Abstract:
A method and system for security authentication of radio frequency identification are disclosed. All the security control in this method is completed by the security authentication control apparatus. The reader is for the command transmission and the tag data forwarding, and there is not the security authentication control logic, the security authentication and the non security authentication can be supported at the same time. The key in the tag is unreadable, which ensures that the tag is unable to be replicated; the constant for every security authentication is randomly generated by the control module, and is returned by the tag after being encrypted, which presents the air interface from intercepting the useful information. This method provides the inventory with the mask code before the security authentication, which can have a certain filtering function on the tag data. The mask code can be configured flexibly.
Abstract:
The invention provides a method and a system for rebuilding single ring network topology. In the method, each node in the single ring network detects, at a predetermined time interval, whether the link connected with the root port of the present node is failed (S401); when one node in the single ring network detects a link failure, the node having a blocking port obtains the information that the link failure occurs in the single ring network (S403); and the node having the blocking port switches the state of the port in a blocking state to a forwarding state (S405). With the technical solution provided by the invention, the passive wait for obtaining the link failure can be converted to the active detection for the link failure, and the state of the port in the blocking state is directly switched to the forwarding state. Therefore, the convergence speed is accelerated.
Abstract:
A method and system for security authentication of radio frequency identification are disclosed. All the security control in this method is completed by the security authentication control apparatus. The reader is for the command transmission and the tag data forwarding, and there is not the security authentication control logic, the security authentication and the non security authentication can be supported at the same time. The key in the tag is unreadable, which ensures that the tag is unable to be replicated; the constant for every security authentication is randomly generated by the control module, and is returned by the tag after being encrypted, which presents the air interface from intercepting the useful information. This method provides the inventory with the mask code before the security authentication, which can have a certain filtering function on the tag data. The mask code can be configured flexibly.