Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting radio frequency identification tag and reader data safety

A technology of data security and radio frequency identification, which is applied in the field of RFID, can solve the problem of stopping label reuse, and achieve the effect of avoiding illegal theft and protecting data security

Active Publication Date: 2008-07-02
CHINA TELECOM CORP LTD
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

What needs to be solved at present is how to ensure the validity of the stop label and how to reuse the label

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting radio frequency identification tag and reader data safety
  • Method and system for protecting radio frequency identification tag and reader data safety
  • Method and system for protecting radio frequency identification tag and reader data safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] figure 1 The network entities and their attributes involved in the overall structure of an RFID application system according to an embodiment of the present invention are shown. Specifically, the RFID application system includes three network entities: server, RFID reader and RFID tag.

[0020] The server is a system service management server, and its role is to respond to requests from the RFID tags and their readers or issue commands to the RFID tags and their readers. The server can exchange data with RFID readers via wired or wireless means. The server stores its own network identification "server ID" and a list of random numbers shared with the RFID tag and its reader, and has a logic circuit capable of implementing a secure encryption algorithm (eg, MD5 encryption algorithm).

[0021] The function of the RFID reader is to respond to the command of the server or to read the information of the RFID tag. The RFID reader can exchange data with the server by wire or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and system to protect data safety of RF identification (RFID) tags and acquisition devices, so as to fulfill bidirectional authority verification between a network server and RFID tags and acquisition devices; therefore, the invention can effectively prevent illegal access on RFID tags and acquisition devices that have not passed safety certification. When effectively using a matured and simple arithmetic structure, the RFID system has no higher requirement for system hardware, so as to effectively lower composition cost between the RFID system and prior telecom network.

Description

technical field [0001] The present invention relates generally to RFID (Radio Frequency Identification), and in particular to a method and system for protecting data security of RFID tags and readers. Background technique [0002] A typical RFID system generally consists of RFID tags, readers, and computer systems. The RFID tag generally stores coded data in an agreed format, which is used to uniquely identify the object to which the tag is attached. Compared with the traditional barcode technology, it has obvious advantages such as non-contact reading, no need for optical alignment, long working distance, suitable for harsh environments, and can identify moving targets. Thanks to the development of electronic technology, it has gradually gained popularity. Wide range of applications. Typical applications include identification of trains and freight containers, automatic highway toll collection and traffic management, warehouse management, access control systems, anti-thef...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/00H04L9/32
Inventor 龚学峰薛立宏李峰
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products