[go: up one dir, main page]

WO2007147306A1 - A communication method between reader and label in the rfid system - Google Patents

A communication method between reader and label in the rfid system Download PDF

Info

Publication number
WO2007147306A1
WO2007147306A1 PCT/CN2006/003740 CN2006003740W WO2007147306A1 WO 2007147306 A1 WO2007147306 A1 WO 2007147306A1 CN 2006003740 W CN2006003740 W CN 2006003740W WO 2007147306 A1 WO2007147306 A1 WO 2007147306A1
Authority
WO
WIPO (PCT)
Prior art keywords
tag
reader
state
label
instruction
Prior art date
Application number
PCT/CN2006/003740
Other languages
French (fr)
Chinese (zh)
Inventor
Honggang Wang
Limin Zhou
Original Assignee
Zte Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zte Corporation filed Critical Zte Corporation
Publication of WO2007147306A1 publication Critical patent/WO2007147306A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer

Definitions

  • the present invention relates to the field of radio frequency identification technologies, and in particular to a method for communicating a reader and a tag in an RFID system.
  • RFID can identify a single very specific object, and can also read multiple objects at the same time.
  • the RFID system can be composed of at least one reader and an electronic tag. The reader and the tag communicate wirelessly. The reader can send an inquiry signal to the tag and read the relevant information from the tag.
  • tags have evolved from a small amount of read-only storage to a large amount of writable storage.
  • the tag can be divided into an active tag and a passive tag.
  • the active tag has a power supply inside, and can actively communicate with the reader.
  • the passive tag has no power inside, and the electromagnetic wave is sent from the reader.
  • the power is drawn, as a power source for its operation, and the information is sent to the reader in a back-projection manner to complete the communication of the tag to the reader.
  • RFID technology is at the critical stage of the formation of international standards.
  • UHF Ultra-high frequency
  • EPCglobal GEN2 is the second generation UHF air interface standard (GEN2) developed by the non-profit standardization organization, Electronic Product Code (EPC) Management Center (EPCglobal).
  • EPC Electronic Product Code
  • GEN2 during the communication between the reader and the tag, three processes are defined for the reader: Select, Inventory, Access, the corresponding tag status is Ready, Arbitrate (Arbitration), Reply, Acknowledged Open, Secured, Killed, the entire communication process is completed between these operations and states.
  • the design of GEN2 is around the reading of EPC codes, and the tags carry other types of information and their interactions are not enough.
  • the three operating procedures of the reader play a role in the easy implementation of the cartridge, but relatively speaking, the functional mechanism is not strict enough, for example, the security mechanism, there is a 16-bit random or pseudo-random data (RN16) verification process, However, there is no adequate consideration from the mechanism, and there is no room for technological upgrading.
  • the correspondence between the operation of the reader and the state of the tag is not clear enough. Energy saving issues for handheld terminals are not considered in GEN2.
  • SUMMARY OF THE INVENTION The present invention is directed to these problems to provide an efficient and secure communication method between a reader and a plurality of tags, which makes the communication between the reader and the tag more complete and powerful in terms of framework and mechanism.
  • the reader sends a detection signal to perform a detection operation to detect whether a tag exists in the area:
  • the tag exists
  • the response signal is sent, and the ready state is entered, and the second step is performed; if there is no response, no tag is considered to exist, and the reader does not perform other operations;
  • the label of the detected response is based on
  • the parameter of the selection operation instruction sent by the reader changes the corresponding flag bit, and the selected label enters the selection state;
  • the third step the reader performs a query operation on the selected label; and the fourth step, the query operation of the selected label on the reader
  • the command responds, when the tags with multiple selected states are simultaneously responding on the same channel, the above tags
  • the arbitration state using the arbitration method, the unique tag is connected to the reader at one moment, and the reader performs the access operation;
  • the fifth step after the unique tag is successfully
  • the instruction with the key is sent to the tag, and the tag is claimed.
  • the tag is in the authentication state, and after the tag receives the instruction for the reader to request authentication, it is authenticated, and after passing the authentication,
  • the label is transferred to the open state; when no authentication is required between the reader and the label, the step is omitted, and the fourth step is directly entered into the sixth step;
  • the reader after the tag of the access reader enters the open state, the reader operates the tag, including the read sub-operation, the write sub-operation, and the "kill"sub-operation; the reader can select the operation mode of the tag:
  • the reader selects the read operation, first sends the instruction, and after the label verifies the instruction, it transfers to the read state, and then the reader reads the label; here the read operation can be a plurality of different read operations, by reading the secret of different permissions in the instruction Key difference, after the label verification instruction, send the reader the information required by the reader; if the reader selects the write operation, first sends
  • the selected tag when the reader performs a query operation on the selected tag, the selected tag is initialized by an instruction, and an inventory is initiated, and the inventory refers to the entire process of selecting the tag to end the operation of the tag.
  • the reader first reads the unique identification code of the tag as the identity identifier.
  • the label is in an open state, and according to different operation instructions of the reader, the label enters the read state, the write state, or the kill state, and in addition to the power-off condition, the label in the read state and the write state. It can be returned to the open state by the reader command or directly to the kill state.
  • the label when the label is moved between the open state, the read state, the write state, and the kill state in the sixth step, the key authentication of different privilege levels in the reader command is required. Further, the tag cannot be transferred to any other state in the killed state. Further, the tag is in any state, and after the power is turned off, it must be restarted from the ready state. Further, when the tag has an error in arbitration, authentication, and open state, it automatically enters the ready state; when the tag has an error in the read, write, and kill states, it automatically transitions to the open state.
  • FIG. 1 is a process chart of a reader in the present invention.
  • Figure 2 is a state transition diagram of the label in the present invention.
  • Figure 3 is a diagram showing the communication process of the reader and the tag in the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. As shown in FIG. 1, the (logical) operation of the reader and its definitions of the present invention are as follows:
  • S1 Select (ie Selection) The reader selects and categorizes the labels in the active area with certain instructions. This allows multiple selections of the label to be used to select the label multiple times until the predetermined selection task is completed.
  • S2 Query (ie Query)
  • the reader queries the selected tag, where the reader initializes the selected tag by an instruction and initiates an inventory.
  • the enumeration here refers to the end of the operation from being selected to the tag.
  • S3 Access (ie Access) If there are multiple tags responding on the same channel, a collision will occur, and a certain arbitration method will be adopted to prevent collisions, so as to ensure that the unique tag is successfully accessed at one time.
  • S5 Operation (ie Operation)
  • the reader's operation on the tag includes the S5R: Read sub-operation, and the S5W: Write sub-operation and the S5D: "kill" sub-operation.
  • S5R Read sub-operation
  • S5W Write sub-operation
  • S5D "kill" sub-operation.
  • FIG. 2 the label status and its definitions related to the present invention are as follows:
  • the Ready state can be thought of as a wait state to indicate the status of a power-up tag that has not yet received any read or write operations from the reader and has not yet entered an inventory process. After a tag enters the RF active zone, it is switched to this state except for the kill state and power down. The tag will remain in this state until it receives a selection command from the reader.
  • S7 Selection (ie Selection) Before the reader enters the label, the label will be selected according to the requirements. When the reader issues a selection instruction, the response label is automatically transferred to the selection state, and the corresponding selection identifier is generated. The corresponding flag is changed. Only the tag entering the state enters the arbitration state and responds to subsequent query commands.
  • the arbitration state is a hold state that indicates the tags that are participating in the current inventory process but have not yet obtained an available channel and are uniquely connected to the reader.
  • the tag in this state can receive various commands sent by the reader for arbitration, and will not leave the state until the access is successful, and enter the authentication state.
  • S 10 Open (ie Open) When the tag and the reader authenticate each other successfully, the tag enters an open state. In this state, the tag chooses to enter the read, write or kill state depending on the different instructions of the reader. In addition to powering down or killing the state, the tags in the read and write states can be returned to the open state by the reader command.
  • S11 Read (ie Read)
  • the tag When the tag enters the open state, it can enter this state according to the instructions of the reader. In this state, the reader has the right to read the relevant information of the tag. For different zones or information, different instructions are required, and these commands have keys with different read permissions. In this state, you can go to the write or kill state according to the different instructions of the reader, or return to the open state.
  • S12 Write (ie Write)
  • the tag When the tag enters the open state, it can enter this state according to the reader command. In this state, the reader has the right to write to the tag. For writes to different areas, different instructions are required, with keys with different write permissions in these instructions to perform different write operations. In this state, the tag can be read and killed according to different instructions, or returned to the open state.
  • the tag When the tag enters the open state, it can enter this state according to the reader command. In this state, the tag no longer responds to any other instructions of the reader and can be referred to as a kill state. In this state, the tag can no longer be transferred to any other state.
  • the specific process of the communication method between the reader and the label provided by the present invention includes the following steps: First, the reader detects the working area, and detects whether a label exists.
  • the reader When the label enters a valid radio frequency activation area, Or after the reader enters the tag presence area, the reader performs the SO: Detection operation as shown in Figure 1: First, the reader sends a detection signal, such as a specific continuous carrier, and the tag demodulates its signal and backs A specific response signal is emitted to ensure that the reader can discriminate the presence of the tag, namely S14 to S15 in FIG. When the tag is present, the tag is powered up, and a response is issued at the same time, and enters the S6: Ready state as shown in Figure 2, which is S 15 to S16 in Figure 3. The second step reader selects the detected pre-communication label When a tag is detected, the tag is selected, that is, S16 to S17 in Fig. 3.
  • a detection signal such as a specific continuous carrier
  • the tag demodulates its signal and backs
  • a specific response signal is emitted to ensure that the reader can discriminate the presence of the tag, namely S14 to S15 in FIG.
  • the tag
  • the reader performs the S1: Selection operation in Figure 1.
  • the tag changes the corresponding flag bit according to the parameters of the selection instruction, and proceeds to S7 in the FIG. 2: Selection state.
  • the reader can select and classify tags within the active area by one or more selection commands.
  • This command can contain specific information in the instruction and select the label by parameter.
  • This instruction can contain a specific sequence and specify a logical operation with a specific part of the information stored in the tag, and use this result to change the part of the tag to achieve the purpose of selection.
  • the instruction sequence includes the information sequence 101010, and is used to select a certain piece of stored information of the tag and the same tag.
  • the reader will match the instructions according to the coding characteristics corresponding to the features, and then identify the such products. Items for subsequent operations.
  • the third step reader performs a query on the selected tag.
  • the reader performs the S2: Query operation in FIG. 1 on the selected tag, that is, S18 to S19 in FIG.
  • the selected tag is initialized with a certain instruction, and the tag is started to be counted.
  • the fourth step of the tag access reader selects the tag to respond to the reader's query command.
  • a certain arbitration method can be used, such as using ALOHA. Algorithm to avoid conflicts.
  • the tag is in the S8: Arbitration state in Figure 2.
  • the reader performs the S3 access operation in FIG. 1 to access the unique tag at one time, that is, S19 to S20 in FIG. Step 5: Reader and tag mutual authentication
  • the reader authenticates the tag.
  • the command with the key is sent to the tag, requesting tag authentication, that is, Figure 3 In S20 to S21.
  • the reader operates as S4 in Figure 1: Authentication
  • the tag is in the S9: Authentication state in Figure 2.
  • the tag After receiving the instruction for requesting authentication, the tag authenticates it, and then passes to S10: Open state, that is, S21 to S22 in FIG.
  • the reader After the mutual identification of the legal identity by the authentication, the reader first reads the unique identification code of the tag, such as a unique identifier (Unique identifier, UID code). More specifically, for example, the tag may first send a command with a key, and include a random number in the instruction. When the reader receives the instruction, the key is verified, and after the verification is passed, the received random number is returned. . When both parties authenticate each other through a certain authentication mechanism, they are legal. After identity, a secure communication link is established between the reader and the tag. Step 6: The reader reads and writes the label. When the label enters the S10: Open state, the reader can choose how to operate the label.
  • UID code Unique identifier
  • the instruction is sent first, and the label is transferred to the S11: Read state in Figure 2.
  • the read operation can be multiple. Different read operations are distinguished by the keys of different permissions in the read command, that is, S22 to S23 in FIG.
  • the reader is sent the information of the reader request, that is, S23 to S24 in FIG. 3, for example, the EPC information of the tag, the user information, and the like.
  • the instruction is first sent, causing the label to go to the S12: Write state in Figure 2, after which the reader writes the label, where the write operation can be
  • a plurality of different write operations are distinguished by a key of different permissions in the write command, that is, S24 to S25 in FIG. 3, for example, EPC information, user information, etc. can be rewritten by different instructions or parameters, and for rewriting of some important information,
  • the command has a key.
  • the reader When the reader selects the S5D: "Dead” operation in Figure 1, the reader sends an instruction with a key, the tag verifies the instruction, and proceeds to S13 as shown in Figure 2: Kill (Dead) State, this process is S26 to S27 in Fig. 3. This action will cause the tag to no longer respond to any instructions.
  • the tag in the Open state, the tag can be selected to enter any of the Read, Write, and Dead states according to the reader command, in the Read (Read), Write (Write) state. , can convert state according to reader instructions, or go to the Dead state, or return to the Open state. When entering the Dead state, the tag no longer transitions to another state.
  • tags In a particular application, not all tags must be read, written, or read and written simultaneously, so they can be selected.
  • ID unique identification
  • the management process of the item is based on the management of the ID.
  • the database in the background monitors the existing items in real time. For example, when the item is a new item, it must be read. Take information about its items, such as name, material, size, shelf life, storage environment, and more.
  • the write operation can be directly performed to rewrite the price information storage area.
  • the fifth step can be omitted during system design, that is, it can be directly from the fourth step. Go to the sixth step. For example, in the production line of a factory, there is no safety hazard in the identification of the product, so it can be omitted to improve efficiency.
  • the state shown in FIG. 2 is a logical state of a tag, and each logical state may correspond to a plurality of physical states.
  • the Arbitration state responding to different instructions will generate multiple physical response states.
  • the Write state there will be different physical states depending on the different contents written.
  • the tag is in any state, and after power down, it must be restarted from the Ready state.
  • the tag has an error in the Arbitration Authentication and Open state, it automatically goes to the Ready state.
  • the tag has an error in the Read, Write, and Dead states, it automatically goes into the Open state.

Landscapes

  • Engineering & Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Near-Field Transmission Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A communication method between the reader and the label in the RFID system is disclosed. The method includes the follow steps: the first step, the reader detects whether the label existing in the work area; the second step, the detected label changes the corresponding flag bit according to the parameter of the selection instruction of the reader; the third step, the reader queries the selected label; the forth step, the reader receives the single label at one moment according to the arbitrating method of the reader; the fifth step, the reader and the label authenticates each other; the sixth step, the reader reads/writes the label. The method of the present invention makes the change of the reader’s state more flexible and corresponds to the operation process of the reader more explicit, so that the communication between the reader and the label can be improved more perfectly, strongly, safely and high efficiency on the frame and mechanism, and be in favor of upgrading the performance of RFID.

Description

一种 RFID系统中阅读器与标签的通信方法 技术领域 本发明涉及无线射频识别技术领域,特别是一种 RFID系统中阅读器与标 签的通信方法。 背景技术 在物品识别中, 条码的使用非常普遍, 因为它有很低的成本, 然而却很受 限制, 比如受光线、 污渍、 遮挡物等的影响。 RFID 技术的出现完全克 了这 些缺点, RFID 可以识别单个非常具体的物体, 也可以同时对多个物体进行识 读。 RFID系统可以由至少一个由阅读器和一个电子标签組成。 阅读器和标签 之间通过无线的方式进行通信。 阅读器可以向标签发出询问信号并从标签读取 相关信息。 随着 RFID技术的发展, 标签从只读小存储量不断向可写大存储量 发展。 标签可以分为有源标签 (active tag ) 和无源标签 (passive tag ), 有源标 签内部备有电源, 可以主动与阅读器通信; 无源标签内部无电源, 从阅读器发 给的电磁波中吸取电能, 作为其工作的电源, 并以背射的方式, 将相关信息发 送给阅读器, 完成标签到阅读器的通信。 目前, RFID 技术正处在国际^)标准形成的关键阶段, 关于超高频 ( Ultra-high frequency , 以下简称 UHF ) RFID空中接口的标准, 国际上主要有 两个规范: EPCglobal GEN2和 ISO 18000-6。 EPCglobal GEN2是非盈利性标准 化组织一全球产品电子代码 (Electronic Product Code , 以下简称 EPC)管理中心 (简称 EPCglobal )制定的第二代 UHF空中接口标准(简称 GEN2 )。 在 GEN2 中, 阅读器与标签的通信过程中, 就阅读器而言定义了三个过程: Select (选 择)、 Inventory (清点) 、 Access (访问), 对应的标签状态为 Ready (就绪)、 Arbitrate (仲裁)、 Reply (应答)、 Acknowledged (确十) Open (开放)、 Secured (保护)、 Killed (杀死), 整个通信过程在这些操作和、状态之间完成。 GEN2 的 设计是围绕 EPC码的读取, 对于标签承载其它类型的信息及其交互考虑不够。 阅读器的三个操作过程起到了筒单易实现的作用, 但相对来说, 在功能机制上 不够严密, 比如, 安全机制, 有 16位随机或伪随机数据(RN16 )的验证过程, 但从机制上没有充分的考虑, 也没有技术升级的空间。 在阅读器的操作过程与 标签的状态的对应关系上不够明晰。在 GEN2 中没有考虑对于手持终端的节能 问题。 发明内容 本发明正是针对这些问题是提出一种用于阅读器和多个标签之间的高效、 安全的通信方法, 使阅读器与标签之间的通信在框架和机制上更完善和强大, 使标签的状态转移更灵活、 与阅读器的操作过程对应更加明确, 有利于全面提 升 RFID的性能。 鉴于上述,本发明的目的在于提供一种 RFID系统中阅读器与标签之间的 通信方法, 在该方法中给出一种新的阅读器与标签之间通信的框架和新的功能 机制, 其包 4舌如下步骤: 第一步, 当标签进入有效的射频激活区, 或者阅读器进入标签存在区后, 阅读器发出检测信号, 进行检测操作, 以检测区域内是否有标签存在: 当标签存在时, 标签上电, 同时发出响应信号, 并进入就绪状态, 执行第 二步; 如果没有响应就认为没有标签存在, 阅读器不再进行其它操作; 第二步,上述检测到的响应的标签根据阅读器发出的选择操作指令的参数 改变相应标志位, 所选标签 入选择 态; 第三步, 阅读器对上述所选标签进行查询操作; 第四步,上述所选标签对阅读器的查询操作指令进行响应, 当有多个选择 状态的标签同时在同一信道响应时, 上述这些标签进入仲裁状态, 利用仲裁的 方法, 将唯一标签在一个时刻接入阅读器, 此时阅读器进行接入操作; 第五步, 当有唯一标签接入成功后, 阅读器对标签进行鉴权操作, 鉴权通 过后, 向标签发送带有密钥的指令, 请求标签答权, 此时标签处在鉴权状态, 标签收到阅读器请求鉴权的指令后,对其进行鉴权,通过后标签转入开放状态; 当阅读器与标签之间不需要鉴权时, 省略此步, 直接由第四步进入第六步; 第六步, 当接入阅读器的标签进入开放状态后, 阅读器对标签进行操作, 包含读子操作、 写子操作和 "杀死" 子操作; 阅读器可以选择对标签的操作方 式: 如果阅读器选择读操作, 首先发送指令, 标签对指令进行验证后, 转入读 状态, 之后阅读器对标签进行读操作; 这里读操作可以是多个不同读操作, 通 过读指令中不同权限的密钥区别, 标签验证指令后, 向阅读器发送阅读器需求 的信息; 如果阅读器选择写操作, 首先发送指令, 标签对指令进行验证后, 转入写 状态, 之后阅读器对标签进行写操作, 这里写操作可以是多个不同的写操作, 通过写指令中不同权限的密钥区别; 当阅读器选择对标签进行 "杀死" 操作时, 阅读器发送带有密钥的指令, 标签对指令进 4于臉 i正后, 转入杀死状态。 进一步地, 上述第三步中阅读器对所选标签进行查询操作时, 通过指令对 所选标签进行初始化, 并发起清点, 清点是指选择标签到对标签的操作结束的 整个过程。 进一步地,上述第五步中在鉴权成功时, 阅读器首先读取标签的唯一标识 码, 作为身份标识。 进一步地,上述第六步中标签在开放状态下,根据阅读器的不同操作指令, 选择进入标签的读状态、 写状态或杀死状态, 除断电的情况, 处于读状态和写 状态的标签可以通过阅读器指令返回开放状态或直接进入杀死状态。 进一步地, 上述第六步中标签在开放状态、 读状态、 写状态及杀死状态之 间转移时, 需通过阅读器指令中不同权限级别的密钥认证。 进一步地, 标签在杀死状态下不能再向其它任何状态转移。 进一步地, 标签处在任何一个状态下, 当断电后, 必须从就绪状态重新开 始。 进一步地, 当标签在仲裁、 鉴权和开放状态下出现错误时, 自动转入就绪 状态; 当标签在读、 写和杀死状态下出现错误时, 自动转入开放状态。 下面结合附图, 对本发明的具体实施作进一步的详细说明。对于熟悉本技 术领域的人员而言,从对本发明方法的详细说明中,本发明的上述和其他目的、 特征和优点将显而易见。 附图说明 图 1 本发明中阅读器的操作过程图。 图 2 本发明中标签的状态转移图。 图 3 本发明中阅读器与标签的通信过程图。 具体实施方式 下面结合附图对本发明的具体实施作详细说明如下。 如图 1所示, 本发明涉及到的阅读器的 (逻辑) 操作及其定义说明如下: TECHNICAL FIELD The present invention relates to the field of radio frequency identification technologies, and in particular to a method for communicating a reader and a tag in an RFID system. BACKGROUND OF THE INVENTION In the identification of articles, the use of bar codes is very common because of its low cost, but it is limited, such as by light, stains, obstructions, and the like. The emergence of RFID technology completely overcomes these shortcomings. RFID can identify a single very specific object, and can also read multiple objects at the same time. The RFID system can be composed of at least one reader and an electronic tag. The reader and the tag communicate wirelessly. The reader can send an inquiry signal to the tag and read the relevant information from the tag. With the development of RFID technology, tags have evolved from a small amount of read-only storage to a large amount of writable storage. The tag can be divided into an active tag and a passive tag. The active tag has a power supply inside, and can actively communicate with the reader. The passive tag has no power inside, and the electromagnetic wave is sent from the reader. The power is drawn, as a power source for its operation, and the information is sent to the reader in a back-projection manner to complete the communication of the tag to the reader. At present, RFID technology is at the critical stage of the formation of international standards. Regarding the standards of Ultra-high frequency (UHF) RFID air interface, there are two main international standards: EPCglobal GEN2 and ISO 18000- 6. EPCglobal GEN2 is the second generation UHF air interface standard (GEN2) developed by the non-profit standardization organization, Electronic Product Code (EPC) Management Center (EPCglobal). In GEN2, during the communication between the reader and the tag, three processes are defined for the reader: Select, Inventory, Access, the corresponding tag status is Ready, Arbitrate (Arbitration), Reply, Acknowledged Open, Secured, Killed, the entire communication process is completed between these operations and states. The design of GEN2 is around the reading of EPC codes, and the tags carry other types of information and their interactions are not enough. The three operating procedures of the reader play a role in the easy implementation of the cartridge, but relatively speaking, the functional mechanism is not strict enough, for example, the security mechanism, there is a 16-bit random or pseudo-random data (RN16) verification process, However, there is no adequate consideration from the mechanism, and there is no room for technological upgrading. The correspondence between the operation of the reader and the state of the tag is not clear enough. Energy saving issues for handheld terminals are not considered in GEN2. SUMMARY OF THE INVENTION The present invention is directed to these problems to provide an efficient and secure communication method between a reader and a plurality of tags, which makes the communication between the reader and the tag more complete and powerful in terms of framework and mechanism. It makes the state transition of the tag more flexible and more clear with the operation process of the reader, which is beneficial to the overall improvement of the performance of the RFID. In view of the above, it is an object of the present invention to provide a communication method between a reader and a tag in an RFID system, in which a new framework for communication between a reader and a tag and a new functional mechanism are provided. The following steps are performed on the packet: In the first step, when the tag enters the active RF activation zone, or the reader enters the tag presence zone, the reader sends a detection signal to perform a detection operation to detect whether a tag exists in the area: When the tag exists When the tag is powered on, the response signal is sent, and the ready state is entered, and the second step is performed; if there is no response, no tag is considered to exist, and the reader does not perform other operations; in the second step, the label of the detected response is based on The parameter of the selection operation instruction sent by the reader changes the corresponding flag bit, and the selected label enters the selection state; the third step, the reader performs a query operation on the selected label; and the fourth step, the query operation of the selected label on the reader The command responds, when the tags with multiple selected states are simultaneously responding on the same channel, the above tags In the arbitration state, using the arbitration method, the unique tag is connected to the reader at one moment, and the reader performs the access operation; the fifth step, after the unique tag is successfully accessed, the reader authenticates the tag. After the authentication is passed, the instruction with the key is sent to the tag, and the tag is claimed. At this time, the tag is in the authentication state, and after the tag receives the instruction for the reader to request authentication, it is authenticated, and after passing the authentication, The label is transferred to the open state; when no authentication is required between the reader and the label, the step is omitted, and the fourth step is directly entered into the sixth step; In the sixth step, after the tag of the access reader enters the open state, the reader operates the tag, including the read sub-operation, the write sub-operation, and the "kill"sub-operation; the reader can select the operation mode of the tag: The reader selects the read operation, first sends the instruction, and after the label verifies the instruction, it transfers to the read state, and then the reader reads the label; here the read operation can be a plurality of different read operations, by reading the secret of different permissions in the instruction Key difference, after the label verification instruction, send the reader the information required by the reader; if the reader selects the write operation, first sends the instruction, the label verifies the instruction, and then enters the write state, after which the reader writes the label, Here, the write operation can be a plurality of different write operations, which are distinguished by the keys of different permissions in the write command; when the reader chooses to "kill" the tag, the reader sends the command with the key, the tag pair instruction After entering the face of the face i, turn into the kill state. Further, in the third step, when the reader performs a query operation on the selected tag, the selected tag is initialized by an instruction, and an inventory is initiated, and the inventory refers to the entire process of selecting the tag to end the operation of the tag. Further, in the fifth step, when the authentication succeeds, the reader first reads the unique identification code of the tag as the identity identifier. Further, in the sixth step, the label is in an open state, and according to different operation instructions of the reader, the label enters the read state, the write state, or the kill state, and in addition to the power-off condition, the label in the read state and the write state. It can be returned to the open state by the reader command or directly to the kill state. Further, when the label is moved between the open state, the read state, the write state, and the kill state in the sixth step, the key authentication of different privilege levels in the reader command is required. Further, the tag cannot be transferred to any other state in the killed state. Further, the tag is in any state, and after the power is turned off, it must be restarted from the ready state. Further, when the tag has an error in arbitration, authentication, and open state, it automatically enters the ready state; when the tag has an error in the read, write, and kill states, it automatically transitions to the open state. The specific implementation of the present invention will be further described in detail below with reference to the accompanying drawings. The above and other objects, features and advantages of the present invention will become apparent to those skilled in the art. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a process chart of a reader in the present invention. Figure 2 is a state transition diagram of the label in the present invention. Figure 3 is a diagram showing the communication process of the reader and the tag in the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. As shown in FIG. 1, the (logical) operation of the reader and its definitions of the present invention are as follows:
SO: 检测 (即 Detection ) 当阅读器进入一个工作区域后, 阅读器发出一个检测指令, 用来检测区域 内是否有标签存在。 SO: Detection (ie Detection) When the reader enters a work area, the reader issues a test command to detect if a tag exists in the area.
S1 : 选择 (即 Selection ) 阅读器通过一定的指令对有效区域内的标签进行选择和分类。这里允许使 用多个选择指令对标签进行多次选择, 直至完成预定的选择任务。 S1: Select (ie Selection) The reader selects and categorizes the labels in the active area with certain instructions. This allows multiple selections of the label to be used to select the label multiple times until the predetermined selection task is completed.
S2: 查询 (即 Query ) 阅读器对所选标签进行查询,在这里阅读器通过指令对所选标签进^ "初始 化, 并发起清点。 这里的清点是指从被选择到对标签的操作结束的整个过程。 S3 : 接入 (即 Access ) 如果有多个标签在同一信道进行响应,将发生碰撞, 这时将采取一定的仲 裁方法防止冲突, 以保证唯一标签在一个时刻成功接入。 S2: Query (ie Query) The reader queries the selected tag, where the reader initializes the selected tag by an instruction and initiates an inventory. The enumeration here refers to the end of the operation from being selected to the tag. The whole process. S3: Access (ie Access) If there are multiple tags responding on the same channel, a collision will occur, and a certain arbitration method will be adopted to prevent collisions, so as to ensure that the unique tag is successfully accessed at one time.
S4: 鉴权 (? p Authentication ) 阅读器和标签双方通过一定的鉴权机制相互认证为合法身份后,阅读器与 标签之间就建立了一条安全的通信链路。 S4: Authentication (? p Authentication ) After both the reader and the tag authenticate each other to a legal identity through a certain authentication mechanism, a secure communication link is established between the reader and the tag.
S5: 操作 (即 Operation ) 阅读器对标签的操作包括 S5R: 读(Read )子操作, 和 S5W: 写 (Write ) 子操作和 S5D: "杀死" 子操作。 如图 2所示, 本发明涉及到的标签状态及其定义说明如下: S5: Operation (ie Operation) The reader's operation on the tag includes the S5R: Read sub-operation, and the S5W: Write sub-operation and the S5D: "kill" sub-operation. As shown in FIG. 2, the label status and its definitions related to the present invention are as follows:
S6: 就緒(即 Ready ) 就绪状态可以被看作一个等待状态,用以表示一个还没有接受阅读器任何 读写操作, 也还没有进入一个清点过程的已上电的标签的状态。 在一个标签进 入射频激活区后, 除了杀死状态, 掉电, 就转入该状态。 标签会一直保持该状 态, 直至它收到来自阅读器的选择指令。 S6: Ready (Ready) The Ready state can be thought of as a wait state to indicate the status of a power-up tag that has not yet received any read or write operations from the reader and has not yet entered an inventory process. After a tag enters the RF active zone, it is switched to this state except for the kill state and power down. The tag will remain in this state until it receives a selection command from the reader.
S7: 选择 (即 Selection ) 在阅读器对标签进 ^亍清点之前,会对标签根据需求选择, 当阅读器发出选 择指令时, 响应的标签自动转入选择状态, 同时产生相应的选择标识, 即改变 相应的标志位, 只有进入该状态的标签才会进入仲裁状态, 响应后续的查询指 令。 S7: Selection (ie Selection) Before the reader enters the label, the label will be selected according to the requirements. When the reader issues a selection instruction, the response label is automatically transferred to the selection state, and the corresponding selection identifier is generated. The corresponding flag is changed. Only the tag entering the state enters the arbitration state and responds to subsequent query commands.
S8: 仲裁(即 Arbitration ) 仲裁状态是一个保持状态, 用于表示那些参与到当前的清点过程,但还没 有得到一个可用信道而唯一接入阅读器的标签。 处于这个状态的标签可以接收 阅读器发过来的各种用于实现仲裁的指令, 直到成功接入时才离开这个状态, 进入鉴权状态。 S8: Arbitration (Arbitration) The arbitration state is a hold state that indicates the tags that are participating in the current inventory process but have not yet obtained an available channel and are uniquely connected to the reader. The tag in this state can receive various commands sent by the reader for arbitration, and will not leave the state until the access is successful, and enter the authentication state.
S9: 鉴权 (即 Authentication ) 当标签被成功接入后, 除了掉电或是 Dead状态, 标签进入鉴权状态。 在 该状态下, 标签响应阅读器发来的各种用于鉴权的指令, 以保证双方的身份是 合法的, 才能建立安全的通信链路, 使得后续的信息交互是安全的。 S9: Authentication (ie, Authentication) When the tag is successfully accessed, the tag enters the authentication state except for the power-down or dead state. In this state, the tag responds to various commands for authentication sent by the reader to ensure that the identity of both parties is legal, so that a secure communication link can be established, so that subsequent information interaction is secure.
S 10: 开放 (即 Open ) 当标签和阅读器相互鉴权成功后, 标签进入开放状态。 在该状态下, 标签 根据阅读器的不同指令, 选择进入读、 写或杀死状态。 除断电或杀死状态, 处 于读和写状态的标签可以通过阅读器指令返回开放状态。 S 10: Open (ie Open) When the tag and the reader authenticate each other successfully, the tag enters an open state. In this state, the tag chooses to enter the read, write or kill state depending on the different instructions of the reader. In addition to powering down or killing the state, the tags in the read and write states can be returned to the open state by the reader command.
S11 : 读 (即 Read ) 当标签进入开放状态后,可以根据阅读器的指令进入该状态。在该状态下, 阅读器有权读取标签的相关信息, 对于不同区 i或的信息, 需要用不同的指令, 这些指令中带有不同读取权限的密钥。 在该状态下, 可以根据阅读器的不同指 令转入写或杀死状态, 或返回开放状态。 S11: Read (ie Read) When the tag enters the open state, it can enter this state according to the instructions of the reader. In this state, the reader has the right to read the relevant information of the tag. For different zones or information, different instructions are required, and these commands have keys with different read permissions. In this state, you can go to the write or kill state according to the different instructions of the reader, or return to the open state.
S12: 写 (即 Write ) 当标签进入开放状态后, 可根据阅读器指令进入该状态。 在该状态下, 阅 读器有权对标签进行写操作。 对于不同区域的写操作, 需要不同指令, 这些指 令中带有不同写权限的密钥, 以完成不同的写操作。 在该状态下, 标签可以根 据不同的指令转入读和杀死) 状态, 或返回开放状态。 S12: Write (ie Write) When the tag enters the open state, it can enter this state according to the reader command. In this state, the reader has the right to write to the tag. For writes to different areas, different instructions are required, with keys with different write permissions in these instructions to perform different write operations. In this state, the tag can be read and killed according to different instructions, or returned to the open state.
S13 : 杀死 (即 Dead ) 当标签进入开放状态后, 可根据阅读器指令进入该状态。 在该状态下, 标 签不再响应阅读器任何其它指令, 可以称为是杀死状态。 在该状态下, 标签不 能再向其它任何状态下转移。 如图 3所示,本发明提供的阅读器与标签的通信方法的具体过程包括如下 步驟: 第一步 阅读器对所在工作区域进行检测, 检测是否有标签存在 当标签进入有效的射频激活区,或者阅读器进入标签存在区后, 阅读器进 行如图 1 中的 SO: 检测 (Detection )操作: 首先由阅读器发出检测信号, 比如 一个特定的连续载波,标签对其信号进行解调,并背射出一个特定的响应信号, 确保阅读器能判别出标签的存在, 即图 3中 S14至 S15。 当标签存在时, 标签 上电, 同时发出响应 4言号, 并进入如图 2 中 S6: 就绪 (Ready ) 状态, 即图 3 中 S 15至 S16。 第二步 阅读器对检测到的预通信标签进行选择 当检测到有标签存在时, 对标签进行选择, 即图 3中 S16至 S17。 此时阅 读器进行图 1中的 S1 : 选择(Selection )操作。 标签根据选择指令的参数改变 相应标志位, 并转入图 2中的 S7: 选择(Selection )状态。 更具体地说, 在这 里阅读器可以通过一个或多个选择指令对有效区域内的标签进行选择和分类。 这个指令可以在指令中包含特定的信息, 通过参数选择标签。 这个指令中可以 包含一个特定的序列, 并指定与标签中存储的信息的特定部分进行逻辑运算, 并以此结果来改变才示签的部分标识, 以达到选择的目的。 比如在指令中包含信 息序列 101010, 并用于选择标签的某段存储信息和它相同的标签。 在具体应用 中, 比如, 在仓库中, 选择所有的某个指定厂商生产的某类食品, 那么阅读器 会根据这些特征所对应的编码特征, 在指令中要求与之匹配, 然后再标识这类 物品, 以便后续操作。 第三步 阅读器对所选标签进行查询 阅读器对所选标签进行图 1 中的 S2: 查询 (Query )操作, 即图 3 中的 S18至 S19。 并通过一定的指令对所选标签进行初始化, 并开始清点标签。 第四步 标签接入阅读器 所选标签对阅读器的查询指令进行响应,当有多个标签同时在同一信道响 应时, 将发生冲突, 在此, 可以釆用一定的仲裁方法, 比如用 ALOHA算法来 避免冲突。 此时标签处于图 2中的 S8: 仲裁(Arbitration )状态。 通过仲裁后, 此时阅读器进行图 1 中的 S3接入 (Access )操作, 将唯一的标签在一个时刻 接入阅读器, 即图 3 中 S19至 S20。 第五步 阅读器和标签相互鉴权 当有唯一标签接入成功后, 阅读器对标签进行鉴权, 鉴权通过后, 向标签 发送带有密钥的指令, 请求标签鉴权, 即图 3中 S20至 S21。 此时, 阅读器的 操作为图 1 中的 S4: 鉴权(Authentication ), 标签处在图 2 中的 S9: 鉴权 ( Authentication )状态。 标签收到请求鉴权的指令后, 对其进行鉴权, 通过后 转入 S10: 开放(Open )状态, 即图 3中 S21至 S22。 通过鉴权相互识别合法 身份后, 阅读器首先读取标签合法的唯一标识码, 如唯一识别内码 (Unique identifier, 简称 UID 码)。 更具体地说, 比如标签可以首先发送一个带密钥的 指令, 在指令中同时包括一个随机数, 当阅读器收到指令后, 对密钥进行验证, 验证通过后, 返回收到的随机数。 当双方通过一定的鉴权机制相互认证为合法 身份后, 阅读器与标签之间就建立了一条安全的通信链路。 第六步 阅读器对标签进行读写 当标签进入 S10: 开放( Open )状态后, 阅读器可以选择对标签的操作方 式。 如果选择图 1 中 S5R: 读(Read )操作,, 首先发送指令, 使标签转入图 2 中的 S11 : 读 (Read ) 状态, 之后阅读器对标签进行读操作, 这里读操作可以 是多个不同读操作, 通过读指令中不同权限的密钥区别, 即图 3中 S22至 S23。 标签验证指令后, 向阅读器发送阅读器需求的信息, 即图 3中 S23至 S24, 比 如, 标签的 EPC信息、用户信息等。如果阅读器选择图 1 中的 S5W: 写(Write ) 操作, 首先发送指令, 使标签转入图 2中的 S12: 写 (Write )状态, 之后阅读 器对标签进行写操作, 这里写操作可以是多个不同的写操作, 通过写指令中不 同权限的密钥区别, 即图 3中 S24至 S25 , 比如, 通过不同指令或参数可以改 写 EPC信息、 用户信息等, 对于一些重要信息的改写, 需要指令中带有密钥。 当阅读器选择图 1 中 S5D: "杀死" (Dead )操作时, 阅读器发送带有密钥的 指令, 标签对指令进行验证, 并转入如图 2中的 S13 : 杀死 (Dead ) 状态, 此 过程为图 3中的 S26至 S27。 这种操作会使标签不再响应任何指令。 另外, 在开放 ( Open ) 状态下, 标签可以根据阅读器指令选择进入读 ( Read )、 写 ( Write ) 和杀死 ( Dead ) 状态中的任何一个, 在读 ( Read )、 写 ( Write )状态下, 可以根据阅读器指令相互转换状态, 或转入杀死(Dead )状 态, 或者返回开放(Open )状态。 当进入杀死(Dead )状态后, 标签不再转入 其它状态。 在一个特定的应用场合中, 不是对所有的标签都必须进行读操作、 或写操作、 或同时进行读写操作, 所以可以进行选择。 比如, 在超市或仓库的 物品管理过程中, 物品是通过附在其上的标签的唯一身份码 (Identification,以 下简称 ID ) 去识别的, 这个标签的 ID是预定好, 并是唯一的。 对物品的管理 过程, 是以 ID的管理为主线的, 这样在基于 RFID的管理系统中, 后台的数据 库会实时的对现有的物品进行监测, 比如, 当物品为新进物品时, 必须读取它 的物品信息, 如名称、 材料、 大小、 保质期、 存放环境等等。 当这个物品在长 期存放后, 比如, 要调整它的价格, 那么当与标签建立通信后, 就可以直接进 行写操作, 改写价格信息存储区。 当物品存放时间大于保质期后, 直接对其进 行 "杀死" 操作, 而不需要再进入操作的其它状态。 因为这些监测是在后台数 据库中预先#文好的。 在本发明中, 第五步在系统设计时可以不使用, 即可以允许从第四步直接 进入第六步。 比如在工厂的生产线上, 对产品的识别是不存在安全危险的, 因 此, 为提高效率可以将其省略。 但是如果是用于门禁系统, 则要注重其系统的 通信安全, 保留第五步。 在本发明中, 图 2所示的状态为标签的一种逻辑状态,每个逻辑状态可能 对应多个物理状态。 比如在仲裁( Arbitration ) 状态中, 居对不同指令的响 应, 会产生多个物理响应状态。 比^ , 在写 (Write )状态下, 根据写入的不同 内容, 会有不同的物理状态。 标签处在任何一个状态下, 当掉电后, 必须从就 绪( Ready )状态重新开始。 当标签在仲裁( Arbitration ) 鉴权( Authentication ) 和开放( Open ) 状态下出现错误, 自动转入就緒 ( Ready ) 状态。 当标签在读 ( Read )、 写 ( Write )和杀死( Dead )状态下出现错误, 自动转入开放 ( Open ) 状态。 以上详细说明了本发明的实施方式,但这只是为了便于理解而举的形象化 的实例, 不应被视为是对本发明范围的限制。 同样, 任何所属技术领域的普通 专业人员均可根据本发明的技术方案及其较佳实施例的描述, 做出各种可能的 等同改变或替换, 但所有这些改变或替换都应属于本发明的权利要求的保护范 围。 S13: Kill (ie Dead) When the tag enters the open state, it can enter this state according to the reader command. In this state, the tag no longer responds to any other instructions of the reader and can be referred to as a kill state. In this state, the tag can no longer be transferred to any other state. As shown in FIG. 3, the specific process of the communication method between the reader and the label provided by the present invention includes the following steps: First, the reader detects the working area, and detects whether a label exists. When the label enters a valid radio frequency activation area, Or after the reader enters the tag presence area, the reader performs the SO: Detection operation as shown in Figure 1: First, the reader sends a detection signal, such as a specific continuous carrier, and the tag demodulates its signal and backs A specific response signal is emitted to ensure that the reader can discriminate the presence of the tag, namely S14 to S15 in FIG. When the tag is present, the tag is powered up, and a response is issued at the same time, and enters the S6: Ready state as shown in Figure 2, which is S 15 to S16 in Figure 3. The second step reader selects the detected pre-communication label When a tag is detected, the tag is selected, that is, S16 to S17 in Fig. 3. At this point, the reader performs the S1: Selection operation in Figure 1. The tag changes the corresponding flag bit according to the parameters of the selection instruction, and proceeds to S7 in the FIG. 2: Selection state. More specifically, the reader can select and classify tags within the active area by one or more selection commands. This command can contain specific information in the instruction and select the label by parameter. This instruction can contain a specific sequence and specify a logical operation with a specific part of the information stored in the tag, and use this result to change the part of the tag to achieve the purpose of selection. For example, the instruction sequence includes the information sequence 101010, and is used to select a certain piece of stored information of the tag and the same tag. In a specific application, for example, in a warehouse, selecting all kinds of foods produced by a certain manufacturer, the reader will match the instructions according to the coding characteristics corresponding to the features, and then identify the such products. Items for subsequent operations. The third step reader performs a query on the selected tag. The reader performs the S2: Query operation in FIG. 1 on the selected tag, that is, S18 to S19 in FIG. The selected tag is initialized with a certain instruction, and the tag is started to be counted. The fourth step of the tag access reader selects the tag to respond to the reader's query command. When multiple tags are simultaneously responding on the same channel, a conflict will occur. Here, a certain arbitration method can be used, such as using ALOHA. Algorithm to avoid conflicts. At this point the tag is in the S8: Arbitration state in Figure 2. After arbitration, the reader performs the S3 access operation in FIG. 1 to access the unique tag at one time, that is, S19 to S20 in FIG. Step 5: Reader and tag mutual authentication When a unique tag is successfully accessed, the reader authenticates the tag. After the authentication is passed, the command with the key is sent to the tag, requesting tag authentication, that is, Figure 3 In S20 to S21. At this point, the reader operates as S4 in Figure 1: Authentication, and the tag is in the S9: Authentication state in Figure 2. After receiving the instruction for requesting authentication, the tag authenticates it, and then passes to S10: Open state, that is, S21 to S22 in FIG. After the mutual identification of the legal identity by the authentication, the reader first reads the unique identification code of the tag, such as a unique identifier (Unique identifier, UID code). More specifically, for example, the tag may first send a command with a key, and include a random number in the instruction. When the reader receives the instruction, the key is verified, and after the verification is passed, the received random number is returned. . When both parties authenticate each other through a certain authentication mechanism, they are legal. After identity, a secure communication link is established between the reader and the tag. Step 6: The reader reads and writes the label. When the label enters the S10: Open state, the reader can choose how to operate the label. If you select the S5R: Read operation in Figure 1, the instruction is sent first, and the label is transferred to the S11: Read state in Figure 2. After the reader reads the label, the read operation can be multiple. Different read operations are distinguished by the keys of different permissions in the read command, that is, S22 to S23 in FIG. After the tag verification command, the reader is sent the information of the reader request, that is, S23 to S24 in FIG. 3, for example, the EPC information of the tag, the user information, and the like. If the reader selects the S5W: Write operation in Figure 1, the instruction is first sent, causing the label to go to the S12: Write state in Figure 2, after which the reader writes the label, where the write operation can be A plurality of different write operations are distinguished by a key of different permissions in the write command, that is, S24 to S25 in FIG. 3, for example, EPC information, user information, etc. can be rewritten by different instructions or parameters, and for rewriting of some important information, The command has a key. When the reader selects the S5D: "Dead" operation in Figure 1, the reader sends an instruction with a key, the tag verifies the instruction, and proceeds to S13 as shown in Figure 2: Kill (Dead) State, this process is S26 to S27 in Fig. 3. This action will cause the tag to no longer respond to any instructions. In addition, in the Open state, the tag can be selected to enter any of the Read, Write, and Dead states according to the reader command, in the Read (Read), Write (Write) state. , can convert state according to reader instructions, or go to the Dead state, or return to the Open state. When entering the Dead state, the tag no longer transitions to another state. In a particular application, not all tags must be read, written, or read and written simultaneously, so they can be selected. For example, in the item management process of a supermarket or warehouse, an item is identified by a unique identification (ID) of the label attached thereto, and the ID of the label is predetermined and unique. The management process of the item is based on the management of the ID. In the RFID-based management system, the database in the background monitors the existing items in real time. For example, when the item is a new item, it must be read. Take information about its items, such as name, material, size, shelf life, storage environment, and more. When the item is stored for a long period of time, for example, to adjust its price, then when communication is established with the tag, the write operation can be directly performed to rewrite the price information storage area. When the item is stored for longer than the shelf life, it is directly "killed" without having to go into other states of operation. Because these monitoring is in the background database in advance. In the present invention, the fifth step can be omitted during system design, that is, it can be directly from the fourth step. Go to the sixth step. For example, in the production line of a factory, there is no safety hazard in the identification of the product, so it can be omitted to improve efficiency. However, if it is used in the access control system, it is necessary to pay attention to the communication security of its system, and keep the fifth step. In the present invention, the state shown in FIG. 2 is a logical state of a tag, and each logical state may correspond to a plurality of physical states. For example, in the Arbitration state, responding to different instructions will generate multiple physical response states. Compared with ^, in the Write state, there will be different physical states depending on the different contents written. The tag is in any state, and after power down, it must be restarted from the Ready state. When the tag has an error in the Arbitration Authentication and Open state, it automatically goes to the Ready state. When the tag has an error in the Read, Write, and Dead states, it automatically goes into the Open state. The embodiments of the present invention have been described in detail above, but are merely illustrative examples of the present invention and are not intended to limit the scope of the invention. Also, any person skilled in the art can make various possible equivalent changes or substitutions according to the technical solutions of the present invention and the description of the preferred embodiments thereof, but all such changes or substitutions should belong to the present invention. The scope of protection of the claims.

Claims

权 利 要 求 书 一种 RFID系统中阅读器与标签的通信方法, 其包括如下步骤: The method for communicating a reader and a tag in an RFID system includes the following steps:
第一步, 当标签进入有效的射频激活区, 或者阅读器进入标签存在 区后, 阅读器发出检测信号, 进行检测操作, 以检测区域内是否有标签 存在:  In the first step, when the tag enters the active RF activation area, or the reader enters the tag presence area, the reader sends a detection signal to perform a detection operation to detect whether a tag exists in the area:
当标签存在时, 标签上电, 同时发出响应信号, 并进入就绪状态, 执 4亍第二步; 如果没有响应就认为没有标签存在, 阅读器不再进行其它操作; 第二步,上述检测到的响应的标签根据阅读器发出的选择操作指令 的参数改变相应标志位, 所选标签转入选择状态;  When the tag exists, the tag is powered on, and a response signal is sent, and the ready state is entered, and the second step is performed. If there is no response, no tag is considered to exist, and the reader does not perform other operations. In the second step, the above detection is performed. The response tag changes the corresponding flag bit according to the parameter of the selection operation instruction issued by the reader, and the selected tag is transferred to the selection state;
第三步, 阅读器对上述所选标签进行查询操作;  In the third step, the reader performs a query operation on the selected label;
第四步, 上述所选标签对阅读器的查询操作指令进行响应, 当有多 个标签同时在同一信道响应时, 上述这些标签进入仲裁状态, 利用仲裁 方法将唯一标签在一个时刻接入阅读器, 此时阅读器进行接入操作; 第五步, 当有唯一标签接入成功后, 阅读器对标签进行鉴权操作, 鉴权通过后, 向标签发送带有密钥的指令, 请求标签鉴权, 此时标签处 在鉴权状态, 标签收到阅读器请求鉴权的指令后, 对其进行鉴权, 通过 后标签转入开放状态; 当阅读器与标签之间不需要鉴权时, 省略此步, 直接由第四步进入第六步, 且标签直接转入开放状态;  In the fourth step, the selected tag responds to the query operation command of the reader. When multiple tags are simultaneously responding on the same channel, the tags enter the arbitration state, and the unique tag is used to access the reader at one time by using the arbitration method. At this time, the reader performs an access operation. In the fifth step, after the unique tag is successfully accessed, the reader performs an authentication operation on the tag, and after the authentication is passed, sends a command with a key to the tag, requesting the tag. Right, at this time, the tag is in the authentication state. After the tag receives the instruction requesting authentication from the reader, it authenticates it, and then passes the tag to the open state. When the reader does not need authentication, the device is omitted. In this step, the fourth step is directly entered into the sixth step, and the label is directly transferred to the open state;
第六步, 当接入阅读器的标签进入开放状态后, 阅读器对标签进行 操作, 包含读子操作和写子操作、 "杀死 "子操作; 阅读器可以选择对标 签的操作方式:  In the sixth step, after the tag of the access reader enters the open state, the reader operates the tag, including the read sub-operation and the write sub-operation, and the "kill" sub-operation; the reader can select the operation mode of the tag:
如果阅读器选择读操作, 首先发送指令, 标签对指令进行验证后, 转入读状态, 之后阅读器对标签进行读操作; 这里读操作可以是多个不 同读操作, 通过读指令中不同权限的密钥区别, 标签睑证指令后, 向阅 读器发送阅读器需求的信息;  If the reader selects a read operation, the instruction is first sent, and after the tag verifies the instruction, it is transferred to the read state, and then the reader reads the tag; here, the read operation may be a plurality of different read operations, by reading the different permissions in the instruction. The key difference, after the label is issued, sends the reader the information required by the reader;
如果阅读器选择写操作, 首先发送指令, 标签对指令进行验证后, 转入写状态, 之后阅读器对标签进行写操作, 这里写操作可以是多个不 同的写操作, 通过写指'令中不同权限的密钥区别; 当阅读器选择对标签进行"杀死"操作时, 阅读器发送带有密钥的指 令, 标签对指令进行验证后, 转入杀死状态。 If the reader selects a write operation, the instruction is sent first, and after the label verifies the instruction, it is transferred to the write state, and then the reader writes the label, where the write operation may be multiple The same write operation, by writing the key difference between the different permissions in the command; when the reader chooses to "kill" the tag, the reader sends an instruction with the key, after the tag verifies the instruction, Into the kill state.
2、 根据权利要求 1所述的方法, 其特征是上述第三步中阅读器对所选标签 进行查询操作时, 通过指令对所选标签进行初始化, 并发起清点, 清点 是指从选择标签到对标签的操作结束的整个过程。 2. The method according to claim 1, wherein in the third step, when the reader performs a query operation on the selected tag, the selected tag is initialized by an instruction, and an inventory is initiated, and the inventory point is from the selection tag to The entire process of the end of the operation of the label.
3、 根据权利要求 1所述的方法, 其特征是上述第五步中在鉴权成功时, 阅 读器首先读取标签的唯一标识码, 作为标签的身份标识。 3. The method according to claim 1, wherein in the fifth step, when the authentication is successful, the reader first reads the unique identification code of the tag as the identity of the tag.
4、 根据权利要求 1所述的方法,其特征是上述第六步中标签在开放状态下, 根据阅读器的不同操作指令, 选择进入标签的读状态、 写状态或杀死状 态, 除断电的情况, 处于读状态和写状态的标签可以通过阅读器指令返 回开放状态或直接进入杀死状态。 4. The method according to claim 1, wherein in the sixth step, the tag is in an open state, and according to different operation instructions of the reader, selecting to enter a read state, a write state or a kill state of the tag, except for powering off. In the case of a read state and a write state, the tag can be returned to the open state by the reader command or directly to the kill state.
5、 根据权利要求 1或 4所述的方法, 其特征是上述第六步中标签在开放状 态、 读状态、 写状态及杀死状态之间转移时, 需通过阅读器指令中不同 权卩艮级别的密钥认证。 5. The method according to claim 1 or 4, wherein in the sixth step, when the label is transferred between an open state, a read state, a write state, and a kill state, different commands are required in the reader command. Level key authentication.
6、 根据权利要求 1或 4所述的方法, 其特征是标签在杀死状态下不能再向 其它任何状态转移。 6. A method according to claim 1 or 4, characterized in that the tag cannot be transferred to any other state in the killed state.
7、 根据权利要求 1所述的方法, 其特征是标签处在任何一个状态下, 当断 电后, 必须从就绪状态重新开始。 7. The method of claim 1 wherein the tag is in any of the states and must be restarted from the ready state when the power is turned off.
8、 根据权利要求 1所述的方法, 其特征是当标签在仲裁、 鉴权和开放状态 下出现错误时, 自动转入就绪状态; 当标签在读、 写和杀死状态下出现 错误时, 自动转入开放状态。 8. The method according to claim 1, wherein when the tag has an error in arbitration, authentication, and open state, it automatically enters a ready state; when an error occurs in the read, write, and kill states of the tag, Moved to an open state.
PCT/CN2006/003740 2006-06-13 2006-12-30 A communication method between reader and label in the rfid system WO2007147306A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200610087226.5 2006-06-13
CNB2006100872265A CN100501758C (en) 2006-06-13 2006-06-13 A communication method between reader and tag in RFID system

Publications (1)

Publication Number Publication Date
WO2007147306A1 true WO2007147306A1 (en) 2007-12-27

Family

ID=38833057

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2006/003740 WO2007147306A1 (en) 2006-06-13 2006-12-30 A communication method between reader and label in the rfid system

Country Status (2)

Country Link
CN (1) CN100501758C (en)
WO (1) WO2007147306A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102081744A (en) * 2009-11-30 2011-06-01 中兴通讯股份有限公司 Path identification system and secure interaction method thereof
WO2013152653A1 (en) * 2012-04-11 2013-10-17 西安西电捷通无线网络通信股份有限公司 Air interface security method and device
CN106408673A (en) * 2016-08-26 2017-02-15 天津七二通信广播股份有限公司 Vehicle-mounted unit applied to path identification system and safe method of vehicle-mounted unit
CN112528688A (en) * 2019-09-19 2021-03-19 浙江悦和科技有限公司 Radio frequency tag control method, response method and device, storage medium, reader and radio frequency tag
CN118519969A (en) * 2024-07-19 2024-08-20 济南泰格电子技术有限公司 Digital storage management system and device for positioning type entity files

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101470795B (en) * 2007-12-27 2012-04-25 华为技术有限公司 Communication method and device in a radio frequency identification system
TWI455037B (en) 2008-09-12 2014-10-01 Mstar Semiconductor Inc Controlling method for rfid tag and rfid system thereof
CN101685494B (en) * 2008-09-25 2014-04-16 晨星软件研发(深圳)有限公司 Control method of radio frequency identification tag and radio frequency identification system using same
CN101751540B (en) * 2008-12-09 2012-02-22 晨星软件研发(深圳)有限公司 Method and system for co-processing tasks using radio frequency identification tags
CN102043934B (en) * 2009-10-12 2014-12-10 中兴通讯股份有限公司 Radio frequency identification system and operating method thereof
CN103080949A (en) * 2010-09-02 2013-05-01 北京智捷通科技发展有限公司 Method and device for radio frequency identification(RFID) access control
CN101976365B (en) * 2010-11-05 2012-09-19 中国航天科工集团第二研究院七○六所 Safe radio frequency identification system
CN102122340A (en) * 2010-11-16 2011-07-13 北京中电华大电子设计有限责任公司 Method for preventing radio from being exposed in radio frequency identification system
HK1145128A2 (en) * 2010-11-25 2011-04-01 苏贵生 Device and method for detecting water level, and device adapted for such method and container adapted for such device
CN102087697B (en) * 2011-02-25 2013-08-14 深圳市中兴长天信息技术有限公司 Data transmission method of reader and wireless tags
CN102129541B (en) * 2011-03-01 2015-04-01 中国电子技术标准化研究所 Radio frequency identification system, reader-writer, tag and communication method
CN102169537B (en) * 2011-04-07 2014-03-26 工业和信息化部电子工业标准化研究所 Method for processing security information data received by electronic tag
CN102682313B (en) * 2011-06-10 2015-08-19 中国人民解放军国防科学技术大学 The communication means of read write line and label in radio-frequency recognition system
CN102314585A (en) * 2011-07-22 2012-01-11 上海聚星仪器有限公司 Method suitable for testing secure communication of radio frequency identification tag
CN103164718B (en) * 2011-12-13 2016-10-05 天津中兴智联科技有限公司 RF identification exchange method and radio-frequency recognition system
CN102510348A (en) * 2011-12-27 2012-06-20 杭州电子科技大学 Real-time self-adaptive detecting and processing method for radio frequency identification devices (RFID) super-concurrent signal
CN104091184B (en) * 2014-06-16 2017-09-15 上海实甲智能系统有限公司 Electronic label detecting method and system
CN106228211B (en) * 2016-07-25 2020-06-19 吕永根 Target searching system and searching method thereof
US10474938B2 (en) * 2017-04-24 2019-11-12 Flockstock Pty Ltd Inventory management system
CN108768464B (en) * 2018-04-08 2021-06-22 深圳市盛路物联通讯技术有限公司 Radio frequency data transmission method and system
CN110334553B (en) * 2019-05-08 2023-03-24 广东识芯微电子科技有限公司 Link method for radio frequency identification sensing data and sensing label node
WO2021164039A1 (en) * 2020-02-22 2021-08-26 南京大学 Method and device for authenticating passive rfid tag
CN113496127A (en) * 2020-04-02 2021-10-12 太原理工大学 Method, device and storage medium for performing selection and write operations on multiple CRFID tags
WO2022036537A1 (en) * 2020-08-18 2022-02-24 Tridonic Gmbh & Co Kg Data calibration method and driver
CN120050659A (en) * 2023-11-27 2025-05-27 华为技术有限公司 Communication method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1264483A (en) * 1997-07-24 2000-08-23 检验点系统有限公司 Inventory system using articles with RFID tags
CN1531715A (en) * 2000-09-05 2004-09-22 Gap��˾ System and method for using radio frequency identification in retail operations

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1264483A (en) * 1997-07-24 2000-08-23 检验点系统有限公司 Inventory system using articles with RFID tags
CN1531715A (en) * 2000-09-05 2004-09-22 Gap��˾ System and method for using radio frequency identification in retail operations

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102081744A (en) * 2009-11-30 2011-06-01 中兴通讯股份有限公司 Path identification system and secure interaction method thereof
WO2013152653A1 (en) * 2012-04-11 2013-10-17 西安西电捷通无线网络通信股份有限公司 Air interface security method and device
US9350721B2 (en) 2012-04-11 2016-05-24 China Iwncomm Co., Ltd. Air interface security method and device
CN106408673A (en) * 2016-08-26 2017-02-15 天津七二通信广播股份有限公司 Vehicle-mounted unit applied to path identification system and safe method of vehicle-mounted unit
CN112528688A (en) * 2019-09-19 2021-03-19 浙江悦和科技有限公司 Radio frequency tag control method, response method and device, storage medium, reader and radio frequency tag
CN112528688B (en) * 2019-09-19 2023-08-15 浙江悦和科技有限公司 Radio frequency tag control method, response method and device, storage medium, reader and radio frequency tag
CN118519969A (en) * 2024-07-19 2024-08-20 济南泰格电子技术有限公司 Digital storage management system and device for positioning type entity files

Also Published As

Publication number Publication date
CN101089872A (en) 2007-12-19
CN100501758C (en) 2009-06-17

Similar Documents

Publication Publication Date Title
WO2007147306A1 (en) A communication method between reader and label in the rfid system
US8284033B2 (en) Object tracking
EP1760641A2 (en) Human feedback using parasitic power harvesting of RFID tags
CN114692790B (en) A communication method and related equipment
CN101438330B (en) Method and system for setup of, and communication with, an RFID middleware server from an enterprise resource planning system server
US20070257768A1 (en) System and method for point-of-sale activation of consumer electronics
US20080001724A1 (en) Using read lock capability for secure RFID authentication
CN103999111A (en) Electronic price label system and method
WO2008137206A1 (en) Dynamically programmable rfid transponder
WO2008069892A2 (en) Rfid tag including rom, method of impeding an rifd tag from being killed, and method of manufacturing an rfid tag
EP3151146B1 (en) Near field communication device
WO2007149218A2 (en) Rfid tag user memory indication
US9405941B2 (en) Simultaneous programming of selected tags
CN102722806A (en) Sale management system based on RFID (radio frequency identification) and implementation method thereof
CN102682313B (en) The communication means of read write line and label in radio-frequency recognition system
US12257975B2 (en) Vehicle and control method thereof
CN104584036B (en) The method and corresponding label of operation mode for managing non-contact tag
CN101593286B (en) Radio-frequency identification label and identification method
CN102129541B (en) Radio frequency identification system, reader-writer, tag and communication method
WO2012083632A1 (en) Method and system for controlling access to radio frequency identification tag
KR101112535B1 (en) Method for Authenticating RFID Readers by Using Flags in RFID Tag
CN108804960B (en) Radio frequency transmission method and device
CN102169537B (en) Method for processing security information data received by electronic tag
TWI695323B (en) Radio frequency identification reader
KR101107005B1 (en) How to input RDF tag data into application and RDF reader using same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06840770

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06840770

Country of ref document: EP

Kind code of ref document: A1