Batch authentication method and system of RFID (Radio Frequency Identification) tags

A technology of RFID tags and authentication methods, which is applied in the field of batch authentication of radio frequency identification tags, can solve the problems of large data volume, slow speed, increased data volume, etc., and achieves less communication data volume, less verification data volume, and light server load. Effect

Inactive Publication Date: 2012-08-22
RUN TECH CO LTD
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These algorithms are also called anti-collision algorithms (Anti-Collision Algorithms), which are slow, making the RFID tag identification process a very time-consuming process.
[0009] (2) The amount of data that needs to be authenticated is large
This algorithm to improve retrieval speed by increasing the amount of retrieved information requires RIFD tags to transmit multiple digital signatures at a time, each digital signature is 20 bits, which greatly increases the amount of data required for authentication and reduces the authentication speed of the reader
[0011] (3) The authentication server is overloaded
[0012] Since a large number of digital signatures need to be authenticated during batch authentication, it will cause network congestion on the authentication server side, thereby increasing the authentication delay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Batch authentication method and system of RFID (Radio Frequency Identification) tags
  • Batch authentication method and system of RFID (Radio Frequency Identification) tags
  • Batch authentication method and system of RFID (Radio Frequency Identification) tags

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] figure 1 It is a flow chart of an embodiment of a batch authentication method for RFID tags of the present invention, as shown in the figure, comprising the following steps:

[0035] Step 100, the reader obtains the frame length f value and the random number r value from the authentication server.

[0036] Specifically, the reader may first send an authentication request carrying a Tolerance (Tolerance) ε value, a Confidence (Confidence) δ value, and the number n of RFID tags to be authenticated to the authentication server; The ε value, δ value and n value in the authentication request calculate the frame length f value, generate a random number r value, and return it to the reader.

[0037] Among them, the tolerance refers to the ratio of the maximum number of invalid RFID tags that the user can tolerate to the value of the number n, represented by ε, and the value range is [1 / n, 1]; the confidence refers to the method described in this embodiment It is the probabil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a batch authentication method and system of RFID (Radio Frequency Identification) tags. The method comprises the following steps: a reader acquires a frame length f and random number r from an authentication server; the reader sends scanning signals carrying the f and the r to all RFID tags in a broadcasting manner; and when the scanning signal from the reader is received, the RFID tags sends response signals to the reader in a time slice determined by self-stored serial number k, the f and the r. The reader constructs the received response signals into a response vector ES and sends the response vector ES to the authentication server; and the authentication server carries out one-by-one detection on vector elements ES(i) in the ES, and when invalid response signals are not detected, the authentication is successful, otherwise the authentication is failed. The invention has the advantages that the batch authentication of a great amount of RFID tags is realized, the authentication speed is high, and the efficiency is high.

Description

technical field [0001] The invention relates to a method and system for batch authentication of radio frequency identification (Radio Frequency Identification, RFID) labels, belonging to the technical field of product anti-counterfeiting. Background technique [0002] RFID technology is a non-contact automatic identification technology that emerged in the 1990s. It conducts non-contact two-way communication through radio frequency. Compared with other identification technologies, it has the advantages of strong adaptability to the environment, strong anti-interference, parallel identification, rewritable and so on. [0003] The existing RFID system mainly consists of two major components: RFID tags (Tag) and readers (Reader). Among them, the RFID tag is composed of coupling components and chips, including: encryption circuit, Electrically Erasable Programmable Read-Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM for short), Micro Control Unit (Micro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/00
Inventor 杨磊
Owner RUN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products