Anti-counterfeiting method based on EPC class-1 G-2 protocol, electronic label and reader
A technology of electronic tags and readers, which is applied in the field of article anti-counterfeiting, can solve problems such as violations, and achieve reliable anti-counterfeiting effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] According to the EPC Class-1G-2 agreement, the electronic tag has multiple states, and when it completes the early interaction with the reader and starts to perform business operations such as counting, reading, writing, locking, and killing, it is usually open (Open) and protected. (Secured) One of two states. When the access password (Access Password) stored in the reserved storage area of the electronic tag is not 0, the tag will first jump to the Open state; when the Access Password stored in the reserved storage area is 0, the tag will switch from the previous state to Jump directly to the Secured state. When the tag is in the Open state, the reader can perform other business operations on the tag except for locking / unlocking; when the tag is in the Secured state, the reader can perform all business operations on the tag.
[0044]According to the content of the above agreement, the core idea of the present invention is: the EPC code of AccessPassword and produ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 