TWI419055B - Group proving method and radio frequency identification reader and tags using thereof - Google Patents

Group proving method and radio frequency identification reader and tags using thereof Download PDF

Info

Publication number
TWI419055B
TWI419055B TW99117896A TW99117896A TWI419055B TW I419055 B TWI419055 B TW I419055B TW 99117896 A TW99117896 A TW 99117896A TW 99117896 A TW99117896 A TW 99117896A TW I419055 B TWI419055 B TW I419055B
Authority
TW
Taiwan
Prior art keywords
parameter
round
rfid tags
rfid
tag
Prior art date
Application number
TW99117896A
Other languages
Chinese (zh)
Other versions
TW201118750A (en
Inventor
Wei Chih Ting
Original Assignee
Ind Tech Res Inst
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ind Tech Res Inst filed Critical Ind Tech Res Inst
Priority to US12/859,008 priority Critical patent/US8446260B2/en
Publication of TW201118750A publication Critical patent/TW201118750A/en
Application granted granted Critical
Publication of TWI419055B publication Critical patent/TWI419055B/en

Links

Landscapes

  • Near-Field Transmission Systems (AREA)
  • Storage Device Security (AREA)

Description

群組驗證方法及應用其之無線射頻辨識讀取器與標籤Group verification method and RFID tag and label using the same

發明所屬之技術領域是有關於一種群聚驗證方法,且有關於一種應用於無線射頻辨識(Radio Frequency Identification,RFID)之標籤及讀取器間之驗證操作之群聚驗證方法。The technical field to which the invention pertains relates to a clustering verification method, and to a clustering verification method applied to a radio frequency identification (RFID) tag and a verification operation between readers.

在科技發展日新月異的現今時代中,無線射頻辨識(Radio Frequency Identification,RFID)技術係被開發出來,並廣泛地應用在許多物流管理應用場合中。一般來說,現有之RFID驗證機制多採取單一項目稽核,即是判斷個別RFID標籤對應到產品資料庫的內容是否與被標籤的物品相符。換言之,現有RFID驗證機制無法證明所有RFID標籤皆在同一時間內配置。這樣一來,在有心人士地經由電子記錄側錄複製RFID標籤並據以調換原本以RFID標籤標示之物品時,點收人員無法依據現有RFID驗證機制查驗出前述物品掉包之情形。據此,如何提出可有效地克服前述單一項目稽核機制之缺失之RFID驗證方法為業界不斷致力的方向之一。In today's fast-changing technology era, Radio Frequency Identification (RFID) technology has been developed and widely used in many logistics management applications. In general, the existing RFID verification mechanism adopts a single item audit, that is, whether the content of the individual RFID tag corresponding to the product database matches the tagged item. In other words, the existing RFID verification mechanism cannot prove that all RFID tags are configured at the same time. In this way, when the person who is interested in copying the RFID tag through the electronic recording side record and replacing the original item marked with the RFID tag, the ordering personnel cannot check the situation of the above item under the existing RFID verification mechanism. Based on this, how to propose an RFID verification method that can effectively overcome the lack of the aforementioned single project audit mechanism is one of the directions that the industry is constantly striving for.

有關於一種群聚驗證方法被揭露,其係透過無線射頻辨識(Radio Frequency Identification,RFID)讀取器來平行地與多個RFID標籤進行訊號交換操作,以產生可以證明所有RFID標籤在同時存在之群聚驗證電子記錄。應用所揭露的相關之群聚驗證方法之RFID標籤中並未設置有群聚金鑰,換言之,各RFID標籤彼此不具群聚相依關係。應用所揭露的相關之群聚驗證方法之RFID標籤及RFID讀取器有充足之運算能力,以執行金鑰加密、雜湊運算(Hash)及亂數產生等運算操作,使得所揭露的相關之群聚驗證方法可在不和驗證伺服器相連之離線狀態下執行。據此,相較於傳統RFID技術,所揭露的相關之群聚驗證方法具有可有效地在不與驗證伺服器連線之離線狀態下,經由RFID讀取器與RFID標籤間之平行化訊號交換操作產生跨越一個或一個以上不同物品類別之群聚驗證資料的優點。A method for verifying clustering is disclosed in which a radio frequency identification (RFID) reader is used to perform signal exchange operations with a plurality of RFID tags in parallel to generate a proof that all RFID tags are present at the same time. Cluster verification electronic records. The cluster tag is not provided in the RFID tag of the related clustering verification method disclosed in the application. In other words, each RFID tag does not have a cluster-dependent relationship with each other. The RFID tags and RFID readers that apply the related clustering verification methods have sufficient computing power to perform operations such as key encryption, hashing, and random number generation, so that the disclosed related groups are The poly authentication method can be performed in an offline state that is not connected to the authentication server. Accordingly, compared with the conventional RFID technology, the disclosed clustering verification method has the function of effectively parallelizing the signal exchange between the RFID reader and the RFID tag in an offline state without being connected to the verification server. The operation yields the advantage of clustering verification data across one or more different item categories.

根據一實施例,提出一種群聚驗證方法,應用於多個RFID標籤中,以和RFID讀取器執行群聚驗證操作。群聚驗證方法包括下列之步驟。首先回應於RFID讀取器提供之第一回合參數產生亂數參數,第一回合參數相關於各RFID標籤之標籤身份資料。接著根據第一回合參數、亂數參數及標籤金鑰產生第一回傳參數。然後判斷各RFID標籤是否在接收到第一回合參數之起始時點起預定期間內接收到RFID讀取器提供之第二回合參數,第二回合參數相關於各RFID標籤之第一回傳參數。接著判斷第一與第二回合參數是否相互對應。當第一與第二回合參數相互對應且在起始時點起預定期間內接收到第二回合參數時,根據亂數參數來更新標籤金鑰。之後根據第二回合參數、亂數參數及更新後之標籤金鑰產生並輸出第二回傳參數。According to an embodiment, a clustering verification method is proposed for application to a plurality of RFID tags to perform a cluster verification operation with an RFID reader. The clustering verification method includes the following steps. First, in response to the first round parameter provided by the RFID reader, a random number parameter is generated, and the first round parameter is related to the tag identity data of each RFID tag. Then, the first backhaul parameter is generated according to the first round parameter, the random number parameter, and the label key. Then, it is judged whether each RFID tag receives the second round parameter provided by the RFID reader within a predetermined period from the start of receiving the first round parameter, and the second round parameter is related to the first return parameter of each RFID tag. It is then determined whether the first and second round parameters correspond to each other. When the first and second round parameters correspond to each other and the second round parameter is received within a predetermined period from the start time point, the label key is updated according to the random number parameter. Then, the second backhaul parameter is generated and output according to the second round parameter, the random number parameter, and the updated label key.

根據另一實施例,提出一種群聚驗證方法,應用於RFID讀取器中,以和多個RFID標籤執行群聚驗證操作。群聚驗證方法包括下列之步驟。首先廣播查詢指令(Query),各RFID標籤回應於查詢指令回傳標籤身份資料。接著根據接收到之標籤身份資料決定標籤集合,並產生及廣播第一回合參數,各RFID標籤回應於第一回合參數回傳第一回傳參數,其中第一回傳參數相關於第一回合參數、各RFID標籤之標籤金鑰及各RFID標籤產生之亂數參數。然後根據對應至各RFID標籤之第一回傳參數產生並廣播第二回合參數,各RFID標籤判斷是否在接收到第一回合參數之起始時點起一預定期間內接收到第二回合參數且第一與第二回合參數是否相互對應,若是,各RFID標籤根據亂數參數更新標籤金鑰,並根據第二回合參數、亂數參數及更新後之標籤金鑰產生並輸出第二回傳參數。之後根據讀取器金鑰、各RFID標籤之標籤身份資料、第一及第二回傳參數產生群聚驗證資料。According to another embodiment, a clustering verification method is proposed for use in an RFID reader to perform a cluster verification operation with a plurality of RFID tags. The clustering verification method includes the following steps. First, a query command (Query) is broadcast, and each RFID tag returns a tag identity data in response to the query command. Then, determining the label set according to the received tag identity data, and generating and broadcasting the first round parameter, each RFID tag returns a first backhaul parameter in response to the first round parameter, where the first backhaul parameter is related to the first round parameter The tag key of each RFID tag and the random number parameter generated by each RFID tag. And generating and broadcasting a second round parameter according to the first backhaul parameter corresponding to each RFID tag, each RFID tag determining whether to receive the second round parameter within a predetermined period from the start of receiving the first round parameter and Whether the first and second round parameters correspond to each other, and if so, each RFID tag updates the tag key according to the random number parameter, and generates and outputs the second backhaul parameter according to the second round parameter, the random number parameter, and the updated tag key. Then, the cluster verification data is generated according to the reader key, the tag identity data of each RFID tag, and the first and second backhaul parameters.

根據另一實施例,提出一種群聚驗證方法,應用於RFID讀取器及多個RFID標籤之間。群聚驗證方法包括下列之步驟。首先經由RFID讀取器廣播查詢指令。接著回應於查詢指令經由各RFID標籤回傳標籤身份資料至RFID讀取器。然後經由RFID讀取器來根據接收到之標籤身份資料決定標籤集合並產生及廣播第一回合參數。接著經由各RFID標籤儲存第一回合參數、產生亂數參數並根據第一回合參數、亂數參數及標籤金鑰產生第一回傳參數。然後經由RFID讀取器來根據對應至各RFID標籤之第一回傳參數產生並廣播第二回合參數。然後經由各RFID標籤判斷各RFID標籤是否在接收到第一回合參數之起始時點起一預定期間內接收到RFID讀取器提供之第二回合參數,及判斷第二回合參數是否對應至第一回合參數。當第一與第二回合參數相互對應且在起始時點起預定期間內接收到第二回合參數時,經由各RFID標籤根據亂數參數來更新標籤金鑰、根據第二回合參數、亂數參數及更新後之標籤金鑰產生並輸出第二回傳參數。之後經由RFID讀取器根據讀取器金鑰、各RFID標籤之標籤身份資料、第一及第二回傳參數產生群聚驗證資料。According to another embodiment, a clustering verification method is proposed for application between an RFID reader and a plurality of RFID tags. The clustering verification method includes the following steps. The query command is first broadcast via the RFID reader. The tag identity data is then returned to the RFID reader via the RFID tags in response to the query command. The set of tags is then determined via the RFID reader based on the received tag identity data and the first round parameters are generated and broadcast. The first round parameter is stored via each RFID tag, the random number parameter is generated, and the first back pass parameter is generated according to the first round parameter, the random number parameter, and the tag key. A second round parameter is then generated and broadcast via the RFID reader based on the first backhaul parameter corresponding to each RFID tag. And determining, by each RFID tag, whether each RFID tag receives the second round parameter provided by the RFID reader within a predetermined period of time after receiving the start of the first round parameter, and determining whether the second round parameter corresponds to the first Round parameters. When the first and second round parameters correspond to each other and the second round parameter is received within a predetermined period from the start time point, the label key is updated according to the random number parameter via each RFID tag, according to the second round parameter, the random number parameter And the updated tag key generates and outputs a second passback parameter. The cluster verification data is then generated via the RFID reader based on the reader key, the tag identity data of each RFID tag, and the first and second backhaul parameters.

根據另一實施例,提出一種RFID標籤組,包括多個RFID標籤,用以和RFID讀取器進行群聚驗證操作,各RFID標籤包括亂數產生器、加密模組、記憶體及處理器。記憶體儲存程式碼,並回應於初始化操作儲存標籤身份資料及標籤金鑰。控制器執行根據程式碼執行群聚驗證方法,群聚驗證方法包括下列之步驟。首先儲存RFID讀取器提供之第一回合參數並產生亂數參數,其中第一回合參數相關於各RFID標籤之標籤身份資料。接著根據第一回合參數、亂數參數及標籤金鑰產生第一回傳參數。然後判斷各RFID標籤是否在接收到第一回合參數之起始時點起一預定期間內接收到RFID讀取器提供之第二回合參數,第二回合參數相關於RFID標籤之第一回傳參數。接著判斷第一與該第二回合參數是否相互對應。當第一與第二回合參數相互對應且在起始時點起預定期間內接收到第二回合參數時,接收第二回合參數並根據亂數參數來更新標籤金鑰。之後根據第二回合參數、亂數參數及更新後之標籤金鑰產生並輸出第二回傳參數。According to another embodiment, an RFID tag set is provided, including a plurality of RFID tags for performing a group verification operation with an RFID reader, each RFID tag including a random number generator, an encryption module, a memory, and a processor. The memory stores the code and stores the tag identity and tag key in response to the initialization operation. The controller performs a cluster verification method according to the code, and the cluster verification method includes the following steps. First, the first round parameter provided by the RFID reader is stored and a random number parameter is generated, wherein the first round parameter is related to the tag identity data of each RFID tag. Then, the first backhaul parameter is generated according to the first round parameter, the random number parameter, and the label key. Then, it is judged whether each RFID tag receives the second round parameter provided by the RFID reader within a predetermined period of time from the start of receiving the first round parameter, and the second round parameter is related to the first backhaul parameter of the RFID tag. Then, it is determined whether the first and the second round parameters correspond to each other. When the first and second round parameters correspond to each other and the second round parameter is received within a predetermined period from the start time point, the second round parameter is received and the label key is updated according to the random number parameter. Then, the second backhaul parameter is generated and output according to the second round parameter, the random number parameter, and the updated label key.

根據再一實施例,提出一種RFID讀取器,和多個RFID標籤進行群聚驗證操作,RFID讀取器包括多個天線、記憶體及處理器。記憶體儲存程式碼,並回應於初始化操作儲存讀取器金鑰。處理器根據程式碼執行群聚驗證方法,群聚驗證方法包括下列之步驟。首先廣播查詢指令,各RFID標籤回應於查詢指令回傳標籤身份資料。接著根據接收到之該標籤身份資料決定一標籤集合,並產生及廣播第一回合參數,各RFID標籤回應於第一回合參數回傳第一回傳參數,第一回傳參數相關於第一回合參數、各RFID標籤之標籤金鑰及各RFID標籤產生之亂數參數。然後根據對應至各RFID標籤之第一回傳參數產生並廣播第二回合參數,各RFID標籤判斷是否在接收到第一回合參數之起始時點起一預定期間內接收到第二回合參數且第一與第二回合參數是否相互對應,若是,各RFID標籤根據亂數參數更新該標籤金鑰,並根據第二回合參數、亂數參數及更新後之標籤金鑰產生並輸出第二回傳參數。之後根據讀取器金鑰、各RFID標籤之標籤身份資料、第一及第二回傳參數產生群聚驗證資料。According to still another embodiment, an RFID reader is provided, and a plurality of RFID tags are subjected to a cluster verification operation, and the RFID reader includes a plurality of antennas, a memory, and a processor. The memory stores the code and stores the reader key in response to the initialization operation. The processor performs a clustering verification method according to the code, and the clustering verification method includes the following steps. First, the query command is broadcasted, and each RFID tag returns the tag identity data in response to the query command. And then determining, according to the received tag identity data, a tag set, and generating and broadcasting the first round parameter, each RFID tag returns a first backhaul parameter in response to the first round parameter, where the first backhaul parameter is related to the first round Parameters, tag keys for each RFID tag, and random number parameters generated by each RFID tag. And generating and broadcasting a second round parameter according to the first backhaul parameter corresponding to each RFID tag, each RFID tag determining whether to receive the second round parameter within a predetermined period from the start of receiving the first round parameter and Whether the first and second round parameters correspond to each other, and if so, each RFID tag updates the tag key according to the random number parameter, and generates and outputs the second backhaul parameter according to the second round parameter, the random number parameter, and the updated tag key. . Then, the cluster verification data is generated according to the reader key, the tag identity data of each RFID tag, and the first and second backhaul parameters.

為讓本發明之上述內容能更明顯易懂,下文特舉一較佳實施例,並配合所附圖式,作詳細說明如下:In order to make the above-mentioned contents of the present invention more comprehensible, a preferred embodiment will be described below, and in conjunction with the drawings, a detailed description is as follows:

所揭露實施例之群聚驗證方法係在未與驗證伺服器連線的情況下,經由無線射頻辨識(Radio Frequency Identification,RFID)讀取器與多個RFID標籤間之平行化訊息交換,來產生群聚驗證資料。The clustering verification method of the disclosed embodiment generates a parallelized message exchange between a radio frequency identification (RFID) reader and a plurality of RFID tags without being connected to the verification server. Cluster verification data.

請參照第1圖,其繪示依照一實施例之無線射頻辨識系統的方塊圖。RFID系統1包括多個RFID標籤12_1、12_2、…、12_n、RFID讀取器14及驗證伺服器16,其中n為大於1之自然數。在一個例子中,RFID讀取器14具有如第2圖所示之方塊圖,其中包括記憶體14a、網路介面電路14b、輸出/輸入控制電路14c、處理器14d及天線模組14e1、14e2、…、14em。其中記憶體14a儲存有程式碼,而處理器14d係執行記憶體14a中儲存之程式碼,來對控制RFID讀取器14中各個電路進行操作控制。Please refer to FIG. 1 , which is a block diagram of a radio frequency identification system according to an embodiment. The RFID system 1 includes a plurality of RFID tags 12_1, 12_2, ..., 12_n, an RFID reader 14, and a verification server 16, where n is a natural number greater than one. In one example, the RFID reader 14 has a block diagram as shown in FIG. 2, including a memory 14a, a network interface circuit 14b, an output/input control circuit 14c, a processor 14d, and antenna modules 14e1, 14e2. ,..., 14em. The memory 14a stores the code, and the processor 14d executes the code stored in the memory 14a to control the operation of each circuit in the RFID reader 14.

在一個例子中,各RFID標籤12_1-12_n具有實質上相同之電路結構。以RFID標籤12_1-12_n中之第i個RFID標籤12_i為例,其具有如第3圖所示之方塊圖,其中i為小於或等於n之自然數。RFID標籤12_i包括控制器12a、非揮發性記憶體12b、計時器12c、隨取記憶體12d、亂數產生器12e及加密模組12f。其中非揮發性記憶體12b儲存有程式碼,經由對應之記憶體存取操作,非揮發性記憶體12b中之程式碼係被提供至隨取記憶體12d中,而控制器12a執行隨取記憶體12d中之程式碼來對RFID標籤12_i中各個電路進行操作控制。In one example, each RFID tag 12_1-12_n has substantially the same circuit structure. Taking the i-th RFID tag 12_i of the RFID tags 12_1-12_n as an example, it has a block diagram as shown in FIG. 3, where i is a natural number less than or equal to n. The RFID tag 12_i includes a controller 12a, a non-volatile memory 12b, a timer 12c, a follow-up memory 12d, a random number generator 12e, and an encryption module 12f. The non-volatile memory 12b stores a code, and the code in the non-volatile memory 12b is supplied to the memory 12d via the corresponding memory access operation, and the controller 12a performs the memory. The code in the body 12d is used to control the operation of each circuit in the RFID tag 12_i.

經由RFID標籤12_1-12_n、RFID讀取器14及驗證伺服器16間之訊號交換操作,無線射頻辨識系統1係依序地執行初始化金鑰部署流程、群聚證明產生流程、群聚證明上傳流程及盤點驗證流程,藉此完成一個完整的群聚驗證程序。接下來,係舉例來對群聚驗證程序中前述各流程做進一步的說明。Through the signal exchange operation between the RFID tag 12_1-12_n, the RFID reader 14 and the verification server 16, the RFID system 1 sequentially performs the initialization key deployment process, the cluster certification generation process, and the cluster certification upload process. And the inventory verification process to complete a complete cluster verification process. Next, an example will be given to further describe the foregoing processes in the cluster verification procedure.

初始化金鑰部署流程Initialization key deployment process

在初始化金鑰部署流程中,驗證伺服器16產生對應至RFID讀取器14之讀取器金鑰kreader,並將讀取器金鑰kreader儲存在驗證伺服器16端。驗證伺服器16更將讀取器金鑰kreader透過中介軟體(Middleware)儲存在RFID讀取器14之記憶體14a中。In the initialization key deployment process, the verification server 16 generates a reader key kreader corresponding to the RFID reader 14, and stores the reader key kreader at the verification server 16 side. The verification server 16 further stores the reader key kreader in the memory 14a of the RFID reader 14 through the intermediate software (Middleware).

在初始化金鑰部署流程中,驗證伺服器16更產生對應至各RFID標籤12_1-12_n之標籤身份資料A1、A2、…、An及標籤金鑰k1、k2、…kn,並將標籤身份資料A1-An及標籤金鑰k1-kn及各RFID標籤12_1-12_n對應之貨品資料(以各RFID標籤12_1-12_n對應標示之貨品資訊)儲存在驗證伺服器16端。驗證伺服器16更將標籤身份資料A1-An、標籤金鑰k1-kn寫入各RFID標籤12_1-12-n中之非揮發性記憶體12b中。據此,在初始化金鑰部署流程中,驗證伺服器16係對RFID讀取器14及各RFID標籤12_1-12_n進行初始化操作,使其具有對應之標籤身份資料A1-An、標籤金鑰k1-kn及產品資訊。In the initialization key deployment process, the verification server 16 further generates the tag identity data A1, A2, ..., An and the tag keys k1, k2, ... kn corresponding to the RFID tags 12_1-12_n, and the tag identity data A1. -An and the tag key k1-kn and the item information corresponding to each RFID tag 12_1-12_n (information information corresponding to each RFID tag 12_1-12_n) are stored in the verification server 16 end. The verification server 16 further writes the tag identification data A1-An and the tag key k1-kn into the non-volatile memory 12b of each of the RFID tags 12_1-12-n. Accordingly, in the initialization key deployment process, the verification server 16 performs an initialization operation on the RFID reader 14 and each of the RFID tags 12_1-12_n to have corresponding tag identity data A1-An, tag key k1- Kn and product information.

群聚證明產生流程Clustering certificate generation process

在群聚證明產生流程中,RFID讀取器14及RFID標籤12_1-12_n例如處在未和驗證伺服器16相互連結之離線狀態,而RFID讀取器14係平行地與所有RFID標籤12_1-12_n進行訊息交換操作,藉此產生群聚驗證資料P。舉例來說,群聚證明產生流程中之各流程步驟如第4圖所示,其繪示乃第1圖中RFID讀取器14與RFID標籤12_1-12_n間之群聚證明產生流程的次序圖。In the clustering certification generation process, the RFID reader 14 and the RFID tags 12_1-12_n are, for example, in an offline state in which the authentication server 16 is not connected to each other, and the RFID reader 14 is in parallel with all the RFID tags 12_1-12_n. A message exchange operation is performed, thereby generating a cluster verification data P. For example, the process steps in the clustering certification generation process are as shown in FIG. 4, which is a sequence diagram showing the flow of the clustering proof generation between the RFID reader 14 and the RFID tags 12_1-12_n in FIG. .

在初始化金鑰部署流程後,首先執行操作流程(a1),處理器14d產生查詢指令(Query),並將此查詢指令廣播至各RFID標籤12_1-12_n。接著執行操作流程(a2),各RFID標籤12_1-12_n中之控制器12a接收此查詢指令,並回應於此查詢指令回傳其對應之標籤身份資料A1-An。After initializing the key deployment process, the operational flow (a1) is first performed, the processor 14d generates a query command (Query), and broadcasts the query command to each of the RFID tags 12_1-12_n. Then, the operation flow (a2) is executed, and the controller 12a in each of the RFID tags 12_1-12_n receives the query command, and returns its corresponding tag identity data A1-An in response to the query command.

然後執行操作流程(b1),處理器14d根據其接收到之標籤身份資料來決定產生之群聚證明資料P對應之RFID標籤集合。舉例來說,處理器14d接收到n個RFID標籤12_1-12_n之標籤身份資料A1-An,據此,本次群聚證明資料產生流程將RFID標籤12_1-12_n視為一個RFID標籤集合,並產生對應之群聚證明資料P指示此RFID標籤集合是否滿足特定之驗證條件。處理器14d根據接收到之標籤身份資料A1-An產生回合參數m,並將回合參數m廣播至各RFID標籤12_1-12_n。舉例來說,處理器14d係經由下列雜湊運算(Hash)來產生回合參數m,∥代表字串的連接:Then, the operation flow (b1) is executed, and the processor 14d determines the RFID tag set corresponding to the generated cluster certification data P according to the tag identity data received by the processor 14d. For example, the processor 14d receives the tag identity data A1-An of the n RFID tags 12_1-12_n, according to which the current cluster certification data generation process treats the RFID tags 12_1-12_n as an RFID tag set and generates The corresponding clustering proof material P indicates whether the RFID tag set satisfies a specific verification condition. The processor 14d generates a round parameter m based on the received tag identity data A1-An, and broadcasts the round parameter m to each of the RFID tags 12_1-12_n. For example, the processor 14d generates a round parameter m via the following hash operation, and represents a connection of the string:

m=hash(A1 ∥A2 ∥...∥An )m=hash(A 1 ∥A 2 ∥...∥A n )

接著執行操作流程(b2),各RFID標籤12_1-12_n中之控制器12a接收並儲存回合參數m。然後如步驟(b3),各RFID標籤12_1-12_n中之控制器12a驅動計時器12c進行計時操作,並據以判斷對應之RFID標籤12_1-12_n是否在接收到回合參數m之起始時點起一段預定期間內接收到RFID讀取器14在下一個訊息交換回合中廣播之回合參數s及m。Next, the operational flow (b2) is performed, and the controller 12a of each of the RFID tags 12_1-12_n receives and stores the round parameter m. Then, as in step (b3), the controller 12a of each of the RFID tags 12_1-12_n drives the timer 12c to perform a timing operation, and accordingly determines whether the corresponding RFID tag 12_1-12_n is at the beginning of receiving the round parameter m. The round parameters s and m broadcast by the RFID reader 14 in the next message exchange round are received during the predetermined period.

然後執行操作流程(b4),各RFID標籤12_1-12_n中之控制器12a接收並儲存回合參數m及驅動對應之亂數產生器12e產生對應之亂數參數r1、r2、…、rn。各RFID標籤12_1-12_n中之控制器12a更經由加密模組12f來根據回合參數m、及各對應之亂數參數r1-rn來產生對應之回傳參數X1、X2、…、Xn。各RFID標籤12_1-12_n中之控制器12a更分別將回傳參數X1-Xn回傳至RFID讀取器14。在一個例子中,各RFID標籤12_1-12_n產生回傳參數X1-Xn之步驟為實質上相同,若以RFID標籤12_1-12_n中之RFID標籤12_i為例,其中之加密模組12f例如係經由下列加密運算(ENC)來產生回傳參數Xi:Then, the operation flow (b4) is executed, and the controller 12a of each of the RFID tags 12_1-12_n receives and stores the round parameter m and the drive corresponding random number generator 12e to generate corresponding random number parameters r1, r2, ..., rn. The controller 12a of each of the RFID tags 12_1-12_n further generates corresponding backhaul parameters X1, X2, ..., Xn according to the rounding parameter m and each corresponding random number parameter r1-rn via the encryption module 12f. The controller 12a of each of the RFID tags 12_1-12_n further transmits the return parameters X1-Xn back to the RFID reader 14, respectively. In an example, the steps of generating the backhaul parameters X1-Xn by the RFID tags 12_1-12_n are substantially the same. If the RFID tags 12_i in the RFID tags 12_1-12_n are taken as an example, the encryption module 12f is, for example, via the following Encryption operation (ENC) to generate the return parameter Xi:

Xi =(m⊕ri )X i = (m⊕r i )

換言之,RFID標籤12_i中之控制器12a係根據回合參數m及亂數參數ri進行互斥或(Exclusive OR,XOR)運算,並根據標籤金鑰ki對前述回合參數m及亂數參數ri之XOR運算結果進行加密,以產生對應之回傳參數Xi。In other words, the controller 12a in the RFID tag 12_i performs an exclusive OR (XOR) operation based on the round parameter m and the random parameter ri, and XORs the round parameter m and the random number parameter ri according to the tag key ki. The result of the operation is encrypted to generate a corresponding backhaul parameter Xi.

然後執行操作流程(c1),處理器14d根據回傳參數X1-Xn產生回合參數s,並將回合參數s及m廣播至各個RFID標籤12_1-12_n。舉例來說,處理器14d係經由下列雜湊運算來產生回合參數s,∥代表字串的連接:Then, the operational flow (c1) is executed, the processor 14d generates a round parameter s based on the backhaul parameters X1-Xn, and broadcasts the round parameters s and m to the respective RFID tags 12_1-12_n. For example, processor 14d generates a round parameter s via the following hash operations, ∥ representing the connection of the string:

s=hash(X1 ∥X2 ∥...∥Xn )s=hash(X 1 ∥X 2 ∥...∥X n )

接著執行操作流程(c2),各RFID標籤12_1-12_n中之控制器12a接收回合參數s與m。Next, the operational flow (c2) is executed, and the controller 12a of each of the RFID tags 12_1-12_n receives the round parameters s and m.

令各RFID標籤12_1-12_n執行操作流程(c2)以接收回合參數s及m之時點觸發在各RFID標籤12_1-12_n對應之此起始時點起此段預定期間內,據此對於各RFID標籤12_1-12_n來說,其係在前述操作流程(b3)中得到接收到回合參數m及接收到回合參數s與m間之時間延遲小於此段預定期間的判斷結果。Having each of the RFID tags 12_1-12_n perform the operation flow (c2) to receive the round parameters s and m at the time point of the start of the respective RFID tags 12_1-12_n for a predetermined period of time, according to which for each RFID tag 12_1 -12_n, in the foregoing operational flow (b3), the judgment result of receiving the round parameter m and receiving the time difference between the round parameters s and m is less than the predetermined period of the period.

在前述操作流程(b3)之判斷結果的條件成立時執行操作流程(c3),各RFID標籤12_1-12_n中之控制器12a更判斷RFID讀取器14於操作流程(c2)中接收到之回合參數是否實質上對應至其於操作流程(b2)中接收並儲存之回合參數。更進一步的說,各RFID標籤12_1-12_n中之控制器12a例如經由比較其於操作流程(c2)接收到之回合參數m及其於操作流程(b2)中接收到之回合參數m是否實質上相等,來判斷操作流程(c2)及(b2)中接收到之回合參數是否彼此對應。When the condition of the judgment result of the foregoing operation flow (b3) is satisfied, the operation flow (c3) is executed, and the controller 12a of each of the RFID tags 12_1-12_n further judges the round received by the RFID reader 14 in the operation flow (c2). Whether the parameter substantially corresponds to the round parameter that it receives and stores in the operational flow (b2). Further, the controller 12a of each of the RFID tags 12_1-12_n, for example, compares the round parameter m received by the operation flow (c2) and the round parameter m received in the operation flow (b2), whether substantially Equal to determine whether the round parameters received in the operational flows (c2) and (b2) correspond to each other.

令RFID讀取器14於操作流程(c2)及(b2)中接收到之回合參數為實質上對應,據此對於各RFID標籤12_1-12_n來說,其係在前述操作流程(c3)中得到其於操作流程(c2)及(b2)中接收到之回合參數彼此相互對應的判斷結果。The round parameters received by the RFID reader 14 in the operational flows (c2) and (b2) are substantially corresponding, and accordingly, for each of the RFID tags 12_1-12_n, they are obtained in the foregoing operational flow (c3). The result of the determination that the round parameters received in the operational flows (c2) and (b2) correspond to each other.

接著執行操作流程(c4),各RFID標籤12_1-12_n中之控制器12a根據對應之亂數參數r1-rn更新對應之標籤金鑰k1-kn以分別得到更新標籤金鑰k1'、k2'、…、kn'。各RFID標籤12_1-12_n中之控制器12a更經由加密模組12f來根據回合參數s、亂數參數r1-rn及更新後之標籤金鑰k1'-kn'產生回傳參數Y1、Y2、…、Yn,而各RFID標籤12_1-12_n更將對應之回傳參數Y1-Yn回傳至RFID讀取器14。在一個例子中,各RFID標籤12_1-12_n產生回傳參數Y1-Yn之步驟為實質上相同,若以RFID標籤12_i為例,其例如係經由下列更新運算及加密運算來產生更新後之標籤金鑰ki'及產生回傳參數Yi:Then, the operation flow (c4) is executed, and the controller 12a of each of the RFID tags 12_1-12_n updates the corresponding tag key k1-kn according to the corresponding random number parameter r1-rn to obtain the update tag keys k1', k2', respectively. ..., kn'. The controller 12a of each of the RFID tags 12_1-12_n further generates a backhaul parameter Y1, Y2, based on the round parameter s, the random number parameter r1-rn, and the updated tag key k1'-kn' via the encryption module 12f. Yn, and each of the RFID tags 12_1-12_n returns the corresponding backhaul parameters Y1-Yn to the RFID reader 14. In one example, the steps of generating the backhaul parameters Y1-Yn for each of the RFID tags 12_1-12_n are substantially the same. If the RFID tag 12_i is taken as an example, the updated tag gold is generated, for example, by the following update operation and encryption operation. Key ki' and generate return parameter Yi:

之後執行操作流程(c5),處理器14d接收回傳參數Y1-Yn,並根據讀取器金鑰kreader、各RFID標籤12_1-12_n之標籤身份資料A1-An、回傳參數X1-Xn及Y1-Yn產生群聚驗證資料P。舉例來說,處理器14d係經由下列加密運算來產生群聚驗證資料P:After the operation flow (c5) is executed, the processor 14d receives the return parameters Y1-Yn, and according to the reader key kreader, the tag identity data A1-An of each RFID tag 12_1-12_n, and the return parameters X1-Xn and Y1 -Yn generates cluster verification data P. For example, the processor 14d generates the cluster verification data P via the following encryption operations:

在其他例子中,若在前述操作流程(c2)中,任一個RFID標籤12_1-12_n(例如是第y個RFID標籤12_y,y為小於或等於n之自然數)接收回合參數s及m之時點觸發在其對應之此起始時點起此段預定期間之外,則RFID標籤12_y對應之執行之次序圖如第5圖所示。其中步驟(c2)係執行此起始時點起此段預定期間之外,則於操作流程(b3)之後係執行操作流程(c6),RFID標籤12_y中之控制器12a係觸發終止事件,以放棄前述操作流程得到之參數。In other examples, if in the foregoing operation flow (c2), any one of the RFID tags 12_1-12_n (for example, the yth RFID tag 12_y, y is a natural number less than or equal to n) receives the round parameters s and m The sequence diagram of the execution of the RFID tag 12_y corresponding to the triggering of the corresponding start point is shown in FIG. 5. Wherein step (c2) is performed outside the predetermined period from the start point, then after the operation flow (b3), the operation flow (c6) is executed, and the controller 12a in the RFID tag 12_y triggers the termination event to abandon The parameters obtained in the foregoing operational procedures.

在其他例子中,若在前述操作流程(c3)中,任一個RFID標籤12_1-12_n(例如是第z個RFID標籤12_z,z為小於或等於n之自然數)於步驟(b2)及(c2)接收到之回合參數彼此不相互對應,則RFID標籤12_z對應之執行之次序圖如第6圖所示。其中於操作流程(c3)之後係執行操作流程(c7),RFID標籤12_z中之控制器12a係觸發終止事件,以放棄前述操作流程得到之參數。In other examples, in the foregoing operation flow (c3), any one of the RFID tags 12_1-12_n (for example, the zth RFID tag 12_z, z is a natural number less than or equal to n) in steps (b2) and (c2) The received round parameters do not correspond to each other, and the sequence diagram of the execution of the RFID tag 12_z is as shown in FIG. After the operation flow (c3), the operation flow (c7) is executed, and the controller 12a in the RFID tag 12_z triggers the termination event to abandon the parameters obtained by the foregoing operation flow.

請參照第7圖,其繪示應用於各RFID標籤12_1-12_n端之群聚證明產生方法的流程圖。由於各RFID標籤12_1-12_n執行之群聚驗證方法為實質上相同,接下來,係僅以RFID標籤12_i所執行之群聚驗證方法為例做說明。首先如步驟(A),RFID標籤12_i判斷是否接收到查詢指令;若否,則重複執行步驟(A);若是,則執行步驟(B),RFID標籤12_i回傳對應之標籤身份資料Ai至RFID讀取器14。Please refer to FIG. 7 , which illustrates a flow chart of a method for generating a clustering certificate applied to each RFID tag 12_1-12_n. Since the clustering verification method performed by each of the RFID tags 12_1-12_n is substantially the same, the cluster verification method executed by the RFID tag 12_i is taken as an example for explanation. First, as in step (A), the RFID tag 12_i determines whether a query command is received; if not, repeats step (A); if so, performs step (B), and the RFID tag 12_i returns the corresponding tag identity data Ai to RFID. Reader 14.

然後如步驟(C),RFID標籤12_i判斷是否接收到回合參數m;若否,則重複執行步驟(C);若是,則執行步驟(D),RFID標籤12_i儲存回合參數m、產生亂數參數ri、根據回合參數m、對應之亂數參數ri及對應之標籤金鑰ki產生回傳參數Xi與標籤身份資料Ai。Then, as in step (C), the RFID tag 12_i determines whether the round parameter m is received; if not, repeats step (C); if so, performs step (D), the RFID tag 12_i stores the round parameter m, generates a random number parameter Ri, generating the backhaul parameter Xi and the tag identity data Ai according to the round parameter m, the corresponding random number parameter ri and the corresponding tag key ki.

接著如步驟(E),RFID標籤12_i判斷是否接收到回合參數s與m;若否,則重複執行步驟(E);若是,則執行步驟(F),RFID標籤12_i判斷是否在接收到回合參數m之起始時點起預定期間內接收到RFID讀取器14提供之回合參數s與m及步驟(G),RFID標籤12_i判斷前後兩次接收到之回合參數是否相互對應。Then, as in step (E), the RFID tag 12_i determines whether the round parameters s and m are received; if not, repeats step (E); if so, performs step (F), and the RFID tag 12_i determines whether the round parameter is received. The round parameters s and m provided by the RFID reader 14 and the step (G) are received within a predetermined period from the start of the m, and the RFID tag 12_i determines whether the round parameters received twice before and after correspond to each other.

當RFID標籤12_i判斷其前後兩次接收到之回合參數相互對應且其在接收到第一筆回合參數(即是回合參數m)起此預定期間內接收到第二筆回合參數(即是回合參數s與m)時執行步驟(I),RFID標籤12_i根據對應之亂數參數ri來更新標籤金鑰ki為更新後之標籤金鑰ki'、根據回合參數s、對應之亂數參數ri及更新後之標籤金鑰ki'產生並輸出回傳參數Yi與標籤身份資料Ai。When the RFID tag 12_i judges that the round parameters received twice before and after each other correspond to each other and it receives the first round round parameter (ie, the round parameter m), the second round round parameter is received within the predetermined period (ie, the round parameter) Steps (I) are performed when s and m), and the RFID tag 12_i updates the tag key ki as the updated tag key ki' according to the corresponding random number parameter ri, according to the round parameter s, the corresponding random number parameter ri, and the update The subsequent tag key ki' generates and outputs the return parameter Yi and the tag identity data Ai.

當RFID標籤12_i判斷其前後兩次接收到之回合參數彼此不相互對應,或判斷其在接收到第一筆回合參數(即是回合參數m)起此預定期間內並未接收到第二筆回合參數(即是回合參數s與m)時執行步驟(H),RFID標籤12_i觸發終止事件。When the RFID tag 12_i determines that the round parameters received twice before and after do not correspond to each other, or judge that it has received the first round round parameter (ie, the round parameter m), the second round is not received within the predetermined period. The step (H) is performed when the parameters (ie, the round parameters s and m), and the RFID tag 12_i triggers the termination event.

請參照第8圖,其繪示應用於各RFID讀取器14之群聚證明產生方法的流程圖。首先如步驟(A),RFID讀取器14廣播查詢指令(Query)至各RFID標籤12_1-12_n,接收到此廣播指令之RFID標籤對應地回傳標籤身份資料。舉例來說,所有之RFID標籤12_1-12_n均接收到此查詢指令並對應地回傳標籤身份資料A1-An。接著如步驟(B),RFID讀取器14根據標籤身份資料A1-An產生並廣播回合參數m至各RFID標籤12_1-12_n,各RFID標籤12_1-12_n對應地回傳回傳參數X1-Xn,其中回傳參數X1-Xn相關於回合參數m、各RFID標籤12_1-12_n之標籤金鑰k1-kn及各RFID標籤產生之亂數參數r1-rn。Please refer to FIG. 8 , which illustrates a flow chart of a method for generating a cluster certificate applied to each RFID reader 14 . First, as step (A), the RFID reader 14 broadcasts a query command (Query) to each of the RFID tags 12_1-12_n, and the RFID tag receiving the broadcast command correspondingly returns the tag identity data. For example, all of the RFID tags 12_1-12_n receive the query command and correspondingly return the tag identity data A1-An. Then, as in step (B), the RFID reader 14 generates and broadcasts the round parameter m to each of the RFID tags 12_1-12_n according to the tag identity data A1-An, and each of the RFID tags 12_1-12_n correspondingly returns the return parameters X1-Xn. The return parameters X1-Xn are related to the round parameter m, the label key k1-kn of each RFID tag 12_1-12_n, and the random number parameter r1-rn generated by each RFID tag.

然後執行步驟(C),RFID讀取器14判斷是否接收到所有RFID標籤12_1-12_n之回傳參數X1-Xn及標籤身份資料A1-An;若否,則重複執行步驟(C);若是,則執行步驟(D),RFID讀取器14根據回傳參數X1-Xn產生並廣播回合參數s與m至RFID標籤12_1-12_n。Then, performing step (C), the RFID reader 14 determines whether the return parameters X1-Xn and the tag identity data A1-An of all the RFID tags 12_1-12_n are received; if not, the step (C) is repeated; if yes, Then step (D) is performed, and the RFID reader 14 generates and broadcasts the round parameters s and m to the RFID tags 12_1-12_n according to the return parameters X1-Xn.

接著執行步驟(E),RFID讀取器14判斷是否接收到所有RFID標籤12_1-12_n之回傳參數Y1-Yn及標籤身份資料A1-An;若否,則重複執行步驟(E);若是,則執行步驟(F),RFID讀取器14根據讀取器金鑰kreader、標籤身份資料A1-An、回傳參數X1-Xn及Y1-Yn產生群聚驗證資料P,並將群聚驗證資料P儲存於記憶體14a中。Then, in step (E), the RFID reader 14 determines whether the return parameters Y1-Yn and the tag identity data A1-An of all the RFID tags 12_1-12_n are received; if not, the step (E) is repeated; if yes, Then, in step (F), the RFID reader 14 generates the cluster verification data P according to the reader key kreader, the tag identity data A1-An, the return parameters X1-Xn, and Y1-Yn, and the cluster verification data is generated. P is stored in the memory 14a.

群聚證明上傳流程及盤點驗證流程Clustering certificate upload process and inventory verification process

請參照第9圖,其繪示依照一實施例之群聚證明上傳方法的流程圖。首先如步驟(A),處理器14d詢問網路介面電路14b,以判斷RFID讀取器14是否經由對應之通訊連結連接至驗證伺服器16;若否,則重複執行步驟(A);若是,則執行步驟(B),處理器14d更判斷記憶體14a中是否儲存有群聚驗證資料P;若否,則執行步驟(A);若是,則執行步驟(C),處理器14d驅動網路介面電路14b將群聚驗證資料P傳輸至驗證伺服器16。Please refer to FIG. 9 , which illustrates a flow chart of a method for uploading a cluster certificate according to an embodiment. First, as step (A), the processor 14d queries the network interface circuit 14b to determine whether the RFID reader 14 is connected to the verification server 16 via a corresponding communication link; if not, repeats step (A); if so, Step (B) is executed, the processor 14d further determines whether the clustered verification data P is stored in the memory 14a; if not, executing step (A); if yes, executing step (C), the processor 14d drives the network The interface circuit 14b transmits the cluster verification data P to the verification server 16.

請參照第10圖,其繪示依照一實施例之盤點驗證方法的流程圖。首先如步驟(A),驗證伺服器16根據預先儲存之讀取器金鑰kreader對群聚驗證資料P進行解密,以找出標籤身份資料A1-An、回傳參數X1-Xn及Y1-Yn。接著如步驟(B),驗證伺服器16更根據標籤身份資料A1-An找出對應至各RFID標籤12_1-12_n之標籤金鑰k1-kn。Please refer to FIG. 10, which illustrates a flow chart of an inventory verification method according to an embodiment. First, as step (A), the verification server 16 decrypts the cluster verification data P according to the pre-stored reader key kreader to find the tag identity data A1-An, the return parameters X1-Xn and Y1-Yn. . Next, as in step (B), the verification server 16 further finds the tag key k1-kn corresponding to each of the RFID tags 12_1-12_n based on the tag identity data A1-An.

然後如步驟(C),驗證伺服器16根據標籤身份資料A1-An進行雜湊運算,以產生回合參數m,並根據回傳參數X1-Xn、標籤金鑰k1-kn及回合參數m產生亂數參數r1-rn。接著如步驟(D),驗證伺服器16更根據回傳參數X1-Xn進行雜湊運算以產生回合參數s、根據亂數參數r1-rn及標籤金鑰k1-kn找出更新標籤金鑰k1'-kn'及根據前述回合參數s、亂數參數r1-rn與更新標籤金鑰k1'-kn'運算得到參考參數Y1'、Y2'、…、Yn'。Then, as in step (C), the verification server 16 performs a hash operation based on the tag identity data A1-An to generate a round parameter m, and generates a random number according to the return parameter X1-Xn, the tag key k1-kn, and the round parameter m. Parameter r1-rn. Then, as in step (D), the verification server 16 performs a hash operation according to the return parameters X1-Xn to generate a round parameter s, and finds an update label key k1' according to the random number parameter r1-rn and the label key k1-kn. -kn' and the reference parameters Y1', Y2', ..., Yn' are obtained according to the aforementioned round parameter s, random number parameter r1-rn and update tag key k1'-kn'.

然後如步驟(E),驗證伺服器16判斷於步驟(A)中解出之回傳參數Y1-Yn是否分別等於參考參數Y1'-Yn';若是,執行步驟(F),驗證伺服器16判斷群聚驗證資料P具有合法性而驗證成功,驗證伺服器16將對應至各RFID標籤12_1-12_n之標籤金鑰更新為更新標籤金鑰k1'-kn'。當回傳參數Y1-Yn分別等於參考參數Y1'-Yn'之條件未成立時執行步驟(G),驗證伺服器16判斷群聚驗證資料P不具有合法性而驗證失敗,驗證伺服器16更將產生錯誤事件,通知使用者此時之驗證結果指示可能有物品遺失或掉包之情形。Then, as in step (E), the verification server 16 determines whether the return parameters Y1-Yn solved in the step (A) are equal to the reference parameters Y1'-Yn', respectively; if yes, performing step (F), the verification server 16 It is judged that the cluster verification data P has legality and the verification is successful, and the verification server 16 updates the tag key corresponding to each of the RFID tags 12_1-12_n to the update tag key k1'-kn'. When the condition that the return parameters Y1-Yn are equal to the reference parameter Y1'-Yn' respectively is not established, the step (G) is executed, and the verification server 16 judges that the cluster verification data P has no legality and the verification fails, and the verification server 16 further An error event will be generated to inform the user that the verification result at this time indicates that there may be missing or dropped items.

本實施例之群聚驗證方法透過RFID讀取器來平行地與多個RFID標籤進行訊號交換操作,以產生可以證明所有RFID標籤在同時存在之群聚驗證電子記錄。據此,相較於傳統RFID技術,本實施例之群聚驗證方法具有可經由RFID讀取器與RFID標籤間之平行化訊號交換來產生群聚驗證資料的優點。The clustering verification method of this embodiment performs a signal exchange operation with a plurality of RFID tags in parallel through an RFID reader to generate a clustered verification electronic record that can prove that all RFID tags are present at the same time. Accordingly, the clustering verification method of the present embodiment has the advantage of generating clustered verification data via parallelized signal exchange between the RFID reader and the RFID tag as compared to the conventional RFID technology.

另外,應用本實施例之群聚驗證方法之RFID標籤中並未設置有群聚金鑰來預先設定各個RFID標籤之分組關係,而經由RFID讀取器及RFID標籤間之查詢指令/標籤身份資料訊息交換來決定本次群聚驗證操作欲進行之RFID標籤集合。據此,相較於傳統RFID技術,本實施例之群聚驗證方法更具有可彈性地對任意選取之RFID標籤集合進行群聚驗證的優點。In addition, the RFID tag to which the cluster verification method of the embodiment is applied is not provided with a cluster key to pre-set the grouping relationship of each RFID tag, and the query command/tag identity data between the RFID reader and the RFID tag is used. The message exchange determines the set of RFID tags to be performed by this cluster verification operation. Accordingly, the clustering verification method of the present embodiment has the advantage of elastically performing cluster verification on an arbitrarily selected RFID tag set compared to the conventional RFID technology.

再者,應用本實施例之群聚驗證方法之RFID標籤及RFID讀取器有充足之運算能力,以執行產生群聚驗證資料之相關金鑰加密、雜湊運算(Hash)及亂數產生等運算操作。換言之,本實施例之群聚驗證方法可在不和驗證伺服器相連之離線狀態下執行。據此,相較於傳統RFID技術,本實施例之群聚驗證方法更具有可在不與驗證伺服器連線之離線狀態下產生群聚驗證資料的優點。Furthermore, the RFID tag and the RFID reader applying the clustering verification method of the present embodiment have sufficient computing power to perform operations such as correlation key encryption, hashing (Hash), and random number generation for generating cluster verification data. operating. In other words, the clustering verification method of the present embodiment can be executed in an offline state that is not connected to the authentication server. Accordingly, the cluster verification method of the present embodiment has the advantage of generating cluster verification data in an offline state that is not connected to the verification server, compared to the conventional RFID technology.

綜上所述,雖然本發明已以若干實施例揭露如上,然其並非用以限定本發明。本發明所屬技術領域中具有通常知識者,在不脫離本發明之精神和範圍內,當可作各種之更動與潤飾。因此,本發明之保護範圍當視後附之申請專利範圍所界定者為準。In the above, the present invention has been disclosed in several embodiments, but it is not intended to limit the present invention. A person skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention. Therefore, the scope of the invention is defined by the scope of the appended claims.

1...無線射頻辨識系統1. . . Radio frequency identification system

12_1-12_n...無線射頻辨識標籤12_1-12_n. . . Radio frequency identification tag

14...無線射頻辨識讀取器14. . . Radio frequency identification reader

16...驗證伺服器16. . . Authentication server

14a...記憶體14a. . . Memory

14b...網路介面電路14b. . . Network interface circuit

14c...輸出輸入控制器14c. . . Output input controller

14d...處理器14d. . . processor

14e1-14em...天線模組14e1-14em. . . Antenna module

12a...控制器12a. . . Controller

12b...非揮發性記憶體12b. . . Non-volatile memory

12c...計時器12c. . . Timer

12d...隨取記憶體12d. . . Accompanying memory

12e...亂數產生器12e. . . Random generator

12f...加密模組12f. . . Cryptographic module

第1圖繪示依照一實施例之無線射頻辨識系統的方塊圖。FIG. 1 is a block diagram of a radio frequency identification system in accordance with an embodiment.

第2圖繪示乃第1圖中之無線射頻辨識讀取器14的詳細方塊圖。FIG. 2 is a detailed block diagram of the RFID reader 14 in FIG. 1.

第3圖繪示乃第1圖中之第i個無線射頻辨識標籤12_i的詳細方塊圖。FIG. 3 is a detailed block diagram of the i-th radio frequency identification tag 12_i in FIG. 1.

第4圖繪示乃第1圖中RFID讀取器14與RFID標籤12_1-12_n間之群聚證明產生流程的次序圖。Fig. 4 is a sequence diagram showing the flow of the clustering proof generation between the RFID reader 14 and the RFID tags 12_1-12_n in Fig. 1.

第5圖繪示乃第1圖中RFID讀取器14與RFID標籤12_1-12_n間之群聚證明產生流程的另一次序圖。FIG. 5 is another sequence diagram showing the flow of the clustering proof generation between the RFID reader 14 and the RFID tags 12_1-12_n in FIG.

第6圖繪示乃第1圖中RFID讀取器14與RFID標籤12_1-12_n間之群聚證明產生流程的再一次序圖。FIG. 6 is a further sequence diagram showing the flow of the clustering proof generation between the RFID reader 14 and the RFID tags 12_1-12_n in FIG.

第7圖繪示應用於各RFID標籤12_1-12_n端之群聚證明產生方法的流程圖。FIG. 7 is a flow chart showing a method for generating a clustering certificate applied to each of the RFID tags 12_1-12_n.

第8圖繪示應用於RFID讀取器14之群聚證明產生方法的流程圖。FIG. 8 is a flow chart showing a method of generating a clustering certificate applied to the RFID reader 14.

第9圖繪示依照一實施例之群聚證明上傳方法的流程圖。FIG. 9 is a flow chart showing a method for uploading a cluster certificate according to an embodiment.

第10圖繪示依照一實施例之盤點驗證方法的流程圖。FIG. 10 is a flow chart showing an inventory verification method according to an embodiment.

(A)-(F)...操作步驟(A)-(F). . . Steps

Claims (19)

一種群聚驗證方法,應用於複數個無線射頻辨識(Radio Frequency Identification,RFID)標籤中,以和一RFID讀取器執行群聚驗證操作,該群聚驗證方法包括:回應於該RFID讀取器提供之一第一回合參數產生一亂數參數,其中該第一回合參數相關於各該些RFID標籤之一標籤身份資料;根據該第一回合參數、該亂數參數及一標籤金鑰產生一第一回傳參數;判斷各該些RFID標籤是否在接收到該第一回合參數之一起始時點起一預定期間內接收到該RFID讀取器提供之一第二回合參數,其中該第二回合參數相關於該些RFID標籤之該第一回傳參數;判斷該第一與該第二回合參數是否相互對應;當該第一與該第二回合參數相互對應且在該起始時點起該預定期間內接收到該第二回合參數時,根據該亂數參數來更新該標籤金鑰;以及根據該第二回合參數、該亂數參數及更新後之該標籤金鑰產生並輸出一第二回傳參數。A clustering verification method is applied to a plurality of radio frequency identification (RFID) tags to perform a clustering verification operation with an RFID reader, the clustering verification method comprising: responding to the RFID reader Providing a first round parameter to generate a random number parameter, wherein the first round parameter is related to one of the RFID tags, and generating a tag according to the first round parameter, the random number parameter, and a tag key a first passback parameter; determining whether each of the RFID tags receives a second round parameter provided by the RFID reader within a predetermined period of time after receiving the start of one of the first round parameters, wherein the second round The parameter is related to the first backhaul parameter of the RFID tags; determining whether the first and the second round parameters correspond to each other; when the first and second round parameters correspond to each other and the predetermined time starts from the predetermined time Receiving the second round parameter during the period, updating the label key according to the random number parameter; and according to the second round parameter, the random number parameter, and the updated label gold Generating and outputting a second return parameter. 如申請專利範圍第1項所述之群聚驗證方法,其中在判斷各該些RFID標籤是否在該起始時點起該預定期間內接收到該第二回合參數的步驟之後更包括:當未在該起始時點起該預定期間內接收到該第二回合參數時,經由各該些RFID標籤觸發一終止事件。The clustering verification method according to claim 1, wherein after the step of determining whether each of the RFID tags receives the second round parameter within the predetermined period from the start point, the method further comprises: when not When the second round parameter is received within the predetermined period from the start time point, a termination event is triggered via each of the RFID tags. 如申請專利範圍第1項所述之群聚驗證方法,其中在判斷該第一與該第二回合參數是否相互對應的步驟之後更包括:當判斷該第二回合參數不與該第一回合參數對應時,經由各該些RFID標籤觸發一終止事件。The clustering verification method of claim 1, wherein after the step of determining whether the first and the second round parameters correspond to each other, the method further comprises: when determining that the second round parameter is not related to the first round parameter Correspondingly, a termination event is triggered via each of the RFID tags. 如申請專利範圍第1項所述之群聚驗證方法,其中根據該第一回合參數、該亂數參數及一標籤金鑰產生該第一回傳參數之步驟更包括:根據該第一回合參數及該亂數參數計算一第一運算參數;及根據該標籤金鑰對該第一運算參數加密,以產生該第一回傳參數。The method of claim 1, wherein the step of generating the first backhaul parameter according to the first round parameter, the random number parameter and a label key further comprises: according to the first round parameter And calculating the first operational parameter by the random parameter; and encrypting the first operational parameter according to the tag key to generate the first backhaul parameter. 如申請專利範圍第1項所述之群聚驗證方法,其中根據該第二回合參數、該亂數參數及更新後之該標籤金鑰產生並輸出該第二回傳參數之步驟更包括:根據該第二回合參數及該亂數參數計算一第二運算參數;及根據更新後之該標籤金鑰對該第二運算參數加密,以產生並輸出一第二回傳參數。The clustering verification method of claim 1, wherein the step of generating and outputting the second backhaul parameter according to the second round parameter, the random number parameter, and the updated label key further comprises: The second round parameter and the random number parameter calculate a second operational parameter; and encrypt the second operational parameter according to the updated label key to generate and output a second backhaul parameter. 如申請專利範圍第1項所述之群聚驗證方法,更包括:初始化該些RFID標籤,使各該些RFID標籤具有該標籤身份資料及該標籤金鑰;及回應於該RFID讀取器提供之一查詢指令(Query),提供各該些RFID標籤之該標籤身份資料至該RFID讀取器;其中,該RFID讀取器根據接收到之標籤身份資料來決定一標籤集合並產生該第一回合參數。The method for verifying the clustering according to claim 1, further comprising: initializing the RFID tags, causing each of the RFID tags to have the tag identity data and the tag key; and responding to the RFID reader providing a query instruction (Query), providing the tag identification data of each of the RFID tags to the RFID reader; wherein the RFID reader determines a tag set according to the received tag identity data and generates the first Round parameters. 一種群聚驗證方法,應用於一無線射頻辨識(Radio Frequency Identification,RFID)讀取器中,以和複數個RFID標籤執行群聚驗證操作,該群聚驗證方法包括:廣播一查詢指令(Query),各該些RFID標籤回應於該查詢指令回傳一標籤身份資料;根據接收到之標籤身份資料決定一標籤集合,並產生及廣播一第一回合參數,各該些RFID標籤回應於該第一回合參數回傳一第一回傳參數,其中該第一回傳參數相關於該第一回合參數、各該些RFID標籤之一標籤金鑰及各該些RFID標籤產生之一亂數參數;根據對應至各該些RFID標籤之該第一回傳參數產生並廣播一第二回合參數,各該些RFID標籤判斷是否在接收到該第一回合參數之一起始時點起一預定期間內接收到該第二回合參數且該第一與該第二回合參數是否相互對應,若是,各該些RFID標籤根據該亂數參數更新該標籤金鑰,並根據該第二回合參數、該亂數參數及更新後之該標籤金鑰產生並輸出一第二回傳參數;以及根據一讀取器金鑰、各該些RFID標籤之該標籤身份資料、該第一及該第二回傳參數產生一群聚驗證資料。A clustering verification method is applied to a Radio Frequency Identification (RFID) reader to perform a cluster verification operation with a plurality of RFID tags, the group verification method comprising: broadcasting a query instruction (Query) Each of the RFID tags returns a tag identity data in response to the query command; determining a tag set according to the received tag identity data, and generating and broadcasting a first round parameter, each of the RFID tags responding to the first Returning a first backhaul parameter, wherein the first backhaul parameter is related to the first round parameter, one of the RFID tags, and each of the RFID tags generates a random number parameter; Generating and broadcasting a second round parameter corresponding to the first backhaul parameter of each of the RFID tags, each of the RFID tags determining whether to receive the predetermined time period after receiving the start of one of the first round parameters a second round parameter and whether the first and second round parameters correspond to each other, and if so, each of the RFID tags updates the label key according to the random number parameter, and according to the first The round parameter, the random number parameter and the updated label key generate and output a second backhaul parameter; and the first and the same according to a reader key, the label identity data of each of the RFID tags The second passback parameter produces a bunch of poly verification data. 如申請專利範圍第7項所述之群聚驗證方法,更包括:初始化該RFID讀取器,使該RFID讀取器具有該讀取器金鑰。The clustering verification method of claim 7, further comprising: initializing the RFID reader such that the RFID reader has the reader key. 如申請專利範圍第7項所述之群聚驗證方法,更包括:判斷該RFID讀取器是否經由一通訊連結連接至一驗證伺服器;判斷該RFID讀取器中是否具有該群聚驗證資料;及當該RFID讀取器經由該通訊連結連接至該驗證伺服器且該RFID讀取器具有該群聚驗證資料時,傳輸該群聚驗證資料至該驗證伺服器;其中,該驗證伺服器根據預先儲存之該讀取器金鑰、各該些RFID標籤之該標籤身份資料及各該些RFID標籤之該標籤金鑰對該群聚驗證資料進行解密,以對該群聚驗證資料進行稽核操作。The method for verifying the clustering according to claim 7, further comprising: determining whether the RFID reader is connected to a verification server via a communication link; determining whether the RFID reader has the cluster verification data. And transmitting the clustered verification data to the verification server when the RFID reader is connected to the verification server via the communication link and the RFID reader has the cluster verification data; wherein the verification server Decrypting the cluster verification data according to the pre-stored reader key, the label identity data of each of the RFID tags, and the tag key of each of the RFID tags to audit the cluster verification data operating. 如申請專利範圍第7項所述之群聚驗證方法,其中根據對應至各該些RFID標籤之該標籤身份資料產生並廣播該第一回合參數之步驟更包括:對該些RFID標籤之該標籤身份資料進行雜湊運算(Hash),以找出該第一回合參數。The clustering verification method of claim 7, wherein the step of generating and broadcasting the first round parameter according to the label identity data corresponding to each of the RFID tags further comprises: labeling the RFID tags The identity data is hashed to find the first round parameter. 如申請專利範圍第7項所述之群聚驗證方法,其中根據對應至各該些RFID標籤之該第一回傳參數產生並廣播一第二回合參數之步驟更包括:對該些RFID標籤之該第一回傳參數進行雜湊運算,以找出該第二回合參數。The clustering verification method of claim 7, wherein the step of generating and broadcasting a second round parameter according to the first backhaul parameter corresponding to each of the RFID tags further comprises: The first passback parameter performs a hash operation to find the second round parameter. 如申請專利範圍第7項所述之群聚驗證方法,其中根據該讀取器金鑰、各該些RFID標籤之該標籤身份資料、該第一及該第二回傳參數產生該群聚驗證資料之步驟更包括:根據該讀取器金鑰對各該些RFID標籤回傳之該標籤身份資料、該第一回傳參數及該第二回傳參數進行加密,以產生並儲存一群聚驗證資料。The clustering verification method according to claim 7, wherein the cluster verification is generated according to the reader key, the label identity data of each of the RFID tags, the first and the second backhaul parameters. The step of data further includes: encrypting the tag identity data, the first backhaul parameter, and the second backhaul parameter returned by each of the RFID tags according to the reader key to generate and store a group of verifications. data. 一種群聚驗證方法,應用於一無線射頻辨識(Radio Frequency Identification,RFID)讀取器及複數個RFID標籤之間,該群聚驗證方法包括:經由該RFID讀取器廣播一查詢指令(Query);回應於該查詢指令,經由各該些RFID標籤回傳該標籤身份資料至該RFID讀取器;經由該RFID讀取器來根據接收到之標籤身份資料決定一標籤集合,並產生及廣播一第一回合參數;經由各該些RFID標籤儲存該第一回合參數、產生一亂數參數並根據該第一回合參數、該亂數參數及一標籤金鑰產生一第一回傳參數;經由該RFID讀取器來根據對應至各該些RFID標籤之該第一回傳參數產生並廣播一第二回合參數;經由各該些RFID標籤判斷各該些RFID標籤是否在接收到該第一回合參數之一起始時點起一預定期間內接收到該RFID讀取器提供之該第二回合參數,及判斷該第二回合參數是否對應至該第一回合參數;當該第一與該第二回合參數相互對應且在該起始時點起該預定期間內接收到該第二回合參數時,經由各該些RFID標籤根據該亂數參數來更新該標籤金鑰、根據該第二回合參數、該亂數參數及更新後之該標籤金鑰產生並輸出一第二回傳參數;以及經由該RFID讀取器根據一讀取器金鑰、各該些RFID標籤之該標籤身份資料、該第一及該第二回傳參數產生一群聚驗證資料。A clustering verification method is applied between a Radio Frequency Identification (RFID) reader and a plurality of RFID tags, and the clustering verification method includes: broadcasting a query command (Query) via the RFID reader. Responding to the query command, returning the tag identity data to the RFID reader via each of the RFID tags; determining, by the RFID reader, a tag set according to the received tag identity data, and generating and broadcasting a tag a first round parameter; storing the first round parameter via each of the RFID tags, generating a random number parameter, and generating a first backhaul parameter according to the first round parameter, the random number parameter, and a tag key; The RFID reader generates and broadcasts a second round parameter according to the first backhaul parameter corresponding to each of the RFID tags; determining, by each of the RFID tags, whether each of the RFID tags is receiving the first round parameter Receiving, by the start point, the second round parameter provided by the RFID reader within a predetermined period, and determining whether the second round parameter corresponds to the first round parameter; When the first and the second round parameters correspond to each other and the second round parameter is received within the predetermined period from the start time point, the label key is updated according to the random number parameter via each of the RFID tags, according to the The second round parameter, the random number parameter and the updated label key generate and output a second backhaul parameter; and the label is received by the RFID reader according to a reader key and each of the RFID tags The identity data, the first and the second backhaul parameters generate a group of verified data. 如申請專利範圍第13項所述之群聚驗證方法,更包括:初始化該些RFID標籤,使各該些RFID標籤具有該標籤身份資料及該標籤金鑰;及初始化該RFID讀取器,使該RFID讀取器具有該讀取器金鑰。The method for verifying the clustering according to claim 13 further includes: initializing the RFID tags, causing each of the RFID tags to have the tag identity data and the tag key; and initializing the RFID reader to enable The RFID reader has the reader key. 如申請專利範圍第13項所述之群聚驗證方法,其中在判斷各該些RFID標籤是否在該起始時點起該預定期間內接收到該第二回合參數的步驟之後更包括:當未在該起始時點起該預定期間內接收到該第二回合參數時,經由各該些RFID標籤觸發一終止事件。The clustering verification method of claim 13, wherein after the step of determining whether each of the RFID tags receives the second round parameter within the predetermined period from the start point, the method further comprises: when not When the second round parameter is received within the predetermined period from the start time point, a termination event is triggered via each of the RFID tags. 如申請專利範圍第13項所述之群聚驗證方法,其中在判斷該第一與該第二回合參數是否相互對應的步驟之後更包括:當判斷該第二回合參數不與該第一回合參數對應時,經由各該些RFID標籤觸發一終止事件。The clustering verification method of claim 13, wherein after the step of determining whether the first and the second round parameters correspond to each other, the method further comprises: when determining that the second round parameter is not related to the first round parameter Correspondingly, a termination event is triggered via each of the RFID tags. 如申請專利範圍第13項所述之群聚驗證方法,更包括:判斷該RFID讀取器是否經由一通訊連結連接至一驗證伺服器;判斷該RFID讀取器中是否具有該群聚驗證資料;及當該RFID讀取器經由該通訊連結連接至該驗證伺服器且該RFID讀取器具有該群聚驗證資料時,傳輸該群聚驗證資料至該驗證伺服器;其中,該驗證伺服器根據預先儲存之該讀取器金鑰、各該些RFID標籤之該標籤身份資料及各該些RFID標籤之該標籤金鑰對該群聚驗證資料進行解密,以對該群聚驗證資料進行稽核操作。The method for verifying the clustering according to claim 13 further includes: determining whether the RFID reader is connected to a verification server via a communication link; determining whether the RFID reader has the cluster verification data. And transmitting the clustered verification data to the verification server when the RFID reader is connected to the verification server via the communication link and the RFID reader has the cluster verification data; wherein the verification server Decrypting the cluster verification data according to the pre-stored reader key, the label identity data of each of the RFID tags, and the tag key of each of the RFID tags to audit the cluster verification data operating. 一種無線射頻辨識(Radio Frequency Identification,RFID)標籤組,包括複數個RFID標籤,用以和一RFID讀取器進行群聚驗證操作,各該些RFID標籤包括:一亂數產生器;一記憶體,用以儲存一程式碼,並回應於一初始化操作儲存一標籤身份資料及一標籤金鑰;一加密模組;以及一控制器,用以執行根據該程式碼執行一群聚驗證方法,該群聚驗證方法包括下列之步驟:儲存該RFID讀取器提供之一第一回合參數並產生一亂數參數,其中該第一回合參數相關於各該些RFID標籤之一標籤身份資料;驅動該加密模組根據該第一回合參數、該亂數參數及一標籤金鑰產生一第一回傳參數;判斷各該些RFID標籤是否在接收到該第一回合參數之一起始時點起一預定期間內接收到該RFID讀取器提供之一第二回合參數,其中該第二回合參數相關於該些RFID標籤之該第一回傳參數;判斷該第一與該第二回合參數是否相互對應;當該第一與該第二回合參數相互對應且在該起始時點起該預定期間內接收到該第二回合參數時,接收該第二回合參數,並根據該亂數參數來更新該標籤金鑰;及驅動該加密模組根據該第二回合參數、該亂數參數及更新後之該標籤金鑰產生並輸出一第二回傳參數。A radio frequency identification (RFID) tag group includes a plurality of RFID tags for performing a group verification operation with an RFID reader, each of the RFID tags including: a random number generator; a memory Storing a code and storing a tag identity data and a tag key in response to an initialization operation; an encryption module; and a controller for executing a group of verification methods according to the code, the group The poly verification method includes the steps of: storing the RFID reader to provide one of the first round parameters and generating a random number parameter, wherein the first round parameter is related to one of the RFID tags and identifying the identity information; driving the encryption The module generates a first backhaul parameter according to the first round parameter, the random number parameter and a label key; and determines whether each of the RFID tags is within a predetermined period of time after receiving one of the first round parameters Receiving, by the RFID reader, one of the second round parameters, wherein the second round parameter is related to the first backhaul parameter of the RFID tags; determining the first Whether the second round parameters correspond to each other; when the first and second round parameters correspond to each other and the second round parameter is received within the predetermined period from the start time point, the second round parameter is received, and according to The random number parameter is used to update the label key; and the encryption module is driven to generate and output a second backhaul parameter according to the second round parameter, the random number parameter and the updated label key. 一種無線射頻辨識(Radio Frequency Identification,RFID)讀取器,用以和複數個RFID標籤進行群聚驗證操作,該RFID讀取器包括:複數個天線;一記憶體,用以儲存一程式碼,並回應於一初始化操作儲存一讀取器金鑰;以及一處理器,用以根據該程式碼執行一群聚驗證方法,該群聚驗證方法包括下列之步驟:廣播一查詢指令(Query),各該些RFID標籤回應於該查詢指令回傳一標籤身份資料;根據接收到之該標籤身份資料決定一標籤集合,並產生及廣播一第一回合參數,各該些RFID標籤回應於該第一回合參數回傳一第一回傳參數,其中該第一回傳參數相關於該第一回合參數、各該些RFID標籤之一標籤金鑰及各該些RFID標籤產生之一亂數參數;根據對應至各該些RFID標籤之該第一回傳參數產生並廣播一第二回合參數,各該些RFID標籤判斷是否在接收到該第一回合參數之一起始時點起一預定期間內接收到該第二回合參數且該第一與該第二回合參數是否相互對應,若是,各該些RFID標籤根據該亂數參數更新該標籤金鑰,並根據該第二回合參數、該亂數參數及更新後之該標籤金鑰產生並輸出一第二回傳參數;及根據一讀取器金鑰、各該些RFID標籤之該標籤身份資料、該第一及該第二回傳參數產生一群聚驗證資料。A radio frequency identification (RFID) reader for performing a group verification operation with a plurality of RFID tags, the RFID reader comprising: a plurality of antennas; and a memory for storing a code. And storing a reader key in response to an initialization operation; and a processor for performing a group of aggregation verification methods according to the code, the cluster verification method comprising the steps of: broadcasting a query instruction (Query), each The RFID tags return a tag identity data in response to the query command; determine a tag set according to the received tag identity data, and generate and broadcast a first round parameter, each of the RFID tags responding to the first round The parameter returns a first backhaul parameter, wherein the first backhaul parameter is related to the first round parameter, one of the RFID tags, and one of the RFID tags generates a random number parameter; The first backhaul parameter to each of the RFID tags generates and broadcasts a second round parameter, and each of the RFID tags determines whether one of the first round parameters is received. Receiving the second round parameter within a predetermined period of time and whether the first and second round parameters correspond to each other, and if so, each of the RFID tags updates the label key according to the random number parameter, and according to the second The round parameter, the random number parameter and the updated label key generate and output a second backhaul parameter; and according to a reader key, the label identity data of each of the RFID tags, the first and the The second passback parameter produces a bunch of poly verification data.
TW99117896A 2009-11-30 2010-06-03 Group proving method and radio frequency identification reader and tags using thereof TWI419055B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/859,008 US8446260B2 (en) 2009-11-30 2010-08-18 Group proving method and radio frequency identification reader and tags using thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US26491609P 2009-11-30 2009-11-30

Publications (2)

Publication Number Publication Date
TW201118750A TW201118750A (en) 2011-06-01
TWI419055B true TWI419055B (en) 2013-12-11

Family

ID=44087685

Family Applications (1)

Application Number Title Priority Date Filing Date
TW99117896A TWI419055B (en) 2009-11-30 2010-06-03 Group proving method and radio frequency identification reader and tags using thereof

Country Status (2)

Country Link
CN (1) CN102081729B (en)
TW (1) TWI419055B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201329850A (en) * 2012-01-09 2013-07-16 jun-heng Li Wireless information display device
CN108989994A (en) * 2018-07-13 2018-12-11 京东方科技集团股份有限公司 A kind of data-updating method, electronic tag, control terminal and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030137403A1 (en) * 2001-10-09 2003-07-24 Carrender Curtis L. Methods and apparatuses for identification
TW200604953A (en) * 2004-07-29 2006-02-01 Mitsubishi Electric Corp Radio frequency indentification tag reading system, radio frequency identification tag reading device, and radio frequency identification tag
US20070164863A1 (en) * 2006-01-17 2007-07-19 International Business Machines Corporation System and method to track inventory using RFID tags
TW200935318A (en) * 2008-02-14 2009-08-16 Nec China Co Ltd Radio frequency identification system and method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6424263B1 (en) * 2000-12-01 2002-07-23 Microchip Technology Incorporated Radio frequency identification tag on a single layer substrate
CN101246538A (en) * 2007-02-14 2008-08-20 日电(中国)有限公司 Radio frequency recognition system and method
CN100449569C (en) * 2007-03-23 2009-01-07 东莞市太平洋计算机科技有限公司 Active radio frequency electronic label power-controlling method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030137403A1 (en) * 2001-10-09 2003-07-24 Carrender Curtis L. Methods and apparatuses for identification
TW200604953A (en) * 2004-07-29 2006-02-01 Mitsubishi Electric Corp Radio frequency indentification tag reading system, radio frequency identification tag reading device, and radio frequency identification tag
US20070164863A1 (en) * 2006-01-17 2007-07-19 International Business Machines Corporation System and method to track inventory using RFID tags
TW200935318A (en) * 2008-02-14 2009-08-16 Nec China Co Ltd Radio frequency identification system and method

Also Published As

Publication number Publication date
TW201118750A (en) 2011-06-01
CN102081729B (en) 2014-05-21
CN102081729A (en) 2011-06-01

Similar Documents

Publication Publication Date Title
CN110442652B (en) Cross-chain data processing method and device based on block chain
CN110489485B (en) Federated blockchain network, method and storage medium for storing product data therein
US10523443B1 (en) Devices, methods, and systems for cryptographic authentication and provenance of physical assets
CN108924130B (en) Block data verification method, device, equipment and storage medium
CN110036389A (en) Quickly to track the method and system of the navigation of block chain via data manipulation
CN110089075B (en) Pseudo-random generation of matrices for computing fuzzy extractors and method for verification
CN102419809B (en) Safe, efficient and universal method for proving original value of electronic document
CN112689979B (en) Article identity management method, terminal, microprocessor unit, identification device and system
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
CN110611563A (en) Equipment identification code distribution method and device and Internet of things equipment
Lin et al. A cloud-based authentication protocol for RFID supply chain systems
CN103348625B (en) Authenticator, certified person and authentication method
CN111241569A (en) Information processing method, device and equipment
US20220318415A1 (en) Integrity auditing for multi-copy storage
CN109815289A (en) Block generation method, calculating equipment, storage medium for block chain network
CN110740038A (en) Block chain and communication method, gateway, communication system and storage medium thereof
CN114372296A (en) Block chain-based user behavior data auditing method and system
KR102272928B1 (en) Operating method for machine learning model using encrypted data and apparatus based on machine learning model
CN111798254A (en) Tracing code generation method, device, equipment and readable storage medium
CN114780923A (en) Electronic seal management and control method and system
US20220035932A1 (en) System, device and method for securely transferring information from a hardware to a blockchain
CN110100413A (en) Robust for certification calculates Fuzzy extractor and method
TWI419055B (en) Group proving method and radio frequency identification reader and tags using thereof
US8446260B2 (en) Group proving method and radio frequency identification reader and tags using thereof
CN110474968B (en) Self-adaptive sensing type block chain mixed consensus mechanism structure and method thereof