Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Teaching and training reader control method for protecting RFID labels

A technology of RFID tags and control methods, applied in the control field of teaching and training readers, can solve the problems of RFID card failure, unfavorable movement, time-consuming and labor-intensive, etc., to protect RFID tags, increase the average service life, and reduce management work. amount of effect

Active Publication Date: 2018-08-31
FUJIAN UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the management workload of this type of RFID card is very large, and it is difficult to ensure that the key of a certain sector of the RFID card will not be modified into a key unknown to the laboratory manager, resulting in partial failure of the RFID card
[0008] (3) For a class of RFID tags containing inactivation instructions, such as ISO18000 tags, ISO18000-6C tags, etc., when the inactivation instruction is received, it will officially become invalid, resulting in waste of RFID tags
When the "lock" command is executed, its RFID tag cannot be modified again, resulting in the failure of the RFID tag
[0010] (5) During the experiment, students can only understand the experiment process through the computer. The computer is heavy and not conducive to movement, causing students to walk back and forth between the device and the computer, reducing the efficiency of the experiment; and students can only rely on the operation results to judge the status of the RFID tag. time consuming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Teaching and training reader control method for protecting RFID labels
  • Teaching and training reader control method for protecting RFID labels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] Such as figure 1 and figure 2 As shown, a control method for teaching and training readers that protect RFID tags. Before the experiment starts, the control system generates the data structure corresponding to the tag record according to the type of RFID tag tested and sends it to the reader. The data structure initializes the memory, and the RFID tag in the memory is accessed as the initial tag record; accessing the RFID tag includes the following steps:

[0046] Step 10, read tag operation

[0047] After the control system sends the command to read the tag, the reader controls the RFID reading chip to perform the tag reading operation, and the RFID tag in the antenna responds to the command of the control system; finally, the reader parses the result and sends it to the control system;

[0048] Step 20, anti-collision operation

[0049] The control system sends anti-collision commands, and the reader controls the RFID reading chip to perform anti-collision operati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a teaching and training reader control method for protecting RFID labels. The method has the advantages that redundant loads are not caused to students when the students carry out RFID experiments, and the students only need to carry out the experiments according to original manners; and the RFID labels are protected, so that the students do not need to worry the problem ofRFID label failure and can carry out the experiments boldly and confidently. According to the method, experimental operations for carrying out password change, inactivation and locking on the RFID labels are provided for the students, so that better experiment environment is provided for RFID experiments; the RFID labels are protected, so that an average service life of the RFID labels is prolonged, the investment costs, for the RFID labels, of schools are decreased and the capitals are saved; and when teachers process the RFID labels, initialization is carried out in batches, and different processing manners do not need to be adopted for the RFID labels with different states and contents, so that the operation is more simple and efficient.

Description

technical field [0001] The invention relates to the field of RFID technology, in particular to a control method for teaching and training readers for protecting RFID tags. Background technique [0002] The basic working principle of RFID technology is as follows: after the tag enters the magnetic field, the radio frequency signal sent by the reader sends out the product information stored in the chip (passive tag or passive tag) by virtue of the energy obtained by the induced current, or is actively sent by the tag For a signal of a certain frequency (Active Tag, active tag or active tag), the reader reads and decodes the information, and then sends it to the central information system for relevant data processing. [0003] RFID experiments are the main experimental courses for Internet of Things engineering majors. The main purpose of the courses is to enable students to understand and master various RFID standards and the actual operation of RFID tags through experiments. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K7/10G06Q50/20
CPCG06K7/10257G06K7/10297G06K7/10316G06Q50/205Y02P90/02
Inventor 陈松岭陈江红叶润玉贾瑞芬孙晓婷刘星华
Owner FUJIAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products