Electronic ear Tag Dealer

News

RFID electronic label with password function.UHF Cards RFID manufacturer

source:Industry News Popular:rfid fpc tag release time:2021-11-19 09:17:24 Article author:sznbone

  RFID electronic label with password function

  For writable electronic tags, if there is no password function, any reader can read and write data on RFID electronic tags. In order to ensure the security of system data, unauthorized access to electronic tags should be prevented. This can take a variety of methods to protect RFID electronic tags. The protection of RFID electronic tags involves data encryption. Data encryption can prevent tracking, stealing or malicious tampering with the information of the electronic tags, thereby ensuring data security.

  (1) Hierarchical key

  Hierarchical key means that the system has multiple keys, and different keys have different access rights. In the application, the level of the key can be determined according to the access rights. For example, a certain system has a key A and a key B, and the authentication between the RFID electronic tag and the radio frequency reader can be determined by the key A and the key B, but the levels of the key A and the key B are different.

  The data inside the electronic label is divided into two parts, which are protected by key A and key B respectively. The data protected by the key A is stored in a read-only memory, and the data can only be read, not written. The data protected by the key B can be written into the memory for storage. The reader 1 has the key A. After the electronic tag is successfully authenticated, the reader 1 is allowed to access the data protected by the key A. The reader 2 has a key B. After the electronic tag is successfully authenticated, the reader 2 is allowed to read the data protected by the key B, and the reader 2 is allowed to write the data, which can be read and written.

  (2) Application of hierarchical keys in public transportation

  In the urban public transportation system, there are application examples of hierarchical keys. At present, the urban public transportation system can use the card reader (reader) of the card to ride the bus, and the other is the reader of the bus company to recharge the card.

  The card swiping for bus rides is a close-contact card swiping, and the amount is deducted from the card for each swipe, and this part of the data is stored in the card. There are two kinds of readers in the urban public transportation system, one is the key A authentication on the bus. The RFID electronic tag can also be recharged, and the recharge is authenticated by the key B. The reader/writer on the bus only has key A. After the electronic tag authentication key A is successful, the reader/writer on the bus is allowed to deduct the amount on the electronic tag.

  The reader/writer of the bus company has key B. The electronic tag needs to be recharged at the bus company. After the electronic tag authentication key B is successful, the reader/writer of the bus company is allowed to recharge the electronic tag.


Read recommendations:

M04 ISO11784/5 Animal Microchip Implant

M03 ICAR Certifiicated Injected Under Skin Microchip

M02- Pet Microchip with Needle Pack

Introduction to the working principle of RFID.dog microchip maker

What are the advantages of UHF RFID electronic tags? Mainly in three aspects!Pet Tag Sale

Previous : Reading distance of handheld rfid reader.rfid cable tie tag manufacturer Next : rfid writable electronic label.uhf rfid label manufacturer

Popular recommended products

Related Products

Related Information

Creative, organized, responsible, enthusiastic

contact us