Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-counterfeiting method based on EPC class-1 G-2 protocol, electronic label and reader

A technology of electronic tags and readers, which is applied in the field of article anti-counterfeiting, can solve problems such as violations, and achieve reliable anti-counterfeiting effects

Active Publication Date: 2010-09-29
ZTE INTELLIGENT IOT TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The scheme of anti-counterfeiting with TID number is feasible under the premise of (1), but it violates the original intention of TID and EPC stipulated in the agreement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-counterfeiting method based on EPC class-1 G-2 protocol, electronic label and reader
  • Anti-counterfeiting method based on EPC class-1 G-2 protocol, electronic label and reader
  • Anti-counterfeiting method based on EPC class-1 G-2 protocol, electronic label and reader

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] According to the EPC Class-1G-2 agreement, the electronic tag has multiple states, and when it completes the early interaction with the reader and starts to perform business operations such as counting, reading, writing, locking, and killing, it is usually open (Open) and protected. (Secured) One of two states. When the access password (Access Password) stored in the reserved storage area of ​​the electronic tag is not 0, the tag will first jump to the Open state; when the Access Password stored in the reserved storage area is 0, the tag will switch from the previous state to Jump directly to the Secured state. When the tag is in the Open state, the reader can perform other business operations on the tag except for locking / unlocking; when the tag is in the Secured state, the reader can perform all business operations on the tag.

[0044]According to the content of the above agreement, the core idea of ​​the present invention is: the EPC code of AccessPassword and produ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an anti-counterfeiting method, an electronic label and a reader based on the EPC Class-1 G-2 protocol. the method includes the following steps: the EPC code of the product is written into the EPC storage area of the electronic label; the access password of the electronic label is written into the access password storage area of the electronic label; the EPC code and the access password are stored in an application server as a record; the EPC storage area of the electronic label is set to be write-lock; the access password storage area of the electronic label is set to be read-write lock; the reader compares the access password in the electronic label with the access password in the application server to determine the validity of the electronic label. According to the technical proposal of the invention, the anti-counterfeiting towards the object becomes more reliable; meanwhile, the technical proposal completely accords with the EPC Class-1 G-2 protocol standard.

Description

technical field [0001] The invention relates to the technical field of article anti-counterfeiting, in particular to an anti-counterfeiting method, an electronic tag and a reader based on the EPC Class-1G-2 protocol. Background technique [0002] At present, the use of radio frequency identification (RFID) electronic tags (Tags) based on the Electronic Product Code (EPC) Class 1 (Class-1) Generation 2 (Genration-2, G-2 for short) protocol to carry out anti-counterfeiting is a kind of Commonly used anti-counterfeiting methods. figure 1 It is a schematic diagram of the image of the logic memory of the electronic tag based on the EPC Class-1G-2 protocol. refer to figure 1 , The electronic tag memory is divided into four independent storage blocks (Bank), namely: reserved (RESERVED) storage area, EPC storage area, tag identification number (TID) storage area, user (USER) storage area. Among them, the reserved storage area is used to store the access password (Access Password)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06K17/00G06K19/073G06K7/00
Inventor 曹金波
Owner ZTE INTELLIGENT IOT TECH