CN115780278A - Secret-related carrier sorting system and method - Google Patents

Secret-related carrier sorting system and method Download PDF

Info

Publication number
CN115780278A
CN115780278A CN202310079444.8A CN202310079444A CN115780278A CN 115780278 A CN115780278 A CN 115780278A CN 202310079444 A CN202310079444 A CN 202310079444A CN 115780278 A CN115780278 A CN 115780278A
Authority
CN
China
Prior art keywords
sorting
frame
current frame
identification
identification device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310079444.8A
Other languages
Chinese (zh)
Inventor
罗远哲
刘瑞景
李雪茹
陆立军
荆全振
李连庚
刘志明
申慈恩
薛瑞亭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing China Super Industry Information Security Technology Ltd By Share Ltd
Original Assignee
Beijing China Super Industry Information Security Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing China Super Industry Information Security Technology Ltd By Share Ltd filed Critical Beijing China Super Industry Information Security Technology Ltd By Share Ltd
Priority to CN202310079444.8A priority Critical patent/CN115780278A/en
Publication of CN115780278A publication Critical patent/CN115780278A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Near-Field Transmission Systems (AREA)

Abstract

The invention belongs to the technical field of sorting of the Internet of things and discloses a sorting system and method for secret-related carriers. The method applies the RFID technology to the management of the confidential carrier, reads the RFID label stuck on the confidential carrier through identification equipment, and sends a read generated identification signal to the control equipment; the control equipment generates a sorting instruction according to the identification signal and sends the sorting instruction to the sorting equipment; the sorting equipment sorts the confidential carriers according to the sorting instructions when receiving the sorting instructions, and the confidential carriers are sorted by identifying the RFID labels adhered to the confidential carriers through the confidential carrier sorting system, so that the informatization management degree in the management of the confidential carriers is improved, the artificial interference factors are reduced, the management dead angles of the confidential carriers are reduced, and the management safety of the confidential carriers is improved.

Description

Secret-related carrier sorting system and method
Technical Field
The invention relates to the technical field of sorting of the Internet of things, in particular to a sorting system and method for secret-related carriers.
Background
In life, a large number of confidential archive files such as product information, technical data, design drawings and the like are stored and kept in the form of electronic documents. How to effectively manage the movable secret-related carrier for storing the confidential documents and strictly prevent the confidential information in the carrier from being leaked becomes a problem to be solved.
At present, the management of the secret-related carriers basically depends on traditional means such as manual registration and periodic inspection, and is completely based on a static management mode, so that the defects of poor safety, more management dead angles, low informatization management degree, large man-made interference factors and the like exist.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a sorting system and method for secret-related carriers, and aims to solve the technical problems that the management mode of the secret-related carriers in the prior art is poor in safety, large in management dead angle, low in informatization management degree and large in human interference factor.
In order to achieve the above object, the present invention provides a secret carrier sorting system, including: the device comprises an identification device, a control device and a sorting device;
the identification device is used for reading the RFID label pasted on the secret-related carrier and sending a reading generated identification signal to the control device;
the control equipment is further used for generating a sorting instruction according to the identification signal and sending the sorting instruction to the sorting equipment;
and the sorting equipment is used for sorting the confidential carriers according to the sorting instruction when the sorting instruction is received.
Optionally, the identification device is further configured to select a frame length of a current frame based on fuzzy logic, and the identification device performs RFID tag reading in units of frames;
the identification equipment is also used for calculating the frame length of the current frame according to the estimated RFID label quantity and the time slot duration in the current reading area;
the identification device is further configured to check the time slot of the current frame according to the length of the current frame, and generate a current frame interruption condition.
Optionally, the identification device is further configured to obtain a time slot duration, a reader command duration, and an RFID tag message duration;
the identification device is further configured to obtain the number of time slots of the current frame;
the identification device is further configured to calculate a frame length of the current frame according to the number of time slots, the time slot duration, the reader command duration, and the RFID tag message duration.
Optionally, the identification device is further configured to determine whether to read a new frame according to the condition of interrupting the current frame.
Optionally, the identifying device is further configured to calculate a first expected average time of a single sensor data packet of the current frame;
the identification device is further configured to calculate a second expected average time for a single sensor data packet of a new frame;
the identification device is further configured to interrupt a current frame and start a new frame when the first expected average time is less than the second expected average time;
the identifying device is further configured to continue with the current frame when the first expected average time is greater than the second expected average time.
In addition, in order to achieve the above object, the present invention further provides a method for sorting confidential carriers, which is applied to a RFID-based system for sorting confidential carriers, and the system includes: the control equipment, the identification equipment and the sorting equipment; the method comprises the following steps:
the identification equipment reads the RFID label pasted on the secret-related carrier and sends a read generated identification signal to the control equipment;
the control equipment generates a sorting instruction according to the identification signal and sends the sorting instruction to the sorting equipment;
and when the sorting equipment receives the sorting instruction, sorting the confidential carriers according to the sorting instruction.
Optionally, the step of reading, by the identification device, the RFID tag attached to the secret carrier includes:
the identification device is also used for selecting the frame length of the current frame based on fuzzy logic, and the identification device reads the RFID label by taking the frame as a period;
the identification equipment calculates the frame length of the current frame according to the estimated number of the RFID labels in the current reading area and the time slot duration;
and the identification equipment checks the time slot of the current frame according to the length of the current frame and generates a current frame interruption condition.
Optionally, the step of calculating, by the identification device, a frame length of the current frame according to the estimated number of RFID tags in the current reading area and the duration of the time slot includes:
the identification equipment acquires time slot duration, reader command duration and RFID tag message duration;
the identification equipment acquires the time slot number of the time slot;
and the identification equipment calculates the frame length of the current frame according to the time slot number, the time slot duration, the reader command duration and the RFID label message duration.
Optionally, after the step of checking, by the identification device, the time slot of the current frame according to the length of the current frame and generating a condition for interrupting the current frame, the method further includes:
and the identification equipment judges whether to read a new frame according to the current frame interruption condition.
Optionally, the step of determining, by the identification device, whether to read the new frame according to the frame lengths and the time slots of the current frame and the new frame includes:
the identification device calculates a first expected average time for a single sensor data packet of a current frame;
the identification device calculating a second expected average time for a single sensor data packet of a new frame;
the identification device interrupts the current frame and starts reading a new frame when the first expected average time is less than the second expected average time;
the identification device continues to read the current frame when the first expected average time is greater than the second expected average time.
The RFID technology is applied to the management of the secret carrier, the RFID label stuck on the secret carrier is read through the identification equipment, and the read and generated identification signal is sent to the control equipment; the control equipment generates a sorting instruction according to the identification signal and sends the sorting instruction to the sorting equipment; the sorting equipment sorts the confidential carriers according to the sorting instructions when receiving the sorting instructions, and the confidential carriers are sorted by identifying the RFID labels adhered to the confidential carriers through the confidential carrier sorting system, so that the informatization management degree in the management of the confidential carriers is improved, the artificial interference factors are reduced, the management dead angles of the confidential carriers are reduced, and the management safety is improved.
Drawings
FIG. 1 is a block diagram of a first embodiment of a secret carrier sorting system according to the present invention;
FIG. 2 is a schematic diagram of the identification device of the classified carrier sorting system according to the present invention;
FIG. 3 is a schematic view of the working process of the identification device of the secret-related carrier sorting system of the present invention;
FIG. 4 is a schematic diagram of the system for sorting classified carriers according to the present invention;
FIG. 5 is a schematic diagram of the operation flow of the RFID reader of the classified carrier sorting system according to the present invention;
FIG. 6 is a schematic flow chart of a method for sorting secret carriers according to a first embodiment of the present invention;
fig. 7 is a schematic flow chart of a second embodiment of the sorting method for confidential carriers according to the present invention.
The implementation, functional features and advantages of the present invention will be further described with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a block diagram illustrating a first embodiment of a secret carrier sorting system according to the present invention.
The secret-related carrier sorting system comprises: control device 10, recognition device 20, sorting device 30 and conveying device.
And the identification equipment is used for reading the RFID label pasted on the secret-related carrier and sending the identification signal generated by reading to the control equipment.
It should be understood that the above-mentioned transmission device may be used to transmit the secret carrier to which the RFID tag is attached, and when the secret carrier is transmitted to the identification area of the identification device, the identification device may read the RFID tag on the secret carrier to generate an identification signal and transmit the identification signal to the control device.
It should be noted that, a plurality of RFID readers may be included in the identification device, and the RFID readers may use and employ passive uhf RFID sensing. The RFID system can be formed by an RFID reader and an RFID tag, into which different types of sensors can be integrated.
It should be understood that the sensor in the RFID tag may collect environmental data around the RFID tag, and when the RFID tag receives a radio frequency signal sent by the identification device, the classified category of the RFID tag and the environmental data may be returned to the identification device as an identification signal, and when the identification device receives the identification signal, the identification signal may be sent to the control device.
It can be understood that the control device is in communication connection with the conveying device, the identification device and the sorting device respectively, and the connection mode may be a wireless connection, or other connection modes, which is not limited in this embodiment; the control equipment can be used for comprehensively controlling each equipment in the secret-related carrier sorting system, controlling the conveying equipment to convey the secret-related carriers, generating corresponding powder simple and straight commands based on the identification signals and the operation parameter information of the conveying equipment, and sending sorting instructions to the corresponding sorting equipment. The control device may be a terminal device, such as a computer, capable of performing functions such as data analysis and signal processing, and the present embodiment is not limited thereto.
It should be noted that the manner of generating the identification signal may be to upload the identification signal generated by the RFID tag read from the confidential carrier to a server or an upper computer, and determine the category of the confidential carrier by the server or the upper computer so as to select a corresponding sorting channel.
The RFID tag reading device comprises an RFID tag reading device, a control device and a recognition device, wherein the RFID tag reading device is used for reading the RFID tag, the recognition device is used for reading the RFID tag, and the recognition device is used for reading the RFID tag and sending the RFID tag to the control device.
In a specific implementation, the identification device reads the RFID tag attached to the confidential carrier and sends an identification signal generated by reading to the control device.
In practical applications, since there may be a plurality of tags within the identification range of the identification device, when the secret carrier sorting system is in operation, when two or more RFID tags simultaneously transmit data to the identification device within the range of action of the same reader, signal interference occurs, which is called collision. In order to reduce the number of collisions with other tags within the identification area of the identification device, a fast collision-prevention protocol needs to be provided in the tags.
RFID tag reading and processing is performed, for example, using the DFSA algorithm (dynamic frame slotted ALOHA algorithm), which can use the number of free slots, collision slots, and single slots to determine the frame size. When the number of the time slots with conflicts exceeds an online threshold, the identification equipment increases the size of the frame; if the collision probability is less than the lower threshold, the identifying device may reduce the size of the frame. Because the identification device starts the read cycle with the smallest number of frames, it can effectively identify tags when the number of tags is small, without increasing the size of the frame, and when the number of tags is large, the reader will change the size of the frame to reduce the collision probability.
In another implementation of the DFSA algorithm, a read cycle is started with an initial frame size, if no tag was identified in the previous read cycle, the frame size is increased to start another read cycle, the process is repeated until at least one tag is identified, and if one tag is identified, the current read cycle is immediately stopped and another tag with the initial minimum frame size is started to be read.
Referring to fig. 2, fig. 2 is a working schematic diagram of the identification device of the classified carrier sorting system of the present invention;
as shown in fig. 2, the control device may communicate with the identification device to send commands to the identification device and to respond to information transmitted by the identification device.
It should be understood that an encoding/decoding unit may be included in the identification device, which may be used to encode transmitted data and decode received data.
It is understood that the identification device may further include a command unit, and the command unit may be configured to process a command received by the identification device and data sent by the identification device.
It should be understood that the identification device may further include a logical memory unit, and the logical memory unit may be configured to store information or commands for logically controlling each function of the identification device, such as tag read/write commands and mapping rules. The command unit can apply the tag read-write command and the mapping rule to the RFID tag read-write of the identification device by reading the logic memory.
It will be appreciated that the identification device may further comprise a data protocol processor, and the data protocol processor may process some data protocols required in the functional operation of the identification device.
It should be understood that the identification device may further include an RF channel and a physical reader, the RF channel may be used to generate a radio frequency signal, and the physical reader may encrypt data and transmit the data to the RFID tag through the antenna, and decrypt the data returned by the RFID tag based on the antenna and transmit the decrypted data back to the control device.
The control equipment is further used for generating a sorting instruction according to the identification signal and sending the sorting instruction to the sorting equipment;
and the sorting equipment is used for sorting the confidential carriers according to the sorting instruction when receiving the sorting instruction.
It should be noted that the above-mentioned sorting device is a device which is placed between the conveying device and the sorting channel and is used for conveying the confidential carriers to the sorting channel, and a plurality of sorting devices may be provided in the confidential carrier sorting system.
It can be understood that a plurality of sorting channels are arranged in the secret-related carrier sorting system, each sorting channel corresponds to a class of secret-related carriers, and the control device can generate sorting instructions according to the identification signals and the operating parameter information of the sorting devices, and transmit the sorting instructions to the corresponding sorting devices so that the secret-related carriers can be sorted into the sorting channels consistent with the secret-related classes of the secret-related carriers.
In a specific implementation, the control equipment generates a sorting instruction according to the identification signal and sends the sorting instruction to the sorting equipment; and when the sorting equipment receives the sorting instruction, sorting the classified carriers according to the sorting instruction.
As shown in fig. 3, fig. 3 is a schematic view of the operation flow of the identification device of the classified carrier sorting system according to the present invention;
when the identification equipment of the classified carrier sorting system starts to work, the RFID protocol of communication between the RFID reader and the RFID label is firstly identified; calculating the protocol execution time of different quantities of RFID readers and RFID labels; and then identifying the RFID label stuck on the secret-related carrier, acquiring identification information, inquiring the server according to the identification information, generating a sorting instruction according to the inquired data, and finally sending the instruction to sorting equipment to finish the reading of the RFID label.
In the embodiment, the RFID technology is applied to the management of the confidential carrier, the RFID label pasted on the confidential carrier is read through the identification equipment, and the read generated identification signal is sent to the control equipment; the control equipment generates a sorting instruction according to the identification signal and sends the sorting instruction to the sorting equipment; when the sorting equipment receives the sorting instruction, the confidential carriers are sorted according to the sorting instruction, and the confidential carriers are sorted through the confidential carrier sorting system, so that the informatization management degree in the management of the confidential carriers is improved, the human interference factors are reduced, the management dead angles of the confidential carriers are reduced, and the management safety is improved.
Referring to fig. 4, fig. 4 is a schematic diagram of the operation of the secret carrier sorting system of the present invention.
As shown in fig. 4, when the classified carrier sorting system starts to work, the identification device first identifies a frame generated by the length iteration of the fuzzy dynamic frame based on the RFID tag anti-collision protocol, and if the RFID tag is identified, the control device can generate a sorting instruction according to the identification signal of the RFID tag; when a sorting instruction exists, the control equipment sends the sorting instruction to corresponding sorting equipment, so that the secret-related carriers are sorted; if no sorting instruction exists, other frames are continuously identified through the identification module.
Based on the first embodiment of the secret-related carrier sorting system of the present invention, a second embodiment of the secret-related carrier sorting system of the present invention is provided.
The DFSA algorithm is inefficient to use in the case of large frames that encounter many collisions, as the algorithm reader must wait for the frame length to be updated again when the frame is completed and calculate the frame length L at each time slot of the frame, increasing the frame identification time and possibly overloading the resource limited system.
In order to reduce the reading time of the sensor tags of the large-range tags, the embodiment provides a fuzzy dynamic frame slotted ALOHA algorithm (FFSA algorithm) as an anti-collision protocol of the identification device, so that the reading time of the sensor tags of the large-range tags is remarkably reduced, the high-efficiency and accurate identification of the secret-related carriers can be realized, the dynamic information of the secret-related carriers can be timely grasped, and the scientific, high-efficiency and safe management of the secret-related carriers is realized. And reading the RFID label by taking the FFSA algorithm as an anti-collision protocol of the identification device. The steps of the FFSA algorithm may be divided into three parts: the frame length calculation, the frame length check and the frame interrupt condition may specifically include:
the identification device is also used for selecting the frame length of the current frame based on fuzzy logic, and the identification device reads the RFID label by taking the frame as a unit;
the identification device is further used for calculating the frame length of the current frame according to the estimated number of the RFID tags in the current reading area and the time slot duration.
It should be explained that the fuzzy logic is a mental logic way for simulating the uncertainty concept judgment and reasoning of human brain. For a description system with unknown or uncertain models and a control object with strong nonlinearity and large hysteresis, a fuzzy set and a fuzzy rule can be applied to carry out reasoning, transient boundary or qualitative knowledge experience is expressed, a human brain mode is simulated, fuzzy comprehensive judgment is carried out, and the problem of regular fuzzy information which is difficult to solve by a conventional method is solved by reasoning.
It should be noted that the FFSA algorithm divides time into a plurality of discrete time slots, and the RFID tag can only transmit data at the beginning of each time slot.
It should be understood that in the present embodiment, iterative values of frame lengths are selected by fuzzy logic, that is, the frame length of the current frame and the frame length of the next frame are both uncertain, and the frame lengths of the current frame and the next frame may be calculated according to the estimated number of RFID tags and the time slot duration in the current reading region.
It should be noted that the time slot is a basic unit constituting a physical channel, a frame may include a plurality of time slots, and the RFID tag may transmit data only at the beginning of each time slot, so the time slots in the frame may be classified into three types, one type is an idle time slot in an idle state, one type is a single time slot in which only one tag is read, and the other type is a collision time slot in a tag collision state.
In a specific implementation, the identification device selects a frame length of the current frame based on fuzzy logic and calculates the frame length of the current frame according to the estimated number of RFID tags and the time slot duration in the current reading region.
In one implementation, the operation of the identification device selecting a frame length of a current frame based on fuzzy logic and calculating the frame length of the current frame according to the estimated number of RFID tags and the time slot duration in the current reading region includes:
the identification device is also used for acquiring time slot duration, reader command duration and RFID tag message duration;
the identification device is further configured to obtain the number of time slots of the current frame;
the identification device is further configured to calculate a frame length of the current frame according to the number of time slots, the time slot duration, the reader command duration, and the RFID tag message duration.
It should be explained that n tags have an expected time t for reading a sensor data packet when the frame length is L R The expression of (R, L) calculation is shown in the following formula (1):
Figure SMS_1
(1)
wherein the duration T of the idle time slot s Duration of a single time slot T p And duration T of the conflicting slot k Each can be calculated by the formula shown below:
Figure SMS_2
Figure SMS_3
Figure SMS_4
wherein, T command Is the duration of the read command, T QA 、T QC 、T QR 、T ACK 、T reqRN 、T Read Duration of reader commands qa, qc, qr, ack, reqRN, and read, respectively; t is a unit of 1 、T 2 And T 3 Is the duration of time between the reader command and the tag response, which separates the reader command and the tag response; t is EPC 、T RN6 、T handle 、T data Duration corresponding to EPC, RN16, handle and data tag messages, respectively; the identification device may calculate the duration of the idle slot, the duration of the single slot, and the duration of the collision slot by obtaining the above-mentioned reader command duration and the duration in between the reader command and the tag response.
It should be noted that, since the tags are approximately binomial distributed in the time slot, the probability of r tags in a given time slot is shown by the following formula:
Figure SMS_5
respectively calculating the number c of idle time slots, single time slots and conflict time slots in a frame i 、c s And c k The formula of the calculation is as follows:
Figure SMS_6
Figure SMS_7
Figure SMS_8
c above i 、c s And c k Substitute intoThe following formula (1) can be derived as shown below:
Figure SMS_9
wherein the content of the first and second substances,
Figure SMS_10
n is total number of labels, rho is unit frame length, and t is R The derivation of (ρ) from ρ can be derived as follows:
Figure SMS_11
in combination with the following formula
Figure SMS_12
Equation (2) can be derived:
Figure SMS_13
(2)
then, the formula shown below can be obtained by carrying out degenerate calculation according to the lambert-W function:
Figure SMS_14
and calculating the label estimator by calculating Minimum Mean Square Error (MMSE)
Figure SMS_15
And finally estimating quantity according to rho and label
Figure SMS_16
And calculating to obtain the frame length L.
The minimum mean square error is calculated as follows:
Figure SMS_17
in a specific implementation, the identification device may obtain the time slot saving time, the reader command duration and the RFID tag message duration to calculate the frame length of the current frame.
The identification device is further configured to check the time slot of the current frame according to the length of the current frame, and generate a current frame interrupt condition.
It should be noted that the time slot in the frame may be divided into three parts, and the time slot of the frame is checked according to the frame length, and whether to interrupt switching from the current frame to the next frame may be determined according to the time slot of the current frame and the time slot of the next frame.
It should be explained that after generating the interrupt current frame condition, the identification device may determine whether to read the new frame according to the interrupt current frame condition.
It should be noted that, the Pointer by Pointer (PbP) algorithm defines some specific time slots in the frame (the time slot p < the frame length L), and the identification device can check the appropriateness of the time slot through the frame length L, so that the operation of interrupting the current frame is more flexible, and the lower computational complexity in the identification device is maintained.
In a particular implementation, the identification device checks the time slots of the frame according to the frame length and generates the current frame condition.
Further, the identification device is further configured to determine whether to read a new frame according to the current frame interruption condition.
It will be appreciated that when the interrupt current frame condition is fulfilled, the current frame is interrupted and a new frame is read.
In one implementation, the identifying device is further configured to calculate a first expected average time for a single sensor data packet of a current frame;
the identification device is further configured to calculate a second expected average time for a single sensor data packet of a new frame;
the identification device is further configured to interrupt a current frame and start a new frame when the first expected average time is less than the second expected average time;
the identifying device is further configured to continue the current frame when the first expected average time is greater than the second expected average time.
In the present frame L, the current frame L is c In the method, a first expected average time t for reading a sensor data packet in n sensor tags can be calculated Rc (ii) a In the new frame L n In the method, a second expected average time t for reading a sensor data packet in the n sensor tags can be calculated Rn The calculation formula is as follows:
Figure SMS_18
Figure SMS_19
in order to reduce the tag sensor data reading time, if the condition t is satisfied Rc <t Rn Then the current frame can be interrupted to start a new frame; if not, the current frame is continuously executed.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating an operation flow of an RFID reader of the secret-related carrier sorting system according to the present invention;
it should be noted that the classified carrier sorting system of the invention reads the label of the RFID reader by the fuzzy dynamic frame time slot algorithm, when the RFID reader reads the current frame, the initial value is substituted first, and the number c of the idle time slot, the single time slot and the conflict time slot is updated i 、c s And c k Reading the slot _ index value again, and judging the length L of the slot _ index and the current frame c Whether the time slots are the same or not, and judging the number C of the conflict time slots when the time slots are the same k Whether the time slot number is 0 or not, if not, calculating the minimum mean square error of the time slot number; and if the number of the conflict time slots is zero, finishing reading the current frame.
The method for calculating the minimum mean square error of the time slot number comprises the following steps:
Figure SMS_20
it should be explained that slot _ index is the total number of slots (slots).
Calculating the next frame L at the minimum mean square error according to the number of time slots n The frame length of (2) is calculated by the following formula:
Figure SMS_21
Figure SMS_22
and then, updating the frame length of the current frame according to the frame length of the next frame, so as to read the current frame again, namely:
L c =L n
further, if the slot _ index value is different from the frame length of the current frame, the ratio col _ rate of the total number of slots occupied by a single slot in the current frame is calculated, and the calculation method is as follows:
Figure SMS_23
and after the total number of the time slots is increased step by step, the first expected average time T is judged Rc Whether or not it is less than the second expected average time t Rn If the first expected average time is longer than the second expected average time, the current frame is finished and a new frame is started.
Further, if the first expected average time is less than the second expected average time, calculating a relay time slot p of a current frame and a frame length of a next frame, wherein the calculating method comprises the following steps:
Figure SMS_24
and then, iterating the frame length of the current frame according to the relay time slot and the frame length of the next frame, and reading the current frame again.
The identification equipment of the embodiment selects the frame length of the current frame based on fuzzy logic, and calculates the frame length of the current frame according to the estimated number of RFID tags and the time slot duration in the current reading area; the time slot of the frame is checked according to the frame length, and the condition for interrupting the current frame is generated. The frame length is selected through fuzzy logic, the calculation complexity is reduced through frame length calculation, frame length check and frame interrupt conditions, the time for reading the RFID tag is shortened, and scientific, efficient and safe management of the secret-related carrier is realized.
In addition, an embodiment of the present invention further provides a secret carrier sorting method, where the method is applied to the secret carrier sorting system described above, and the system includes: control equipment, conveying equipment, identification equipment and sorting equipment.
Referring to fig. 6, fig. 6 is a schematic flow chart of a first embodiment of a method for sorting classified carriers according to the present invention.
As shown in fig. 6, the method for sorting classified carriers includes:
step S10: and the identification equipment reads the RFID label pasted on the secret-related carrier and sends the identification signal generated by reading to the control equipment.
It should be understood that the above-mentioned transmission device may be used to transmit the secret carrier to which the RFID tag is attached, and when the secret carrier is transmitted into the identification area of the identification device, the identification device may read the RFID tag on the secret carrier to generate an identification signal and transmit the identification signal to the control device.
It should be noted that, a plurality of RFID readers may be included in the identification device, and the RFID readers may use and employ passive uhf RFID sensing. An RFID system can be formed by an RFID reader and an RFID tag, into which different types of sensors can be integrated.
It should be understood that the sensor in the RFID tag may collect environmental data around the RFID tag, and when the RFID tag receives a radio frequency signal sent by the identification device, the classified category of the RFID tag and the environmental data may be returned to the identification device as an identification signal, and when the identification device receives the identification signal, the identification signal may be sent to the control device.
It can be understood that the control device is in communication connection with the conveying device, the identification device and the sorting device respectively, and the connection mode may be a wireless connection, or other connection modes, which is not limited in this embodiment; the control equipment can be used for comprehensively controlling each equipment in the secret-related carrier sorting system, controlling the conveying equipment to convey the secret-related carriers, generating corresponding powder simple and straight commands based on the identification signals and the operation parameter information of the conveying equipment, and sending sorting instructions to the corresponding sorting equipment. The control device may be a terminal device, such as a computer, capable of performing functions such as data analysis and signal processing, and the present embodiment is not limited thereto.
It should be noted that the manner of generating the identification signal may be to upload the identification signal generated by the RFID tag read from the confidential carrier to a server or an upper computer, and determine the category of the confidential carrier by the server or the upper computer so as to select a corresponding sorting channel.
The RFID tag reading device comprises an RFID tag reading device, a control device and a recognition device, wherein the RFID tag reading device is used for reading the RFID tag, the recognition device is used for reading the RFID tag, and the recognition device is used for reading the RFID tag and sending the RFID tag to the control device.
In a specific implementation, the identification device reads the RFID tag attached to the secret carrier and sends an identification signal generated by reading to the control device.
In practical applications, since there may be a plurality of tags within the identification range of the identification device, when the secret carrier sorting system is in operation, when two or more RFID tags simultaneously transmit data to the identification device within the range of action of the same reader, signal interference occurs, which is called collision. In order to reduce the number of collisions with other tags within the identification area of the identification device, a fast collision-prevention protocol needs to be provided in the tags.
RFID tag reading and processing is performed, for example, using a DFSA algorithm (dynamic frame slotted ALOHA algorithm), which can use the number of free slots, collision slots, and single slots to determine the frame size. When the number of the time slots with conflicts exceeds an online threshold, the identification equipment increases the size of the frame; if the collision probability is less than the lower threshold, the identifying device may decrease the size of the frame. Since the identification device starts the reading cycle with the smallest frame, it can effectively identify the tag when the number of tags is small without increasing the size of the frame, and when the number of tags is large, the reader changes the size of the frame to reduce the collision probability.
In another implementation of the DFSA algorithm, a read cycle is started with an initial frame size, if no tag was identified in the previous read cycle, the frame size is increased to start another read cycle, the process is repeated until at least one tag is identified, and if one tag is identified, the current read cycle is immediately stopped and another tag with the initial minimum frame size is started to be read.
Step S20: the control equipment generates a sorting instruction according to the identification signal and sends the sorting instruction to the sorting equipment;
step S30: and when the sorting equipment receives the sorting instruction, sorting the confidential carriers according to the sorting instruction.
It should be noted that the above-mentioned sorting device is a device which is placed between the conveying device and the sorting channel and is used for conveying the confidential carriers to the sorting channel, and a plurality of sorting devices may be provided in the confidential carrier sorting system.
It can be understood that a plurality of sorting channels are arranged in the secret carrier sorting system, each sorting channel corresponds to a class of secret carriers, and the control device can generate a sorting instruction according to the identification signal and the operating parameter information of the sorting device, and transmit the sorting instruction to the corresponding sorting device so that the secret carriers can be sorted into the sorting channels consistent with the secret classes of the secret carriers.
In a specific implementation, the control equipment generates a sorting instruction according to the identification signal and sends the sorting instruction to the sorting equipment; and when the sorting equipment receives the sorting instruction, sorting the classified carriers according to the sorting instruction.
When the identification equipment of the classified carrier sorting system starts to work, the RFID protocol for communication between the RFID reader and the RFID tag is firstly identified; calculating the protocol execution time of different quantities of RFID readers and RFID labels; and then identifying the RFID label stuck on the secret-related carrier, acquiring identification information, inquiring the server according to the identification information, generating a sorting instruction according to the inquired data, and finally sending the instruction to sorting equipment to finish the reading of the RFID label.
In the embodiment, the RFID technology is applied to the management of the confidential carrier, the RFID label pasted on the confidential carrier is read through the identification equipment, and the read generated identification signal is sent to the control equipment; the control equipment generates a sorting instruction according to the identification signal and sends the sorting instruction to the sorting equipment; when the sorting equipment receives the sorting instruction, the confidential carriers are sorted according to the sorting instruction, and the confidential carriers are sorted through the confidential carrier sorting system, so that the informatization management degree in the management of the confidential carriers is improved, the human interference factors are reduced, the management dead angles of the confidential carriers are reduced, and the management safety is improved.
Referring to fig. 7, fig. 7 is a schematic flow chart of a second embodiment of the method for sorting classified carriers of the present invention.
As shown in fig. 7, the step of reading the RFID tag attached to the secret carrier by the identification device includes:
step S11: the identification device is also used for selecting the frame length of the current information frame based on fuzzy logic, and the identification device reads the RFID label by taking the information frame as a period;
step S12: and the identification equipment calculates the frame length of the current information frame according to the estimated number of the RFID labels in the current reading area and the duration of the time slot.
It should be noted that the DFSA algorithm reader is inefficient to use in case of large frames encountering many collisions, since it has to wait for the frame length to be updated again when the frame is completed and calculate the frame length L at each time slot of the frame, increasing the frame identification time and possibly overloading the resource limited system.
In order to reduce the reading time of the sensor tags of the large-range tags, the embodiment provides a fuzzy dynamic frame slotted ALOHA algorithm (FFSA algorithm) as an anti-collision protocol of the identification device, so that the reading time of the sensor tags of the large-range tags is remarkably reduced, the high-efficiency and accurate identification of the secret-related carriers can be realized, the dynamic information of the secret-related carriers can be timely grasped, and the scientific, high-efficiency and safe management of the secret-related carriers is realized. And reading the RFID label by taking the FFSA algorithm as an anti-collision protocol of the identification device.
It should be explained that the steps of the FFSA algorithm can be divided into three parts: frame length calculation, frame length check and frame interrupt conditions.
It should be explained that the fuzzy logic is a mental logic way for simulating the uncertainty concept judgment and reasoning of human brain. For a description system with unknown or uncertain model and a control object with strong nonlinearity and large hysteresis, a fuzzy set and a fuzzy rule can be applied to carry out reasoning, express transitional boundaries or qualitative knowledge experience, simulate a human brain mode, carry out fuzzy comprehensive judgment and solve the problem of fuzzy information of rule type which is difficult to solve by a conventional method.
It should be noted that the FFSA algorithm divides time into a plurality of discrete time slots, and the RFID tag can only transmit data at the beginning of each time slot.
It should be understood that in the present embodiment, iterative values of frame lengths are selected by fuzzy logic, that is, the frame length of the current frame and the frame length of the next frame are both uncertain, and the frame lengths of the current frame and the next frame may be calculated according to the estimated number of RFID tags and the time slot duration in the current reading region.
It should be noted that the time slot is a basic unit constituting a physical channel, a frame may include a plurality of time slots, and the RFID tag may transmit data only at the beginning of each time slot, so the time slots in the frame may be classified into three types, one type is an idle time slot in an idle state, one type is a single time slot in which only one tag is read, and the other type is a collision time slot in a tag collision state.
In a specific implementation, the identification device selects a frame length of the current frame based on fuzzy logic and calculates the frame length of the current frame according to the estimated number of RFID tags and the time slot duration in the current reading region.
In one implementation manner, the step of calculating, by the identification device, a frame length of the current information frame according to the estimated number of RFID tags in the current reading area and the duration of the time slot includes:
the identification equipment acquires time slot duration, reader command duration and RFID tag message duration;
the identification equipment acquires the time slot number of the time slot;
and the identification equipment calculates the frame length of the current information frame according to the time slot number, the time slot duration, the reader command duration and the RFID label message duration.
It should be explained that n tags have an expected time t for reading a sensor data packet when the frame length is L R The expression calculated by (R, L) is shown in the following formula (1):
Figure SMS_25
(1)
wherein the duration T of the idle time slot s Duration of a single time slot T p And duration T of the conflicting slot k Each can be calculated by the formula shown below:
Figure SMS_26
Figure SMS_27
Figure SMS_28
wherein, T command Is the duration of the read command, T QA 、T QC 、T QR 、T ACK 、T reqRN 、T Read Are respectively readersDuration of commands qa, qc, qr, ack, reqRN, and read; t is a unit of 1 、T 2 And T 3 Is the duration of time between the reader command and the tag response, which separates the reader command and the tag response; t is EPC 、T RN6 、T handle 、T data Duration corresponding to EPC, RN16, handle and data tag messages, respectively; the identification device may calculate the duration of the idle slot, the duration of the single slot, and the duration of the collision slot by obtaining the above-mentioned reader command duration and the duration in between the reader command and the tag response.
It should be noted that, since the tags approximate binomial distribution in the time slot, the probability of r tags in a given time slot is shown as the following formula:
Figure SMS_29
respectively calculating the number c of idle time slots, single time slots and conflict time slots in a frame i 、c s And c k The formula of the calculation is as follows:
Figure SMS_30
Figure SMS_31
Figure SMS_32
c above i 、c s And c k Substituting the above equation (1) can derive the following equation:
Figure SMS_33
wherein the content of the first and second substances,
Figure SMS_34
n is total number of labels, rho is unit frame length, and t is R The derivation of (ρ) from ρ can be derived as follows:
Figure SMS_35
the combination formula:
Figure SMS_36
equation (2) can be obtained
Figure SMS_37
(2)
Then, the formula shown in the following can be obtained by carrying out degenerated calculation according to the lambert W function:
Figure SMS_38
and calculating the tag estimator by calculating Minimum Mean Square Error (MMSE)
Figure SMS_39
And finally estimating quantity according to rho and label
Figure SMS_40
And calculating to obtain the frame length L.
The minimum mean square error is calculated as follows:
Figure SMS_41
in a specific implementation, the identification device may obtain the slot saving time, the reader command duration, and the RFID tag message duration to calculate the frame length of the current frame.
Step S13: and the identification equipment checks the time slot of the information frame according to the frame length and generates a condition for interrupting the current information frame.
It should be noted that the time slot in the frame can be divided into three parts, and the time slot of the frame is checked according to the frame length, and whether to interrupt the switching from the current frame to the next frame can be judged according to the time slot of the current frame and the time slot of the next frame.
It should be explained that, after generating the current frame interruption condition, the identification device may determine whether to read a new frame according to the current frame interruption condition.
It should be noted that, the Pointer by Pointer (PbP) algorithm defines some specific time slots in the frame (time slot p < frame length L), and the identification device can check the appropriateness of the time slots by the frame length L, so that the operation of interrupting the current frame is more flexible, and the lower computational complexity in the identification device is maintained.
In a particular implementation, the identification device checks the time slots of the frame according to the frame length and generates the current frame condition.
Further, the identification device is further configured to determine whether to read a new frame according to the current frame interruption condition.
It will be appreciated that when the interrupt current frame condition is fulfilled, the current frame is interrupted and a new frame is read.
In one implementation manner, the step of determining, by the identification device, whether to read the new frame according to the frame lengths and the time slots of the current frame and the new frame includes:
the identification device calculates a first expected average time for a single sensor data packet of a current frame;
the identification device calculating a second expected average time for a single sensor data packet of a new frame;
the identification device interrupts a current frame and starts a new frame when the first expected average time is less than the second expected average time;
the identifying device continues with the current frame when the first expected average time is greater than the second expected average time.
In the present frame L, the current frame L is c In the method, a first expected average time t for reading a sensor data packet from the n sensor tags can be calculated Rc (ii) a In the new frame L n In the method, a second expected average time t for reading a sensor data packet in the n sensor tags can be calculated Rn The calculation formula is as follows:
Figure SMS_42
Figure SMS_43
in order to reduce the tag sensor data reading time, if the condition t is satisfied Rc <t Rn Then the current frame can be interrupted to start a new frame; if not, the current frame is continuously executed.
The identification equipment of the embodiment selects the frame length of the current frame based on fuzzy logic, and calculates the frame length of the current frame according to the estimated number of RFID tags and the time slot duration in the current reading area; the time slot of the frame is checked according to the frame length, and the condition for interrupting the current frame is generated. The frame length is selected through fuzzy logic, the calculation complexity is reduced through frame length calculation, frame length check and frame interrupt conditions, the time for reading the RFID tag is shortened, and scientific, efficient and safe management of the secret-related carrier is realized.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., a rom/ram, a magnetic disk, an optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A secret-related carrier sorting system, the system comprising: the device comprises an identification device, a control device and a sorting device;
the identification equipment is used for reading the RFID label adhered to the confidential carrier and sending a read and generated identification signal to the control equipment;
the control equipment is further used for generating a sorting instruction according to the identification signal and sending the sorting instruction to the sorting equipment;
and the sorting equipment is used for sorting the confidential carriers according to the sorting instruction when the sorting instruction is received.
2. The secret carrier sorting system according to claim 1, wherein the identification device is further configured to select a frame length of a current frame based on fuzzy logic, and the identification device performs RFID tag reading in units of frames;
the identification equipment is also used for calculating the frame length of the current frame according to the estimated RFID label quantity and the time slot duration in the current reading area;
the identification device is further configured to check the time slot of the current frame according to the length of the current frame, and generate a current frame interrupt condition.
3. The secret-related carrier sorting system of claim 2, wherein the identification device is further configured to obtain a time slot duration, a reader command duration, and an RFID tag message duration;
the identification device is further configured to obtain the number of time slots of the current frame;
the identification device is further configured to calculate a frame length of the current frame according to the number of time slots, the time slot duration, the reader command duration, and the RFID tag message duration.
4. The secret carrier sorting system of claim 3, wherein the identification device is further configured to determine whether to read a new frame according to the condition of interrupting the current frame.
5. The secret carrier sorting system of claim 4, wherein the identification device is further configured to calculate a first expected average time for a single sensor data packet of a current frame;
the identification device is further configured to calculate a second expected average time for a single sensor data packet of a new frame;
the identification device is further configured to interrupt a current frame and start a new frame when the first expected average time is less than the second expected average time;
the identifying device is further configured to continue the current frame when the first expected average time is greater than the second expected average time.
6. A secret-related carrier sorting method is applied to a secret-related carrier sorting system based on RFID, and the system comprises: the device comprises a control device, an identification device and a sorting device; the method comprises the following steps:
the identification equipment reads the RFID label pasted on the secret-related carrier and sends a read generated identification signal to the control equipment;
the control equipment generates a sorting instruction according to the identification signal and sends the sorting instruction to the sorting equipment;
and when the sorting equipment receives the sorting instruction, sorting the confidential carriers according to the sorting instruction.
7. The method for sorting confidential carriers according to claim 6, wherein the step of reading the RFID tag attached to the confidential carrier by the identification device includes:
the identification device is also used for selecting the frame length of the current frame based on fuzzy logic, and the identification device reads the RFID label by taking the frame as a period;
the identification equipment calculates the frame length of the current frame according to the estimated number of the RFID tags in the current reading area and the time slot duration;
and the identification equipment checks the time slot of the current frame according to the length of the current frame and generates a current frame interruption condition.
8. The secret carrier sorting method according to claim 7, wherein the step of calculating, by the identification device, the frame length of the current frame according to the estimated number of RFID tags in the current reading area and the duration of the time slot includes:
the identification equipment acquires time slot duration, reader command duration and RFID tag message duration;
the identification equipment acquires the time slot number of the time slot;
and the identification equipment calculates the frame length of the current frame according to the time slot number, the time slot duration, the reader command duration and the RFID label message duration.
9. The method for sorting secret carriers according to claim 8, wherein the step of checking the time slot of the current frame according to the length of the current frame and generating a condition for interrupting the current frame by the identification device further comprises:
and the identification equipment judges whether to read a new frame according to the current frame interruption condition.
10. The method for sorting classified carriers according to claim 9, wherein the step of determining whether to read a new frame by the identification device according to the frame length and the time slot of the current frame and the new frame comprises:
the identification device calculates a first expected average time for a single sensor data packet of a current frame;
the identification device calculating a second expected average time for a single sensor data packet of a new frame;
the identification device interrupts the current frame and starts reading a new frame when the first expected average time is less than the second expected average time;
the identification device continues to read the current frame when the first expected average time is greater than the second expected average time.
CN202310079444.8A 2023-02-08 2023-02-08 Secret-related carrier sorting system and method Pending CN115780278A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310079444.8A CN115780278A (en) 2023-02-08 2023-02-08 Secret-related carrier sorting system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310079444.8A CN115780278A (en) 2023-02-08 2023-02-08 Secret-related carrier sorting system and method

Publications (1)

Publication Number Publication Date
CN115780278A true CN115780278A (en) 2023-03-14

Family

ID=85430454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310079444.8A Pending CN115780278A (en) 2023-02-08 2023-02-08 Secret-related carrier sorting system and method

Country Status (1)

Country Link
CN (1) CN115780278A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080150674A1 (en) * 2006-12-21 2008-06-26 Sungkyunkwan University Foundation For Corporate Collaboration System for tag estimation and anti-collision and method thereof
CN101286192A (en) * 2008-06-05 2008-10-15 复旦大学 Time slot ALOHA anticollision algorithm suitable for dynamic environment
CN102630091A (en) * 2012-03-02 2012-08-08 浙江工商大学 Anti-collision method based on ultrahigh frequency radio frequency identification (RFID) system
CN107506676A (en) * 2017-08-22 2017-12-22 哈尔滨工程大学 A kind of RFID anti-collision method estimated based on dynamic detection point and label
CN108280377A (en) * 2018-02-10 2018-07-13 沈阳理工大学 The anticollision method for reading ID of multi-tag in goods and materials Warehouse Management System
CN210125565U (en) * 2019-04-03 2020-03-06 瑞达保密(青岛)有限公司 Automatic sorting system for secret-related carriers
KR20210067661A (en) * 2019-11-29 2021-06-08 한남대학교 산학협력단 Automatic home delivery sorter using line tracer and RFID
CN213670533U (en) * 2020-10-19 2021-07-13 上海东普信息科技有限公司 Sorting system based on RFID

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080150674A1 (en) * 2006-12-21 2008-06-26 Sungkyunkwan University Foundation For Corporate Collaboration System for tag estimation and anti-collision and method thereof
CN101286192A (en) * 2008-06-05 2008-10-15 复旦大学 Time slot ALOHA anticollision algorithm suitable for dynamic environment
CN102630091A (en) * 2012-03-02 2012-08-08 浙江工商大学 Anti-collision method based on ultrahigh frequency radio frequency identification (RFID) system
CN107506676A (en) * 2017-08-22 2017-12-22 哈尔滨工程大学 A kind of RFID anti-collision method estimated based on dynamic detection point and label
CN108280377A (en) * 2018-02-10 2018-07-13 沈阳理工大学 The anticollision method for reading ID of multi-tag in goods and materials Warehouse Management System
CN210125565U (en) * 2019-04-03 2020-03-06 瑞达保密(青岛)有限公司 Automatic sorting system for secret-related carriers
KR20210067661A (en) * 2019-11-29 2021-06-08 한남대학교 산학협력단 Automatic home delivery sorter using line tracer and RFID
CN213670533U (en) * 2020-10-19 2021-07-13 上海东普信息科技有限公司 Sorting system based on RFID

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
雷英杰等, 西安电子科技大学出版社 *

Similar Documents

Publication Publication Date Title
CN109725616B (en) Intelligent warehouse-based unmanned carrier scheduling method and device
Myung et al. An adaptive memoryless protocol for RFID tag collision arbitration
US7612672B2 (en) Query tree based tag identification method in RFID systems
EP1914659B1 (en) Bi-slot tree based tag identification method in RFID systems
CN109726195B (en) Data enhancement method and device
Chen et al. An efficient and easy-to-implement tag identification algorithm for UHF RFID systems
US11658989B1 (en) Method and device for identifying unknown traffic data based dynamic network environment
CN109446869B (en) Anti-collision method and device for RFID system, computer readable storage medium and equipment
CN102024163A (en) Anti-collision method with packet previewing mechanism
Wu et al. Capture-aware Bayesian RFID tag estimate for large-scale identification
CN111680645B (en) Garbage classification treatment method and device
CN115780278A (en) Secret-related carrier sorting system and method
KR100829794B1 (en) Method of identifying radio frequency tag in rfid system
KR100783682B1 (en) Method for high speed indentifying tag of rfid system
CN104036210A (en) Test method of identifying multi-tag performance by UHF reader
CN112506063B (en) Data analysis method, system, electronic device and storage medium
CN109711222B (en) Radio frequency identification anti-collision performance test method, test instrument and storage medium
KR100956738B1 (en) Apparaus and method that prevent collision of tag in rfid system
CN117057372B (en) Multi-target identification method based on radio frequency identification technology
Chen An efficient RFID anticollision algorithm using early adjustment of frame length
CN117808024B (en) Reader-writer equipment management method and system based on self-adaptive regulation and control
Duan et al. A Dynamic Detection of Missing Tags for Multi-category RFID Systems
Duan et al. An Enhanced Posterior Probability Anti-Collision Algorithm Based on Dynamic Frame Slotted ALOHA for EPCglobal Class1 Gen2.
CN111177596B (en) URL request classification method and device based on LSTM model
Moon et al. Energy Level-based Adaptive Backscatter and Active Communication in Energy-Harvesting Network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20230314

RJ01 Rejection of invention patent application after publication