RFID (radio frequency identification) digital information read-write security control method and device, and reader-writer

A technology of security control and digital information, applied in the field of data information security, can solve problems such as major security and hidden dangers, and achieve the effect of ensuring security and avoiding the impact of security

Active Publication Date: 2014-01-08
重庆市城投金卡信息产业(集团)股份有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is difficult to avoid tag chip data duplication and theft, especially when the data stored in the chip is sensitive data related to the vehicle, there is a greater security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID (radio frequency identification) digital information read-write security control method and device, and reader-writer
  • RFID (radio frequency identification) digital information read-write security control method and device, and reader-writer
  • RFID (radio frequency identification) digital information read-write security control method and device, and reader-writer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 4

[0104] The present invention also provides RFID reader-writer, as Figure 5 As shown, it includes a communication module connected to the central processing unit CPU and any read-write safety control device as described above;

[0105] The communication module includes an RF radio frequency interface and a remote communication module. The RF radio frequency interface establishes a communication connection with the label and performs read and write operations to the label. The remote communication module is used to communicate with the central information system in a wired or wireless manner. Any one of RJ232 interface, RJ45 interface or RS485 interface, or any one of wireless Bluetooth interface, infrared interface, WIFI interface, ZIGBEE interface, CDMA interface or LTE interface.

[0106] It should be pointed out that the control module of the above-mentioned read-write security control device is a logical structural unit. In order to save hardware expenses, the functions of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of data information security, in particular to an RFID (radio frequency identification) digital information read-write security control method, an RFID digital information read-write security control device and a reader-writer. The method comprises the following steps of acquiring a requested operation range, a requested operation right, an allowable operation range and an allowable operation right, judging whether the requested operation range exceeds the allowable operation range or not, denying the reading-writing of a tag if the requested operation range exceeds the allowable operation range, otherwise judging whether the requested operation right exceeds the allowable operation right or not, denying the reading-writing of the tag if the requested operation right exceeds the allowable operation right, otherwise allowing the reading-writing of the tag. According to the method, the device and the reader-writer, two verification stages of operation range verification and operation right verification are set, and only a user passing the two stages of verification can operate the tag, so that the requested operation range and the requested operation right are prevented from exceeding the allowable operation range and the allowable operation right, and the security of an operation request is ensured; an access password is further generated, is transmitted to the tag together with the requested operation range and the requested operation right, and is verified, so that the influence of an access password verification-free operation behavior on the security is avoided.

Description

technical field [0001] The present invention relates to the field of data information security, in particular to a RFID (Radio Frequency Identification, radio frequency identification) digital information reading and writing security control method, device and reader. Background technique [0002] RFID is a technology that uses radio frequency to conduct non-contact two-way data communication to identify targets. It has a profound impact on the intelligence, informatization, and production models of society. Its application is related to the process of national economic development and construction of informatization. Involving national information security and national interests. The simplest RFID system is composed of three parts: a tag (Tag), a reader (Reader) and an antenna (Antenna). When the tag enters the magnetic field area, the receiving reader sends a signal to the tag, and the tag obtains The energy of the tag is sent to the reader to the relevant information sto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K17/00
Inventor 赵明
Owner 重庆市城投金卡信息产业(集团)股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products