摘要:
Disclosed is a synchronization method between a reader and tag according to an example embodiment, the method including: transmitting, by the reader, a first write command message to the tag at a first time; detecting, by the tag, the first write command message from the reader at a second time and transmitting a first response message to the reader in response to the first write message; transmitting, by the reader, a second write command message including first time information of the first time to the tag; and correcting, by the tag, a clock offset using a difference between the first time and the second time.
摘要:
Disclosed are an RFID reader, an RFID tag, and a controlling method thereof. The RFID tag may include a state information generator to generate state information of the RFID tag, a receiver to receive an activation command including reference state information of the RFID tag, and a controller to activate the RFID tag based on the state information and the reference state information. The RFID tag may be selectively activated according to an inner state of the RFID tag.
摘要:
Disclosed is a method of generating an activation code of a Radio Frequency Identification (RFID) tag including calculating K satisfying a condition that N is set to exceed 2k-1 and to be equal to or less than 2k, when classifying N number of objects through a plurality of RFID tags; and classifying the N number of objects by recording a code corresponding to each of the N number of objects in a K-bit region in an activation code of each RFID tag.
摘要:
Provided is a communication method for radio frequency identification (RFID). In order to transmit a command message with respect to an RFID tag, an RFID reader generates a command message comprising a command code indicating a type of command to be delivered to the RFID tag, a response format having one or more bits for indicating a type of additional data to be added to a response message to be received from the RFID tag, and an identifier identifying the RFID tag; and transmits the command message to the RFID tag, thereby allowing the RFID tag to immediately transmit the additional data via the response message in response to the command message.
摘要:
Disclosed are an RFID authentication apparatus having an authentication function and a method thereof. An RFID authentication method includes determining, by an authentication reader, an AES key using authentication information received from an authentication tag, generating an output key, encrypting a predetermined length of confirmation data by using the output key, transmitting the encrypted confirmation data to the authentication tag, receiving encrypted confirm response data corresponding to the confirmation data from the authentication tag to decrypt the encrypted confirm response data, and comparing the predetermined length of the confirmation data with the decrypted confirm response data to verify authenticity of the authentication tag.
摘要:
Provided is a method and apparatus for managing a product distribution. The product distribution management method may include: reading a security key of a product from a security tag attached to the product; transferring the read security key to a security server; receiving, from the security server, first authentication information that is encrypted using the security key; receiving, from the security tag, second authentication information that is encrypted using the security key; and determining whether the security tag is duplicated, based on the first authentication information and the second authentication information.
摘要:
Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.
摘要:
Provided is a method and apparatus for managing a product distribution. The product distribution management method may include: reading a security key of a product from a security tag attached to the product; transferring the read security key to a security server; receiving, from the security server, first authentication information that is encrypted using the security key; receiving, from the security tag, second authentication information that is encrypted using the security key; and determining whether the security tag is duplicated, based on the first authentication information and the second authentication information.
摘要:
Disclosed are a radio frequency identification (RFID) security apparatus and a method thereof. According to the RFID security method, a secure tag reader performs determining an AES key using security information received from a secure tag and generating an output key using the determined AES key, decrypting AES data received from the secure tag using the output key, and encrypting data to be transmitted to the secure tag using the output key and transmitting the data, and a secure tag performs generating an output key using an AES key and security information, and transmitting the security information to a secure tag reader, encrypting data to be transmitted to the secure tag reader using the output key, and transmitting the encrypted data to the secure tag reader, and decrypting data received from the secure tag reader using the output key.
摘要:
Provided is an apparatus and method for computing the location of a radio beacon by using received signal strength (RSS) and multiple frequencies. The apparatus and method of the present invention computes the location of a radio beacon without limitation in distance by using multiple frequencies and received signal strength to resolve the problem of phase ambiguity. A radio beacon location computing system includes a plurality of base stations configured to receive signals of multiple frequencies transmitted from the radio beacon, and detect and output phase differences and received signal strength; and a location computing server configured to receive the phase differences and the received signal strength outputted from the respective base stations, acquire calculation distances based on the phase differences, remove phase ambiguity from the calculation distances based on the received signal strength, and compute the location of the radio beacon.