be apparent to those of ordinary skill in the art that modifications may be made to the described embodiments in various different ways without departing from the spirit and scope of the invention. Accordingly, the drawings and description are to be regarded as illustrative in nature and not as restrictive of the scope of the invention, which is defined by the appended claims.

Claims (6)

1. A multi-target identification method based on radio frequency identification technology, comprising:
the RFID transmitting module is arranged on the tag and is used for transmitting an RFID signal bound with the current tag;
the RFID receiving module is used for receiving an RFID signal bound with the current tag;
the RFID monitoring module is used for monitoring the RFID signal bound with the current tag, and comprises:
the RFID monitoring protocol input module is used for inputting an RFID monitoring protocol group which accords with the current RFID monitoring use condition by a user and transmitting the RFID monitoring protocol group which accords with the current RFID monitoring use condition to the RFID monitoring protocol selection module;
the RFID monitoring protocol selection module receives an RFID monitoring protocol group meeting the current RFID monitoring use condition sent by the RFID monitoring protocol input module and inputs the current RFID monitoring protocol selection requirement, and the RFID monitoring protocol selection module carries out RFID monitoring protocol selection on the RFID monitoring protocol group according to the protocol selection requirement, wherein the protocol selection requirement comprises RFID monitoring protocol writing speed, RFID monitoring protocol reading speed and RFID monitoring protocol interaction efficiency;
the RFID monitoring protocol interaction module is used for interacting the RFID monitoring protocol queue sent by the RFID monitoring protocol selection module into the RFID monitoring protocol queue available for current RFID monitoring and sending the RFID monitoring protocol queue to the RFID monitoring protocol unpacking module;
the RFID monitoring protocol unpacking module is used for converting the RFID monitoring protocol queues sent by the RFID monitoring protocol interaction module into 64bit data, packet headers and control signals and sending the 64bit data, packet headers and control signals to the RFID monitoring protocol interaction scheduling module;
the RFID monitoring protocol interaction scheduling module is used for scheduling the protocol interaction queue when the RFID monitoring protocol interaction module performs protocol interaction;
the security analysis module is used for carrying out security analysis on the tags, determining the influence degree of the use risks of each tag, and setting the security management requirement of each tag based on the influence degree of the use risks;
the parameter setting module is used for setting tag management parameters based on security management requirements of tags, wherein the tag management parameters comprise request verification parameters and use monitoring parameters;
the verification module is used for verifying the tag use request based on the request verification parameter, and generating a use monitoring instruction according to the use monitoring parameter as the verified tag use request;
the image monitoring module is used for calling a monitoring flow according to the use monitoring instruction, and carrying out image monitoring on the positions of a requesting user and a card reading through the image acquisition equipment based on the monitoring flow to obtain a use monitoring image set;
the feature analysis module is used for determining monitoring features according to the monitoring flow, and performing feature traversal analysis on the using monitoring image set based on the monitoring features to obtain feature matching results;
the execution information generation module is used for generating tag execution information when the feature matching result meets the requirement of using the monitoring parameter, and the tag execution information is used for opening tag control operation authority for a requesting user.
2. The method of claim 1, wherein the RFID monitoring protocol selection module comprises:
the protocol selection requirement input module is used for manually inputting the protocol selection requirement of RFID monitoring;
the result matching module is used for receiving the RFID monitoring protocol group which accords with the current RFID monitoring use condition and is sent by the RFID monitoring protocol input module, and carrying out result matching on the RFID monitoring protocol group and the protocol selection requirement input by the protocol selection requirement input module, wherein the same RFID monitoring protocol is sent to the result comparison module by the result matching module, and the RFID monitoring protocols which are different in result matching are discarded;
the result comparison module is used for receiving the RFID monitoring protocol sent by the result matching module and comparing the RFID monitoring protocol, wherein the RFID monitoring protocol comparison comprises RFID monitoring protocol writing speed comparison and RFID monitoring protocol reading speed comparison.
3. The multi-target identification method based on the radio frequency identification technology according to claim 1, wherein the working method of the RFID monitoring module is as follows;
a1, a user inputs an RFID monitoring protocol group which accords with the current RFID monitoring use condition through an RFID monitoring protocol input module;
a2, inputting a protocol selection requirement of current RFID monitoring through an RFID monitoring protocol selection module;
a3, judging whether the RFID monitoring protocol group is matched with the protocol selection requirement;
a4, if the judgment result is yes, outputting an RFID monitoring protocol queue to an RFID monitoring protocol unpacking module;
a5, the RFID monitoring protocol unpacking module unpacks the RFID monitoring protocol queue;
a6, the unpacked RFID monitoring protocol group performs protocol interaction queue scheduling through an RFID monitoring protocol interaction scheduling module;
and A7, monitoring the interacted RFID monitoring protocol group signal through an RFID monitoring signal monitoring unit.
4. The multi-target identification method based on radio frequency identification technology according to claim 1, comprising the steps of:
s1, carrying out use security analysis on tags, determining the influence degree of use risks of each tag, and setting the security management requirement of each tag based on the influence degree of use risks;
s2, setting tag management parameters based on security management requirements of tags, wherein the tag management parameters comprise request verification parameters and use monitoring parameters;
s3, verifying the tag use request based on the request verification parameter, and generating a use monitoring instruction according to the use monitoring parameter being the verified tag use request;
s4, according to the use monitoring instruction, a monitoring flow is called, and based on the monitoring flow, image monitoring is carried out on the position of a requesting user and a card reading position through image acquisition equipment, so that a use monitoring image set is obtained;
s5, determining monitoring features according to the monitoring flow, and respectively carrying out feature traversal analysis on the using monitoring image set based on the monitoring features to obtain feature matching results;
and S6, when the feature matching result meets the requirement of using the monitoring parameters, generating tag execution information, wherein the tag execution information is used for opening tag control operation authority for a requesting user.
5. The method for multi-target identification based on radio frequency identification technology according to claim 4, wherein the performing the usage security analysis on the tags, determining the usage risk influence degree of each tag, and setting the security management requirement of each tag based on the usage risk influence degree, comprises the following steps:
b1, when the tag is stored, transmitting an RFID signal bound with the tag;
b2, receiving corresponding RFID signals based on the transmitted RFID signals;
b3, formulating a corresponding RFID monitoring protocol based on the received RFID signals;
when the labels are taken, obtaining label type information and label use range information;
b5, constructing a tag use record database based on the tag type information and the tag use range information;
b6, extracting tag risk events from the tag use record database, and analyzing the robbery frequency, the influence range and the multidimensional influence degree of the influence result according to the tag risk event record information to obtain the multidimensional risk influence degree;
b7, calculating the using risk influence according to the stealing frequency, the influence range, the preset weight value of the influence result and the multidimensional risk influence;
and B8, setting a security management level according to the influence of the use risk, and setting security management requirements of the tag based on the security management level.
6. The method of claim 5, wherein verifying the tag use request based on the request verification parameters comprises the steps of:
c1, obtaining user information of a tag use request;
performing authority verification on the user information, and performing level matching according to the user authority and the request verification parameters after passing the authority verification to determine authority level matching parameters;
and C3, generating a verification instruction to verify the tag use request based on the permission level matching parameter.
CN202311325949.4A 2023-10-13 2023-10-13 Multi-target identification method based on radio frequency identification technology Active CN117057372B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311325949.4A CN117057372B (en) 2023-10-13 2023-10-13 Multi-target identification method based on radio frequency identification technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311325949.4A CN117057372B (en) 2023-10-13 2023-10-13 Multi-target identification method based on radio frequency identification technology

Publications (2)

Publication Number Publication Date
CN117057372A CN117057372A (en) 2023-11-14
CN117057372B true CN117057372B (en) 2024-01-26

Family

ID=88669661

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311325949.4A Active CN117057372B (en) 2023-10-13 2023-10-13 Multi-target identification method based on radio frequency identification technology

Country Status (1)

Country Link
CN (1) CN117057372B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101289354B1 (en) * 2012-03-21 2013-07-29 순천향대학교 산학협력단 Rfid recognition system and method
WO2015092375A1 (en) * 2013-12-16 2015-06-25 Sekura Global Llp Security system and method
CN105424222A (en) * 2015-11-01 2016-03-23 西安电子科技大学 RFID technology based multi-target temperature state monitoring system and method
CN107004152A (en) * 2014-10-10 2017-08-01 维普公司 Allow the contactless biometric identifying device of various configurations
CN115643634A (en) * 2022-12-26 2023-01-24 北京云末科技服务有限公司 Wireless cooperative tracking monitoring method, device and system
CN115828219A (en) * 2022-12-12 2023-03-21 中博信息技术研究院有限公司 Intelligent seal management and control method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101289354B1 (en) * 2012-03-21 2013-07-29 순천향대학교 산학협력단 Rfid recognition system and method
WO2015092375A1 (en) * 2013-12-16 2015-06-25 Sekura Global Llp Security system and method
CN107004152A (en) * 2014-10-10 2017-08-01 维普公司 Allow the contactless biometric identifying device of various configurations
CN105424222A (en) * 2015-11-01 2016-03-23 西安电子科技大学 RFID technology based multi-target temperature state monitoring system and method
CN115828219A (en) * 2022-12-12 2023-03-21 中博信息技术研究院有限公司 Intelligent seal management and control method and system
CN115643634A (en) * 2022-12-26 2023-01-24 北京云末科技服务有限公司 Wireless cooperative tracking monitoring method, device and system

Also Published As

Publication number Publication date
CN117057372A (en) 2023-11-14

Similar Documents

Publication Publication Date Title
US8537014B2 (en) RFID tag movement determination
Liu et al. Unknown tag identification in large RFID systems: An efficient and complete solution
EP1914660B1 (en) Query tree based tag identification method in RFID systems
US7626503B2 (en) Bi-slot tree based tag identification method in RFID systems
EP1959579A1 (en) Electronic tag, and electronic tag system
CN110737881B (en) Fingerprint verification method and device for intelligent equipment
CN104091184A (en) Electronic tag detection method and system
CN107689871A (en) The Internet of Things mobile terminal veritified with identity and testimony of a witness unification checking method
CN114154995B (en) Abnormal payment data analysis method and system applied to big data wind control
CN111144522A (en) Power grid NFC equipment fingerprint authentication method based on hardware intrinsic difference
CN117057372B (en) Multi-target identification method based on radio frequency identification technology
CN112215029B (en) Ultrahigh frequency passive tag real-time parallel decoding method, storage medium and device
CN116861941A (en) Asset management method, system and storage medium based on RFID data
Quan et al. Performance analysis of tag anti-collision algorithms for RFID systems
US20170235979A1 (en) RFID Reader and Method for Recognizing RFID tags
CN114245412A (en) Channel state determination method, device and machine-readable storage medium
WO2021217914A1 (en) Damage evidence extraction method and apparatus, computer device, and storage medium
CN112434656A (en) Image identification method and device of Internet of things equipment and computer equipment
CN102208041A (en) RFID data acquisition method having interruption tolerance capability
CN111310875A (en) Reagent detection system, method, computer device and readable storage medium
CN116805232B (en) RFID-based intelligent comprehensive material management method, system and storage medium
CN110675140A (en) Payment information processing method, device, equipment and computer readable storage medium
Yu et al. Practical key tag monitoring in RFID systems
US20240020492A1 (en) Method for detecting mounting of an object at a terminal device
WO2023159340A1 (en) Deep learning-based tag identification method and apparatus, electronic device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant