Unlock instant, AI-driven research and patent intelligence for your innovation.

Verification method and identification system

A verification method and identification system technology, applied in the field of verification and identification systems

Inactive Publication Date: 2010-05-26
USERSTAR INFORMATION SYST
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned existing RFID tags have disadvantages: since their unique identification codes are fixed, fake tags can be easily copied as long as the reader is tapped.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and identification system
  • Verification method and identification system
  • Verification method and identification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention will be described in detail below in conjunction with the drawings and embodiments:

[0013] Refer to figure 1 , Which shows that the first preferred embodiment of the identification system of the present invention includes a transponder 1 and a reader 2. The transponder 1 is, for example, a radio frequency identification (RFID) tag, and includes a database 11 storing unique identification codes. The reader 2 includes a code generator 21 for generating a first verification code and a second verification code.

[0014] In this embodiment, the reader 2 authenticates the transponder 1 according to the first and second verification codes generated by the code generator 21, and the generation method will be described later. The reader 2 generates and wirelessly transmits a reading request including the first verification code. In this embodiment, the code generator 21 of the reader 2 generates the first verification code according to the first variation va...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a verification method, which comprises the following steps of ensuring that a reader generates a first verification code according to a first variation value, generates and wirelessly transmits a reading request including the first verification code; ensuring that a radio frequency identification tag receives the reading request and figures out the first verification code from the reading request; ensuring that the radio frequency identification tag generates and wirelessly transmits a response signal, wherein the response signal comprises the first verification code figured out from the reading request; ensuring the reader receives the response signal and figures out the first verification code from the response signal; ensuring the reader generates a second verification code according to a second variation value; ensuring the reader figures out the difference between the first verification code and the second verification code; and ensuring the reader identifies the radio frequency identification tag according to the difference.

Description

Technical field [0001] The invention relates to a verification method for authenticating a transponder, in particular to a radio frequency identification (RFID) tag of an identification system. Background technique [0002] When the reader reads a radio frequency identification (RFID) tag, the RFID tag will return a unique identification code to the reader. However, the aforementioned existing RFID tags have disadvantages: since their unique identification codes are fixed, the fake tags can be easily copied by eavesdropping on the reader. Summary of the invention [0003] Therefore, the main purpose of the present invention is to provide a verification method that can overcome the aforementioned shortcomings of the prior art. [0004] Another object of the present invention is to provide an identification system that can overcome the disadvantages of the prior art mentioned earlier. [0005] According to an aspect of the present invention, the verification method includes the follow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/00H04L9/00
Inventor 曾银宏许圣军
Owner USERSTAR INFORMATION SYST