CN117315298B - RFID tag-based identification method and device, electronic equipment and storage medium - Google Patents

RFID tag-based identification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117315298B
CN117315298B CN202311585878.1A CN202311585878A CN117315298B CN 117315298 B CN117315298 B CN 117315298B CN 202311585878 A CN202311585878 A CN 202311585878A CN 117315298 B CN117315298 B CN 117315298B
Authority
CN
China
Prior art keywords
tag
information
verification
image
coding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311585878.1A
Other languages
Chinese (zh)
Other versions
CN117315298A (en
Inventor
刘尔霖
何昊阳
刘绿山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Auco Huachuang Automation Shenzhen Co ltd
Original Assignee
Auco Huachuang Automation Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Auco Huachuang Automation Shenzhen Co ltd filed Critical Auco Huachuang Automation Shenzhen Co ltd
Priority to CN202311585878.1A priority Critical patent/CN117315298B/en
Publication of CN117315298A publication Critical patent/CN117315298A/en
Application granted granted Critical
Publication of CN117315298B publication Critical patent/CN117315298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/761Proximity, similarity or dissimilarity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/0464Convolutional networks [CNN, ConvNet]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/82Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Evolutionary Computation (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Multimedia (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Molecular Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an identification method and device based on an RFID tag, electronic equipment and a storage medium, and relates to the technical field of computers. The method comprises the steps of firstly obtaining tag coding information of an RFID tag, then decrypting the tag coding information, and determining tag storage information corresponding to the RFID tag. And then screening out the tag verification information from the tag storage information according to a preset verification field address, and then carrying out information conversion on the tag verification information according to an image conversion rule to obtain a tag verification image. And finally, carrying out image verification on the label verification image, and under the condition that the image verification fails, determining that the label storage information is tampered, generating label abnormal information and displaying the label abnormal information. Therefore, the label storage information of the RFID label can be subjected to safety verification, and the accuracy and the data safety of information tracing of the RFID label are ensured.

Description

RFID tag-based identification method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an RFID tag-based identification method, an RFID tag-based identification device, an electronic device, and a storage medium.
Background
RFID (Radio Frequency Identification, radio frequency identification technology) is a communication technology for identifying and transmitting information by radio waves. It does not require direct physical contact to identify the object, which makes RFID very convenient and practical in many applications. For example, they are widely used in supply chain management, security tracking, animal identification, car theft protection, etc. However, the encryption algorithm corresponding to the RFID tag is generally simple, and after decrypting the obtained tag coding information, the decrypted tag storage information is read as the initial storage information of the RFID tag. Thereby greatly reducing the data security of the RFID tag.
Disclosure of Invention
The present invention has been made in view of the above problems, and has as its object to provide an RFID tag-based identification method, apparatus, device and storage medium which overcome or at least partially solve the above problems.
According to a first aspect of the present invention, there is provided an RFID tag-based identification method, the method comprising: acquiring tag coding information of an RFID tag; decrypting the tag coding information to determine tag storage information corresponding to the RFID tag; screening tag verification information from the tag storage information according to a preset verification field address; performing information conversion on the tag verification information according to an image conversion rule to obtain a tag verification image; and carrying out image verification on the label verification image, determining that the label storage information is tampered under the condition that the image verification fails, generating label abnormal information and displaying the label abnormal information.
According to a second aspect of the present invention, there is also provided an RFID tag-based identification device, the device comprising: the information acquisition module is used for acquiring tag coding information of the RFID tag; the information decryption module is used for decrypting the tag coding information and determining tag storage information corresponding to the RFID tag; the information screening module is used for screening out tag verification information from the tag storage information according to a preset verification field address; the information conversion module is used for carrying out information conversion on the tag verification information according to an image conversion rule to obtain a tag verification image; and the image verification module is used for carrying out image verification on the tag verification image, determining that the tag storage information is tampered under the condition that the image verification fails, generating tag abnormality information and displaying the tag abnormality information.
According to a third aspect of the present invention, there is also provided an electronic device comprising: one or more processors; a memory; one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of the above summary.
According to a fourth aspect of the present invention there is also provided a storage medium storing a computer program for use in connection with an electronic device, the computer program being executable by a processor to perform the method of any of the above summary.
In the scheme of the invention, the method comprises the steps of firstly obtaining the label coding information of the RFID label, then decrypting the label coding information, and determining the label storage information corresponding to the RFID label. And then screening out the tag verification information from the tag storage information according to a preset verification field address, and then carrying out information conversion on the tag verification information according to an image conversion rule to obtain a tag verification image. And finally, carrying out image verification on the label verification image, and under the condition that the image verification fails, determining that the label storage information is tampered, generating label abnormal information and displaying the label abnormal information. Therefore, the label storage information of the RFID label can be subjected to safety verification, and the accuracy and the data safety of information tracing of the RFID label are ensured.
The foregoing description is only a summary of the invention in order to make it easier to understand the technical means of the invention, and it is intended to make the above and other objects, features and advantages of the invention more obvious and more understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures.
In the drawings: fig. 1 is a schematic flow chart of steps of an identification method based on an RFID tag according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart of steps of another identification method based on an RFID tag according to an embodiment of the present invention.
Fig. 3 is a block diagram of an RFID tag-based identification apparatus according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present invention are shown in the drawings, it should be understood that the present invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
Referring to fig. 1, an identification method based on an RFID tag according to an embodiment of the present invention is shown, where the method may include: s101, acquiring tag coding information of the RFID tag.
In the embodiment of the invention, the RFID (Radio Frequency Identification, radio frequency identification technology) tag is also called an electronic tag or a radio frequency tag. The RFID tag is a carrier of the RFID technology and consists of a coupling element and a chip, and each tag has a unique electronic code, is attached to a product and is used for identifying a target product object.
The tag encoded information is encrypted to prevent others from obtaining, misappropriating, or otherwise tampering with the information stored in the RFID tag. The tag coding information identifies different target product objects, that is, for different target product objects, the corresponding tag coding information is unique, and can be used for tracing the related information of the target product objects. For example, the tag encoded information may include product type, product attributes, and other traceable scenarios tailored to the target product object.
S102, decrypting the tag coding information to determine tag storage information corresponding to the RFID tag.
In the embodiment of the invention, after the tag coding information is acquired. The tag coding information can be decrypted according to a preset encryption algorithm, so that tag storage information corresponding to the RFID tag can be determined. The tag storage information may be in a plaintext format corresponding to the tag coding information.
S103, screening out tag verification information from the tag storage information according to a preset verification field address.
In the embodiment of the present invention, the verification field address may be understood as a field location corresponding to verification information used for verifying whether the tag storage information is tampered with in the tag storage information. And screening out the tag verification information from the corresponding field position of the tag storage information according to the verification field address, wherein the tag verification information is verification information for verifying whether the tag storage information is tampered or not.
S104, carrying out information conversion on the tag verification information according to an image conversion rule to obtain a tag verification image.
In the embodiment of the invention, the image conversion rule can be understood as a related rule for converting verification information into a verification image. For example, the image conversion rule may include a feature mapping relationship between the tag verification information and the tag verification image.
And converting the information of the tag verification information through the characteristic mapping relation, and determining a tag verification image matched with the tag verification information.
S105, performing image verification on the tag verification image, and under the condition that the image verification fails, determining that the tag storage information is tampered, generating tag abnormality information and displaying the tag abnormality information.
In the embodiment of the invention, after the label verification image matched with the label verification information is determined, the label verification image can be subjected to image verification. For example, the image similarity between the tag verification image and the tag reference image may be calculated, and in the case that the image similarity is smaller than the image similarity threshold, the tag storage information is determined to be tampered, and tag abnormality information is generated and displayed.
Referring to fig. 2, another RFID tag-based identification method provided by an embodiment of the present invention is shown, where the method may include: s201, acquiring tag coding information of the RFID tag.
In the embodiment of the present invention, the description of step S201 refers to the description of step S101 described above.
S202, determining the field coding width corresponding to the tag coding information according to a preset first coding formula.
The first coding formula is as follows:equation (1).
Wherein, W refers to the field coding width corresponding to each coding information field, and W0 is the preset initial field coding width; a refers to a user identification constant; b refers to a random constant which is randomly valued between 0,1,2, wherein the user identification constant and the random constant are stored in the head end of the tag coding information.
In the embodiment of the present invention, the field coding width refers to a preset coding bit number of the data storage corresponding to each coding information field. Therefore, after the field coding width is determined, the tag coding information can be divided according to the field coding width to obtain a plurality of coding information fields to be decrypted.
In one example, the user identification constant a is associated with a user terminal corresponding to performing an information storage operation of the RFID tag. That is, the user identification constant a is different according to the user terminals corresponding to the information storage operation of the RFID tag, and the value of the corresponding user identification constant is also different, so that the field coding width of the RFID tag can be dynamically adapted according to different user terminals, that is, under the condition that the information storage operation is performed on the RFID tag for the target product object in the same batch through the user terminals corresponding to different users, the field coding width corresponding to each corresponding encrypted storage information field can be different, thereby reducing the risk that the storage information in the RFID tag is successfully acquired or tampered by others, and further improving the detection accuracy of verifying whether the storage information of the tag is tampered.
The user identification constant may be a positive integer, and may be differentiated according to user levels corresponding to different user terminals, for example, the user identification constant of a user terminal corresponding to a first level may be 1, the user identification constant of a user terminal corresponding to a second level may be 2, etc.
In some embodiments, the preset initial field coding width W0 is determined synthetically by those skilled in the art according to different coding requirements and preset values of the user identification constant, so that W0/2a may be a positive integer. And the user identification constant and the random constant are stored in the head end of the tag coding information. And after the data corresponding to each encoded information field is stored, the data with less than the preset encoding digits are complemented by a preset character or a preset symbol, for example, the preset character may be 0, and the preset symbol may be comma, period, etc. And are not excessively limited herein.
S203, determining the coding mode identification corresponding to the tag coding information according to a preset second coding formula.
The second coding formula is as follows:equation (2).
In the embodiment of the invention, S refers to a coding mode identifier; q refers to the total number of preset coding modes; s0 refers to the initial coding mode identification. The code pattern identification is used to determine a specific code pattern (or may be used to determine an encryption algorithm). Wherein the coding mode identifier is associated with a user terminal corresponding to the information storage operation of the RFID tag, that is, the coding mode identifier S is different according to the user terminal corresponding to the information storage operation of the RFID tag, and the corresponding coding mode identifier is also different. Considering that b is a random constant which is randomly valued between 0,1,2, the coding mode identifier can be defined based on the total number of preset encryption algorithms and the cumulative sum of the user identifier constant and the random constant.
For example, if the cumulative sum of the user identification constant and the random constant is smaller than or equal to the total number of the encryption algorithms, it is determined that the coding mode identifier corresponding to the tag coding information is a+b. For another example, when the cumulative sum of the user identification constant and the random constant is greater than the total number of the encryption algorithm, it is determined that the coding mode identification corresponding to the tag coding information is S0, where S0 is one of values 1-Q.
Therefore, the coding mode identification of the RFID tag can be dynamically adapted according to different user terminals, namely, under the condition that information storage operation is carried out on the RFID tag of the target product object in the same batch through the user terminals corresponding to different users, the encryption algorithm of the corresponding tag storage information can also be different, so that the risk that the storage information in the RFID tag is successfully acquired or tampered by other people can be reduced, and the detection accuracy for verifying whether the tag storage information is tampered can be further improved.
For example, the user identification constant a and the random constant b are stored in a first storage bit and a second storage bit of the tag encoding information. When the relevant traceability information of the target product object is written into the RFID tag, the relevant traceability information can be encoded according to the field coding width and the coding mode identification, the encoded storage information is completed, and the field coding width and the coding mode identification are spliced to the first storage bit and the second storage bit after the encoded storage information. Thereby obtaining tag encoded information written in the RFID tag.
S204, decrypting the tag coding information according to the field coding width and the coding mode identification, and determining the tag storage information corresponding to the RFID tag.
In the embodiment of the invention, after the field coding width and the coding mode identifier are determined, the corresponding coding mode can be matched according to the coding mode identifier, so that a plurality of coded information fields to be decrypted can be decrypted (or are reversely coded) respectively according to the coding mode. Thereby determining the label storage information corresponding to the RFID label. The tag storage information may be in a plaintext format corresponding to the tag coding information.
S205, screening out tag verification information from the tag storage information according to a preset verification field address.
In the embodiment of the present invention, the verification field address may be understood as a field location corresponding to verification information used for verifying whether the tag storage information is tampered with in the tag storage information. And screening out the tag verification information from the corresponding field position of the tag storage information according to the verification field address, wherein the tag verification information is verification information for verifying whether the tag storage information is tampered or not.
The verification field address may be discontinuous, that is, the tag verification information is interspersed with the tag verification information, so that the verification accuracy of whether the tag storage information is tampered can be further improved. To avoid that the verification field addresses are consecutive, the user tampers with the stored information of a part of the RFID tags without detection.
In one example, the address association relationship between the verification field address and the information field address in the tag storage information is as follows:equation (3).
Wherein Bi is an information field address of an i-th verification field address in the tag verification information in the tag storage information. Wherein, C refers to a field distance between two adjacent verification field addresses in the tag verification information, which may be a constant preset by a user. And i is a positive integer. The D0 refers to the address of the first verification field in the tag storage information.
S206, carrying out information conversion on the tag verification information according to an image conversion rule to obtain a tag verification image.
In the embodiment of the invention, the image conversion rule can be understood as a related rule for converting verification information into a verification image. For example, the image conversion rule may include a feature mapping relationship between the tag verification information and the tag verification image. And converting the numerical value corresponding to the verification field into an image gray value according to the verification field in the label verification information and the feature mapping relation included in the image verification rule. The feature mapping relationship is as follows: Equation (4).
Wherein S is K Refers to the image gray value corresponding to the kth pixel point. K refers to the Kth verification field, V in the tag verification information KP Refers to the value corresponding to the P-th storage bit in the kth verification field.
Thus, when determining the image gray value corresponding to the first pixel point, the value may be the cumulative sum of the values corresponding to the W storage bits in the first verification field in the tag verification information. And so on, thereby obtaining the image gray values corresponding to all the pixel points corresponding to the label verification image.
And after determining all the image gray values, generating blank images with preset sizes. The number of pixels corresponding to the blank image with the preset size is the same as that of pixels corresponding to the tag verification image. For example, the preset size of the blank image includes a preset width and a preset length. The product of the preset width and the preset length is the number of pixels of the blank image. Thus, in determining the image gray value S 1 、S 2 To S K And then, sequentially filling the plurality of image gray values into the blank images, for example, the filling of the image gray values can be performed according to the row filling sequence from top to bottom or the column filling sequence from left to right, and finally the label verification image is obtained.
S207, performing image verification on the label verification image.
S208, whether the tag verification image fails to verify the image.
In the embodiment of the invention, after the label verification image matched with the label verification information is determined, the label verification image can be subjected to image verification. For example, an image similarity between the tag verification image and the tag reference image may be calculated, and in the case where the image similarity is smaller than an image similarity threshold, it is determined that the tag verification image fails to verify, and it is determined that the tag storage information is tampered. The label verification image can comprise a target product image and an encrypted image. The target product image may be an image including a target product object, and the encrypted image may include an image corresponding to the encrypted object. The encrypted object may be another object different from the target product object, for example, the encrypted object may be LOGO, text, etc., and a person skilled in the art may select a corresponding encrypted object according to the actual situation, which is not limited herein.
Correspondingly, the image similarity may include a product similarity and an encryption similarity, and the tag reference image may include a product reference image and an encryption reference image. The target detection can be performed on the tag verification image to obtain a target product image corresponding to the RFID tag, and the product similarity between the target product image and the product reference image is calculated.
And under the condition of calculating the product similarity, comparing the gray values of the images corresponding to the pixel points at the same position, if the gray value difference value between the pixel points at the same position is larger than a difference threshold value, indicating that the gray values of the images corresponding to the pixel points at the position are not matched, and counting the pixel points with the unmatched gray values of the images between the product reference image and the target product image, wherein the pixel points occupy the ratio of all the pixel points and are used as the product similarity.
In an example, a product detection model is adopted to perform target detection on the tag verification image, so as to obtain a target product image corresponding to the RFID tag. The product detection model is used for detecting image position information of a target product object contained in the tag verification image, so that the target product object can be scratched out of the tag verification image according to the image position information, and a target product image is generated.
In the embodiment of the invention, the product detection model comprises a feature extraction network and a target detection network, wherein the feature extraction network is used for extracting image feature information of a label verification image. Therefore, the tag verification images can be respectively input into the feature extraction network to perform feature extraction, and image feature information corresponding to the tag verification images is determined. The image feature information may be understood as a vector representation of the product features of the corresponding target product object. And then inputting the image characteristic information into the target detection network for product characteristic recognition to obtain a target product image corresponding to the target product object contained in the tag verification image. The target detection network is used for determining product characteristic information corresponding to a target product image from image characteristics and positioning information of the product characteristic information in the tag verification image, so that image information of a corresponding position can be scratched or copied from the tag verification image according to the positioning information to serve as the target product image. The product detection model can adopt a regional convolution neural network, a Mask R-CNN network, a fast R-CNN network and other networks.
The training images of the product detection model can comprise target product objects, and corresponding product frames are preset in each training image. The training data of the product detection model may be composed of N (image+data pair of product frame), and the product frame refers to a bounding box pre-laid in the image and including parameter information, where the parameter information includes position information and size information of the product frame, and is used for framing a target product object in the training image.
And training the product detection model by adopting the training data, inputting the training image into the product detection model for product matching, and predicting the product category and the product frame included in the training image. And then determining a loss function value of the model according to the predicted product category and the predicted product frame, the real product category and the real product frame, and adjusting parameters of the model according to the loss function value so as to obtain a trained product detection model. For example, when the magnitude of the decrease in the loss function value is small, for example, when the magnitude of the decrease is not more than 0.5%, the parameter adjustment is stopped, and it is determined that the training of the product detection model is completed.
The placement position of the target encryption image in the tag verification image is preset, so that the tag verification image can be subjected to image segmentation to obtain the encryption image corresponding to the RFID tag. Wherein the encrypted image may also be associated with a user identification constant. Then the encryption similarity between the encrypted image and the encrypted reference image is calculated. And when the encryption similarity is calculated, calculating the encryption similarity according to the logic for calculating the product similarity. The difference threshold may be 2, 5, and 10, which are not limited herein. And finally, determining whether the label verification image fails to verify according to the product similarity and the encryption similarity.
In one example, the tag verification image verification failure is determined if the product similarity is less than a first similarity threshold, or if the encryption similarity is less than the second similarity threshold. That is, the tag storage information is tampered with by other users. If the image verification fails, step S209 is executed. The first similar threshold and the second similar threshold may be determined according to actual design requirements, for example, may be 90%, 92%, 97%, etc.
In another example, in the case where the product similarity is greater than or equal to a first similarity threshold and the encryption similarity is greater than or equal to a second similarity threshold, it is determined that the tag verification image verification is successful, that is, the tag encoded information is still originally saved information and has not been altered. In the case that the image verification is successful, step S210 is performed.
S209, determining that the tag storage information is tampered, generating tag abnormality information and displaying the tag abnormality information.
In the embodiment of the invention, under the condition that the image verification fails, the label storage information is determined to be tampered, the label abnormality information is generated and displayed, so that a user can be prompted to process the abnormal RFID label in time.
S210, determining that the tag storage information is successfully read, and displaying the tag storage information.
In the embodiment of the invention, under the condition that the image verification is successful, the label storage information of the RFID label is determined not to be tampered, and the complete and accurate original storage information is ensured, so that the success of reading the decrypted label storage information is determined, and the label storage information in the plaintext form is displayed. The user can conveniently read the related product information of the target product object based on the displayed tag storage information.
In summary, the embodiment of the invention discloses an identification method based on an RFID tag, which may include first acquiring tag coding information of the RFID tag, then decrypting the tag coding information, and determining tag storage information corresponding to the RFID tag. And then screening out the tag verification information from the tag storage information according to a preset verification field address, and then carrying out information conversion on the tag verification information according to an image conversion rule to obtain a tag verification image. And finally, carrying out image verification on the label verification image, and under the condition that the image verification fails, determining that the label storage information is tampered, generating label abnormal information and displaying the label abnormal information. Therefore, the label storage information of the RFID label can be subjected to safety verification, and the accuracy and the data safety of information tracing of the RFID label are ensured.
The identification method based on the RFID tag described in the embodiments of the invention can be applied to application scenes with strong traceability on product objects and high data security level. Such as the transfer of valuables, the anti-counterfeiting of tickets, the tracking of personnel or important goods and the like.
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are all preferred embodiments and that the acts referred to are not necessarily required by the embodiments of the present application.
Referring to fig. 3, an identification device based on an RFID tag according to an embodiment of the present invention is shown, where the device may include: the information acquisition module 301 is configured to acquire tag coding information of an RFID tag.
And the information decryption module 302 is configured to decrypt the tag encoded information and determine tag storage information corresponding to the RFID tag.
The information filtering module 303 is configured to filter the tag verification information from the tag storage information according to a preset verification field address.
And the information conversion module 304 is configured to perform information conversion on the tag verification information according to an image conversion rule, so as to obtain a tag verification image.
And the image verification module 305 is used for performing image verification on the tag verification image, determining that the tag storage information is tampered under the condition that the image verification fails, and generating and displaying tag abnormality information.
In an optional embodiment of the present invention, the information decryption module 302 may include a first decryption sub-module, configured to determine, according to a preset first coding formula, a field coding width corresponding to the tag coding information, where the first coding formula is as follows:
the W refers to the field coding width corresponding to each coding information field, and W0 is the preset initial field coding width; a refers to a user identification constant; b refers to a random constant which is randomly valued between 0,1,2, wherein the user identification constant and the random constant are stored in the head end of the tag coding information.
The second decryption sub-module is used for determining the coding mode identifier corresponding to the tag coding information according to a preset second coding formula, and the second coding formula is as follows:
s refers to a coding mode identifier; q refers to the total number of preset coding modes; s0 refers to the initial coding mode identification.
And the information decryption sub-module is used for decrypting the tag coding information according to the field coding width and the coding mode identification and determining the tag storage information corresponding to the RFID tag.
In an alternative embodiment of the invention, the user identification constant is obtained based on the user identification triggering the storing operation in case of information storage by the RFID tag.
In an alternative embodiment of the invention, the image verification rule includes: feature mapping relation between label verification information and image gray scale features, wherein the feature mapping relation is as follows:
S K refers to the image gray value corresponding to the kth pixel point. Wherein K refers to the Kth verification field, V in the tag verification information KP Refers to the value corresponding to the P-th storage bit in the kth verification field.
In an alternative embodiment of the invention, the information conversion module 304 may include: and the gray level conversion sub-module is used for converting the numerical value corresponding to the verification field into an image gray level value according to the verification field in the label verification information and the characteristic mapping relation included in the image verification rule.
And the image generation sub-module is used for generating blank images with preset sizes, and sequentially filling a plurality of image gray values into the blank images respectively to obtain the label verification image.
In an alternative embodiment of the invention, the image verification module 305 may include: and the product image determining sub-module is used for carrying out target detection on the tag verification image to obtain a target product image corresponding to the RFID tag.
And the first similarity sub-module is used for calculating the product similarity between the target product image and the product reference image.
And the encryption image determining sub-module is used for carrying out image segmentation on the tag verification image to obtain an encryption image corresponding to the RFID tag.
And the second similarity submodule is used for calculating the encryption similarity between the encryption image and the encryption reference image.
And the image verification sub-module is used for determining whether the label verification image fails to be verified according to the product similarity and the encryption similarity.
In an alternative embodiment of the invention, the image verification sub-module may include: and the first verification unit is used for determining that the label verification image fails to verify if the product similarity is smaller than a first similarity threshold value or if the encryption similarity is smaller than a second similarity threshold value.
And the second verification unit is used for determining that the label verification image verification is successful when the product similarity is greater than or equal to a first similarity threshold value and the encryption similarity is greater than or equal to a second similarity threshold value.
In summary, the embodiment of the invention discloses an identification device based on an RFID tag, which may include first acquiring tag coding information of the RFID tag, then decrypting the tag coding information, and determining tag storage information corresponding to the RFID tag. And then screening out the tag verification information from the tag storage information according to a preset verification field address, and then carrying out information conversion on the tag verification information according to an image conversion rule to obtain a tag verification image. And finally, carrying out image verification on the label verification image, and under the condition that the image verification fails, determining that the label storage information is tampered, generating label abnormal information and displaying the label abnormal information. Therefore, the label storage information of the RFID label can be subjected to safety verification, and the accuracy and the data safety of information tracing of the RFID label are ensured.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described by differences from other embodiments, and identical and similar parts between the embodiments are all enough to be referred to each other.
As will be readily appreciated by those skilled in the art: any combination of the above embodiments is possible, and thus is an embodiment of the present invention, but the present specification is not limited by the text.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the above description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be construed as reflecting the intention that: i.e., the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the apparatus of the embodiments may be adaptively changed and disposed in one or more apparatuses different from the embodiments. The modules or units or components of the embodiments may be combined into one module or unit or component and, furthermore, they may be divided into a plurality of sub-modules or sub-units or sub-components. Any combination of all features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or units of any method or apparatus so disclosed, may be used in combination, except insofar as at least some of such features and/or processes or units are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
An electronic device, comprising: one or more processors; a memory; one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the methods described in the above embodiments.
A computer readable storage medium storing a computer program for use in connection with an electronic device, the computer program being executable by a processor to perform the method of the above embodiments.
It will be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the invention may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal device, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or terminal device comprising the element.
The above description of the identification method based on the RFID tag and the identification device based on the RFID tag provided by the invention applies specific examples to illustrate the principle and the implementation of the invention, and the above description of the examples is only used for helping to understand the method and the core idea of the invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.

Claims (8)

1. An RFID tag-based identification method, the method comprising:
acquiring tag coding information of an RFID tag;
decrypting the tag coding information to determine tag storage information corresponding to the RFID tag;
screening tag verification information from the tag storage information according to a preset verification field address;
performing information conversion on the tag verification information according to an image conversion rule to obtain a tag verification image;
performing image verification on the label verification image, determining that the label storage information is tampered under the condition that the image verification fails, generating label abnormality information and displaying,
the decrypting the tag coding information to determine the tag storage information corresponding to the RFID tag includes:
according to the presetDetermining a field coding width corresponding to each coding information field in the tag coding information, wherein the first coding formula is as follows:;
the W refers to the field coding width corresponding to each coding information field, and W0 is the preset initial field coding width; a refers to a user identification constant; b refers to a random constant which is randomly valued in three values of 0,1 and 2, wherein the user identification constant and the random constant are stored in the head end of the tag coding information;
Determining a coding mode identifier corresponding to the tag coding information according to a preset second coding formula, wherein the second coding formula is as follows:;
s refers to a coding mode identifier; q refers to the total number of preset coding modes; s0 refers to an initial coding mode identifier;
decrypting the tag coding information according to the field coding width and the coding mode identification corresponding to each coding information field to determine the tag storage information corresponding to the RFID tag,
wherein the image conversion rule includes: feature mapping relation between label verification information and image gray scale features, wherein the feature mapping relation is as follows:;
S K refers to the image gray value corresponding to the Kth pixel point; wherein K refers to the Kth verification field, V in the tag verification information KP Refers to the value corresponding to the P-th storage bit in the kth verification field.
2. The RFID tag-based identification method of claim 1, wherein the user identification constant is derived based on a user identification triggering a storage operation in the case of information storage by the RFID tag.
3. The method for identifying an RFID tag according to claim 1, wherein said converting the tag verification information according to an image conversion rule to obtain a tag verification image comprises:
Converting a numerical value corresponding to the verification field into an image gray value according to the verification field in the tag verification information and the feature mapping relation included in the image conversion rule;
and generating blank images with preset sizes, and respectively filling a plurality of image gray values into the blank images in sequence to obtain the label verification image.
4. The RFID tag-based identification method of claim 2, wherein said image verifying the tag verification image comprises:
performing target detection on the tag verification image to obtain a target product image corresponding to the RFID tag;
calculating the product similarity between the target product image and the product reference image;
performing image segmentation on the tag verification image to obtain an encrypted image corresponding to the RFID tag;
calculating the encryption similarity between the encryption image and the encryption reference image;
and determining whether the label verification image fails to be verified according to the product similarity and the encryption similarity.
5. The RFID tag-based identification method of claim 4, wherein the determining whether the tag verification image fails image verification based on the product similarity and the encryption similarity comprises:
Determining that the tag verification image fails in the event that the product similarity is less than a first similarity threshold, or in the event that the encryption similarity is less than a second similarity threshold;
and determining that the tag verification image verification is successful when the product similarity is greater than or equal to a first similarity threshold and the encryption similarity is greater than or equal to a second similarity threshold.
6. An RFID tag-based identification device, the device comprising:
the information acquisition module is used for acquiring tag coding information of the RFID tag;
the information decryption module is used for decrypting the tag coding information and determining tag storage information corresponding to the RFID tag;
the information screening module is used for screening out tag verification information from the tag storage information according to a preset verification field address;
the information conversion module is used for carrying out information conversion on the tag verification information according to an image conversion rule to obtain a tag verification image;
the image verification module is used for carrying out image verification on the label verification image, determining that the label storage information is tampered and generating and displaying label abnormality information under the condition of failure of the image verification,
The decrypting the tag coding information to determine the tag storage information corresponding to the RFID tag includes:
determining the field coding width corresponding to each coding information field in the tag coding information according to a preset first coding formula, wherein the first coding formula is as follows:;
the W refers to the field coding width corresponding to each coding information field, and W0 is the preset initial field coding width; a refers to a user identification constant; b refers to a random constant which is randomly valued in three values of 0,1 and 2, wherein the user identification constant and the random constant are stored in the head end of the tag coding information;
determining a coding mode identifier corresponding to the tag coding information according to a preset second coding formula, wherein the second coding formula is as follows:;
s refers to a coding mode identifier; q refers to the total number of preset coding modes; s0 refers to an initial coding mode identifier;
decrypting the tag coding information according to the field coding width and the coding mode identification corresponding to each coding information field to determine the tag storage information corresponding to the RFID tag,
Wherein the image conversion rule includes: feature mapping relation between label verification information and image gray scale features, wherein the feature mapping relation is as follows:;
S K refers to the image gray value corresponding to the Kth pixel point; wherein K refers to the Kth verification field, V in the tag verification information KP Refers to the value corresponding to the P-th storage bit in the kth verification field.
7. An electronic device, comprising:
one or more processors;
a memory;
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-5.
8. A storage medium storing a computer program for use in connection with an electronic device, wherein the computer program is executed by a processor to perform the method of any one of claims 1-5.
CN202311585878.1A 2023-11-27 2023-11-27 RFID tag-based identification method and device, electronic equipment and storage medium Active CN117315298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311585878.1A CN117315298B (en) 2023-11-27 2023-11-27 RFID tag-based identification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311585878.1A CN117315298B (en) 2023-11-27 2023-11-27 RFID tag-based identification method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN117315298A CN117315298A (en) 2023-12-29
CN117315298B true CN117315298B (en) 2024-03-19

Family

ID=89260685

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311585878.1A Active CN117315298B (en) 2023-11-27 2023-11-27 RFID tag-based identification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117315298B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034394A (en) * 2009-09-27 2011-04-27 郑阿奇 Method for realizing anti-counterfeiting by self authentication information-containing radio frequency identifier (RFID)
CN104182788A (en) * 2014-08-26 2014-12-03 黑龙江大学 RFID bank card development method based on finger vein identity recognition
GB201916806D0 (en) * 2019-06-27 2020-01-01 Chinapps Ltd Method, device, terminal apparatus and storage medium for product authentication
CN112802138A (en) * 2021-02-04 2021-05-14 联仁健康医疗大数据科技股份有限公司 Image processing method and device, storage medium and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10664941B1 (en) * 2019-12-24 2020-05-26 Capital One Services, Llc Steganographic image encoding of biometric template information on a card

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102034394A (en) * 2009-09-27 2011-04-27 郑阿奇 Method for realizing anti-counterfeiting by self authentication information-containing radio frequency identifier (RFID)
CN104182788A (en) * 2014-08-26 2014-12-03 黑龙江大学 RFID bank card development method based on finger vein identity recognition
GB201916806D0 (en) * 2019-06-27 2020-01-01 Chinapps Ltd Method, device, terminal apparatus and storage medium for product authentication
CN112802138A (en) * 2021-02-04 2021-05-14 联仁健康医疗大数据科技股份有限公司 Image processing method and device, storage medium and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于视觉密码的RFID安全协议;李春艳;软件导刊;第14卷(第6期);第173-175页 *

Also Published As

Publication number Publication date
CN117315298A (en) 2023-12-29

Similar Documents

Publication Publication Date Title
US11349666B2 (en) Electronically signing and distributing identification data as a service that provides proof of identity, integrity, validity and origin of data for non-repudiation and ID validation methods
TWI776084B (en) Two-dimensional code provision, verification method and device
KR102388698B1 (en) Method for enrolling data in a base to protect said data
CN105184538B (en) A kind of Logistics Distribution Method that cargo arrival time is estimated and system
CN101645081A (en) Method and system for tracing farm product information through two-dimension code
CN104636730A (en) Method and device for face verification
US9721259B2 (en) Rules-based selection of counterfeit detection techniques
CN103049779A (en) Method for generating and recognizing food safety liability insurance electronic policy two-dimensional code voucher
CN112383554B (en) Interface flow abnormity detection method and device, terminal equipment and storage medium
CN105404841A (en) Mobile equipment data calculation method based on internet of things
Li et al. Data hiding in iris image for privacy protection
JP2022115892A (en) Information processing system, information code generation system, information processing method, and information code generation method
Al-Zahrani et al. Secure Real‐Time Artificial Intelligence System against Malicious QR Code Links
CN110751490A (en) Fraud identification method and device, electronic equipment and computer-readable storage medium
CN117315298B (en) RFID tag-based identification method and device, electronic equipment and storage medium
CN109919109A (en) Image-recognizing method, device and equipment
CN116911883A (en) Agricultural product anti-counterfeiting tracing method and cloud platform based on AI (advanced technology) authentication technology and tracing quantification
CN112288088A (en) Business model training method, device and system
Bunma et al. Using augment reality to increase capacity in QR code
CN111753729A (en) False face detection method and device, electronic equipment and storage medium
CN112085469B (en) Data approval method, device, equipment and storage medium based on vector machine model
CN108537559B (en) Anti-counterfeiting method and system free of remote service
CN109840574B (en) Two-dimensional code information hiding method and device, electronic equipment and storage medium
CN115526282A (en) Watermark encryption method, watermark extraction method, device and storage medium
CN113627578A (en) Two-dimensional code generation method, two-dimensional code recognition device, two-dimensional code, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant