Abstract:
In a radio frequency identification (RFID) security reader, by integrating an encryption module that encrypts transmission data and a decryption module that decrypts reception data from an RFID security tag to restore the reception data to original data to a modem, an input/output time period of a processor module that processes a communication protocol in an RFID security system is minimized.
Abstract:
A Radio Frequency Identification (RFID) tag and an interrogator that support a normal mode and a secure mode, and operating methods thereof are provided. The RFID tag may notify the interrogator of whether a current operating mode of the RFID tag is the normal mode or the secure mode, may perform different inventory processes based on the current operating mode, and may perform an authentication of the interrogator. Here, the RFID tag and the interrogator may also perform a mutual authentication.
Abstract:
Disclosed are an RFID authentication apparatus having an authentication function and a method thereof. An RFID authentication method includes determining, by an authentication reader, an AES key using authentication information received from an authentication tag, generating an output key, encrypting a predetermined length of confirmation data by using the output key, transmitting the encrypted confirmation data to the authentication tag, receiving encrypted confirm response data corresponding to the confirmation data from the authentication tag to decrypt the encrypted confirm response data, and comparing the predetermined length of the confirmation data with the decrypted confirm response data to verify authenticity of the authentication tag.
Abstract:
Provided are an RFID reader and a method for controlling a gain thereof. The RFID reader includes an amplifier and an AGC circuit. The amplifier controls the gain of an RX signal, received from an RFID tag, in response to an AGC signal. The AGC circuit measures a signal level in an ante-preamble period of the RX signal and generates an AGC signal to control the gain of the RX signal, on the basis of the measured signal level.
Abstract:
Disclosed are a radio secure reader and a radio secure tag for supporting a secure mode and a normal mode. The radio secure reader for controlling an operation mode of the radio secure tag may include a reader modem to receive the operation mode from the radio secure tag, and a reader processing unit to identify the received operation mode as a normal mode or a secure mode, and to control the radio secure tag based on the identified operation mode.
Abstract:
The present invention relates to an RFID reader and a signal receiving method thereof. The RFID reader according to one embodiment of the present invention down-converts transmission leakage signals introduced into a reader receiver and then suppresses them through a band stop filter in a low frequency band and up-converts them, thereby making it possible to effectively suppress the transmission leakage signals.
Abstract:
An apparatus for providing duplicated shelf managers in an ATCA system is provided. The apparatus for providing duplicated shelf managers includes a hub/switch in a control backplane to allow a manager to access the duplicated shelf managers all the time from an external network while maintaining the switch configuration defined of the ATCA specification. The hub/switch connects Ethernet ports of the duplicated two shelf managers and Ethernet ports of the two switches at the same time, and connects the two shelf managers and the two switches to the Internet.
Abstract:
Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.
Abstract:
Disclosed are a radio secure reader and a radio secure tag for supporting a secure mode and a normal mode. The radio secure reader for controlling an operation mode of the radio secure tag may include a reader modem to receive the operation mode from the radio secure tag, and a reader processing unit to identify the received operation mode as a normal mode or a secure mode, and to control the radio secure tag based on the identified operation mode.
Abstract:
A method of storing sensor data in a sensor tag is provided. The method comprises receiving new sensor data output from a sensor, comparing the received new sensor data with immediately previous sensor data to determine whether the comparison result satisfies a predetermined criterion, and storing the new sensor data in a tag memory when it is determined that the criterion is satisfied. Accordingly, efficient use of the tag memory is possible.