Check patentability & draft patents in minutes with Patsnap Eureka AI!

A tag data anti-theft method based on EPC protocol, electronic tag and reader

A technology of electronic tags and tag data, which is applied in the direction of collaborative devices, instruments, and record carriers used by machines, which can solve problems such as the inability to guarantee the security of tag data, and achieve the effect of improving efficiency

Active Publication Date: 2011-12-21
INVENGO INFORMATION TECH
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the security of tag data cannot be guaranteed, which has become a drawback of the EPC protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A tag data anti-theft method based on EPC protocol, electronic tag and reader
  • A tag data anti-theft method based on EPC protocol, electronic tag and reader
  • A tag data anti-theft method based on EPC protocol, electronic tag and reader

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Such as figure 2 As shown, it is a flow chart of the tag data anti-theft method based on the EPC protocol according to the embodiment of the present invention. In this embodiment, both the reader-writer and the electronic tag comply with the EPC protocol. Wherein, the storage area of ​​the electronic tag based on the EPC protocol includes an EPC storage area, a TID storage area, a reserved storage area, and a user storage area; wherein, the reserved storage area includes an inactivation password storage area and an access password storage area. In this embodiment, the TID codes in the TID storage areas of all electronic tags are set to a uniform value. First, in step 201, the tag data is written into the inactivation password storage area, wherein the tag data is the data that the user needs to encrypt and can only read through authorization, and the reader / writer writes the tag data into the inactivation password storage area. Password storage area. Then in step 20...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a labeled data burglary prevention method based on an EPC (Electronic Product Code) protocol, an electronic label and a reader-writer. The method comprises the following steps of: writing labeled data into an inactivation password storage area; distributing an EPC identifier for the electronic label and writing the EPC identifier into an EPC storage area; writing an obtained access password into an access password storage area and locking a reserved storage area and the EPC storage area; obtaining an access password according to an EPC; and comparing the obtained access password with a self-stored access password to determine whether read labeled data are legal. In the invention, labeled data are stored in the inactivation password storage area, and at least two electronic labels have the same EPC, and the reader-writer cannot be used for distinguishing electronic labels according to the EPC but can only be used for distinguishing labels and acquiring information carried by the labels by obtaining a correct access password, so that data of the electronic labels can be prevented from being stolen when the reader-writer is not unauthorized, and the security of electronic label data is further ensured.

Description

technical field [0001] The invention relates to a tag data anti-theft method, in particular to an EPC protocol-based tag data anti-theft method. Background technique [0002] The EPC C1G2 standard is an air interface communication technology standard between electronic tags and readers launched by EPCglobal based on the concept of EPC and the Internet of Things, aiming to assign a unique identification code to each item. At present, the demand for unified standards in the radio frequency identification industry is increasing. The EPC protocol is widely used because of its versatility and frequency band practicability. With the support of this protocol, the common problem of equipment between different suppliers has been solved, and better Promoted the development of the industry. However, this versatility also has certain disadvantages. [0003] The storage area of ​​EPC tags is divided into four parts, such as figure 1 As shown, they are the TID storage area used to stor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K19/073G06K17/00
Inventor 刘春江段璞彭友谊
Owner INVENGO INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More