WO2021103117A1 - 一种读取rfid标签数据的系统 - Google Patents
一种读取rfid标签数据的系统 Download PDFInfo
- Publication number
- WO2021103117A1 WO2021103117A1 PCT/CN2019/123777 CN2019123777W WO2021103117A1 WO 2021103117 A1 WO2021103117 A1 WO 2021103117A1 CN 2019123777 W CN2019123777 W CN 2019123777W WO 2021103117 A1 WO2021103117 A1 WO 2021103117A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- electronic tag
- reader
- rfid
- tag
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10198—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves setting parameters for the interrogator, e.g. programming parameters and operating modes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
- G06K17/0029—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10019—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10257—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves arrangements for protecting the interrogation against piracy attacks
Definitions
- the present invention relates to the field of communication technology, in particular to a system for reading RFID tag data.
- RFID Radio Frequency Identification
- the existing RFID system is shown in Figure 1. It usually includes an electronic tag, a reader, and an antenna (reader antenna, electronic tag antenna) for data communication between the electronic tag and the reader.
- the electronic tag stores Electronic data in a certain format is used as the identification information to identify the item.
- the electronic tag is attached to the item to be identified and used as the electronic mark of the item to be identified.
- the reader sends a command to the electronic tag, and the electronic tag is based on the received
- the reader instruction of the reader transmits the stored identification data to the reader to realize data communication.
- the reader reads and decodes the data and then transfers the data to the control device or network for related data processing.
- the management of the RFID system in the prior art usually relies on the management software on the computer, and the computer has different operating systems in different use environments, such as Windows XP ⁇ Windows Vista ⁇ Windows 7 ⁇ Windows 8 ⁇ Windows 10 and Linux, etc. ,
- the management software runs in the environment of different systems, and different applications and RFID middleware are needed to realize the management and control of the equipment.
- customized development is required.
- the operating system is upgraded, there may be changes in the original application program interface due to the upgrade, resulting in management software incompatibility, non-working, or even management software crashes. It is more difficult for ordinary users to deal with such situations.
- the present invention provides a system for reading RFID tag data.
- the present invention provides a system for reading RFID tag data, including a terminal, an RFID reader, and an electronic tag, wherein the terminal sends configuration commands to the RFID reader; the RFID reader is used to find the corresponding electronic tag, The electronic tag confirmed by the anti-collision operation is selected and the selected electronic tag is authenticated; when the authentication is passed, the terminal receives the data of the electronic tag.
- the system for reading RFID tag data provided by the present invention can adapt to different operating system environments and overcome the problem that existing equipment requires different management programs to control.
- operating system upgrades may cause changes in the underlying interface SDK, etc.
- the original management program does not work properly.
- Figure 1 is a structural diagram of an existing RFID system
- Figure 2 shows the RFID system and its components in an exemplary embodiment of the present invention
- Figure 3 is a diagram of the RFID reader and electronic tag components in an exemplary embodiment of the present invention.
- Fig. 4 is a flowchart of reading and writing of RFID tag data in an exemplary embodiment of the present invention.
- Fig. 5 is an interactive diagram of reading and writing RFID tag data in an exemplary embodiment of the present invention.
- Fig. 6 is a diagram of a device for reading and writing RFID tag data in an exemplary embodiment of the present invention.
- the RFID system consists of three parts: an electronic tag, a reader and a terminal.
- the communication between the terminal and the reader is wired communication, and the communication between the reader and the electronic tag
- the communication is wireless communication, and the basic communication process is read and write ROM ⁇ antenna ⁇ electronic tag ⁇ output.
- the wireless communication in the reader is completed through a radio frequency module, which includes a power supply device, a radio frequency oscillator, a radio frequency processor, a radio frequency receiver, and a preamplifier.
- the radio frequency oscillator generates a signal, modulates the transmitted signal through the radio frequency processor, and sends it to the antenna to send to the electronic tag.
- the signal sent back from the electronic tag is received by the radio frequency receiver, amplified and sent to the control module for processing.
- the control module is responsible for communicating with the application system software and controlling the communication between the reader and the electronic tag. It is an important part of the reader.
- the control module receives the instructions sent by the application system software, and sends it to the radio frequency module for modulation through the signal encoding and encryption, and then sends it to the tag via the antenna. Demodulate, decode and decrypt the signal sent by the electronic tag to the application system software.
- the operating system of the terminal in this application includes but is not limited to operating systems such as Windows XP ⁇ Windows Vista ⁇ Windows 7 ⁇ Windows 8 ⁇ Windows 10 and Linux.
- the communication between the terminal and the reader includes, but is not limited to, for example, USB, IEEE Communication protocols such as 1394, Thunderbolt, TCP/IP, UDP, and terminals including but not limited to mobile phones, tablet computers, personal computers, servers, etc. can be configured to execute at least one of the methods provided in the embodiments of the present application.
- the implementation of the method is introduced below by taking a terminal as an example of the execution subject of the method. It can be understood that the fact that the execution subject of the method is the terminal is only an exemplary description, and should not be understood as a limitation of the method.
- the electronic tag is the real data carrier of the radio frequency identification system.
- Each electronic tag has a unique electronic code, which is generally attached to the object to be monitored for wireless data exchange with the reader through electromagnetic waves, and has the functions of intelligent reading and writing and encrypted communication.
- the electronic tag receives the signal sent by the reader, and converts it into a DC power supply for the circuit in the electronic tag to work.
- the data is sent back according to the requirements of the reader, and the data is modulated and sent to the reader by the antenna.
- the frequency band or frequency occupied by system applications is in the ISM (Industrial Scientific Medical) frequency band.
- ISM International Scientific Medical
- This frequency band is mainly open to industry, science and medicine. It is used by a major organization without authorization, only a certain transmit power (generally less than 1W) is required, and no interference to other frequency bands is enough.
- the typical working frequency bands widely adopted by RFID systems internationally include four frequency bands: low frequency, high frequency, ultra high frequency and microwave. They are low frequency 125kHz and 133kHz, high frequency 13.56MHz and 27.12MHz, UHF 433MHz and 860MHz-960MHz, microwave 2.45GHz and 5.8GHz.
- the working frequency is different, the working principle is also different, the recognition distance is also different, the low frequency recognition distance is closer, the microwave recognition distance is longer.
- the design of the RFID electronic tag (Tag) in the embodiment of this application mainly includes the following key technologies, coding and modulation, digital modulation, error detection and correction, coding in the baseband, etc.
- the specific components of each module are shown in Figure 3. Shown.
- the data transmission between the reader and the transponder requires three modules: transmitter, receiver and information channel.
- the transmitter is composed of modulator and signal processing.
- the receiver is composed of demodulation circuit and signal processing in the transponder.
- the information channel is mainly the medium for information transmission.
- the data encoding methods involved in this application include PIE code, Manchester code, and Miller. Code, etc.
- the data modulation methods involved include ASK, unilateral ASK, bilateral ASK, PR-ASK, etc.
- Electromagnetic energy is emitted into space in the form of electromagnetic waves, and information can be encoded by changing any one or several of the three parameters of electromagnetic waves, namely frequency, power, and phase, and then transmitted to any place in space through electromagnetic waves.
- information can be encoded by changing any one or several of the three parameters of electromagnetic waves, namely frequency, power, and phase, and then transmitted to any place in space through electromagnetic waves.
- modulation By encoding the information of the electromagnetic wave, it is modulation, and the carrier is the electromagnetic wave without modulation.
- the original information can be obtained from the received electromagnetic wave by analyzing the changes in its frequency, phase, and received power. This is demodulation.
- the modulation method commonly used in RFID is mainly composed of frequency shift keying, amplitude keying and subcarrier.
- Encoding uses different forms of codes to represent 0 and 1 in binary. Commonly used encoding methods in RFID include Miller code, single-stage return to zero code, MRZ code, differential two-way code, deformed Miller code, Manchester code And other forms.
- ECC Error Correcting Code, error detection and correction
- Measures are used to correct the changed data.
- Commonly used techniques in related technologies include parity checking.
- the method of parity check includes vertical parity check, horizontal parity check, horizontal and vertical parity check and so on.
- the longitudinal parity is grouped by characters.
- the horizontal parity and the longitudinal parity can only detect the encoding errors of the data in the horizontal and vertical directions, and cannot do anything about the error of a certain character.
- This application combines the parity check methods in the longitudinal direction and the transverse direction to obtain cross-checking. This method has very good error detection performance.
- Fig. 4 The implementation of the method for outputting RFID tag data provided by the present invention is shown in Fig. 4:
- S401 Send a signal through the antenna in the reader to search for tags that are sensed in a specific frequency range.
- the relevant parameters of the RFID reader set the antenna transmission frequency, call the API interface according to the transmission frequency and select the corresponding mode.
- this application can set the parameters of the RFID device through the supporting management software according to user needs, such as:
- Working mode It can be configured to read/write RFID tags by triggering or automatically and continuously read RFID tags.
- Reading frequency band Configure the read RF frequency band standard (840MHz-844.5MHz ⁇ 902MHz-928MHz, etc.) and power sensitivity and other parameters.
- Reading area you can specify the designated area of the RFID tag to be read, such as the unique identification code TID of the electronic tag, the electronic product code EPC and the reading of user data Userdata;
- Reading mode The interval time of the output mode can be configured. For example, the same label will not be output repeatedly within a few seconds, and the new label will be output immediately;
- Output mode You can configure the output data rules and format, such as PS2, HID protocol rules;
- the electronic tag When the system can read data and there is an electronic tag, the electronic tag receives the command sequence sent. At this time, the electronic tag will transmit the unique identification code stored in EPROM to the part that needs authentication. Call the void WriteRV (uchar Address, uchar Value) function, send the request command parameter 28H into the input and output data register, and then call the WriteRawRV function to send the request command word 16H. After running, the input and output data will contain the electronic label The unique identification code. Then, call uchar ReadRV (uchar Address) to get the operation result.
- uchar ReadRV uchar Address
- S402 Anti-collision operation.
- This application can choose to call the native API or write the anti-collision algorithm, call this interface, and then the reader can read the current anti-collision electronic tag serial number through its own register.
- the anti-collision algorithms involved in this application include ALOHA algorithm, binary search algorithm, label estimation algorithm, etc.
- the algorithm function is stored in the address 0x4000000 in the ROM.
- the WriteRV function to send the collision parameters to the input and output data register, and then call the WriteRawRV instruction to send the instruction word 80H to the register.
- the input and output data register stores the result of the collision processing.
- the result is an 8-byte identification code, which represents the identification code of the electronic tag that the reader should read.
- S403 Authentication security of the electronic tag After collision processing, the tag number that can be read is obtained, and the authentication step of the RFID reader and electronic tag is entered.
- the authentication security of RFID readers and electronic tags must comply with the national standard ISO9798. Both the reader and the electronic tag should have the secret key to authenticate each other. In normal mode, both parties have the same Key.
- the secret key can be generated iteratively by a pseudo-random algorithm, as shown in the following formula:
- Specify the initial value Key which can be a memory address in the ROM of the reader, where a is the iteration parameter, b is the iteration constant, and m is the numerical control scale. After reaching the designated operating level n, the Key can be obtained.
- the RFID reader calls the char Pcd Auth Key(uchar*coded) function to verify the secret key to the electronic tag.
- the electronic tag returns a random number R after the hardware calculation solidified in the ROM, and the reader calls the function char Pcd after receiving R.
- Auth State(uchar auth_mode,uchar block,uchar*snr) is verified, and then the connection can be established.
- Select the electronic label and return the relevant information collected by the electronic label mainly returning information such as the unique identification code TID of the electronic label, the electronic product code EPC, and the user data Userdata.
- S404 Perform security authentication in the reader system to determine the accuracy of the data and the relevant security of the data source. If the certification is passed, the label content can be transmitted. Electronic tags can be divided into different sectors, and different sectors can be read by calling different APIs of the reader. The software part of the RFID reader mainly completes the configuration of the storage content and capacity of each register of the reader.
- the reader can read and write the electronic tag.
- This step mainly calls the Write RV function to send the read and write command parameters into the input and output data registers.
- the read instruction of the electronic tag is 38H
- the write instruction is 18H
- the Write Raw Rc function is called to send the operation instruction 16H to the instruction register.
- the RIFD reader executes it, the data can be obtained in the input and output data registers.
- the command packet of the terminal corresponds to a command execution result data packet.
- the application interface layer receives the command packet sent by the terminal, parses the parameters therein, and executes the corresponding callback function according to the analysis result. After the command is executed, the reader will package the execution result and send it to the terminal for processing and display. If the operation is successful, the read electronic label will be output as a label document, and the serial number in the document will be automatically numbered. If the operation fails, it will return failure. And output as a log file.
- the command packet of this application consists of a 1-byte packet type, a 1-byte packet length, and a variable-length data field.
- the definition of the command bit field is shown in Table 1 below:
- terminal system interfaces and read operation functions are listed in Table 2 below. It should be stated that the definitions here are only exemplary and not restrictive. Those skilled in the art can fully write operation interfaces according to actual data transmission requirements and user needs. Function definition and function description.
- the communication between the RFID reader and the electronic tag requires a unified data structure, so that the interface function can be used to convert the communication data packet into its own memory data structure during the analysis of the reader, and the communication data packet can be converted through hardware conversion It is converted into instruction data, thus avoiding the data transmission abnormal problem caused by the different firmware version of the data format.
- the data packet structure is shown in Table 3:
- communication data packets can be divided into specific categories: FIND, SEND and ACK data packets.
- FIND FIND
- SEND SEND
- ACK ACK
- Table 4 Data packet type table
- SEND data packets and ACK data packets are RFID system communication data packets, that is, the reader can send information to the electronic tag through the SEND data packet, or ACK receives the electronic tag data information, and the electronic tag receives the instruction to be executed through the ACK data packet.
- the relevant data packet of the reader should add the Command command bit, and the electronic tag should add the receiving bit.
- the packet sent and received by the RFID reader has a unified identification, which is defined as flag1 in the flag bit.
- the packet type is:
- the communication data packet type is SEND
- SEND SEND
- the RFID reader has established a connection with the electronic tag, and then starts to send commands or data.
- SEND package normal communication can be carried out between the two.
- the package should be checked in the middle of the process to ensure some parameters of the data in the process.
- the package needs to be sent as a data frame, and the content in the package structure can be analyzed when receiving.
- the main manifestation is the analysis of the packet.
- the analysis can be carried out through the content in the table item.
- the data packet types are as follows:
- the communication data packet type When the communication data packet type is ACK, it indicates the data that can be sent by the tag in the system.
- the package types are shown in the table.
- the flag bit of the data packet sent by the electronic label is 2.
- the communication data packet is of the SEND type, it mainly sends the electronic label to collect data, and its structure is shown in the table.
- the communication data packet When the communication data packet is of ACK type, it mainly sends the response data packet to the RFID reader. Its structure is shown in the table:
- the electronic tag is mainly responsible for data collection and data transmission to the reader.
- the main data collection commands should be issued by the RFID reader.
- the electronic tag and RFID reader and terminal are shown in Figure 5.
- the interaction process is:
- the RFID reader performs power-on reset, sends electromagnetic waves in a specific frequency band, and waits for the electronic tag to respond to the range.
- the tag is initialized, and the antenna signal of the reader is received when it is working.
- the hardware circuit parses the data packet and sends an ACK communication data packet to the resolved address, requesting to join the network.
- the terminal side mainly implements the rule configuration of the reader, such as setting the working parameters of reading RFID tags:
- Working mode It can be configured to read/write RFID tags by triggering or automatically and continuously read RFID tags.
- Reading frequency band Configure the read RF frequency band standard (840MHz-844.5MHz ⁇ 902MHz-928MHz, etc.) and power sensitivity and other parameters.
- Reading area you can specify the designated area of the RFID tag to be read, such as the unique identification code TID of the electronic tag, the electronic product code EPC and the reading of user data Userdata;
- Reading mode The interval time of the output mode can be configured. For example, the same label will not be output repeatedly within a few seconds, and the new label will be output immediately;
- Output mode You can configure the output data rules and format, such as PS2, HID protocol rules;
- the reader/writer reads the electronic tag data according to the configured rules and outputs it to the terminal for processing and display.
- Fig. 6 is a device for outputting RFID tag data in another exemplary embodiment of the present invention, which includes a search module 61, a selection device 62, an authentication module 63, and an output module 64, wherein:
- the searching module 61 is used for searching the corresponding electronic label according to the configuration rule
- the selection module 62 is used to select the electronic tag confirmed by the anti-collision operation
- the authentication module 63 is used to authenticate the above-mentioned selected electronic tag
- the operation module 64 is used to output the electronic tag data after passing the authentication.
- the modules in the device for outputting RFID tag data provided by the embodiments of the present invention can also be used to implement the functions corresponding to the steps of the methods in the foregoing embodiments, which will not be repeated here.
- An embodiment of the present invention also provides an RFID device, including: a memory, a processor, and a computer program stored in the memory and capable of running on the processor.
- a computer program stored in the memory and capable of running on the processor.
- the embodiment of the present invention also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
- a computer program is stored on the computer-readable storage medium.
- the computer program is executed by a processor, each process of the above-mentioned RFID tag data output method embodiment is realized, and the same can be achieved.
- the technical effect, in order to avoid repetition, will not be repeated here.
- the computer-readable storage medium such as read-only memory (Read-Only Memory, ROM for short), random access memory (Random Access Memory, RAM for short), magnetic disk, or optical disk, etc.
- this application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- These computer program instructions can also be stored in a computer-readable memory that can direct a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
- the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
- These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
- the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
- the computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer readable media.
- RAM random access memory
- ROM read-only memory
- flash RAM flash memory
- Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
- the information can be computer-readable instructions, data structures, program modules, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Near-Field Transmission Systems (AREA)
Abstract
Description
Byte1 | Byte2 | Byte[3……N+4] |
命令包类型ID | 命令包长度L | 命令包有效数据域 |
1BYTE | 1BYTE | 1BYTE | NBYTE | 1BYTE |
长度 | 包类型 | 标签地址 | 数据 | CRC |
Claims (10)
- 一种读取RFID标签数据的系统,包括有终端、RFID阅读器以及电子标签,其特征在于,所述终端发送配置命令至RFID阅读器;所述RFID阅读器用于查找所对应的电子标签,选定经过防碰撞操作所确认的电子标签并认证所述选定的电子标签;当认证通过时,所述终端接收所述电子标签的数据。
- 根据权利要求1所述的系统,其特征在于,在所述查找所对应的电子标签之前,所述RFID阅读器还用于接收工作参数的配置指令,解析该配置指令并写入到配置ROM中。
- 根据权利要求2所述的系统,其特征在于,所述工作参数包括以下的一种或多种:工作方式、读取区域、读取长度、读取方式、读取配置。
- 根据权利要求1所述的系统,其特征在于,所述查找所对应的电子标签包括:所述RFID阅读器通过预设的数据包格式查找特定频段内所对应的电子标签。
- 根据权利要求4所述的系统,所述预设的数据包格式包括:长度、数据包类型、标签地址以及数据,其中数据包类型包括有FIND、SEND、ACK。
- 根据权利要求1所述的系统,其特征在于,所述电子标签的数据包括以下的一种或多种:唯一标识码TID、电子产品代码EPC以及用户数据Userdata。
- 根据权利要求1-6任一所述的系统,其特征在于,所述终端接收所述电子标签的数据包括:所述终端通过预定的协议接收所述电子标签的数据。
- 根据权利要求7所述的系统,其特征在于,所述预定的协议包括以下的一种或多种:PS2、HID、Bluetooth。
- 根据权利要求1所述的系统,其特征在于,所述防碰撞操作包括通过以下的一种或多种算法处理:ALOHA算法、二进制搜索算法、标签估计算法。
- 根据权利要求1所述的系统,其特征在于,所述对所述选定的电子标签进行安全认证包括:所述RFID阅读器通过伪随机算法迭代得到认证密钥Key进行安全认证,其中伪随机算法如下:Key i=(aKey i-1+b)%m指定初值Key,该值为读写器内ROM某一内存地址,其中a为迭代参数,b为迭代常数,m为数控规模。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911166042.1 | 2019-11-25 | ||
CN201911166042.1A CN110969036B (zh) | 2019-11-25 | 2019-11-25 | 一种rfid标签数据输出的方法、装置、设备和存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021103117A1 true WO2021103117A1 (zh) | 2021-06-03 |
Family
ID=70031444
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/123775 WO2021103115A1 (zh) | 2019-11-25 | 2019-12-06 | 一种rfid标签数据输出的方法、装置、设备和存储介质 |
PCT/CN2019/123777 WO2021103117A1 (zh) | 2019-11-25 | 2019-12-06 | 一种读取rfid标签数据的系统 |
PCT/CN2019/123776 WO2021103116A1 (zh) | 2019-11-25 | 2019-12-06 | 一种读取rfid标签数据的方法、装置、设备和存储介质 |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/123775 WO2021103115A1 (zh) | 2019-11-25 | 2019-12-06 | 一种rfid标签数据输出的方法、装置、设备和存储介质 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/123776 WO2021103116A1 (zh) | 2019-11-25 | 2019-12-06 | 一种读取rfid标签数据的方法、装置、设备和存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110969036B (zh) |
WO (3) | WO2021103115A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113992445B (zh) * | 2021-12-28 | 2022-04-19 | 广东曜芯科技有限公司 | 认证装置和方法 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1677425A (zh) * | 2004-03-31 | 2005-10-05 | 深圳市朗科科技有限公司 | 基于无线射频识别系统的数据读写装置及方法 |
CN101236593A (zh) * | 2007-02-02 | 2008-08-06 | 中国科学院声学研究所 | 在rfid中一种带有安全机制的二进制防冲突方法 |
CN102402672A (zh) * | 2010-09-14 | 2012-04-04 | 公安部第三研究所 | 一种应用于涉车环境的rfid超高频安全空口协议 |
CN102682313A (zh) * | 2011-06-10 | 2012-09-19 | 中国人民解放军国防科学技术大学 | 射频识别系统中读写器与标签的通信方法 |
CN105574456A (zh) * | 2015-12-14 | 2016-05-11 | 谭焕玲 | 一种rfid阅读器 |
US20170124361A1 (en) * | 2015-11-02 | 2017-05-04 | Symbol Technologies, Llc | Arrangement for, and method of, configuring an rfid reader to scan rfid tags in compliance with regulations of a particular regulatory region of operation |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100684172B1 (ko) * | 2004-11-24 | 2007-02-20 | 한국전자통신연구원 | Rfid 태그의 저전력 디지털 회로부 |
JP2006179050A (ja) * | 2004-12-21 | 2006-07-06 | Hitachi Global Storage Technologies Netherlands Bv | 磁気ディスク装置の製造方法、試験/調整装置及び搬送容器 |
JP2008146184A (ja) * | 2006-12-06 | 2008-06-26 | Fujitsu Ltd | リーダライタ装置、リーダライタ制御プログラム、データアクセスシステムおよびデータアクセス制御方法 |
CN101256617A (zh) * | 2007-12-21 | 2008-09-03 | 上海复旦微电子股份有限公司 | 高频/超高频rfid识别系统中的多标签防碰撞算法 |
CN101763080B (zh) * | 2009-05-20 | 2012-01-04 | 中国科学院自动化研究所 | 支持多现场总线的rfid读写系统及其管理方法 |
AU2011302710A1 (en) * | 2010-09-13 | 2013-04-18 | Trident Rfid Pty Ltd | System and method for updating parameters and firmware on RFID readers |
CN102622619A (zh) * | 2012-01-10 | 2012-08-01 | 上海交通大学 | 安全无线识别系统及其认证方法 |
CN103489016B (zh) * | 2013-08-26 | 2016-08-10 | 广西大学 | Rfid防冲突读写装置及其控制方法 |
CN103577784B (zh) * | 2013-11-25 | 2016-07-06 | 电子科技大学 | 基于多射频模块的有源rfid阅读器防碰撞方法及系统 |
CN104091184B (zh) * | 2014-06-16 | 2017-09-15 | 上海实甲智能系统有限公司 | 电子标签检测方法及系统 |
CN104091187A (zh) * | 2014-07-06 | 2014-10-08 | 冶金自动化研究设计院 | 一种基于rfid中间件的嵌入式数据集中器 |
CN106250796B (zh) * | 2016-08-16 | 2019-02-01 | 日照山川电子信息技术有限公司 | 一种具备高度防碰撞功能的射频系统及方法 |
CN108388819B (zh) * | 2018-01-31 | 2020-11-17 | 莫冰 | 一种基于超高频rfid应答器的防碰撞方法、装置及其系统 |
CN108595992B (zh) * | 2018-04-06 | 2022-05-17 | 杨明艳 | 一种跨平台多角色网络身份证阅读驱动器制造方法及设备 |
CN110287748B (zh) * | 2019-07-03 | 2024-01-23 | 北京智芯微电子科技有限公司 | 超高频rfid防碰撞方法 |
-
2019
- 2019-11-25 CN CN201911166042.1A patent/CN110969036B/zh active Active
- 2019-12-06 WO PCT/CN2019/123775 patent/WO2021103115A1/zh active Application Filing
- 2019-12-06 WO PCT/CN2019/123777 patent/WO2021103117A1/zh active Application Filing
- 2019-12-06 WO PCT/CN2019/123776 patent/WO2021103116A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1677425A (zh) * | 2004-03-31 | 2005-10-05 | 深圳市朗科科技有限公司 | 基于无线射频识别系统的数据读写装置及方法 |
CN101236593A (zh) * | 2007-02-02 | 2008-08-06 | 中国科学院声学研究所 | 在rfid中一种带有安全机制的二进制防冲突方法 |
CN102402672A (zh) * | 2010-09-14 | 2012-04-04 | 公安部第三研究所 | 一种应用于涉车环境的rfid超高频安全空口协议 |
CN102682313A (zh) * | 2011-06-10 | 2012-09-19 | 中国人民解放军国防科学技术大学 | 射频识别系统中读写器与标签的通信方法 |
US20170124361A1 (en) * | 2015-11-02 | 2017-05-04 | Symbol Technologies, Llc | Arrangement for, and method of, configuring an rfid reader to scan rfid tags in compliance with regulations of a particular regulatory region of operation |
CN105574456A (zh) * | 2015-12-14 | 2016-05-11 | 谭焕玲 | 一种rfid阅读器 |
Also Published As
Publication number | Publication date |
---|---|
CN110969036B (zh) | 2021-04-30 |
WO2021103116A1 (zh) | 2021-06-03 |
CN110969036A (zh) | 2020-04-07 |
WO2021103115A1 (zh) | 2021-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8570157B1 (en) | Local processing of received RFID tag responses | |
US8427315B2 (en) | Ahead-of-time scheduling of commands in RFID reader systems | |
US8390431B1 (en) | RFID tags that backscatter more codes | |
US8237562B1 (en) | Dealing with rogue RFID readers using tag identifiers | |
JP7478327B2 (ja) | 無線装置信号を変換するシステム及び方法 | |
US7663486B2 (en) | RFID tag user memory indication | |
US9928388B1 (en) | Sequential encoding for RFID tags | |
WO2011009768A2 (en) | A method and reader for reading tag data a radio frequency identification system | |
JP4984774B2 (ja) | Rfタグリーダ及び再送制御方法 | |
US8134451B1 (en) | RFID tag chips and tags capable of backscattering more codes and methods | |
US20070236331A1 (en) | Preventing timeout of RFID tag in timed state of air-interface protocol | |
US8063740B1 (en) | Interfacing to RFID reader utility that causes RFID tags to reply using changed reply timing | |
US8115590B1 (en) | RFID readers limiting theft of confidential information | |
US9129168B1 (en) | RFID readers causing tags to backscatter based on challenge | |
US9129169B1 (en) | RFID tags backscattering based on challenge | |
US8830065B1 (en) | RFID readers with run commands | |
US8698629B1 (en) | RFID readers with encapsulating commands | |
WO2021103117A1 (zh) | 一种读取rfid标签数据的系统 | |
Nguyen et al. | Modified tree‐based identification protocols for solving hidden‐tag problem in RFID systems over fading channels | |
JP6241340B2 (ja) | 情報処理装置、情報処理方法、及び情報処理プログラム | |
KR100959562B1 (ko) | 알에프아이디의 리더기와 태그 간의 통신방법 | |
CN115361096B (zh) | 一种rfid标签电路及基于rfid标签电路的数据传输方法 | |
JPWO2006129357A1 (ja) | Idタグおよびリーダ/ライタ | |
KR20180118977A (ko) | 코드를 이용한 단말기간 데이터 통신 방법 | |
CN116055997A (zh) | 通信方法以及相关装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19953979 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19953979 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 14/12/2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19953979 Country of ref document: EP Kind code of ref document: A1 |