Tag reader and database three-way authentication system and method

A tag reader and authentication method technology, applied in digital data authentication, other database retrieval, other database query, etc., can solve problems such as restricting the growth of the radio frequency identification industry, and achieve the effect of avoiding leakage and ensuring normal communication.

Inactive Publication Date: 2017-02-22
DEYANG SHANTONG SIDONG TECH CO LTD
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Major manufacturers of radio frequency identification systems provide dedicated systems, leading to different applications and different industries adopting frequency and protocol standards of different manufacturers. This chaotic and fragmented situation has restricted the growth of the entire radio frequency identification industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tag reader and database three-way authentication system and method
  • Tag reader and database three-way authentication system and method
  • Tag reader and database three-way authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] A three-way authentication system for a tag reader and a database. The application authentication system can quickly and accurately realize the three-way authentication between the reader, the tag, and the database, thereby ensuring the normal communication between the three, such as figure 1 As shown, the following setting method is specially adopted: a reader, a tag and a database are set, the database is connected to the reader, and the reader is connected to the tag.

[0055] When it is in use, connect the reader to the database DataBase through the data transmission link, so as to perform data interaction between the two; at the same time, use wired or wireless to connect the tag and the reader to realize the connection between the two For the data interaction among them, there are preferably i tags, satisfying i=1, 2, 3...n.

Embodiment 2

[0057] This embodiment is further optimized on the basis of the above embodiments. In order to better realize the authentication system of the present invention, the data communication between the tag and the reader can be carried out in a wired or wireless communication mode, such as figure 1 As shown, the following setting method is adopted in particular: the tag is connected to the reader in a wired or wireless manner.

Embodiment 3

[0059] This embodiment is further optimized on the basis of any of the above embodiments, further to better realize the authentication system of the present invention, such as figure 1 As shown, the following setting method is adopted in particular: a reserved storage area, an EPC storage area, a TID storage area and a user storage area for storing different data are set in the tag;

[0060] The reserved storage area stores a 32bit access password (access password) PWA i And 32bit destruction password (kill password) PWK i ;

[0061] The EPC storage area stores 32bit EPC, 16bit protocol control code (PC), EPC and PC value cyclic redundancy check code;

[0062] The TID (tag identifier) ​​storage area stores the TID of the 32bit identification number information of the electronic tag (tag) i , all additional information of 32bit; when used, it is the same as that stipulated in the EPC C1G2 agreement;

[0063] The user storage area stores other information of user products, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a tag reader and database three-way authentication system and method. The authentication system is provided with a reader, a tag and a database, wherein the database is connected with the reader; and the reader is connected with the tag. The authentication method comprises the steps of performing authentication from the reader to the ith tag; performing authentication from the ith tag to the reader; performing authentication from the reader to the ith tag; performing authentication from the ith tag to the reader; performing authentication from the reader to the database; performing authentication from the database to the reader; performing authentication from the reader to the ith tag; performing authentication from the ith tag to the reader; performing authentication from the reader to the ith tag; performing authentication from the ith tag to the reader; and finishing three-way authentication of the reader, the ith tag (tagi) and the database, so that the reader, the tagi and the database can perform normal communication. According to the authentication system and method, the three-way authentication among the reader, the tagi and the database can be quickly and accurately realized, so that the normal communication among the reader, the tagi and the database can be guaranteed.

Description

technical field [0001] The invention relates to the fields of radio frequency identification technology and the like, and specifically relates to a three-way authentication system and method for a tag reader and a database. Background technique [0002] Radio frequency identification, RFID (Radio Frequency Identification) technology, also known as radio frequency identification, is a communication technology that can identify specific targets through radio signals and read and write related data without the need to establish mechanical or optical contact between the identification system and specific targets . [0003] Radio frequency, generally microwave, 1-100GHz, suitable for short-distance identification communication. [0004] RFID readers (RFID readers) are also divided into mobile and fixed. At present, RFID technology is widely used, such as: libraries, access control systems, food safety traceability, etc. [0005] The radio frequency tag is the physical carrier o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06K17/00G06F17/30H04L29/06
CPCG06F16/903G06F21/445G06K17/0029H04L63/0869
Inventor 黎忠文
Owner DEYANG SHANTONG SIDONG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products