摘要:
The present disclosure discloses a method for dynamic authentication between a reader and a tag, and an implementing device therefor, to solve the technical problem of necessity of dependence of a traditional authentication method on a real-time, online, reliable and secure connection with a background database, as well as lack of means for highly autonomous authentication of a tag by a reader. In the present disclosure, only a legitimate reader can obtain corresponding tag authentication information from an authentication database and authenticate or update a corresponding tag status; only a legitimate tag can be processed by the legitimate reader; during the authentication, a dynamic updating mechanism is used for a tag ID which ensures forward security; the reader stores tag information using a hash table and thus increases an authentication speed; data synchronization is achieved cleverly by means of a counting value. The use of a random number guarantees that a different data packet is used for every authentication, thus hiding tag position information effectively and offering excellent security.
摘要:
The present disclosure discloses a method for dynamic authentication between a reader and a tag, and an implementing device therefor, to solve the technical problem of necessity of dependence of a traditional authentication method on a real-time, online, reliable and secure connection with a background database, as well as lack of ways for highly autonomous authentication of a tag by a reader. In the present disclosure, only a legitimate reader can obtain corresponding tag authentication information from an authentication database and authenticate or update a corresponding tag status; only a legitimate tag can be processed by the legitimate reader; during the authentication, a dynamic updating mechanism is used for a tag ID which ensures forward security; the reader stores tag information using a hash table and thus increases an authentication speed; data synchronization is achieved cleverly by ways of a counting value. The use of a random number guarantees that a different data packet is used for every authentication, thus hiding tag position information effectively and offering excellent security.
摘要:
A reporting method for a network state includes: an intermediate node receiving a data packet; the intermediate node marking the data packet according to the current network state; and the intermediate node forwarding the marked data packet. A detecting method for a network state includes: a sink node receiving a data packet; the sink node parsing the data packet to obtain the marking information about the network state; and the sink node determining the network state according to the marking information. A reporting device corresponding to the reporting method, a detecting device corresponding to the detecting method, and a detecting system comprising the reporting device and the detecting method are also provided.
摘要:
Disclosed are a reporting method, a detecting method, device and system for a network state. The reporting method for a network state includes: an intermediate node receiving a data packet; the intermediate node marking the data packet according to the current network state; and the intermediate node forwarding the marked data packet. The detecting method for a network state includes: a sink node receiving a data packet; the sink node parsing the data packet to obtain the marking information about the network state; and the sink node determining the network state according to the marking information. With the present document, the problem of heavy network burden due to a method of determining the network state with an active inquiry mode is solved, thus prolonging the service life of each node and optimizing the performance of the system.
摘要:
A method for improving energy efficiency performance of a reader is disclosed in the present document. The method includes: initializing and adjusting operation parameters, and acquiring the current number of frame timeslots; updating a frame timeslot status, and determining that a power level is not required to be increased according to the updated frame timeslot status; and estimating the number of labels according to the current number of frame timeslots, and acquiring an optimum Q value according to the number of labels. A device for improving energy efficiency performance of a reader is also disclosed in the present document. With the method and device of the present document, throughput of a Radio Frequency Identification (RFID) system is maximized, thereby reducing energy consumption of the system and extending usage time of the system; and while the energy consumption is reduced, a rate at which the reader reads the labels is guaranteed.
摘要:
A method for improving energy efficiency performance of a reader is disclosed in the present document. The method includes: initializing and adjusting operation parameters, and acquiring the current number of frame timeslots; updating a frame timeslot status, and determining that a power level is not required to be increased according to the updated frame timeslot status; and estimating the number of labels according to the current number of frame timeslots, and acquiring an optimum Q value according to the number of labels. A device for improving energy efficiency performance of a reader is also disclosed in the present document. With the method and device of the present document, throughput of a Radio Frequency Identification (RFID) system is maximized, thereby reducing energy consumption of the system and extending usage time of the system; and while the energy consumption is reduced, a rate at which the reader reads the labels is guaranteed.
摘要:
FIG. 1 is a perspective view of the double wall beverage container. FIG. 2 is a front elevational view of the double wall beverage container. FIG. 3 is a rear elevational view thereof. FIG. 4 is a top plan view thereof. FIG. 5 is a bottom plan view thereof. FIG. 6 is a left side elevational view thereof; and, FIG. 7 is a right side elevational view thereof. The broken lines showing of the handle in FIGS. 1, 2, 3, 4, 5 and 7 form no part of the claimed design.
摘要:
Systems and methods which provide data communication content delivery through a hybrid network implementation are disclosed. A hybrid network configuration may utilize a broadcast communication technique to deliver large amounts of data communication content to one or more mobile communication device via uni-directional network links and a uni-cast communication technique via bi-directional network links with the one or more mobile communication device to facilitate delivery and utilization of the data communication content. Data content delivery loss recovery techniques implemented according to embodiments of the invention utilize network links of the hybrid network other than or in addition to the uni-directional network links to implement loss recovery techniques such as a hybrid repeat technique, a hybrid retransmission technique, hybrid statistical feedback technique, and/or combinations thereof.
摘要:
A method and apparatus for allocating subcarriers in an orthogonal frequency division multiple access (OFDMA) system is described. In one embodiment, the method comprises allocating at least one diversity cluster of subcarriers to a first subscriber and allocating at least one coherence cluster to a second subscriber.
摘要:
This present application relates to data encryption and decryption technology, and especially relates to a data encryption and decryption method and apparatus. The described encryption method comprises: packeting plaintext data to be encrypted, randomly assigning an encryption function to each group of the plaintext data, encrypting each group of the plaintext data with the encryption function respectively, and arranging the encrypted data according to its corresponding position in the plaintext data to form a ciphertext. The encryption apparatus includes: packet module, encryption function random assignment module and encryption processing module. This application also provides a data decryption method and apparatus. This invention randomly assigns an encryption function to the plaintext to be encrypted, and uses the assigned encryption function to encrypt the plaintext data to arrange and form a ciphertext, greatly strengthening the security of data storage, and achieving the perfect secrecy of data.