Data cleaning method and device for RFID access control equipment

A technology of data cleaning and RFID tags, which is applied in the field of radio frequency identification, can solve problems such as poor real-time performance, chaotic access management, and occurrences, and achieve the effect of ensuring reading accuracy and low cost

Pending Publication Date: 2022-03-25
BEIJING INST OF COMP TECH & APPL
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, the RFID access control equipment on the market often reads irrelevant tags that have not occurred in the application, causing confusion in access management, which has also become a difficulty in the industry
There are two reasons for this multi-reading phenomenon: on the one hand, due to the interference in the environment, reflections, diffractions, etc., cause the RFID tags that were not within the reading range of the RFID access control system to be read; on the other hand , if the RFID access control system is deployed in a small space, the RFID tags stored in the space will inevitably appear within the reading range of the access control system
[0003] These misreading phenomena seriously limit the application of UHF RFID technology in the field of access control. Scholars and research institutions at home and abroad have proposed a variety of data cleaning methods and antenna design methods for this problem, but these methods have high algorithm complexity. , poor real-time performance, uncontrollable cost and other problems, so the industry urgently needs a simple, feasible and cost-controllable data cleaning method for the misreading of RFID access control equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data cleaning method and device for RFID access control equipment
  • Data cleaning method and device for RFID access control equipment
  • Data cleaning method and device for RFID access control equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0038] The present invention utilizes the monotonic relationship between the phase information of the response signal of the tag with access behavior and the distance from the tag to the RFID access control device and the periodicity of the phase change, and uses a phase information edge detection method based on a threshold to judge whether the RFID t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

According to the invention, the phase information of the RFID tag response signals collected by the RFID access control equipment is fully utilized to analyze the phase information of the RFID tag response signals, and the phase characteristics of the RFID tags with access behaviors (the motion trails pass through the access control equipment) and the phase characteristics of the RFID tags without access behaviors are obviously different. According to the method, whether the read RFID tag has the access behavior or not is judged, tag data judged to have no access behavior are filtered out, the reading accuracy of the RFID access control equipment is guaranteed, and the method has the advantages of being simple, feasible and low in cost.

Description

technical field [0001] The present application relates to the technical field of radio frequency identification, and in particular to a data cleaning method and device for RFID access control equipment. Background technique [0002] At present, the RFID access control equipment on the market often reads irrelevant tags that have not occurred in the application, resulting in confusion in access management, which has also become a difficulty in the industry. There are two reasons for this multi-reading phenomenon: on the one hand, due to the interference in the environment, reflections, diffractions, etc., cause the RFID tags that were not within the reading range of the RFID access control system to be read; on the other hand Therefore, if the RFID access control system is deployed in a small space, the RFID tags stored in the space will inevitably appear within the reading range of the access control system. [0003] These misreading phenomena seriously limit the applicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/215
CPCG06F16/215
Inventor 邵壮张丹贾知浩宋科张兴凯
Owner BEIJING INST OF COMP TECH & APPL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products