Power consumption processing method for encryption and authentication of ultrahigh-frequency passive electronic tag
A passive electronic tag, encryption authentication technology, applied in the field of radio frequency identification, can solve the problem of chip power consumption tag identification distance contradiction
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0014] Introduce working principle of the present invention in detail below in conjunction with accompanying drawing:
[0015] The encryption authentication process is as follows:
[0016] 1) The reader-writer sends an authentication request command to the tag in the authentication state, and the command includes the fields Randl and handle. Randl is the random number generated by the reader, and handle is the handle.
[0017] 2) After the tag receives the authentication command, it discusses with the reader the required continuous carrier time, and the tag returns information carrying the time parameter Treply in response.
[0018] 3) The reader sends an acknowledgment command and sends a continuous carrier wave of Treply time. If the reader does not receive a tag response after waiting for the Treply time, end or resend the authentication command.
[0019] 4) After the tag receives the confirmation command, it completes the operation within the Treply time and returns a r...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 