TWI294595B - Mobile communication terminal having a function of reading out information from contactless type communication tag and method for managing product authentication service - Google Patents

Mobile communication terminal having a function of reading out information from contactless type communication tag and method for managing product authentication service Download PDF

Info

Publication number
TWI294595B
TWI294595B TW93130200A TW93130200A TWI294595B TW I294595 B TWI294595 B TW I294595B TW 93130200 A TW93130200 A TW 93130200A TW 93130200 A TW93130200 A TW 93130200A TW I294595 B TWI294595 B TW I294595B
Authority
TW
Taiwan
Prior art keywords
information
product
tag
key
unit
Prior art date
Application number
TW93130200A
Other languages
Chinese (zh)
Other versions
TW200612351A (en
Inventor
Mi Kyoung Park
Kwang Chul Hyun
Original Assignee
Mi Kyoung Park
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mi Kyoung Park filed Critical Mi Kyoung Park
Priority to TW93130200A priority Critical patent/TWI294595B/en
Publication of TW200612351A publication Critical patent/TW200612351A/en
Application granted granted Critical
Publication of TWI294595B publication Critical patent/TWI294595B/en

Links

Landscapes

  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

1294595 14924pif.doc 九、發明說明: 【發明所屬之技術領域】 本發明是關於-種具有標籤讀取功能的行動通訊心山 θ供真實產品鑑定服務的方法’且特別是有關於能透= 項,和顯示附加在不同品牌產品上的標籤資訊而確定1 的偽並提供關於產品的資訊的行動通訊終端,以及 提供真實產品鑑定服務的方法,其中關於基σ ”戶透過解密儲存在標藏裡的資訊並輸出;密 而得到。 、 【先前技術】 曰本專利申請案早期公開第Hei 14-215749號和第Hei Μ 209692號公開技術,利用電子記錄在標籤上的產品資 訊來識別產品資訊和實現採買、貨品的管理,以非接觸的 模式進行通訊,便攜式標籤讀取器讀出記錄在標籤裡的資 汛。但是,由於這些技術不涉及產品真偽的確定,資訊的 記錄或讀出非常薄弱,有可能有偽造資訊或假造資訊的記 錄0 如另一個習知的途徑,韓國專利第2〇〇2_85144號和日 本專利申請案早期公開第Hei 13-354310號和第Hei 13-341810號公開的網路類型的真偽確定系統,讀出電子 5己錄在非接觸通訊標籤上的產品資訊,透過如網際網路的 通訊網路,參照產品管理數據庫,確定相應產品的真偽。 但疋’為了使用網路類型的系統,在透過有線通訊網與產 品管理數據庫交換數據的情況下,標籤讀取器必須製造成 1294595 14924pif.doc 桌上型電腦(desktop)的形式。結果是,為 偽,必須訪問指定的地點。還有,:透產品的真 α ^ 在透過热線通訊網與產 心理數據庫父換數據的情況下,隨著 取 :加’標籤讀取器變得不方便攜帶,標籤讀取器的 =,母:人用標籤讀取料’用無線通訊網路都要收費。、 U ’標籤讀取器生產成桌上型電腦的形式,由於產品的 二=能在指定的地點確定’所以產品的真偽不能在講買1294595 14924pif.doc IX. Description of the invention: [Technical field to which the invention pertains] The present invention relates to a method for authenticating a product identification service with a tag reading function, and in particular for a transparent product. And a mobile communication terminal that displays the tag information attached to the different brand products and determines the pseudonym and provides information about the product, and a method of providing a real product authentication service, wherein the base σ" is stored in the tag by decryption And the prior art is disclosed in Japanese Patent Application Laid-Open No. Hei 14-215749 and No. Hei 209 692, the use of electronically recorded product information on the label to identify product information and Realize the management of purchase and goods, communicate in a non-contact mode, and the portable tag reader reads the information recorded in the tag. However, since these technologies do not involve the determination of the authenticity of the product, the information is recorded or read very much. Weak, there may be records of forged information or fake information. 0 Another way to know, Korean Patent No. 2 The network type authenticity determining system disclosed in Japanese Patent Application Laid-Open No. Hei 13-354310 and Hei 13-341810 discloses the product information recorded on the non-contact communication tag by the electronic device 5 For example, the communication network of the Internet refers to the product management database to determine the authenticity of the corresponding products. However, in order to use the network type system, in the case of exchanging data with the product management database through the wired communication network, the tag reader must Made in the form of 1294595 14924pif.doc desktop (desktop). The result is that it must be a pseudo-, must visit the designated location. Also,: through the product's true α ^ in the hotline communication network and the psychological database father change data In the case, with the addition: the 'tag reader becomes inconvenient to carry, the tag reader =, the mother: the person uses the tag to read the material 'to use the wireless communication network to charge., U 'tag reading The production is in the form of a desktop computer, because the product's two = can be determined at the designated location, so the authenticity of the product cannot be bought.

Hei n f 一個習,途徑,日本專利申請案早期公開第 _籤读^148號和第Hd 12_14895G號公開的技術,其中 二,取錢過讀ώ電子記錄在賴觸軌韻上的產品 貝,並將讀出的資訊與以前儲存在其中的參考數 =號、生產日期、產品生產品牌名、管理歷史資訊、產品 2 ΐ行比較,來確定產品的真偽。但是,這種離線: 孓抑監定設備解決了網路類型系統的問題,卻由於標籤讀 =态事先必須儲存每樣產品的所有產品資訊,記憶體容量 ^加了。另外,由於標籤讀取器自己確定產品的真偽,只 :供自已確定的結果,用戶不能直接檢查鑑定過程的資 ^二趫定過程的可靠性就低了。換句話說,這個習知的標 予"貝取斋只考慮到產品批發商的角度,沒有滿足產品購買 抑⑧二衣。另外,這個習知的標籤讀取器的問題是:在購 貝心織讀取器後發行的新產品和新加入公司的產品不能確 定出直 ^ ^捣,或者必須更新已經發行的標籤讀取器的產品資 A再有’上述習知的途徑沒有考慮到標籤被從產品上揭 1294595 14924pif.doc 下來貼到偽造的產品上的情形。 命用ίΙΪ決這些問題,韓國專利第2001·89216號,韓國 iii2加冊號252202,和日本專利中請案早期公開第 細ϋ64ί公㈣顧確定設備,包括非接觸通訊標 此直:二,,附在產品上的產品資訊儲存在標籤中。 籤i揭離可以防止標藏的再使用’辦法是’如果標 二原產品,其天線就被損壞。但是,這些習知真偽 石3備的應用僅侷限於特殊的產品,諸如瓶裝產品了並 為了防止標籤的毀壞,可能需要進行事先測量。另外, 身被,:使是生產者也不能讀出標籤的讀 6二隹貝Λ ’不能把標籤的讀取歷史資訊用於消費者傾向 的銷售。 【發明内容】 -i 重能確定產品真偽的行動通訊終端, =巴攸胃通爲籤收到的資訊解密,並輸出解密過的 μ訊。 本發明也提供了-種產品真實鑑定服務的方法,立中 二透_存在標籤裡的資訊解 t本發方面’提供了—種行動軌 =自非=通訊標籤的資訊。行動通訊終端包括第二通 送非接觸通訊減轉的魏;第二通財元,透過= 通訊網向服務管理伺服器發送和接收數據;儲存單元,儲 1294595 14924pif.doc 存至少一個密鑰相關資訊;解密單元,基於密鑰相關資訊, 把從非接觸通訊標籤收到的數據解密,該密鑰相關資'訊是 透過接收自#接觸ϋ訊標籤的密錄說明資訊而從密錄相關 貧訊中選出的,貧訊讀取設備,向附在產品上的非接觸通 訊標籤要求產品資訊,並讀出來自非接觸通訊標籤的產品 資訊;輸出單元,輸出讀出的產品資訊。 在本發明的另-個方面,提供了管理產品鏗定服務的 方^,適用在產品鐘定服務管_服器裡。該產品鑑定服 務管理伺服裔透過網路與行動通訊公司的用戶伺服器通 訊,並可透過行動通訊網與行動通訊終端通訊。該方法包 括:接收讀取細節資訊,包括分發給每個標籤可被讀取的 產品的產品識別號,和從行動通訊終端分發給行動通訊終 端的讀取器識別號;詢問用戶伺服器查詢含在讀取細節資 訊裡基於行動通訊終端的識別號的用戶資訊,並接收來自 用戶伺服器的用戶資訊;創建與儲存客戶管理資訊,包括 ^於讀,細節資訊與用戶資訊的用戶分類資訊與產品資訊 #取細即;回應從外部設備輸入的資訊輪出請求而讀出並 輸出客戶管理資訊。 “為讓本發明之上述和其他目的、特徵和優點能更明顯 易Μ下文特舉較佳實施例,並配合所附圖式,作詳細說 明如下。 【實施方式】 圖1是根據本發明解釋其工作的概觀。 參照圖1,根據本發明,具有標籤讀取功能的行動通 I2945^p,doc 訊終端20-1和20-2,讀出非接觸通訊標籤1(M、1〇·2和 10-3的資訊,顯示讀出的資訊。非接觸通訊標籤丨…丨、^^ 和」0-3附在諸如服裝、鞋類、皮革製品、飲料、農產品 &家畜物品、毒品&藥品、電子產品、機械產品、首飾、 工藝品、估價報告書、入場券、證書、用於設備、錢、銷 售的有彳貝证券、重要文件的票據等的各種產品上。 非接觸通訊標籤1〇-1、1〇-2和ι〇_3是正方形、镇膜 類侧錄標籤,每個寬度和長度是 標籤讀取器安裝在行動通訊終端2〇_丨和2〇-2裡。帶 有行動通訊終端2G_Ma 2G-2的人可以基於行動通訊終端 =1和20-2顯示單元裡顯示的產品資訊、透過將他們的 =通訊終端2(M # 2〇_2 #近產品來確定商標的真偽。 句話說,#個人把他的行騎訊終端靠近—個陌生的飲 枓標籤,如果這個陌生的飲料是真實的,真實產品代碼Hei nf A method of learning, the Japanese patent application, the early publication of the first _ signing ^ 148 and the Hd 12_14895G, the second, the money to read the electronic record on the ray of the product, and The information read is compared with the previously stored reference number = number, production date, product brand name, management history information, and product 2 to determine the authenticity of the product. However, this kind of offline: The depreciation monitoring device solves the problem of the network type system, but since the tag reading state must store all the product information of each product in advance, the memory capacity is increased. In addition, since the tag reader itself determines the authenticity of the product, only the results obtained from the determined results, the reliability of the process in which the user cannot directly check the authentication process is low. In other words, this customary labeling "Bezilianzhai only considers the perspective of the product wholesaler and does not satisfy the product purchase. In addition, the problem with this conventional tag reader is that the new product released after purchasing the Becklace reader and the product added to the company cannot be determined, or the updated tag must be updated. The product A of the device has the above-mentioned conventional approach without considering that the label is attached to the counterfeit product from the product 1294595 14924pif.doc. The use of ί ΙΪ 这些 这些 , , 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 韩国 252 252 252 252 252 Product information attached to the product is stored on the label. Signing out can prevent the reuse of the label. The method is that if the original product is used, its antenna will be damaged. However, the application of these conventional counterfeit stones is limited to special products, such as bottled products, and in order to prevent the destruction of the label, it may be necessary to make a prior measurement. In addition, the body is:, so that the producer can not read the label. 6 隹 隹 ’ ‘ ‘The reading history of the label cannot be used for consumer-oriented sales. [Summary of the Invention] -i The mobile communication terminal that can determine the authenticity of the product, = Ba Shuweitong decrypts the information received by the sign, and outputs the decrypted μ message. The present invention also provides a method for authenticating a service of a product, and the information provided in the label _ the present aspect provides a kind of action track = information from the non-= communication tag. The mobile communication terminal includes the second communication of the non-contact communication reduction; the second communication element transmits and receives data to the service management server through the communication network; the storage unit stores 1294595 14924pif.doc and stores at least one key related information. The decryption unit decrypts the data received from the contactless communication tag based on the key related information, and the key related information is received from the confidential information related to the contact information tag. The selected low-frequency reading device requests product information from the contactless communication tag attached to the product, and reads product information from the contactless communication tag; the output unit outputs the read product information. In another aspect of the present invention, a method for managing a product setting service is provided, which is applicable to a product clock service server. The product identification service management server communicates with the mobile communication company's user server through the network, and can communicate with the mobile communication terminal through the mobile communication network. The method includes receiving read detail information, including a product identification number of a product distributed to each tag that can be read, and a reader identification number distributed from the mobile communication terminal to the mobile communication terminal; querying the user server for querying User information based on the identification number of the mobile communication terminal in reading detailed information, and receiving user information from the user server; creating and storing customer management information, including user classification information and products for reading, detail information and user information The information # is fine; the customer management information is read and output in response to the information rotation request input from the external device. The above and other objects, features, and advantages of the present invention will become more apparent from Overview of the operation. Referring to Fig. 1, according to the present invention, the action-reading I2945^p, doc terminal 20-1 and 20-2 having the tag reading function reads the non-contact communication tag 1 (M, 1 〇·2). And 10-3 information showing the information read. Non-contact communication labels 丨...丨, ^^ and “0-3 are attached to such items as clothing, footwear, leather goods, beverages, agricultural products & livestock items, drugs & Pharmaceuticals, electronic products, mechanical products, jewellery, handicrafts, valuation reports, admission tickets, certificates, various products for equipment, money, sales of mussel securities, important documents, etc. Non-contact communication labels 1〇 -1, 1〇-2 and ι〇_3 are square, film-type side-recording labels, each width and length of the tag reader installed in the mobile communication terminal 2〇_丨 and 2〇-2. The mobile communication terminal 2G_Ma 2G-2 can be based on the mobile communication terminal=1 20-2 Display the product information displayed in the unit, and determine the authenticity of the trademark by using their = communication terminal 2 (M # 2〇_2 #近产品. In other words, #人 put his riding terminal close to - A strange drink label, if this strange drink is real, the real product code

个取叨地讀出產品代碼 行動通訊終端發出短的讀取聲 代碼。還有,行動通 ^音。如果產品代碼 ,可儲存在低容量的 曰,同時顯示輸出單元裡讀出的產品代碼 訊終端可混合輸出讀出的產品代碼和語音 限於一個數字的話,語音數據量不大,二 1294595 14924pif.doc ;=。進而’還可以用一 種6況下,只要在直奋 个八衣座tm代碼。這 籍的逢〇 μ 4 一只產σ口上標記顏色碼’打印在貼右柄 戴的產〇 口上。標籤讀取器從 Ρ在貼有軚 發光二極體(LED)的η/Β “人喝出顏色碼’透過多個 根據讀出的顏色碼,合^示讀出的結果,例如, 法標籤時,行動通訊終端可;二色:當檢測到有非 誤消息來表示偽造標籤或壞標鐵。&的涵色棋式輪出錯 示單=會二在行動通訊終端的顯 ==續地顯===終: 織的產品都有表格,寫有對應於產品標籤每產= 標籤讀取器靠近—個標籤,多個產品代碼按= 的二根據本發明,具有標籤讀取功能 ΤΗσ 基於弟—個表一產品類型表的 H可識別出這是-種飲料類產品。其次,按預 j隔顯示數據‘0014,,基於列印在產品上的另一個表 -商標表的項目,識別出此產品的商標是‘Valentine,。 然後,按預定的時間間隔顯示數據‘0017,,基於列印在 產叩上的又-個表—老化年齡表的項目,可識別出此產品 的新舊是‘17年,。 根據本發明的行動通訊終端204和2〇_2可把從標籤 讀出的資訊讀取細節透過行動通訊網,發送到真實產^鑑 1294595 14924pif.doc 定服務管理伺服器40 (以下,稱作服務管理伺服器4〇)。 ‘ 貧訊讀取細節包括··分發給每個標籤可讀取的產品的產品 識別號,和分發給每個行動通訊終端2〇-1和2〇_2的讀取 · 态識別號。資買取細節也包括真實產品詳細鑑定資訊, 如產業類型、生產商、品牌、等級、式樣名、生產中心、 生產日期、序列唬、價格與鑑定日期。資訊讀取細節還可 包括已鏗定真偽的產品中已售出產品的有關購買資訊。購 買資訊除了真實產品詳細鑑定資訊之外,可包括購買價 格、購買日期與時間。 、、攀 在收到來自行動通訊終端2〇-1和20-2的讀取細節資 訊(+步驟①和②)後,服務管理伺服器4〇可把含在接收到 的讀取細節資訊裡的行動通訊終端2(M和2〇_2的識別資 訊提交給行動通訊公司的用戶伺服器3〇(步驟③),而得 到相應用戶的個人資訊。透過利用服務管理伺服器4〇的這 種功能,批發商可進行更精確的客戶管理。換句話說,諸 =用戶的性別、年紀、位址、學術成就、工作與愛好等的 徉細個人貧訊由行動通訊公司儲存在用戶伺服器3〇裡。服鲁 務管理伺服器40可透過收集接收的讀取細節資訊和這些 用戶資訊,分析指定年齡人群的購買傾向,有指定工作的 人群的購買傾向或產品偏好。這些資訊可提供給其產品被 龜定為真實的生產商,作為市場資訊。服務管理祠服器 把收集的貧訊儲存為客戶管理資訊,生成報告,根據產品 被鑑定為真實的生產商或鑑定服務管理公司的請求,輸出 此報告。另外,服務管理伺服器4〇有時也生成此報告,並 11 1294595 14924pif.doc 把匕發送給品牌擁有者伺服器5〇,透過網路與之通訊(步、 ‘④)。這種生成市場報告的技術在此領域眾 不再詳述。 礼 這種資訊的收集可在採買完成後或真實產品鑑定後, 有規律或無規律地由用戶操作手動進行。透過在行動通訊 =端裡安裝指定的應用程式,這種上傳過程可在用戶沒注 意到^時進行。指定的應用程式監控累積資訊的總量和通 訊狀態,在語音通訊或數據通訊期間,把指定的數據通道 分發給指定的應用程式,指定的應用程式發送累積的讀取⑩ 細節資訊。還有’指定的應用程式監控累射訊的總量, 如,累積資訊的總量達到預定量’指定的應用程式把累積 的資訊以純文字形式發給服務伺服器。 服務管理飼服器40可進一步包括‘積分點,資訊作 為用戶管理資訊。換句話說,服務管理公司儲存積分點作 為給用戶幫助收集採買資訊的獎勵。由於積分點是累積 的,服務管理公司提供產品給用戶,或透過把積分點轉換 成電子貨幣而允許用戶使用儲存的積分點來採買產品,或馨 ,屬公司裡的目錄。這種積分點的儲存是透過根據由服務 官理伺服态40接收的讀取細節資訊的種類和内容來處理 相應用戶的儲蓄實現的。例如,根據已購買的產品價格或 根據生產商或產品名累積的積分點可能不同。 、另外,服務管理伺服器40能透過檢測含在讀取細節資 、 訊裡的產品資訊識別號和讀取器識別號是否與先前收到的 產品讀取細節資訊-致’來附加檢測收到的產品讀取細節 12 1294595 14924pif.doc =是否是重發的細節資訊。換句話說,為 過重禝發达採買細節眘士卞 广也 訊㈣山= 式發运的採買細節資訊。行動通 透過勿略巧My w不滅的硪別唬。服務管理伺服器40 資氕::防T項取器識別號與標籤識別號相同的採買細節 貝止同—悔買㈣資訊的重複及積分關累積。 面的p、f、=日月根據本剌的非接觸通訊誠的架構。在下 ::,讀取器的概念包括具有標鐵讀取功能的 籤i〇^mf本發實施懒雜觸通訊標 300 通崎置⑽、㈣單元綱、儲存單元Read the product code one by one. The mobile communication terminal sends a short read sound code. Also, the action is through. If the product code can be stored in the low-capacity 曰, and the product code read in the output unit can be displayed in the output unit, the product code and voice read out can be limited to one number, and the amount of voice data is not large, two 1294595 14924pif.doc ;=. Furthermore, it is also possible to use a 6-state, as long as it is straight in the eight-seat tm code. The 〇 4 4 4 〇 〇 〇 〇 〇 〇 〇 〇 〇 标记 标记 标记 标记 标记 标记 标记 标记 标记 标记 标记 标记 标记 标记 标记 标记The tag reader Ρ Β Β 贴 贴 贴 贴 Β Β 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人 人When the mobile communication terminal is available; two colors: when a non-false message is detected to indicate a forged label or a bad standard iron. & color of the chess wheel error list = the second in the mobile communication terminal == continued Display ===finish: The woven products have tables, written corresponding to the product label per product = tag reader close to - one tag, multiple product codes by = two according to the invention, with tag reading function ΤΗ σ based Brother - a table of the product type table H can identify this is a kind of beverage products. Secondly, according to the pre-j display data '0014, based on another table-trademark item printed on the product, identify The trademark for this product is 'Valentine,. Then, the data '0017 is displayed at predetermined intervals. Based on the item printed on the calving---age age table, the product can be identified as old and new. Is '17 years, mobile communication terminals 204 and 2〇_2 according to the present invention. The information read details read from the tag are sent to the real service controller 1294595 14924pif.doc service management server 40 (hereinafter referred to as service management server 4) through the mobile communication network. · The product identification number of the product that can be read for each tag, and the read/recognition number assigned to each mobile communication terminal 2〇-1 and 2〇_2. The details of the purchase also include the actual product details. Identification information, such as industry type, manufacturer, brand, grade, model name, production center, production date, serial number, price and date of identification. Information reading details may also include products that have been sold in products that have been determined to be authentic. In addition to the actual product detailed identification information, the purchase information may include the purchase price, the purchase date and time, and the climbing information received from the mobile communication terminals 2〇-1 and 20-2 ( + After steps 1 and 2), the service management server 4 can submit the identification information of the mobile communication terminal 2 (M and 2〇_2) contained in the received read detail information to the mobile communication company. The server 3 (step 3) obtains the personal information of the corresponding user. By utilizing this function of the service management server 4, the wholesaler can perform more precise customer management. In other words, the gender of the user The personal information of the age, location, academic achievements, work and hobbies is stored in the user server by the mobile communication company. The service management server 40 can collect the received reading details and these User information, analysis of the purchasing tendency of the designated age group, the purchasing tendency or product preference of the designated working population. This information can be provided to the manufacturer whose products are determined to be real, as market information. The service management server collects The poor news store manages the information for the customer, generates a report, and outputs the report based on the request of the product to be identified as a real manufacturer or an authentication service management company. In addition, the service management server 4 sometimes generates this report, and 11 1294595 14924pif.doc sends the UI to the brand owner server 5, and communicates with it via the network (step, '4). This technique of generating market reports is not detailed in this field. This collection of information can be manually or irregularly performed by the user after the purchase is completed or after the actual product is identified. By installing the specified application in the mobile communication terminal, this uploading process can be performed when the user does not notice ^. The specified application monitors the total amount of accumulated information and the status of the communication. During the voice communication or data communication, the specified data channel is distributed to the specified application, and the specified application sends the accumulated read details. There is also an application designated by the designated application to monitor the total amount of accumulated signals, for example, the total amount of accumulated information reaches a predetermined amount. The accumulated information is sent to the service server in plain text. The service management feeder 40 may further include a 'point of integration, information as user management information. In other words, the service management company stores the points as a reward for helping the user collect the purchase information. Since the points are cumulative, the service management company provides the product to the user, or allows the user to use the stored points to purchase the product, or convert it into a catalogue, by converting the points into electronic money. The storage of such integration points is achieved by processing the savings of the respective user based on the type and content of the read detail information received by the service manager servo state 40. For example, the points accumulated based on the price of the purchased product or based on the manufacturer or product name may vary. In addition, the service management server 40 can additionally detect the receipt by detecting whether the product information identification number and the reader identification number contained in the reading details and the message are read with the previously received product details. Product read details 12 1294595 14924pif.doc = Whether it is resend details. In other words, for the over-emphasis and development of the details of the purchase of Shen Shizhen Guang (Xi) Shan = type of shipping purchase details. Action pass through the 勿 巧 My My My My My My My My My My My My My Service Management Server 40 Assets:: The purchase details of the anti-T item picker identification number and the label identification number are the same as the ticket-repentance (four) information repetition and integration. The p, f, and the sun and the moon are based on the structure of this contactless communication. In the following ::, the concept of the reader includes the signing of the standard iron reading function i 〇 ^ mf the implementation of the lazy miscellaneous communication standard 300 Tongsaki set (10), (four) unit outline, storage unit

非3通喊置刚料線模式與標朗㈣20交換 的無線信號裡提取能量成分,把&取$ H = t,i其能源。控制單元挪把儲存在儲 L裡6、產〇口貪訊加密成密錄,把密鑰透過非接觸 非接觸通訊裳置⑽包括天線110、能量供 131:解調單元133與調變單元135。天線ιι〇以無線模式 把#訊發碰標籤讀取H 2G且從它龍。能量供給單 ^ 131透過處理從天線⑽接㈣信射的能量電波信 就,給非接觸通訊標籤10提供能源。解調單元133解調從 1294595 14924pif.doc 標籤讀取器20收到的信號。調變單元135把要發送到標籤 讀取器20的信號進行調變。天線11〇是印刷圖案或線圈沿 著標籤周遭形成的。由於調變單元135和解調單元133對 於那些很热悉此技勢者疋XjX所周知的,就不詳述。由於根 據本發明的非接觸通訊標籤10必須生產的很小很薄,希望 把非接觸通訊標籤10生產成被動形式。因此,能量供給單 元131從標籤讀取器20接收的無線信號提取能量成分,把 提取的能量成分提供給整個系統作為其能源。能量供給單 元131的工作和架構是眾所周知的,就不詳述。 儲存單元3 00包括非易失性(n〇nv〇iatiie)半導體記憶 體,像電子可抹除可編程唯讀記憶體(Electdcal ErasableThe non-three-way shouting and the energy signal are extracted from the wireless signal exchanged with the standard (four) 20, and the energy is taken by & $ H = t, i. The control unit moves the stored in the storage L, and the credit is encrypted into a secret record, and the key is transmitted through the non-contact non-contact communication (10) including the antenna 110, the energy supply 131: the demodulation unit 133 and the modulation unit 135. . The antenna ιι〇 uses the wireless mode to read the H 2G and the dragon from it. The energy supply unit 131 supplies energy to the non-contact communication tag 10 by processing the energy wave signal transmitted from the antenna (10). The demodulation unit 133 demodulates the signal received from the 1294595 14924 pif.doc tag reader 20. The modulation unit 135 modulates the signal to be transmitted to the tag reader 20. The antenna 11 is a printed pattern or coil formed along the circumference of the label. Since the modulation unit 135 and the demodulation unit 133 are well known to those skilled in the art, XjX is not described in detail. Since the non-contact communication tag 10 according to the present invention must be produced to be small and thin, it is desirable to produce the non-contact communication tag 10 in a passive form. Therefore, the energy supply unit 131 extracts the energy component from the wireless signal received by the tag reader 20, and supplies the extracted energy component to the entire system as its energy source. The operation and architecture of the energy supply unit 131 are well known and will not be described in detail. The storage unit 3 00 includes a non-volatile (n〇nv〇iatiie) semiconductor memory, such as an electronically erasable programmable read-only memory (Electdcal Erasable)

Programmable Read-Only Memory, EEPROM)或快閃唯讀 記憶體(flashROM),在沒有能源時,也可保存數據。儲存 單元300 κ際上可包括兩個記憶體,如唯讀記憶體和讀/ 寫記憶體。但是,在本發明的較佳實施例裡,儲存單元3⑻ 包括單,可可寫非易錄記憶體。關於貼標籤的產品 ^產品資訊370,如產業類型、生產商、品牌、產品名、 等級、式樣名、生產中心、生產日期、交貨日期與序列號, 以數據儲存在儲存單元裡。儲存單元300切存非接 觸通訊標籤10和標籤讀取器π之間通 錄3=儲存單元300還儲存密錄說明資訊 在‘紙頃取器端詳細說明密錄330所需要的。儲存單元 更包括計數區,儲存非接觸通訊標鐵 讀取器__她。料單元存與; 1294595 14924pif.doc 的標籤讀取器20有關的資訊和讀取細節資訊,如讀取曰期 和時間。 v 儲存在儲存單元300裡的產品資訊370可以以產品代 碼的形式出現,該產品代碼由數字的組合、顏色的組合或 字母的組合而組成。由數字的組合而組成的產品代碼輪出 到標籤讀取器20的顯示單元。產品代碼還可以由按順序排 列的二進制碼和/或顏色碼組成。可以只有單個產品代碼 儲存在儲存單元300裡,但多個產品碼也可以儲存在儲存 單元300裡並連續地被讀出、顯示。這時,產品代碼可事 _ 先根據生產商、品牌、產業類型、產品名確定。因此,擁 有代碼表的用戶可以透過連續顯示的產品碼得到產品資 訊,如生產商、品牌、產業類型、產品名。 、 根據本發明,控制單元200控制非接觸通訊標籤1〇 的整個系統’它僅由硬體實現,主要是狀態機等數位邏輯 電路,如基於正反器(flip-fl〇p)和閘極(gate)設計的特定用途 積體電路(Application Specific lntegrated Circuit,ASIC )。 這種電路可由那些很熟悉此技藝者,在通用各種計算機辅⑩ 助設=(Computer Aided Design,CAD)工具的支持下很容 易地實現’此處不再魏。由於未細附加_存主程式, 可避免包括非易失性記憶體保存期限的問 情況下:那些可能因標藏而變化的產品資訊或;二; .fl也可以作為數據儲存在非易失性記憶體裡。關於保存# 限限制的對策在後面描述。當然,本發明不侷限於僅適於 數位it輯的硬體’控制單元2〇〇還可用微處理器實現。本 15 1294595 14924pif.doc 月特有的功能也可透過軟體控制來實現。這時候,主程 式頟外地儲存在儲存單元3〇〇裡。在本發明的另一個實施 例裡’儲存單元實際上包括兩個記憶體,包含主程式 的部t可料在單觸記鐘裡。 Μ 一控制單元200包括加密/解密單元21〇、資訊提供單 兀250、重送(replay)攻擊防止單元23〇與後管理咖^ management)處理單元270。這些部件的每一個均可獨立於 控制單元200,重送攻擊防止單元23()和後管理處理單元 / 〇 了k擇放在控制單元200裡。加密/解密單元21〇把 從非接觸觀裝置100㈣到的錢進行觸,或給要發 =0的信號加密,把加密過的信號輸出到非接觸通訊裳i 資訊提供單s 250讀出儲存在儲存單元3〇〇裡的產品 貧訊^70,把讀出的產品資訊370提供給加密/解密單元 2口 10:貧訊提供單元25〇還讀出儲存在儲存單元綱裡的產 品資訊370,回應來自標籤讀取器2〇的讀取命令,透過非 接巧通訊裂置1〇〇輸出讀出的產品資訊37〇。每次讀出產 。口資Dfl 370日^,資汛提供單元250把儲存單元的計數 值增加1,並在頊出產品資訊370前,檢測儲存單元%〇 的計數值。如果計數值多於預定值,資訊提供單元25〇不 回應來自錢讀取H 2〇的讀取命令,或糾表明標鐵被不 適當地多次讀取的消息,而不輸出產品資訊37卜但是, 在此情況下’計數值在内部被連續地增加並記錄數 可由管理員攜帶的特殊讀取器檢測。 16 1294595 14924pif.doc 透過這種對標籤被讀取次數的管理,可以有效地防止 標籤被重複使用,例如從真實產品上揭下來貼到偽造產品 上,或從用過的真實產品分離出廢棄的標籤貼到偽造產品 上。另外,透過把計數值儲存在外部無法訪問的區域、: 測儲存的計數值,可有效地防止標籤被重複使用,與物理 的方法相比沒有額外的費用。如果把標籤用报牢的粘合劑 附在產品上,當彳示籤被從產品上揭下來時,可採用物理阻 止方法’如毁壞印刷圖案的天線。但是,這種方法就不可 能進行標籤資訊的後管理或為了使用標籤而訪問標籤。這 種方法開始還不能防止試圖仔細地把標籤從產品上揭下 來。另外,在大規模生產時也有困難。 ^ ,由於放在顯不台上的產品被標籤讀取器讀取很多次, 當^正需要確定產品真偽時,可能無法讀出附在產品上的 標籤。為了解決這個問題,最好在標籤暴露的表面放一個 覆蓋膜,止在交貨時讀取標籤。保護膜可以是紹薄膜之 類的,透過蓋在標籤暴露的表面而阻止無線通訊。當需要 確疋真偽時,從標籤上揭去覆蓋膜。 、計數器的讀取次數限制的參考值可啸據不同產品設 置成不同值。例如,在諸如陌生的飲料、農產品&家畜產 品的食品裡,考慮到標籤可能在交貨時讀一次,在使 用日^買2〜4次’希望計數器的讀取次數限制參考值限在3 =次I對於服賴,由於真實產品的鑑定在銷售時和採 買後可月匕進行多次’希望計數器的讀取次數限制參考值限 在幾十次。用這種方法,讀取次數限制參考值可大致根據 17 1294595 14924pif.doc 產品特徵或發行管道的步驟數設置。但是,本發明不侷限 於檢測計數器的計數值去限制讀取的實施例,例如,至於 把標籤附在著名的晝、㈣或文件上時,讀取次數可不受 ,制。在這種情況下,資訊提供單元25()讀出儲存在儲存 早兀300禋的產品資訊37〇,透過非接觸通訊裝置、回 應來„讀取器20的讀取命令輪出讀出的產品資訊 370^每次讀產品資訊37〇時,儲存單元3〇〇的計數值增加。Programmable Read-Only Memory (EEPROM) or Flash Read-Only Memory (flashROM), which saves data when there is no energy. The storage unit 300 may include two memories, such as read-only memory and read/write memory. However, in a preferred embodiment of the invention, storage unit 3 (8) includes a single, cocoa-writeable non-recordable memory. About labelled products ^Product information 370, such as industry type, manufacturer, brand, product name, grade, model name, production center, date of manufacture, delivery date and serial number, are stored in the storage unit. The storage unit 300 stores the communication between the non-contact communication tag 10 and the tag reader π. 3 = The storage unit 300 also stores the cipher description information. The snippet end requires detailed description of the cipher 330. The storage unit further includes a counting area for storing the non-contact communication target reader __her. The unit is stored with; 1294595 14924pif.doc's tag reader 20 for information and reading details such as reading time and time. v Product information 370 stored in storage unit 300 may be in the form of a product code consisting of a combination of numbers, a combination of colors, or a combination of letters. The product code consisting of a combination of numbers is taken out to the display unit of the tag reader 20. The product code can also consist of binary code and/or color code arranged in sequence. Only a single product code can be stored in the storage unit 300, but a plurality of product codes can also be stored in the storage unit 300 and continuously read and displayed. At this time, the product code can be determined according to the manufacturer, brand, industry type, and product name. Therefore, users with code tables can obtain product information, such as manufacturer, brand, industry type, and product name, through the continuously displayed product code. According to the present invention, the control unit 200 controls the entire system of the contactless communication tag 1'. It is implemented only by hardware, mainly a digital logic circuit such as a state machine, such as a flip-flop and a gate. (gate) Designed Application Specific Integrated Circuit (ASIC). Such a circuit can be easily implemented by those skilled in the art, supported by a variety of computer Aided Design (CAD) tools. Since the _ memory program is not attached, the non-volatile memory retention period can be avoided: those product information that may change due to the label or the second; In sexual memory. The countermeasure for saving the limit is described later. Of course, the invention is not limited to a hardware' control unit 2 that is only suitable for digital programming. It can also be implemented by a microprocessor. The unique features of this 15 1294595 14924pif.doc can also be achieved through software control. At this time, the main program is stored in the storage unit 3〇〇. In another embodiment of the invention, the storage unit actually includes two memories, and the portion t containing the main program can be counted in a one-touch clock. A control unit 200 includes an encryption/decryption unit 21, an information providing unit 250, a replay attack preventing unit 23, and a post management unit 270. Each of these components can be independent of the control unit 200, and the resend attack prevention unit 23() and the post-management processing unit/〇 are placed in the control unit 200. The encryption/decryption unit 21 触 touches the money from the non-contact device 100 (4), or encrypts the signal to be sent =0, and outputs the encrypted signal to the non-contact communication device. The product information message 70 in the storage unit 3 provides the read product information 370 to the encryption/decryption unit 2 port 10: the poor information providing unit 25, and also reads the product information 370 stored in the storage unit. In response to the read command from the tag reader 2〇, the product information read 37〇 is output through the non-contact communication. Read each time. The account Dfl 370 days ^, the asset providing unit 250 increases the count value of the storage unit by 1, and detects the count value of the storage unit % 前 before the product information 370 is extracted. If the count value is more than the predetermined value, the information providing unit 25 does not respond to the read command from the money reading H 2〇, or corrects the message that the target iron is improperly read multiple times, without outputting the product information 37 However, in this case, the 'count value is continuously increased internally and the number of records can be detected by a special reader carried by the administrator. 16 1294595 14924pif.doc Through the management of the number of times the tag is read, it can effectively prevent the tag from being reused, for example, from the real product to the counterfeit product, or from the used real product to separate the discarded The label is attached to the counterfeit product. In addition, by storing the count value in an externally inaccessible area, the stored count value can effectively prevent the label from being reused, and there is no additional cost compared to the physical method. If the label is attached to the product with the adhesive attached to the product, when the label is removed from the product, a physical blocking method such as destroying the printed pattern antenna can be employed. However, this method is not possible for post-management of tag information or access to tags in order to use tags. This approach did not begin to prevent attempts to carefully remove the label from the product. In addition, there are difficulties in mass production. ^ , Since the product placed on the display is read many times by the tag reader, when it is necessary to determine the authenticity of the product, the label attached to the product may not be read. In order to solve this problem, it is best to place a cover film on the exposed surface of the label and read the label on delivery. The protective film can be a film or the like that blocks wireless communication through the exposed surface of the label. When it is necessary to confirm the authenticity, remove the cover film from the label. The reference value of the counter reading limit can be set to different values according to different products. For example, in foods such as unfamiliar beverages, agricultural products, and livestock products, it is considered that the label may be read once at the time of delivery, and 2 to 4 times of the purchase date is used. = Sub-I is for service, because the identification of real products can be carried out several times at the time of sale and after purchase. The reference value of the number of readings of the counter is limited to several dozen times. In this way, the read limit reference can be set roughly based on the number of steps in the 17 1294595 14924pif.doc product feature or the release pipeline. However, the present invention is not limited to the embodiment of detecting the count value of the counter to limit the reading. For example, as the label is attached to the famous 昼, (4) or file, the number of readings is not acceptable. In this case, the information providing unit 25() reads out the product information stored in the stored product 300〇, and transmits the product read by the read command of the reader 20 through the non-contact communication device. Information 370^ Each time the product information is read 37〇, the count value of the storage unit 3〇〇 is increased.

在這種f月;兄下f成^^供單元250不限制基於計數值的資 訊提供。 貝 在用產品碼連續顯示產品資訊370的實施例裡,資 提供單元250可根據來自標籤讀取器2〇的請求,或者二^ 、、、“:籤#取☆ 2〇提供多個產品碼,或者連續多次提供多値 ^品,的-個。當資訊提供單元,多次連續提供產品期 時’每,數據都要使用加密/解密方法和重送攻擊阻止。 加密/解密單元21〇把要發送的資訊透過非接觸通詞 衣置100加在,把從非接觸通訊裝置1⑻In this f month; the brothers under the ^^ supply unit 250 does not limit the information provided based on the count value. In the embodiment in which the product information is continuously displayed by the product code 370, the asset providing unit 250 may provide a plurality of product codes according to the request from the tag reader 2〇 or 2:,,,,,,,,,,,, , or provide multiple products in succession for a number of times. When the information providing unit repeatedly provides the product period multiple times, each data is blocked by the encryption/decryption method and the resend attack. Encryption/decryption unit 21〇 The information to be sent is added to the non-contact communication device 100, and the non-contact communication device 1 (8)

使用三數據加密標準(3_DataEn哪tlGnstancJ 作為域算法,但是加密算糾侷限於三數據加密相 法二數據加岔標準算法三重地應用數據加密標準, 4木?各種·^式。在本實施例裡,採用層疊三數據加密標準 連續地用三個料。由於這些算法都是對稱的錄算法, 相同的密錄用於加密和解密。 根據白知的真偽產品鑑定方法,真偽產品鑑定包括; 把内在的鑑定碼贿在標餘’透過從讀取^讀出内在白 18 1294595 14924pif.doc ,而I if:内在的鑑定碼是否是對應於真實產品的代 ;的月’真實產品鏗定依靠人工,根據在讀取 、㈣二早7\_的貧訊來判斷’必須經歷加密/解密 匕私才月b正確顯示產品資訊。 ,田,本發明的非接觸通訊標籤1G的第一實施例 ·主〇〇資°Κ由唯一的萬能輪匙(master key)加密和解密。 =種^兄下’萬能鑰匙33〇作為各種產品的公共唯一密 論’储存在非_通訊觀1()的 f器也ί單個唯:的密錄,但可以讀取各種產品的產Si C二:(解始單兀210由資訊提供單元250利用萬能输 ^ 330作為加密密鑰’把發送到外部設備的資訊加密,解 釋=外部設備接收的加密過的消息,把解釋過的消息提供 、’、5資Λ提i、單元250。由於產品可被顯示在標籤讀取器2〇 上的產品資訊透過加密/解密單元21〇的操作而識別,所 供許多產品的真爲#訊。此外,如果用在新產品的 標籤是新製的,則不需升級已存在的標籤讀取器就 標籤資訊。 在根據本發明的非接觸通訊標籤1〇的第二實施例 裡,作為單個密鑰的萬能鑰匙33〇和適合於萬能鑰匙33〇 的密鑰說明資訊310都儲存在非接觸通訊標籤1〇的儲存單 元300裡。使用非接觸通訊標籤1〇的公司準備多個密鑰, 根據產業類型、生產商、品牌及產品類型進行不同分發。 例如,在主要為商標的情況下,可根據同一品牌的類 蜇決定使用不同的密鑰。在生產少量產品的公司裡, 1294595 14924pif.doc 公司指定單個的密鑰。讀取相應產品標籤所需的全部密鑰 含在標籤讀取器20裡。 。畐收到來自標籤讀取器2〇的產品資訊請求,加密/解 f ^^ 210把密鑰說明資訊31〇發送到標籤讀取器,使 標籤讀取器20選擇同樣的密鑰作為密鑰330儲存在標籤讀 取器20裡。例如,密鑰說明資訊31〇可以是分發給^個密 鑰的^引。其後,加密/解密單元210把要發送到外部設 備的資矾由資訊提供單元25〇利用這個密鑰進行加密,解 釋從外部設備接收的加密過的消息,把解釋過的消息提供 給資訊提供單元250。 “ 同樣的,透過利用密鑰說明資訊31〇,儘管一些密输 被泡漏,損失只限於相應的產業類型、生產商、品^相 應的產品。還有,與使用唯一的萬能鑰匙的實施例一樣, 包括同樣的密錄,而不需把已有的標籤讀取器升級。當然, 也有可能又需要組合新標籤並儲存新的產品資訊。還有, 如果足夠量的密鑰被保護在標籤讀取器裡,可以透過分發 夕餘的岔输’給新產品設置更高級的安全性。換句話說, 當生產新標籤時,透過儲存一個被作為多餘密鑰而保護的 密鑰,和對應此密鑰的索引,標籤讀取器接收索引,可指 定一個密鑰,把它作為多餘密鑰、作為新標籤的密鑰而被 保護。 在根據本發明的非接觸通訊標籤10的第三實施例 裡,基於產業類型、生產商、品牌、商標各要素之中至少 兩個要素,兩個或更多密錄330被分隔分發,和對應於密 1294595 14924pif.doc 鑰330的密錄說明資訊31〇都儲存在非接觸通訊標籤ι〇 的儲存單元300裡。 圖4A根據本發明的非接觸通訊標籤1〇的第三實施 例表明示範始、錄410和不範密錄說明資訊42〇。參照圖 4A ’儲存在非接觸通訊標籤1〇裡的密錄仙包括三個穷 2 = 413與415 ’每個是根據產業類型、生產商與“ 勺密錄433、453與473及其對應的密錄說明 二二” 、451與471都儲存在標籤讀取器20裡。標 =取器20的歸分成三組,每組是—個密齡發表,用 ;固產業3型、生產商與品牌。例如,多個密錄“I、 鮮契415可以是用在三數據加密標準算法每一步的三個 訊輕it來,_取器2〇的產品資訊請求,非接觸通 引「、 0、加袷/解密單元210把密鑰說明資訊310的索 從帝二^杰〇 1和〇 4發送到標籤讀取器2 〇。標籤讀取器2 0 藏==:選擇與儲存在非接觸通訊標 你炎6 鑰 樣的畨鑰組,如1324、abcd和2345, 觸通讀取當前的非接觸通訊標籤1〇。隨後’非接 密輪把密/解密單元2ig透過連續地使用多個 —要15适到和接收自標籤讀取器的資訊加密、解资。 業餘,標鐵讀取器2〇可識別出密餘所屬的產 〇、品牌或產品名。就是說,在圖4A裡, ===?,引42丨、423與425裡識 下織10的產品是包括在··附件類型、生產商是 1294595 14924pif.doc 3&amp;111 —八11產業,、商標是‘〇八1&gt;八0::1,的產品類型裡。 因此,儲存在儲存單元300裡的產品資訊370和密錄說明 資訊310在實用中可部分互相重疊。換句話說,索引421、 423與425本身可以是產品資訊的一部分。第三實施例具 有第一實施例和第二實施例兩者的優點,可透過連續地使 用多個密鑰而加強安全級別,充分保護引進新產品的利潤。 在根據本發明的非接觸通訊標籤10的第四實施例 裡,多個密鑰330和密鑰說明資訊310儲存在非接觸通訊 標籤10裡,標籤讀取器20包括讀取全部相應產品的產品 資訊所需的密鑰。在此實施例裡,當收到來自標籤讀取器 2〇的讀取請求,非接觸通訊標籤10選擇多個密鑰33〇中 的一個,把對應於選出的密鑰的密鑰說明資訊發送到標籤 讀取器20,使得共有的密鑰互相一致。非接觸通訊標籤1〇 的检錄的選擇是利用輪換或隨機方案進行。隨後,非接觸 通訊標籤10利用選出的密鑰,把與標籤讀取器20交換的 貧訊進行加密和解密。根據本發明的非接觸通訊標籤10 的第四實施例具有第一實施例的兩個優點。由於非接觸通 4“籤10在每次讀操作時,透過改變其密鑰作出回應,第 二實施例可以提升處理偽造讀取器的能力。 在根據本發明的非接觸通訊標籤10的第五實施例 裡’多個密鑰330和密鑰說明資訊310儲存在非接觸通訊 才票籤10裡,標籤讀取器20包括讀取全部相應產品的產品 資A所系的在、錄。非接觸通訊標籤10的每個密錄組包括至 7兩個始、錄,根據在產業類型、生產商、品牌與產品名諸 22 1294595 14924pif.doc 要素中至少兩個要素,被分類與分發。例如,多個密錄」 以疋用在二數據加密標準算法每一步的三個密鑰。換句話 祝,本發明的第五實施例裡,非接觸通訊標籤1〇包括圖 所示的多個密鑰組411、413與415和多個密鑰說明資 汛組421、似3與425。加密/解密單元21〇連續地使用多 個密鑰,並處理加密與解密。標籤的密鑰的選擇是利用輪換 或隨機方案進行的。其後,標籤利用選出的密鑰組連續地 把2票籤讀取H交換的資訊進行加密和職。與非接觸通 訊標籤10的第三實施例相似的情形,在第五實施例裡,〆 旦指,密錄,標籤讀取器2G可以識別出產業類型、生i 商、,牌與產品名。因此,在第五實施例的各種形式裡, 單元300的產品資訊370和密錄說明資訊31〇可能互 =邛分地重疊。根據本發明的非接觸通訊標籤的第五實 苑例具有第一實施例到第四實施例的優點。 、在根據本發明的非接觸通訊標籤10的第六實施例 =1非接*觸通訊賴1G包括—個錄和密綱建資訊,它 =給讀取H來創建與非接觸通訊賴的密錄一樣 據if It用非接觸通訊賴1G的公司準❹個密錄,根 二°麵型、生產商、品牌及產品麵等,分發不同 標籤讀取器2G包括密_建模組,可創建全部讀 子』:ί;=所需的密錄。密錄創建模組利用-個種 密输:由彳f取^接收自標戴的密_建資訊來創建 可根攄7^1· 湘—個種子_建的密鑰數目, 據讀讀值_。儘管儲存在賴讀取ϋ 20裡的種 23 1294595 14924pif.doc :可以把不同的密鑰指派給許多品 *產口 Μ級標鐵讀取112G°111此,根據本發明的真 併許多新要素,即產業類型、生產商、 Γ需^:1票藏讀取器20。透過分發新的密ί给ί應產 =’ιίΐ貼上儲存有創建該新密输的創建資訊的標 種I1進成為可能。還有,根據本發明的真實產 育訊是以句子顯示在顯示單元上’可以 用同樣的赠進行多種產品的真產品鑑定。 建」創建模組可由一個整數作為收到的密鑰創 值的結果。本發明不侷限於這個密鑰 !^建貝K ’c疋要理解,密錄創建資訊包括指定和創建桿 =取;20裡的密鑰的資訊。例如,密鑰創建資訊可以是 產商碼、品牌碼、產品碼或含有包括 曾與產品名的文字資訊。還有,密鑰創建 了法I括泎多函數和操作,可以用一個種子值、至+ 一 ==建^因而,透過適當地選擇_創建^組的 f建忙法,即妙—麵子贿存在標朗取H 20裡,士 有可能實際保護許多密鑰。 性也 逛有,在根據本發明的非接觸通訊標籤10的患 觸通況標籤10的加密/解密單元2】〇把密餘創建 岔鑰說明資訊310,發送到標籤讀取器2〇,導毋代々”、、 态20創建與儲存在標籤讀取器2〇裡的密鑰%〇 一二 24 1294595 14924pif.doc 鑰。其後 加您/解欲早元210透過資訊提供單元25〇, 利用這個餘’把要發制外部設備的魏加密,或解釋 從外部設備接㈣加密過的消息,紐 出到資訊提供單元挪。在非接觸通訊標籤ω 實施 =2過fir保鶴’許多密錄被充分地分發給 ίΐί 牌或產品。因此,即使當密鑰部分 地沒漏,城也可降到最小。另外,類似於第—實施例, 可=又組成具有同樣密鑰卻儲存難品資訊的新標藏,而 不需升級已存在的已分發的標籤讀取器。還有,在此實施 新產品時’如果賴儲存有用於創建密 錄的新讀和讀顺資訊,標籤讀取器能湘從標藏接 ==存_子值和聽說„訊,猶與相應標鐵的 ίί一樣的密錄。因此,在真實產品鏗定並維持更高的安 王寺級的方面,使引進更多新產品成為可能。 在根據本發_非_通訊賴1G的第七實施例 =非f?細票籤10的儲存單元300儲存至少兩個密鑰 〇 ’根據在產業類型、生產商、品牌與產品名諸要素中至 少兩個要素’被分類與分發。作為錄說明資訊的密 錄創建貧訊對應於至少兩個密餘33〇。在此實施例裡,加 解密單元21〇透過連·也利用已儲存的密錄給消息加 ㈣取器2G從非接觸通訊標籤㈣收密錄創建資 透過特定函數、或基於接㈣的密侧建資訊的操作'、 或内部種子值’創建與已儲存在非接觸通訊標籤1〇裡的密 输組-樣的密鑰組。與第六實施例相比,第七實施例的優 25 1294595 14924pif.doc 點:透過利用多個密錄的多重加密,提升安全性。 在非接觸通訊標&amp; 10的第八實施例裡,非接觸通訊^ 二JtT單元300儲存:至少兩個密输330,根據在ΐ 、生產商、品牌與產品名諸要素中至少兩個要素, 被为類、分發;對應於這兩個密鑰330的密输創建資訊; 用於指定密錄創建資訊的識別資訊的索引。在此實 ΐ i ί密/解密單元21G透過連續地利用已儲存的密输給 冶心進仃多重加密。標籤讀取器20從非接觸通訊標籤1〇 接收關於密鑰創建資訊的索引,透過特定函數、基於接收 的操作和内雜子值,継與儲存在非接觸通訊 才示戴10裡的密鑰組同樣的密鑰組。 圖、4B根據非接觸通訊標籤1〇的第八實施例闡明密餘 410、岔鑰創建資訊42〇與對應於密鑰創建資訊42q的^ 引。在圖4B裡,對應於圖4A、或與圖4A 一樣 ㈣樣的參考數字。參關4B,儲存在非接觸通 里的密鑰41〇包括三個密鑰41卜413與415,每個都根 業頸型、生產商與商標決定。例如,這多個密錄411、 六/、4丨5可以是用在三數據加密標準算法每一步的三個 密输^密餘創建資訊49〇能創建這些密鑰411、413與, 作,松輸創建資訊490的參數491、493與495可儲存在儲 元300裡,但是不是必須的。用於指定密鑰創建資訊 、的索引420儲存在非接觸通訊標籤1〇的儲存單元3〇〇 、、, 果心戚項取器20請求密錄的詳細說明,就把它們發 达到標籤讀取器20。創建密鑰‘1324,411的密鑰創建資 26 1294595 14924pif.doc 訊是133’ 491,用於指定這個密鑰創建資訊的索引是 ‘02’ 421。同樣的,密鑰‘abcd,413,密鑰創建資訊 ‘256’ 493和索引‘〇1,423互相對應;密鑰‘2345, 415,密鑰創建資訊‘267, 495和索引‘〇4,425互相對 應。標籤讀取器20的密鑰分成三組,每組是一個密鑰分發 表,用於產業類型、生產商及品牌。 ^當收到來自標籤讀取器20的產品資訊,非接觸通訊標 籤10的加密/解密單元21〇發送索引作為密鑰說明資訊 310 ’此處即疋〇2’、‘〇1’與‘〇4,。標籤讀取器2〇從這些索 引裡查難應的密絲,從密齡發表的每侧錄創建資 訊域433、453與473提取出密錄創建資訊用於創建同樣的 密錄組,此處即是‘1324,、‘_,與‘2345,, 密錄彻儲存在非接觸通訊標籤1〇裡,此處即是‘133,、 256與267。標籤讀取器2〇透過執行預定的基於密 錄創建資㈣錄繼算法,㈣鍵相躺錢和種子 值’延擇舰的錄作㈣剌來讀取非朗通訊標 10。士其後,非接觸通訊標鐵10的加密/解密單元⑽透過 =地^這多個密錄’對發送到和接收自標籤讀取器20 的舅吼進行加密與解密。 根據非接觸通訊標籤10的第八實施例,一旦 鑰,標箴讀取器20可識別出密錄的產業類型、生絲 牌或商標。換句話言兒’參照圖4B,基於密餘41〇、密錄創 建育訊420 *索引,標籤讀取器2〇可從收 ^ 似、423與425識別出貼有非接觸通訊標籤H)的產^ 27 1294595 14924pif.doc 否為包含在··附件類型 ‘ 一生屋商疋 Samah產業、陶標 是CAPACCI,的產品類型裡。因此,在第八實施例的各 種形式裡,儲存單元300裡的產品資訊370和密錄說明資 訊3H)在實財可部分互相重叠。換句話說,索引 Ί: 425可以疋產品貧訊370的一部分。根據本發明的 非,觸通訊標籤1〇的第八實施例,具有第六和第七實施例 ,=優點=另外,在第人實補裡,由於發送與接收的 疋索引,可增強安全級別’並幫助賴讀取^ 2 此内容將在後面描述。^ =這個過程,標籤讀取器2 Q指定相應的密錄,請求 :存,觸通訊標籤10裡的產品資訊,接收對請求的回 :們ΐ::,上顯示收到的回應。如果附在產品上的非 是正確的,標籤讀取器2G和非接觸通訊 在顯示單元上。如果是偽造產品上;: 就會失敗,從而不可讀的、無意義的資訊就 ii70,或顯示偽造產品警告消息。因此,客戶 可以檢查產品的真偽。 接觸讀取器2G㈣訊讀取單元750從非 接收關於不同產品資訊的多個產品碼,連 ;出產品碼。換句話說,關於-個產品, ίΐί::非接觸通訊標籤1〇的儲存單元遍 a :個20連縯地讀出並顯示儲存的產品碼。例 如,夕個產品碼t,第—個顯示的產品碼是生產商,第二 28 1294595 14924pif.doc =丸ϋΞΓ,下—個顯示的產品碼是每個產品 非序列’表明彩色LED的開或關。 200 220 ”士U垃广餘升級單$ 22G。_密输升級單元 二Γ亡 標籤1〇裡的模組,如果協議好的密 ㈣出去,它就使偽造商標無效。在揭露出 心勺)¾漏後,把此模組裝在新生產的標籤裡。在標藏讀 取為t圖讀取非接觸通訊標鐵10時,浪漏密錄升級單 兀f20放棄已有的關於此標籤讀取器的密錄,引導標籤讀 取裔2〇 ^用由浅漏密錄升級單S 22〇指定的新密鑰。 ⑧:¾漏錄升級單元22〇應用於根據本發明的非接觸通 訊標籤10的第-實施例,給標籤讀取器%發送一個新使 用的唯一的萬忐錄匙。標籤讀取器2〇刪除它自己的萬能錄 4,把收到的萬能输匙記錄為新的密餘。這時,透過適當 地定義非接觸通訊標籤10和標籤讀取器2〇之間的鑰匙升 級協議,可以減少萬能鑰匙被盜用造成的危險。 浪漏密錄升級單元220應用於根據本發明的非接觸通 訊標籤10的第二實施例,它裝在產業類型、生產商、品牌 或產品的標籤裡’與洩漏的密鐘一樣,它把相應的新使用 的密鑰發送到標籤讀取器20。標籤讀取器20放棄已有的 分發過的密鑰,在對應於非接觸通訊標籤1〇的索引裡儲存 一個新接收的密鑰,作為相應產業類型、相應生產商、相 29 1294595 14924pif.doc 應品牌或相應產品的密錄。 洩漏密鑰升級單元220應用於根據本發明的非接觸通 訊標籤10的第三實施例,它裝在包含在諸如產業類型、生 產商、品牌或產品的種類的非接觸通訊標籤1〇裡,這婆種 類與茂漏的密錄的-樣,它把相應的新使用的密^給 ,籤讀取器20。標籤讀取器2〇更新對應於索引^餘, 这些索引是姻新收到的每侧類的表裡的錄發給 通主訊標鐵1〇。例如’在圖4八所示的非接觸通訊標 戴ίο的t月況裡,品牌索引指定為‘04,。‘2345, 為^於匕的絲。但是’喊麵二單 兀W7Q,W以引導標鐵讀取器2〇把密鑰&lt;2345,改為 。為了此目的,洩漏密鑰升級單元22〇可 到標鐵讀取11 20 ’如果保護有充分數量未分 ,也可以透過選擇一個多餘密錄的索引設置 新在鑰。例如’如果對應於‘5678,已有的索 ,漏密輪升級單元22〇發送‘15,而 讀取器20從它_ p &amp;本站。 才不戴 ‘5678,4 k取出對應於‘15,的密鑰 社果η ,上测,分發為對應於㈣‘⑽的密錄。 =取器2〇裡,對應於索引‘⑽和% 訊標丨22=^__非接觸通 =•升=密==¾ 在 储存在索引裡、對應於密输表裡的觸密輸白^ 1294595 14924pif.doc 錄升級 背翻於根據本發,非接觸通 4紙10的弟五實施例,它把非 :二 的全部多個密鑰組升級。因此,非接觸 =:二10裡儲存 穷鈐升鈒罝分”Λ4 ^ 非接觸通訊標籤10的洩漏 山升、、及早1220把必需的新的多個 取器20,請求標籤讀取器20把:^达到‘, 输組升級姻_料先在 ::=;=f 1〇的密錄組,然後用收到的密鑰按收到 的順序連縯地升級全部密錄組。 背密二物單元220應用於根據本發明的非接觸通 紙0的弟六貫施例’它把應該新使用的密錄創建資訊 电运到標籤讀取器20。這時,對應於新密錄創建資訊的密 錄儲存在非接觸通訊標籤1G裡。標籤讀取器2()可以把^ 有的通用的密鑰創建資訊註冊為壞標籤放在黑名單裡。這 種情況下,如果特定的賴請求真偽鏗定,標籤讀取器2〇 可以參照黑名單和生產曰期,更精確地確定標籤是否是偽 ,標籤。因此,有可能確定在指定生產曰期前生產的標籤 # 是真的,在指定生產日期後生產的標籤是偽造的。 洩漏密鑰升級單元220應用於根據本發明的非接觸通 訊標籤10的第七實施例,它把應該新使用的密鑰創建資訊 發送到標簸讀取器20。例如,假設在圖4B的密鑰中,密 输1324 411被汽漏出去。這時,新密錄‘1567,儲存 在新發放的標籤裡,而不是密鑰‘1324,,對應於這個新 密鑰‘1567’的密鑰創建資訊是‘138,。這種情況下,洩 31 1294595 14924pif.doc 漏密鑰升級單元220把對應於索引‘02’的密鑰創建資訊 ‘133’删除(其中索引‘〇2,分發給標籤的密錄表430 裡的標叙)’請求記錄新的密输創建資訊是138 。從而, 標籤讀取器20從密鑰表430裡提取出‘138’作為對應於 索引02的密錄創建資訊,創建密錄‘1567’ 。結果是, 對於具有密鑰‘1324,的偽造鑰匙或現有已被分發的標 籤’不能讀出其產品資訊,從而確定這個偽造的或現有已 被分發的標籤是偽造的。 一還有,根據本發明的非接觸通訊標籤1〇或非接觸通訊 標鐵的控制單元200,可包括重送攻擊阻止單元23〇。 在^密技術裡,重送攻擊t味著透過麵—個在已加密的 用戶發送的註冊消息,來試圖訪問飼服器並 重赉非法&gt;肖息給伺服器。為了對付這 =請,息給客戶,在註冊請求消息後面包括== 同ί的求if加密,客戶在回應註冊消息裡包括 隨機數字ΐί當 才允許註冊。由於隨^=的疋—樣的時候 止技術的幫助下,有可化的’在這個重送阻 可能性。 他 重稷使用同樣的註冊消息的 q牧具賞產品鑑定時引 此’本發明的―=其 32 1294595 14924pif.doc 更高的可靠性。 根據本發明的非接觸通訊標籤1〇或其控制單元2〇〇 可包括後管理處理單元270。讀取細節資訊^儲存在非接 觸通訊標籤10的儲存單元300裡。每次讀取,資訊提供單 元250把讀取細節資訊’如序列號、標籤讀取器2〇的讀取 曰期,儲存在儲存單元300的指定區域。當儲存在計數 的、管理讀取次數的值比預定的值高時,#訊提供單元^ =提供產品資訊。設計後管理處理單元謂不僅用來提供 ^品貧訊,而且提供關於用特定密齡冊的特定終端 ,細魏’如:讀取器的管理,讀取次數的放棄。讀取 二己置類:於通用讀取器。它可以透過讀取被用戶放 ::票鐵貢訊或附在返回產品上的標籤資訊,而識別出: 二d ’進订真偽鑑定的用戶,真偽鐘定的 、 有效地把資訊用作繼傾向的銷售心 還可,f本剌的非_通訊標籤10或其控制單元200 怜”_eshM理單元29()。通常 ^ 體裡,在記錄以後,可用 开勿夭性屺 產一查;: 括刷新處理單元290,每’f接觸_標籤10裡包 存單元300裡,刷新處重記錄在错 儲存單元300裡的全,这種刷新處理必須包含 裡的王俯據,包括密錄、產品資訊與計數 33 1294595 14924pif.d〇c -在這種情況下,非接觸通訊椁 器,刷新處理單元290透過在夫1〇包括一個刷新緩沖 的區塊單元裡進行重嫁寫摔:相2刷新緩沖器容量 刷新處理的產品裡,最好把可用刺新處理。在 不限制可用_取缝。 H人數設置成很大或 取哭;;=3 ’根據本發明,具有標籤讀取功能的標籤讀 =2G_2包括操縱單元93q、顯示單元㈣、聲音 :2兀960、電池(未晝)、標籤通訊單元漏、 兀91〇、資訊讀取單元750與控制單元7〇〇。 址(Code Divesion Multiple Access, CDMA)通訊。 標籤通訊單元500以無線模式與非接觸通訊標籤1〇 父換數據,無線地發送必需的能量。標籤通訊單元5〇〇包 操縱料930除了普通行動通訊終端的按鍵外,還包 ^一或兩個触’如讀取雌触和資訊發送独。或者, =具有讀取功能的行動通訊終端2(M和2()_2受控進行讀 才木作日守,行動通訊終端的按鍵中的特定按鈕當作盘讀取功 能=關的按鍵功能,如讀取啟動按鈕和資訊發送按鈕。顯 不單元950使用行動通訊終端20-1和2〇·2的LCD。聲音 輸出單元960使用行動通訊終端20-1和2〇_2的喇叭。^ 線通訊單元970提供行動通訊功能的電路,是Qualc〇mn; 公司的MSM組晶片,有關的射頻(RF)電路支持碼分多 34 1294595 14924pif.doc 括天線51〇、能量發送單元531、解調單以33㈣ 535。天線510以無線模式對非接觸通訊標鐵 收數據。天線5Π)可以沿著具有讀取功能 = I1和2〇·2周遭以印刷圖案形成。功率發送單元以 ^ 一5 = 非^觸通訊標籤發送必需的能量。解 调早兀533把透過天線510、接收自非接觸通訊 調。調變單元535把要發送到非接觸通訊標籤1〇 如號進行賴。域標籤通訊單元· 於非接觸通訊標_的非接觸通訊裝置 110、能量供給單元m、解概分m rt匕括的天線 此處不再詳述。 象周早凡133與調變單元135 ’ 郎於控制整個系統和用於創建資訊交換所需的 1的種子值,它儲存在儲存單元_裡 主 訊交換所㈣㈣密射儲存树 包括:非易失性記憶體如應、臨時存 固快閃記憶體。被具有讀取功能的行動 也^讀取的標鐵的有關讀取詳細資訊, 動n玖π Γ早70 910裡。市場人員可以透過讀取來自行 和2G_2的、連细⑽計算機上的讀取 口手細貝訊,而識別出客戶的愛好。 ㈣ 單元可與朗微處理器―樣實現。資訊讀取 立於控制單元雇的一個部件生 、…貝取早几750回應來自操縱單元930的命令’請 35 1294595 14924pif.doc 求來自非接觸通訊標籤1〇的產品資訊,,在顯示單元95〇 上顯示從非接觸通訊標籤10收到的產品資訊。加密/解密 單兀710透過標籤通訊單元500把發送到或接收自非接觸 通成彳示戴10的育訊加密和解密。 育訊讀取單元乃〇和非接觸通訊標籤10的資訊提供單 兀250互相作用,加密/解密單元71〇和非接觸通訊標籤 1日〇的,密/解密單元21〇互相作用。資訊讀取單元MO在 、、員不單元950上以文字或圖形模式顯示從非接觸通訊標籤 10,到的產品資訊。當顯示單元95〇包括七段㈣ f衫色LED時,育訊提供單元25〇在顯示單元95〇上顯示 ^品碼’^從^_通訊標鐵1〇收到的產品資訊。在這種 Si下’二7取單★ 750從非接觸通訊標籤10的資訊提 到顯;單元二多,產品碼並連續地把收到的產品碼輸出 ======組合成—個消息,從非接 通訊終端2CM和20 早巧0發送,或回應來自行動 個產品碼從資訊提供單取單元75(;的請求’把多 通訊終端20-1和2〇2次^运到具有頃取功能的行動 取出多個產品碼,按預=!取單元75G從收到的消息提 續地顯示在顯示單元9:广:f間巧把提取出的產品碼連 顯示單元上輪出收到的連續地在 讀取結果,聲音輪出⑽_ 1很艨貝讯碩取早兀750的 單元750也包括-個輸聲。資訊讀取 讀取時,資訊讀取草亓7ςη +电路,计异當前時間。每次 5 0把讀取時間和讀取器的序列號 36 1294595 14924pif.doc 發送給標籤 儲存起來。 使日^•間和序列號作為讀取詳細資訊的一部分 、甬如U :疋710透過標籤通訊單元500從非接觸 在儲;r产讀創建f訊,湘_的鶴創建資訊 读:早几910裡的種子值創建-個密鑰,並用創 ί 理加密’密。還有,加密,解密單元710 訊標籤1〇的加密,解密單元210的通訊來 資訊’從儲存在儲存單元_裡的用於多個 ㈣二省、產品的麵巾’選擇與當前讀取的標籤 有關的讀,用選擇的密键理非接觸通訊標籤1G和行動 通訊終端2(Μ和20·2之間的通訊。這種通訊過程在後面 描述。行動通訊終端2(M和2〇_2的加密/解密單元71〇 對應於非接觸通訊標籤!〇的加密/解密單元训,可以配 置成對應社面料__祕賴1()的實關。加密 /解密,程由行動通訊終端2(M和2q_2的實施例的加密 〈解密單元710執行’由於此過程本f上與非接觸通訊標 籤10的實施例的加密/解密單元210執行的過程一樣,這 裡不再詳述。 在根據本發明的具有標籤讀取功能的行動通訊終端 20-1和20-2的第一實施例裡,加密/解密單元71〇對應於 非接觸通訊標籤10的第一實施例的加密/解密單元21〇。 在此實施例裡,儲存單元910只儲存萬能鑰匙這單個密 输。加您/解岔單元710用萬能錄匙把發送到和接收自非 接觸通訊標籤10的資訊加密、解密。 37 1294595 14924pif.doc 在根據本發明的具有標籤讀取功能的行動通訊終端 20·1和20-2的第二實施例裡,加密/解密單元對應於 非接觸通訊標籤10的第二實施例的加密/解密單元21〇。 在此實施例裡,儲存單元910儲存對應於索引的多個密 鑰。加密/解密單元710從標籤接收密鑰說明資訊,如索 引,指疋一個密錄,用指定的密餘把發送到和接收自標籤 的資訊加密、解密。 在根據本發明的具有標籤讀取功能的行動通訊終端 20·1和20-2的第三實施例裡,加密/解密單元71〇對應於 非接觸通標臧10的第三實施例的加密/解密單元21〇。 在此實施例裡,正如圖4Α裡下半部分所示的概念,密鑰 表是基於每個_,如產麵型、生產商、品牌和產品名 而儲存在儲存單元910裡。加密/解密單元71〇從非接觸 通汛標籤10接收索引當作多個密鑰說明資訊,從每個對應 的表裡給非接觸通訊標籤1〇指定一個密錄組。加密/解密 單元710用密鑰連續地對發送到和接收自非接觸通訊標籤 10的資訊進行多重加密、解密。 在根據本發明的具有標籤讀取功能的行動通訊終端 20-1和20-2的第四實施例裡,加密/解密單元71〇對應於 非接觸通訊標籤1 〇的苐四實施例的加密/解密單元21 〇。 在此貫施例裡,多個密鑰以表的形式儲存在儲存單元91〇 裡。加控/解密單元710接收索引作為密鑰說明資訊,查 閱密鑰表給非接觸通訊標籤10指定密鑰。加密/解密單元 710用指定的密鑰對發送到和接收自非接觸通訊標籤1〇的 38 1294595 14924pif.doc 資訊進行加密與解密。 有標制取功能的㈣ ❾弟五貫施例裡,加解密單it 710對應於 ,,通訊標籤1()的第五實施例的加密/解密單元:二 裡,類似與第三實施例,多個麵以表的形式 HU91丨0裡。加密/解密單元710從非接觸通 =減10接收索引作為密瑜說明資訊,查閱密餘表給非接 ^通訊標iUG指定密錄。加密/解密單元71G連續地用密 錄對發送柳減自非_觀賴1G 進 加密與解密。 、 在根據本發日㈣具錢朗取魏的行動通訊終端 -1和20-2的第六實施例裡,加密/解密單元71〇對應於 非接觸通σί^籤1〇的第六實施例的加密/解密單元。 在此實施例裡,加密/解密單元71〇 &amp;括密餘創建模組, 密錄創建额必需_子值可齡在贿單元91()的數據 ,,或引進、儲存為密鑰創建模組的程式碼。加密/解密 單兀/10利用從非接觸通訊標籤10收到的密鑰創建資訊, 再執行么綸創建模組的程式而創建密鑰,它用密鍮對發送 到和接收自非接觸通訊標籤10的資訊進行加密與解密。 在根據本發明的具有標籤讀取功能的行動通訊終端 20-1和20-2的第七實施例裡,加密/解密單元71〇對應於 非接觸通訊標籤丨〇的第七實施例的加密/解密單元210。 ,此實施例裡,加密/解密單元71〇包括密鑰創建模組。 密鑰創建模組必需的種子值可儲存在儲存單元910的數據 39 1294595 14924pif.doc 二- ^no刹田1子為密鑰創建模組的程式碼。加密/解密 的裎犬而密鑰創建資訊,連續地執行密鑰創建 ^ ^ * 一序列密输,再用密餘連續地對發送到 和接if f觸通訊標鐵10的資訊進行多重加密與解密。 艮本I明的具有標籤讀取功能的行動通訊終端 0 1和20 2的第八貫施例裡,加密/解密單元⑽對應於 非接觸通⑶‘籤ίο的第人實施例的加密/解密單元21〇。 正如圖4B裡下半部分所示的概念,表格是儲存在儲存單 兀910裡。、加密/解密單元71〇從接收自非接觸通訊標籤 索引裡提取出關於密鑰表的密鑰創建資訊。加密/解 密單元710利用提取出的密鑰創建資訊,連續地執行密鑰 創建模組的程式而創建一序列密錄,再用密鑰連續地對發 送到和接收自非接觸通訊標籤1〇的資訊進行多重加密、解 密0 如上所示’根據本發明的具有標籤讀取功能的行動通 訊終端20_1和20-2可以從產業類型、生產商、品牌與產 品名中指定至少兩個產品資訊,並在顯示單元950上顯示 指定的產品資訊’產業類型、生產商、品牌與產品是接收 自關於密鑰創建資訊的密鑰說明資訊、密鑰創建資訊或索 引的。這種指定和顯示至少可以用於第三實施例、第五實 施例、第七實施例和第八實施例。如圖4A和圖4B所示, 產品資訊對應於給每個種類的索引,該種類包括相應的密 鑰,並把產品資訊儲存在行動通訊終端20·1和20-2的儲 存單元910裡。因此,有可能基於接收自非接觸通訊標籤 1294595 14924pif.doc 10的索引,指定至少一部分產品資訊。 根據本發明,行動通訊終端20-1和20-2有選擇地包 括資訊提供單元760、洩漏密鑰升級單元79〇、重送攻擊阻 止單元730、讀取益避定單元770與刷新處理單元720中 的至少一個。這些組件可被引進控制單元7〇〇裡。 育訊提供單元760把資訊讀取單元75〇讀出的資訊讀 取細節透過無線通訊單元970,發送到服務管理伺服器 40。貧訊提供單元760發送資訊讀取單元75〇讀出的資訊, ^產品相關資訊,包括產業類型、生產商、品牌、產品名、 等級、樣式名、生產中心、生產日期、序列號和諸如價格、 ,定時間等的讀取細節資訊中的至少—項,透過無線通訊 單元9?0,發送到服務管理飼服器。至於真偽鑑定後採買 的,品,採買資訊可包括在從資訊提供單元76〇發送到服 務官理伺服裔40的資訊裡。行動通訊終端Μ·〗和2〇-2的 擁有者透過m實產^歡”触紐測顯示單 疋㈣上的產品資訊’再_產品。如果完成採買後按下 操縱單元930的“採買完成,,鍵,可以從儲存單元91〇 =儲存的讀取細節巾,讀出真偽最近被蚊過的產品清 單’减不在顯7F單TL 9 5 G上。-旦用戶從清單中選擇資訊, 按-個“確認,,鍵,相應產品就作為採買來處理。採買 資訊收集在儲存單元91Q裡,然後在按下操縱單元93〇的 -發运鍵後-起發送出去。資訊發送透過無線通訊單 疋970或無線網際網路進行,或者資訊可以以簡單短 的形式發送。另-方面,每次用戶按下“採買完成,,鍵二 1294595 14924pif.doc 訊被以短消息的形式發送到服務管理 級籤10收到關於_密鑰的密錄升 、、及明求貝訊%’您鑰升級單元790放棄儲存在儲 錄’透過在儲存單元⑽裡儲存—個新分發的 的實施例及其操作已經在非接觸通 餘升級翠元220裡描述過,不再描述。 7川舰〜 的貝 給加密/解密單元 數字作為魏回應收到的魏裡提取出隨機 二Si隨機數字是否與原來加到發送資訊上 =ΤΝ㈣職㈣重_^單η 互相3器=單元770與外部便攜式讀取器進行通訊, 定功i允許標9二定結果f訊。這麵 I *外部便攜式讀取器互相檢測 也在钱通訊單元 —單元之 =同二’ 是重送攻擊阻止單元7川八Λ妙…丄 皿疋更好的 之間的通訊進行盜用。二 取器 原理在後面細述。 早疋730的工作 刷新處鮮元綱崎销存單元⑽裡的相闕 42 1294595 14924pif.doc 資訊的密鑰,儲存單元910是非易失性記怜 出的資訊。控_標賴取她 20-2的控制單元7〇〇的主程式,是諸如電子可 和 2記=(ΕΕ_)的存儲設備,數據永久:儲二二 =。另外,如同密錄相關資訊,資訊必驗據具有掉= 能的行動通訊終端职和娘不同地儲存,儲 =存^\在_的情況下,記錄可讀取數_期間 在10年。結果是,#閃存使用較長時間,有可能丢失穷势。 因此,當每次讀取密鑰相關資訊時,包括刷新處理單ϋ0 的具有標籤讀取魏的行動通訊終端2(Μ和2G_2把 數據重新記錄在同樣的位址,從而解決這個問題。# 在本杳明裡’標籤頊取器在行動通訊終端2〇_1和加2 裡實現。這時,操縱單元930能從行動通訊終端2(M和 =2的鍵盤裡使用—個❹個鍵,並使用行動通訊終端 20-1 ^ 20-2的LCD作為顯示單元95〇。儲存單元91〇和 才工,單元700基本上安裝在行動㉟訊終端2〇]矛口 裡, 但疋,在這種情況下,瞻讀操作㈣訊可能㈣漏。因 此,具有“籤碩取功能的行動通訊終端2〇_丨和2〇_2包括 個別設計的ASIC。ASIC包_比麟和觀通訊單 广500的调變/解調電路,作為儲存單元91〇的非易失性 體’作為控制單元700的微處理器。ASIC和用於控制 行動通汛終端20_1和20-2系統的微處理器透過它們各自 的主機界面通訊。由於這種通訊只允許有限數目的命令, 有可能嚴格地保持安全。因此,根據本發明的具有標籤讀 43 1294595 14924pif.docUse the three data encryption standard (3_DataEn which tlGnstancJ as the domain algorithm, but the encryption calculation is limited to the three data encryption phase method two data plus standard algorithm triple application data encryption standard, 4 wood? various · ^ type. In this embodiment According to the cascading three data encryption standard, three materials are used continuously. Since these algorithms are symmetric recording algorithms, the same secret recording is used for encryption and decryption. According to Bai Zhi's authentic product identification method, authentic product identification includes; The intrinsic identification code bribes in the standard 'by reading from the reading ^ inside the white 18 1294595 14924pif.doc, and I if: the intrinsic identification code is the generation corresponding to the real product; the month's real product is determined by manual According to the reading, (four) two morning 7 \ _ poor news to judge 'must undergo the encryption / decryption smuggling smuggling month b correctly display product information., Tian, the first embodiment of the contactless communication tag 1G of the present invention · The main asset is encrypted and decrypted by the only universal key. = ^ ^ brother under the 'universal key 33 〇 as the public only secret of various products' stored in non-communication view 1 () f Device ί single only: the secret record, but can read the production of various products Si C two: (the start of the single unit 210 by the information providing unit 250 using the universal input ^ 330 as an encryption key' to encrypt the information sent to the external device, Interpretation = encrypted message received by the external device, providing the interpreted message, ', 5, i, unit 250. Since the product can be displayed on the tag reader 2, the product information is transmitted through the encryption/decryption unit. It is recognized by the operation of 21〇, and the number of products supplied is true. In addition, if the label used in the new product is newly manufactured, it is not necessary to upgrade the label information of the existing label reader. In the second embodiment of the contactless communication tag 1A, the master key 33〇 as a single key and the key description information 310 suitable for the master key 33〇 are stored in the storage unit 300 of the contactless communication tag 1〇. Companies using contactless communication tags 1准备 prepare multiple keys, which are distributed according to industry type, manufacturer, brand and product type. For example, in the case of mainly trademarks, according to the same brand The class decides to use a different key. In a company that produces a small number of products, the 1294595 14924pif.doc company specifies a single key. All the keys needed to read the corresponding product tag are included in the tag reader 20. Receiving a product information request from the tag reader 2, encrypting/decoding f^^ 210, transmitting the key description information 31〇 to the tag reader, causing the tag reader 20 to select the same key as the key 330. It is stored in the tag reader 20. For example, the key description information 31 can be a message to be distributed to the key. Thereafter, the encryption/decryption unit 210 sends the information to be sent to the external device by the information providing unit. 25〇 Encryption is performed using this key, the encrypted message received from the external device is interpreted, and the interpreted message is supplied to the information providing unit 250. "Similarly, by using the key to explain the information 31, although some secrets are bubbled, the loss is limited to the corresponding industry type, manufacturer, product, and corresponding product. Also, the embodiment using the unique master key The same, including the same secret record, without having to upgrade the existing tag reader. Of course, it is also possible to combine new tags and store new product information. Also, if a sufficient amount of keys are protected on the tag In the reader, it is possible to set a higher level of security for the new product by distributing the evening's loss. In other words, when a new tag is produced, by storing a key that is protected as a redundant key, and corresponding The index of this key, the tag reader receives the index, can specify a key, and is protected as a redundant key, as a key for the new tag. The third implementation of the contactless communication tag 10 according to the present invention In the example, based on at least two elements of the industry type, manufacturer, brand, and trademark, two or more secrets 330 are distributed separately, and correspond to the density 1294595 14924pif.doc The cryptographic information 31 of the 330 is stored in the storage unit 300 of the contactless communication tag ι. Figure 4A shows a third embodiment of the contactless communication tag 1 根据 according to the present invention, showing the initial start, the recording 410, and the non-fan Recording information 42. Refer to Figure 4A 'The secret recorded in the contactless communication label 1〇 includes three poor 2 = 413 and 415 'each is based on industry type, manufacturer and "spoon" 433, 453 And 473 and its corresponding secret description 22", 451 and 471 are stored in the tag reader 20. The label = 20 is divided into three groups, each group is a small age publication, use; solid industry Type 3, manufacturer and brand. For example, multiple confidential records "I, fresh deed 415 can be used in the three data encryption standard algorithm for each step of the three information light it, _ extractor 2 〇 product information request, non The contact directing ", 0, adding/decrypting unit 210 transmits the key description information 310 from the emperor 2 〇 1 and 〇 4 to the tag reader 2 〇. The tag reader 2 0 藏 ==: Select and store the key group in the non-contact communication standard, such as 1324, abcd and 2345, touch to read the current The contactless communication tag is 1〇. Then the 'non-contact pin wheel is used to continuously and repeatedly use the secret/decryption unit 2ig to encrypt and decompose the information received from the tag reader. Amateur, standard iron reading Device 2〇 can identify the name of the calving, brand or product to which the secret belongs. That is to say, in Fig. 4A, ===?, and the products of the woven fabrics of 42丨, 423 and 425 are included in··· The type of attachment, the manufacturer is 1294595 14924pif.doc 3&amp;111 - 八11 industry, the trademark is '〇八1&gt; 八::1, the product type. Therefore, the product information 370 stored in the storage unit 300 and The cryptographic instructions 310 may partially overlap each other in practice. In other words, the indexes 421, 423, and 425 themselves may be part of the product information. The third embodiment has the advantages of both the first embodiment and the second embodiment, and the security level can be enhanced by continuously using a plurality of keys, and the profit of introducing new products can be fully protected. In a fourth embodiment of the contactless communication tag 10 in accordance with the present invention, a plurality of keys 330 and key description information 310 are stored in the contactless communication tag 10, and the tag reader 20 includes products for reading all of the corresponding products. The key required for the information. In this embodiment, upon receiving the read request from the tag reader 2, the contactless communication tag 10 selects one of the plurality of keys 33, and transmits the key description information corresponding to the selected key. To the tag reader 20, the shared keys are made to coincide with each other. The selection of the non-contact communication tag 1〇 is performed using a rotation or a random scheme. Subsequently, the contactless communication tag 10 encrypts and decrypts the poor message exchanged with the tag reader 20 using the selected key. The fourth embodiment of the contactless communication tag 10 according to the present invention has two advantages of the first embodiment. Since the non-contact pass 4 "sign 10 responds by changing its key at each read operation, the second embodiment can improve the ability to process the forged reader. The fifth of the contactless communication tag 10 according to the present invention. In the embodiment, the plurality of keys 330 and the key description information 310 are stored in the contactless communication ticket 10. The tag reader 20 includes the record of the product A of reading all the corresponding products. Each cc group of the communication tag 10 includes up to seven records, which are classified and distributed according to at least two elements of the industry type, manufacturer, brand, and product name 22 1294595 14924pif.doc. For example, Multiple cc" uses three keys for each step of the second data encryption standard algorithm. In other words, in the fifth embodiment of the present invention, the contactless communication tag 1 includes a plurality of key groups 411, 413 and 415 and a plurality of key description resource groups 421, like 3 and 425. . The encryption/decryption unit 21 〇 continuously uses a plurality of keys and processes encryption and decryption. The selection of the tag's key is done using a rotation or random scheme. Thereafter, the tag uses the selected key group to continuously encrypt the information exchanged by the 2 ticket check H. In the case of the third embodiment of the non-contact communication tag 10, in the fifth embodiment, the tag reader 2G can identify the industry type, the business name, the card name, and the product name. Therefore, in various forms of the fifth embodiment, the product information 370 and the secret description information 31 of the unit 300 may overlap with each other. The fifth embodiment of the non-contact communication tag according to the present invention has the advantages of the first to fourth embodiments. In the sixth embodiment of the contactless communication tag 10 according to the present invention, the non-contact communication 1G includes a record and a secret information, and it is used to read H to create a secret with the contactless communication. According to if it uses the contactless communication Lai 1G company to order a secret record, the root two-degree surface type, manufacturer, brand and product surface, etc., distribute different tag reader 2G including secret_modeling group, can be created Read all 』: ί;= required secrets. The secret record creation module utilizes - a kind of secret transmission: the number of keys that can be created by the 彳f to receive the self-labeled ___··································· _. Despite the species stored in the ϋ20, 23 1294595 14924pif.doc: different keys can be assigned to many products. 产 Μ 标 读取 读取 读取 读取 读取 读取 读取 读取 读取 , , , , , , , , , , , , , , , , , , , , , , , , , That is, the type of industry, the manufacturer, and the need for a ^:1 ticket reader 20. By distributing a new key to the product, it is possible to affix a standard I1 that stores the creation information for creating the new secret. Also, the real production message according to the present invention is a sentence displayed on the display unit, and the same product can be used for authentic product identification. The Create module can be an integer as a result of the value generated by the received key. The present invention is not limited to this key! ^建贝K'c疋 To understand, the cryptographic creation information includes specifying and creating information of the key = 20; For example, the key creation information may be a manufacturer code, a brand code, a product code, or a text message including a product name and a product name. In addition, the key creates a method that includes a multi-function and operation, and can use a seed value, up to + one == build, thus, by appropriately selecting the _ create ^ group of the f-busy method, that is, the wonderful - face bribe In the presence of the standard H 20, it is possible to actually protect many keys. The encryption/decryption unit 2 of the contact condition tag 10 of the contactless communication tag 10 according to the present invention transmits the key identification information 310 to the tag reader 2,毋代々,, State 20 creates and stores the key %〇一二24 1294595 14924pif.doc key stored in the tag reader 2〇. After that, add / you want to use the information provided by the information providing unit 25〇 This is the 'will be used to issue the external device's Wei encryption, or explain the encrypted message from the external device. (4) The message is sent to the information providing unit. In the non-contact communication tag ω implementation = 2 over fir tortoise 'many secret record It is fully distributed to ίΐί cards or products. Therefore, even when the key is partially leaked, the city can be minimized. In addition, similar to the first embodiment, it can be composed of the same key but stored difficult information. New labeling, without the need to upgrade existing distributed label readers. Also, when implementing new products here, 'If you have a new read and read information for creating a secret record, the tag reader Can Xiang from the standard connection == save _ sub value and heard News, still with the same iron ίί corresponding standard recording density. Therefore, it is possible to introduce more new products in terms of real products to determine and maintain a higher level of Anwang Temple. In the seventh embodiment of the present invention, the storage unit 300 of the non-f? fine ticket 10 stores at least two keys 根据' according to the elements of the industry type, manufacturer, brand and product name. At least two elements 'are classified and distributed. The secret created as a description of the recorded information corresponds to at least two margins of 33〇. In this embodiment, the encryption/decryption unit 21 uses the stored secret record to transmit the message from the contactless communication tag (4) through the specific function, or based on the secret side of the connection (4). The operation's operation ', or internal seed value' creates a key group that is stored in the contactless communication label. Compared with the sixth embodiment, the advantage of the seventh embodiment is 25 1294595 14924pif.doc point: security is improved by using multiple encryption of multiple ciphers. In the eighth embodiment of the non-contact communication standard &amp; 10, the non-contact communication ^ JtT unit 300 stores: at least two dense transmission 330, according to at least two elements in the elements of ΐ, manufacturer, brand and product name , is classified as a class, distributes; a secret creation information corresponding to the two keys 330; an index for identifying the identification information of the secret record creation information. In this case, the crypto/decryption unit 21G continuously encrypts the encrypted data by continuously using the stored secrets. The tag reader 20 receives an index on the key creation information from the contactless communication tag 1〇, and displays the key stored in the contactless communication through the specific function, based on the received operation and the inner hash value. Group the same key group. The figure 4B illustrates the secret 410, the key creation information 42 and the key corresponding to the key creation information 42q according to the eighth embodiment of the contactless communication tag. In Fig. 4B, reference numerals corresponding to Fig. 4A or like (4) are the same as Fig. 4A. Referring to 4B, the key 41 stored in the contactless communication includes three keys 41, 413 and 415, each of which is determined by the neck type, manufacturer and trademark. For example, the plurality of secret records 411, 6/, 4丨5 may be created by using three secrets of each of the three data encryption standard algorithms to create the keys 411, 413 and . The parameters 491, 493, and 495 of the loose creation information 490 can be stored in the storage unit 300, but are not required. The index 420 for specifying the key creation information is stored in the storage unit 3〇〇 of the contactless communication tag 1〇, and the heartbeat item 20 requests detailed description of the secret record, and sends them to the tag reading. 20. The key creation resource 26 1294595 14924pif.doc of the creation key '1324,411 is 133' 491, and the index for specifying this key creation information is '02' 421. Similarly, the key 'abcd, 413, the key creation information '256' 493 and the index '〇1, 423 correspond to each other; the key '2345, 415, the key creation information '267, 495 and the index '〇4, 425 Correspond to each other. The keys of the tag reader 20 are divided into three groups, each of which is a key distribution table for the type of industry, manufacturer, and brand. ^ Upon receiving the product information from the tag reader 20, the encryption/decryption unit 21 of the contactless communication tag 10 transmits an index as the key description information 310 'here 疋〇 2', '〇1' and '〇 4,. The tag reader 2 查 难 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 〇 这些 〇 这些 这些 这些 这些 这些 这些 这些 这些 这些 这些That is, '1324, '', and '2345, the secret record is stored in the contactless communication tag 1,, here is '133, 256 and 267. The tag reader 2 reads the non-language communication tag 10 by executing a predetermined password-based (4) recording algorithm, (4) key lying and seed value 'deferred ship's recording (4). Thereafter, the encryption/decryption unit (10) of the non-contact communication target 10 encrypts and decrypts the UI transmitted to and received from the tag reader 20 through the plurality of secrets. According to the eighth embodiment of the contactless communication tag 10, once the key is obtained, the tag reader 20 can recognize the cloaked industry type, raw silk card or trademark. In other words, referring to FIG. 4B, based on the secret 41〇, the secret record creates the 420* index, the tag reader 2〇 can identify the non-contact communication tag from the receipt, 423 and 425. The production of ^ 27 1294595 14924pif.doc No is included in the · · · attachment type ' one-time housing business 疋 Samah industry, ceramic standard is CAPACCI, the product type. Therefore, in various forms of the eighth embodiment, the product information 370 and the secret recording information 3H in the storage unit 300 may partially overlap each other in real money. In other words, the index Ί: 425 can be part of the product 370. According to the eighth embodiment of the non-contact communication tag 1 of the present invention, there are sixth and seventh embodiments, = advantage = additionally, in the first person, the security level can be enhanced due to the index of transmission and reception. 'And help Lai read ^ 2 This content will be described later. ^ = This process, the tag reader 2 Q specifies the corresponding secret record, request: save, touch the product information in the communication tag 10, receive the return of the request: ΐ::, display the received response. If it is not correct on the product, the tag reader 2G and the contactless communication are on the display unit. If it is forged on the product;: it will fail, so that the unreadable, meaningless information is ii70, or the fake product warning message is displayed. Therefore, the customer can check the authenticity of the product. The contact reader 2G (four) read unit 750 receives a plurality of product codes for different product information, and outputs the product code. In other words, for a product, ίΐί:: The contact unit of the non-contact communication tag 1 遍 a : 20 reads and displays the stored product code. For example, the first product code t, the first displayed product code is the manufacturer, the second 28 1294595 14924pif.doc = Maru, the next - displayed product code is a non-sequence of each product 'indicates the color LED on or turn off. 200 220 ” 士U拉广余升级单$22G. _ Confidential upgrade unit 2 Γ 标签 label 1〇, if the agreement is good (4), it will make the forged trademark invalid. After the 3⁄4 leak, the mold is assembled in the newly produced label. When the standard reading is read as the t-picture to read the non-contact communication standard 10, the leaky secret update unit 20f20 gives up the existing reading about this label. The secret record of the picker, the boot tag read the second key, and the new key specified by the shallow file is upgraded. The 8:3⁄4 missed upgrade unit 22 is applied to the contactless communication tag 10 according to the present invention. In the first embodiment, the tag reader % is sent a newly used unique key. The tag reader 2 deletes its own universal record 4, and records the received universal key as a new secret. At this time, by appropriately defining the key upgrade protocol between the non-contact communication tag 10 and the tag reader 2, the danger caused by the misappropriation of the master key can be reduced. The leak permit update unit 220 is applied to the present invention according to the present invention. A second embodiment of the contactless communication tag 10, which is installed in an industrial type The label of the manufacturer, brand or product is the same as the leaked secret clock, which sends the corresponding newly used key to the tag reader 20. The tag reader 20 discards the existing distributed key. A newly received key is stored in the index corresponding to the contactless communication tag 1, as a confidential record of the corresponding industry type, corresponding manufacturer, phase, or corresponding product. Leakage Key Upgrade Unit 220 A third embodiment applied to the contactless communication tag 10 according to the present invention, which is installed in a contactless communication tag 1 such as an industrial type, manufacturer, brand or product, which is a type of leaking The secret record-like, it gives the corresponding newly used secret to the reader 20. The tag reader 2〇 update corresponds to the index ^, these indexes are the tables of each side of the class received by the new The record is sent to the main message 1 〇. For example, in the case of the non-contact communication standard ίο shown in Figure 4, the brand index is specified as '04, .'2345, which is the wire of ^匕But 'screaming two single 兀W7Q, W to guide the standard iron The key extractor 2〇 &lt;2345, changed to . For this purpose, the leak key upgrading unit 22 can read the target 11 20 '. If the protection has a sufficient number of points, the new key can also be set by selecting an index of the excess secret. For example, if it corresponds to '5678, the existing cable, the leaky wheel upgrade unit 22〇 sends '15, and the reader 20 from it _p &amp; this station. Only after wearing ‘5678, 4 k takes out the key η corresponding to ‘15, and measures it, and distributes it as a secret record corresponding to (4) ‘(10). = in the 2 ,, corresponding to the index '(10) and % 丨 = 22 = ^ _ _ non-contact = = • 升 = 密 = = 3⁄4 in the index, corresponding to the secret input in the secret table ^ 1294595 14924pif.doc The upgrade is reversed to the fifth embodiment of the non-contact 4 paper 10 according to the present invention, which upgrades all the multiple key groups of the non-two. Therefore, the non-contact =: two 10 s to store the poor 鈒罝 鈒罝 Λ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ ^ : ^ reach ', the group upgrade marriage _ first in the :: =; = f 1 〇 secret record group, and then use the received key to upgrade the entire secret record group in the order of receipt. The object unit 220 is applied to the sixth embodiment of the contactless paper 0 according to the present invention. It electrically transports the newly created secret record creation information to the tag reader 20. At this time, the information corresponding to the new secret record is created. The secret record is stored in the contactless communication tag 1G. The tag reader 2() can register the general key creation information as a bad tag in the blacklist. In this case, if the specific request is true In the pseudo-determination, the tag reader 2 can refer to the blacklist and the production cycle to more accurately determine whether the tag is a fake or a tag. Therefore, it is possible to determine that the tag # produced before the specified production cycle is true, in The label produced after the specified production date is forged. The leak key upgrade unit 220 should In the seventh embodiment of the contactless communication tag 10 according to the present invention, it transmits key creation information that should be newly used to the tag reader 20. For example, assume that in the key of Fig. 4B, the secret is 1324 411. It is leaked out by the steam. At this time, the new secret record '1567 is stored in the newly issued label instead of the key '1324, and the key creation information corresponding to the new key '1567' is '138. In the case, the leak 31 1294595 14924pif.doc leak key upgrading unit 220 deletes the key creation information '133' corresponding to the index '02' (where the index '〇2, the label in the secret list 430 distributed to the label) The request to record the new secret creation information is 138. Thus, the tag reader 20 extracts '138' from the key table 430 as the secret record creation information corresponding to the index 02, and creates the secret record '1567'. Yes, the forged key with the key '1324, or the existing distributed label' cannot read its product information, thereby determining that the counterfeit or existing distributed label is forged. Also, according to the present invention Non-contact The control unit 200 of the tag 1 or the non-contact communication tag may include a resend attack blocking unit 23. In the secret technology, the resend attack t smells through the face--a registration message sent by the encrypted user. To try to access the feeder and redeem the illegal> to the server. In order to deal with this = please, to the customer, after the registration request message includes == the same as the if encryption, the customer in the response to the registration message includes random The number ΐί is allowed to register. Because of the help of the technology with the help of ^=, there is a possibility of 're-transmission resistance'. He reuses the q-grass reward product using the same registration message. At the time of identification, this invention's ―= its 32 1294595 14924pif.doc has higher reliability. The contactless communication tag 1 or its control unit 2A according to the present invention may include a post-management processing unit 270. The read detail information is stored in the storage unit 300 of the non-contact communication tag 10. Each time the reading is made, the information providing unit 250 stores the read detail information 'such as the serial number and the reading period of the tag reader 2〇 in the designated area of the storage unit 300. When the value stored in the count and the number of management reads is higher than a predetermined value, the message providing unit ^ = provides product information. The post-design management processing unit is not only used to provide information, but also provides a specific terminal for a specific age book, such as: the management of the reader, the abandonment of the number of readings. Read the two sets: in the universal reader. It can identify the user who has been placed by the user:: the ticket to the tribute or the label attached to the returned product. The user who has verified the authenticity of the two, the authenticity of the clock, the effective use of the information It is also possible to follow the trend of sales, f non-communication label 10 or its control unit 200 pity "_eshM unit 29 (). Usually in the body, after recording, can be used to check the production ;: refresh processing unit 290, each 'f contact _ tag 10 in the storage unit 300, the refresh is re-recorded in the wrong storage unit 300, this refresh processing must contain the king's data, including the secret record , product information and counting 33 1294595 14924pif.d〇c - In this case, the contactless communication device, the refresh processing unit 290 performs a remarriage by re-marriage in the block unit including the refresh buffer: 2 refresh the buffer capacity refresh processing products, it is best to treat the available thorns new. Without limiting the available _ take the seam. H number is set to be large or take cry;; = 3 ' according to the invention, with the label reading function Label reading = 2G_2 including manipulation unit 93q, display list (4) Sound: 2兀960, battery (unsuccessful), tag communication unit leakage, 兀91〇, information reading unit 750 and control unit 7〇〇 (Code Divesion Multiple Access, CDMA) communication. Tag communication unit 500 In the wireless mode, the data is exchanged with the contactless communication tag 1 to transmit the necessary energy wirelessly. The tag communication unit 5 is not only the button of the ordinary mobile communication terminal but also one or two touches. Reading the female contact information transmission alone. Or, = the mobile communication terminal 2 with the reading function (M and 2 ()_2 controlled to read the wood for the day, the specific button in the button of the mobile communication terminal is used as the disk The function of the read function = off, such as the read start button and the information send button. The display unit 950 uses the LCDs of the mobile communication terminals 20-1 and 2〇 2. The sound output unit 960 uses the mobile communication terminal 20-1 and 2〇_2 speaker. ^ Line communication unit 970 provides mobile communication function circuit, is Qualc〇mn; company's MSM group chip, related radio frequency (RF) circuit support code points 34 1294595 14924pif.doc including antenna 51〇 Energy transmission Element 531, demodulation single is 33 (four) 535. Antenna 510 receives data in a wireless mode for the non-contact communication target. Antenna 5) can be formed in a printed pattern along with a read function = I1 and 2 〇 2 weeks. Power transmitting unit The necessary energy is transmitted by the ^5 = non-touch communication tag. The demodulation is transmitted through the antenna 510 and received from the non-contact communication. The modulation unit 535 sends the message to the contactless communication tag. The domain tag communication unit · the contactless communication device 110, the energy supply unit m, and the antenna of the non-contact communication mark _ are not described in detail herein. Like Zhou Zaofan 133 and Modulation Unit 135' Lang controls the whole system and the seed value of 1 required to create information exchange, it is stored in the storage unit _ in the main exchange (4) (4) The dense storage tree includes: non-volatile Memory should be temporarily stored in flash memory. The action with the read function also reads the detailed information about the target iron, which is n 玖 Γ 70 70 910 Hz. Market personnel can identify the customer's hobbies by reading the readers from the line and 2G_2's (10) computer. (4) The unit can be implemented as a sample microprocessor. The information read is based on a component hired by the control unit, and the 750 response to the command from the manipulation unit 930 'Please 35 1294595 14924pif.doc to request product information from the contactless communication tag 1〇, on the display unit 95〇 The product information received from the contactless communication tag 10 is displayed on the top. Encryption/Decryption The unit 710 encrypts and decrypts the video transmission to or from the non-contact transmission through the tag communication unit 500. The communication reading unit interacts with the information providing unit 兀 250 of the non-contact communication tag 10, and the encryption/decryption unit 71 and the non-contact communication tag 1 interact with each other. The information reading unit MO displays the product information from the non-contact communication tag 10 in the text or graphic mode on the member unit 950. When the display unit 95 includes seven (four) f-shirt LEDs, the communication providing unit 25 displays on the display unit 95 产品 the product information received from the ^_ communication target 1〇. Under this Si's 'two 7 orders' ★ 750 from the contactless communication tag 10 information is mentioned; the unit is more than two, the product code and continuously output the received product code ====== into one The message is sent from the non-contact communication terminals 2CM and 20, or the response from the action product code from the information providing unit fetch unit 75 (; the request 'ports the multi-communication terminal 20-1 and 2〇2 times to have The action of taking the function takes out multiple product codes, and the pre-=! fetch unit 75G successively displays from the received message on the display unit 9: wide: f, the extracted product code is connected to the display unit Continually in the reading result, the sound is turned out (10) _ 1 is very 艨 讯 硕 取 取 兀 750 750 750 also includes - a voice. Information read and read, information read grass 亓 7 ς η + circuit, Different current time. Each time 50 reading time and reader serial number 36 1294595 14924pif.doc are sent to the label for storage. Make the day and serial number as part of reading detailed information, such as U:疋 710 through the tag communication unit 500 from the non-contact storage; r production read to create f news, Xiang _ crane to create information Read: The seed value of 910 in the first time creates a key, and encrypts it with the encryption. Also, the encryption, decryption unit 710 encrypts the encryption of the label 1 , and the communication of the decryption unit 210 comes to the information 'from the storage. In the unit _, the face towel for multiple (four) provinces and products, selects the reading related to the currently read tag, and selects the contactless communication tag 1G and the mobile communication terminal 2 with the selected key (Μ and 20·2 The communication process is described later. The mobile communication terminal 2 (the encryption/decryption unit 71 of the M and 2〇_2) corresponds to the non-contact communication tag! The encryption/decryption unit training can be configured to correspond. The security of the fabric __ secret 1 1 (). Encryption/decryption, the process by the mobile communication terminal 2 (the encryption of the embodiment of M and 2q_2 <decryption unit 710 performs 'because of this process on the f and non-contact communication tag 10 The process performed by the encryption/decryption unit 210 of the embodiment is the same and will not be described in detail here. In the first embodiment of the mobile communication terminals 20-1 and 20-2 having the tag reading function according to the present invention, encryption/ The decryption unit 71 〇 corresponds to the contactless communication tag 10 The encryption/decryption unit 21 of the first embodiment. In this embodiment, the storage unit 910 stores only the single key of the master key. The add/unblock unit 710 sends and receives the contactless communication using the universal key. The information of the tag 10 is encrypted and decrypted. 37 1294595 14924pif.doc In the second embodiment of the mobile communication terminals 20·1 and 20-2 having the tag reading function according to the present invention, the encryption/decryption unit corresponds to contactless communication. The encryption/decryption unit 21 of the second embodiment of the tag 10. In this embodiment, the storage unit 910 stores a plurality of keys corresponding to the index. The encryption/decryption unit 710 receives the key description information from the tag, such as an index, refers to a secret record, and encrypts and decrypts the information transmitted to and received from the tag with the specified secret. In the third embodiment of the mobile communication terminals 20·1 and 20-2 having the tag reading function according to the present invention, the encryption/decryption unit 71 corresponds to the encryption of the third embodiment of the non-contact tag 10 The decryption unit 21〇. In this embodiment, as shown in the lower half of Figure 4, the key table is stored in storage unit 910 based on each _, such as face type, manufacturer, brand, and product name. The encryption/decryption unit 71 receives the index from the non-contact communication tag 10 as a plurality of key description information, and assigns a secret recording group to the non-contact communication tag 1 from each corresponding table. The encryption/decryption unit 710 continuously encrypts and decrypts the information transmitted to and received from the contactless communication tag 10 with the key. In the fourth embodiment of the mobile communication terminals 20-1 and 20-2 having the tag reading function according to the present invention, the encryption/decryption unit 71 加密 corresponds to the encryption of the fourth embodiment of the contactless communication tag 1 / The decryption unit 21 is 〇. In this embodiment, a plurality of keys are stored in the storage unit 91A in the form of a table. The control/decryption unit 710 receives the index as the key description information, and the key table is searched to assign the key to the contactless communication tag 10. The encryption/decryption unit 710 encrypts and decrypts the 38 1294595 14924pif.doc information sent to and received from the contactless communication tag 1 with the specified key. In the fifth embodiment of the standard reading function, the encryption/decryption unit it 710 corresponds to the encryption/decryption unit of the fifth embodiment of the communication label 1(): Erri, similar to the third embodiment, Multiple faces are in the form of a table HU91丨0. The encryption/decryption unit 710 receives the index from the non-contact pass = minus 10 as the secret description information, and refers to the secret table to specify the secret record for the non-contact communication target iUG. The encryption/decryption unit 71G continuously encrypts and decrypts the encrypted pair with the non-view 1G. In the sixth embodiment of the mobile communication terminals-1 and 20-2 having the money according to the present day (4), the encryption/decryption unit 71 corresponds to the sixth embodiment of the non-contact σ ί ^ 签 签Encryption/decryption unit. In this embodiment, the encryption/decryption unit 71 〇 &amp; includes a secret creation module, the cryptographic creation amount _ sub-value can be aged in the data of the bribe unit 91 (), or imported, stored as a key creation modulo Group of code. The encryption/decryption unit 10 creates a message by using the key received from the contactless communication tag 10, and then executes the program of the loyalty creation module to create a key, which is sent to and received from the contactless communication tag by the key pair. 10 information is encrypted and decrypted. In the seventh embodiment of the mobile communication terminals 20-1 and 20-2 having the tag reading function according to the present invention, the encryption/decryption unit 71 加密 corresponds to the encryption of the seventh embodiment of the contactless communication tag / Decryption unit 210. In this embodiment, the encryption/decryption unit 71 includes a key creation module. The seed value required by the key creation module can be stored in the data of the storage unit 910. 39 1294595 14924pif.doc II - ^no CAMERA 1 is the code of the key creation module. Encrypting/decrypting the dog and creating the information by key, continuously performing the key creation ^ ^ * a sequence of secret transmission, and then using the secret to continuously encrypt and encrypt the information sent to and connected to the communication target 10 Decrypt. In the eighth embodiment of the mobile communication terminals 0 1 and 20 2 having the tag reading function, the encryption/decryption unit (10) corresponds to the encryption/decryption of the first embodiment of the non-contact (3) signature. Unit 21〇. As with the concept shown in the lower part of Figure 4B, the form is stored in the storage unit 910. The encryption/decryption unit 71 extracts key creation information about the key table from the index received from the contactless communication tag. The encryption/decryption unit 710 creates information using the extracted key, continuously executes the program of the key creation module to create a sequence of secret records, and then continuously transmits and receives the key to the non-contact communication tag using the key. The information is subjected to multiple encryption and decryption. 0 As shown above, the mobile communication terminals 20_1 and 20-2 having the tag reading function according to the present invention can specify at least two product information from the industry type, manufacturer, brand, and product name, and Displaying the specified product information on the display unit 950 'Industry type, manufacturer, brand, and product are key description information, key creation information, or index received from the key creation information. This designation and display can be used at least for the third embodiment, the fifth embodiment, the seventh embodiment, and the eighth embodiment. As shown in Figs. 4A and 4B, the product information corresponds to an index for each category, the category includes a corresponding key, and the product information is stored in the storage unit 910 of the mobile communication terminals 20·1 and 20-2. Therefore, it is possible to specify at least a portion of product information based on an index received from the contactless communication tag 1294595 14924pif.doc 10. According to the present invention, the mobile communication terminals 20-1 and 20-2 selectively include an information providing unit 760, a leak key upgrading unit 79, a resend attack blocking unit 730, a read benefit avoiding unit 770, and a refresh processing unit 720. At least one of them. These components can be introduced into the control unit 7〇〇. The information providing unit 760 transmits the information reading details read by the information reading unit 75 to the service management server 40 via the wireless communication unit 970. The poor communication providing unit 760 sends the information read by the information reading unit 75, and the product related information includes the industry type, manufacturer, brand, product name, grade, style name, production center, production date, serial number, and such as price. At least one of the read details, such as a fixed time, is sent to the service management feeder via the wireless communication unit 9-0. As for the purchase and purchase of the authenticity, the purchase information may be included in the information sent from the information providing unit 76 to the service manager. The owner of the mobile communication terminal Μ·〗 and 2〇-2 displays the product information 're-products' on the single 疋 (4) through the m production ^ 欢 触 。 。 。 四 四 四 四 四 四 四 四 四 四 。 。 。 四 四 如果 如果 如果 如果 如果 如果 如果,, the key, can be read from the storage unit 91 〇 = stored reading details, read the list of genuine and recently mosquitoed products, minus the 7F single TL 9 5 G. Once the user selects the information from the list, press - "confirm," and the corresponding product will be processed as the purchase. The purchase information is collected in the storage unit 91Q, and then after pressing the - delivery button of the manipulation unit 93〇- Send it out. The information is sent via wireless communication unit 970 or wireless internet, or the information can be sent in a simple and short form. On the other hand, each time the user presses “Purchase, the key is 2294595 14924pif.doc. It is sent to the service management level sign 10 in the form of a short message, and the confidential record is received about the _ key, and the 求 贝 讯 % 'Your key upgrading unit 790 abandons the storage in the storage record 'is stored in the storage unit (10) A newly distributed embodiment and its operation have been described in the non-contact upgrade upgrade Tsui Yuan 220 and will not be described. 7 Chuan Ship ~ The number of encryption/decryption unit numbers given as Wei responded to Wei Li extracted whether the random two Si random numbers were added to the original transmission information = ΤΝ (4) positions (four) heavy _^ single η mutual 3 devices = unit 770 Communication with an external portable reader, the fixed power i allows the standard 9 to determine the result of the signal. This side of the I * external portable reader detects each other also in the money communication unit - the unit = the same two is the resend attack blocking unit 7 Λ Λ 丄 丄 疋 疋 疋 better communication between the misappropriation. The principle of the second extractor is described in detail later. The work of the early 730 is refreshed in the fresh element of the kosaki sales unit (10) 42 1294595 14924pif.doc The key of the information, the storage unit 910 is non-volatile information. The main program of the control unit 7 that is based on her 20-2 is a storage device such as electronic and 2 = (ΕΕ_), and the data is permanent: 2nd = 2. In addition, as with the confidential information, the information must be checked. The mobile communication terminal and the mother are stored differently. The storage is stored in the case of _, and the recordable number is _ in 10 years. As a result, #flash uses a long time and it is possible to lose the poor. Therefore, each time the key related information is read, the mobile communication terminal 2 having the tag read Wei including the refresh processing unit 0 (Μ and 2G_2 re-record the data at the same address, thereby solving the problem. In the present invention, the tag extractor is implemented in the mobile communication terminals 2〇_1 and 2. At this time, the manipulation unit 930 can use one of the keys from the mobile communication terminal 2 (the keyboard of M and =2), and The LCD of the mobile communication terminal 20-1 ^ 20-2 is used as the display unit 95. The storage unit 91 and the work unit are basically installed in the action 35 terminal 2 〇] spear, but oh, in this In this case, the reading operation (4) may be (4) leaking. Therefore, the mobile communication terminal with the "signing master function" 2〇_丨 and 2〇_2 includes the individually designed ASIC. ASIC package_Bilin and Guantong Communication 500 a modulation/demodulation circuit as a non-volatile body of the storage unit 91A as a microprocessor of the control unit 700. The ASIC and the microprocessor for controlling the mobile communication terminals 20_1 and 20-2 system pass through them Communication with the respective host interface. Since this communication allows only a limited number The order is likely to remain strictly secure. Therefore, according to the invention, there is a label reading 43 1294595 14924pif.doc

取功能的行動通訊終端20-1和2〇-2可透過給習知的手機 增加獨自設計的ASIC和天線圖案來完成。這時,用於ASIC 和用戶界面之間通訊的獨自的軟體模組必須另外地安穿在 行動通訊終端20-1和20-2裡。 圖5表明根據本發明的行動通訊終端20-1和2〇-2的 產品資訊讀出過程的流程圖。 參照圖5,在第一步S500裡,對應於一個密鑰的密鑰 相關資訊是基於在產業類型、生產商、品牌與產品名 素中至少一個要素被設置的,此密鑰儲存在具有標鐵讀取 功能的行動通說終端20-1和20-2的儲存單元91〇裡。在 步驟S510裡,行動通訊終端20-1和20-2基於接收檢測到 的非接觸通訊標籤10的密鑰說明資訊,從儲存在儲存單元 910裡的密鑰相關資訊裡指定一個密鑰,選擇指定的密输 作為密鑰用於當前的通訊。這時,具有標籤讀取功能的行 動通訊終端20-1和20-2透過利用接收來自標籤的密餘 創建資訊和儲存在儲存單元910裡的密鑰種子資訊而創建 密鑰,指定它為密鑰。在步驟S520裡,具有標籤讀取功 能的行動通訊終端20_1和20_2給請求產品資訊的請求消 息加密並發送到標籤10。在步驟S530裡,具有標籤讀取 功能的行動通sfl終端20-1和20-2把接收自標籤的產品資 訊消息如商標、產品名與等級解密,把產品資訊消息顯示 為可視資況。具有標籤讀取功能的行動通訊終端2〇-1和 20-2透過給資訊請求消息增加一個隨機數而給資訊請求消 息加密,把接收自非接觸通訊標籤1〇的產品資訊消息解 44 1294595 14924pif.doc 密,檢測解密過的產品資訊消息的隨機數是否 肖息上的隨機數—樣,從而另外地應付The functioning mobile communication terminals 20-1 and 2〇-2 can be completed by adding a uniquely designed ASIC and antenna pattern to a conventional mobile phone. At this time, a separate software module for communication between the ASIC and the user interface must be additionally worn in the mobile communication terminals 20-1 and 20-2. Figure 5 is a flow chart showing the product information reading process of the mobile communication terminals 20-1 and 2〇-2 according to the present invention. Referring to FIG. 5, in the first step S500, the key related information corresponding to one key is set based on at least one element in the industry type, manufacturer, brand, and product name, and the key is stored in the standard. The action of the iron reading function is described in the storage unit 91 of the terminals 20-1 and 20-2. In step S510, the mobile communication terminals 20-1 and 20-2 select a key from the key related information stored in the storage unit 910 based on the key description information of the detected non-contact communication tag 10, and select a key. The specified secret is used as the key for the current communication. At this time, the mobile communication terminals 20-1 and 20-2 having the tag reading function create a key by using the secret creation information received from the tag and the key seed information stored in the storage unit 910, and designate it as a key. . In step S520, the mobile communication terminals 20_1 and 20_2 having the tag reading function encrypt the request message requesting the product information and transmit it to the tag 10. In step S530, the action-passing sfl terminals 20-1 and 20-2 having the tag reading function decrypt the product information messages received from the tag, such as the trademark, product name and level, and display the product information message as a visual condition. The mobile communication terminals 2〇-1 and 20-2 having the tag reading function encrypt the information request message by adding a random number to the information request message, and the product information message received from the contactless communication tag 14444 1294595 14924pif .doc secret, detecting whether the random number of the decrypted product information message is a random number on the echo, so as to additionally cope with

擊。退有,在步砰J里k JC 動通7 ,一旦具有標籤讀取功能的行 動通U而2〇-1和2〇_2接收密鑰升級請求資訊, =泡Γ:密鑰’用新密鑰升級,具有標籤讀取功“行 鑰分發給相應的產品,選擇新宓铲柞 阳用新山 ^ k释新么鑰作為密鑰用於當前的通 吕fl 〇 圖6表,籤1()和具有讀取功能的行動通訊終端_ 和20-2之間通訊過程的流程圖。 參照圖6 ’在步驟S_裡,用戶透 功能的行純訊終端2(M和咖㈣定按鍵請j = t孔的㈣。因此,在步驟S6〇5裡,具有讀取功能的行動 H終祧20-1和20-2檢測標籤1〇的存在。這種檢測可以 是遷守刪4443標準的檢測方法’但不偈限於此。具有 =取功能的行動通訊終端2(M和2G_2執行—個協議,有 選擇地指定密鑰。標籤10裡可儲存—個❹個密输用於與 具有讀取功能的行動通訊終端204和2〇_2之間的通訊, 如果是多個密鑰的情況,在被其後的協議指定後使用其中 一個密鑰。為了指定密鑰,在步驟S61()裡,且有讀取功 能的行動通訊終端2(M和2G_2把請求密麟細說明的密 鑰詳細說明請求消息發送到標籤10。這時’具有讀取功能 的行動通訊終端2(M和20·2給錄詳細說明請求消息加 一個隨機數’發送此密鑰詳細說明請求消息。在步驟s615 45 1294595 14924pif.doc 裡,標籤1〇把岔錄的詳細說明必須的密输說明資訊,作為 對後、输详細说明ό月求消息的回應,如密錄的索引發送出 去。這時,標籤10給密鑰詳細說明消息加一個接收自具有 讀取功能的行動通訊終端20-1和20-2的隨機數和在標鐵 1〇裡產生的隨機數,然後發送密鑰詳細說明消息。因此, 不僅可以保護發送消息,而且還能保護從重送攻擊收到的 消息。其中用的加密方法是三數據加密標準方法,由於它 是對稱密鑰算法,加密密鑰和解密密鑰是一樣的。 、標籤10可以提供密餘創建資訊用於創建一個密餘作 為給具有讀取功能的行動通訊終端20-1和20-2的密鑰說 明貧訊。密鑰創建資訊是用於密鑰創建函數的一個參數。 這裡,密鑰創建函數是以標籤讀取器20裡的程式實現的。 在步驟S620裡,具有讀取功能的行動通訊終端2〇_i和2〇_2 使用基於種^值的密_建函數舰—個㈣,該種子值 儲存在儲存單元910裡,密鍮繼資訊接收自標籤1〇。例 如,當種子值是123456,參數可以是用來從種子值的排列 與組合而創建的幾個密馳選擇—個的索引。另一方面, ,數可以是用來從許多密錄裡選擇—個的索引,這些密錄 ,透過加密—録日㈣塊單元_子_鎌字而抽取^ “的。减遇可以是關於算法裡區_分的參數,此算法 ΐ用於加密—個表塊單元鋪子值的㈣字的。關於 建,有♦多异法都很出名,這裡就忽略其描述。 存在標籤讀取器2G裡,儲存在標鐵10 裡的讀創建賢訊包括用於指定種子值的索引。這裡,其 46 1294595 14924pif.doc 匕的組件與具有單個種子值的實施例是一樣的,此處省略 其描述。透過使用上述的密鑰創建函數,有可能增加具有 不同密鑰的、真偽鑑定目標產品,其數目和能創建的密餘 數樣多,而不需要在用戶購買具有讀取功能的行動通訊 終端20-1和20-2之後,把它升級。 岔鑰說明資訊可以是指定多個密鑰的一個的索引。這 裡’多個您錄(如:幾百個密鑰)對應於全部標籤的密餘, 都儲存在具有標籤讀取功能的行動通訊終端2〇_i和 ,。用於指定標籤10的密鑰的索引和多個密鑰的一個,都 是儲存在標籤10裡。具有讀取功能的行動通訊終端204 和20-2接收這些索引,可以從多個密鑰中指定一個密鑰, 用於當前的標籤。這樣,透過使用多個密鑰,有可能增加 真偽鑑定目標產品,其數目和密鑰數一樣多,而不需要用 戶給具有讀取功能的行動通訊終端20-1和20-2升級。 η如果多個密输也儲存在標籤10裡,密錄說明資訊可以 是儲存在標籤10裡指定多個密鑰的多個索引。具有標籤讀 取功忐的行動通訊終端20-1和20-2透過隨機選擇多個接 收自標籤10的索引的-個作出回應。因此在標籤1〇裡, 密输是指定的。這種情況下,具有標籤讀取功能的行動通 ,終端20-1和20-2指定一個密鑰對應於接收自標籤1〇的 ^個索引中的—個索引’此⑨餘是從儲存的許多個密錄裡 k出的’把匕用作標籤10的萬能錄匙。因此,根據本發明, 包括標籤H)和具有標籤讀取功能的行動通訊終端2(M和 2〇·2的真偽產品鑑定系統可以提供更增強的安全性。 47 1294595 14924pif.doc 在上述的三個實施例裡,密錄的選擇可用於產業類型 /生產商/品牌/產品而進行。因此,同一個密鑰可用於 同一產業類型的產品,或由同一生產商生產的同一產業類 型的產品。所以,如果同一產業類型的生產商或同一產業 類型^同一生產商生產新產品,該新產品由根據本發明的 具有標籤讀取功能的行動通訊終端2〇-1和2〇_2讀取,可 以讀出產品資訊,而不需要升級具有標籤讀取功能的行動 通訊終端20·1和20-2的密鑰資訊。還有,當密鑰一般地 用於同類產品時,在新產品發布後,更多的難品可被加 到具有標籤讀取功能的行動通訊終端2〇-1和2〇_2裡。 ^其次,在步驟3625裡,具有標籤讀取功能的行動通 訊終端20-1和20-2把請求產品資訊的產品資訊請求消息 發送到標籤10。這時,具有賴讀取功能的行動通訊終^ 左1和20_2給產ρ口資訊睛求消息加一個接收自標籤的 Ik機數’和一個具有標籤讀取功能的行動通訊終端如_1和 2〇_2新創建的隨機數,然後用指定的萬能鑰匙給產品資^ 請求消息加密。標» 1G從具有標籤讀取功能的行 ^ 端2CM和20_2接收產品資訊請求消息,從中提取出收= 1產品貧訊請求消息所包含的、先前由標籤1〇發送出的 ω幾數’亚制提取出的_數是否與先前發送的齡 一致,從而檢測收到的信號是否為重送攻擊。這時= 〇可進-步執行具有標籤讀取功能的行動通訊終端1 ^20·2的選擇性的鑑定處理。由標籤10執行的具有標籤 °貝取功忐的行動通訊終端2〇4和2〇-2的鑑定,可以透過 48 1294595 14924pif.doc 接收一個回應消息而進行,該回應消息回應發送到具有標 籤讀取功能的行動通訊終端20-1和20_2的絕對加密消 息。如上面提到的,部分產品資訊可以先前從密鑰索引或 密鑰創建資訊索引保護。 在步驟S635裡,標籤1〇提取儲存單元3〇〇裡的計數 值,檢測提取出的計數值。如果確定已完成的讀取次數超 過允許的次數,標籤10阻止進一步讀取。另一方面,在步 驟S640裡,如果提取出的計數值小於允許的次數,標籤 10從儲存單元300裡提取產品資訊,創建產品資訊消息, 這疋回應消息。這日守,給產品資訊加一個接收自具有標籤 言買取功能的行動通訊終端20-1和20-2的隨機數之後,標 籤10用萬此錄起給產品資訊加密,從而創建產品資訊消 息。在步驟S645裡,標籤1〇把創建的產品資訊消息發送 到具有標籤讀取功能的行動通訊終端2〇-1和2〇-2。產品資 訊發送後,在步驟S650裡標籤10增加儲存單元3〇〇的計 數值,在步驟S655裡儲存讀取歷史資訊,包括讀取日期、 時間,請求讀取的具有標籤讀取功能的行動通訊終端2〇-1 和20-2的序列號。在步驟S660裡,具有標籤讀取功能的 行動通汛終縞20-1和20-2從標籤1〇接收產品資訊消息, 把收到的產品資訊消息解密,透過檢測包含在解密過的消 息裡的隨機數是否與以前發送的隨機數一樣,而檢測收到 的仏號疋否疋重送攻擊。如果確定收到的信號不是來自重 送攻擊的虛假回應,具有標籤讀取功能的行動通訊終端 20-1和20-2在步驟S665裡顯示產品資訊。 49 df.doc ,升級處理過程可以在標籤i〇和具有標籤讀取功能的 行動通訊終端20-1和20-2之間的洩漏密鑰上進行。這種 情=下,如圖4所示,如果具有標籤讀取功能的行動通訊 終端20-1和20-2給標籤1〇發送密鑰詳細說明請求消息, 標籤10給具有標籤讀取功能的行動通訊終端20-1和20-2 杳送岔鑰升級請求消息,而不是密餘詳細說明消息。一旦 具有彳*籤項取功能的行動通訊終端2〇_ι和2〇_2接收密餘 升級請求消息’内部分發給相應標籤的已有的密输被^hit. Retired, in step J, k JC is activated 7 , once the action with the tag reading function is passed U and 2〇-1 and 2〇_2 receive the key upgrade request information, =buffer:key' with new The key is upgraded, with the tag reading function "The key is distributed to the corresponding product, and the new shovel is used. The key is used for the current Tonglu fl 〇 Figure 6 table, sign 1 ( And a flow chart of the communication process between the mobile communication terminals _ and 20-2 having the reading function. Referring to Fig. 6 'in step S_, the user transmits the function to the pure communication terminal 2 (M and coffee (four) button j = t (4) of the hole. Therefore, in step S6〇5, the action H terminals 20-1 and 20-2 having the reading function detect the presence of the tag 1〇. This detection may be the relocation of the 4443 standard. The detection method 'but not limited to this. The mobile communication terminal 2 with the = fetch function (M and 2G_2 executes a protocol, selectively assigns a key. The tag 10 can store - one secret transmission for and with read The communication between the function mobile communication terminals 204 and 2〇_2, if it is a plurality of keys, is used after being designated by the subsequent protocol. In order to specify the key, in step S61(), the mobile communication terminal 2 having the reading function (M and 2G_2 sends the key detailed description request message of the request to the tag 10. At this time' The mobile communication terminal 2 having the reading function (M and 20·2 gives a detailed description request message plus a random number 'send this key to specify the request message. In step s615 45 1294595 14924pif.doc, the label 1 〇 The detailed description of the record must be the secret message description, as a response to the post-detail and detailed description of the message, such as the secret record is sent out. At this time, the tag 10 gives the key detailed description message plus one received from the read. The random number of the mobile communication terminals 20-1 and 20-2 of the function and the random number generated in the standard 1〇 are transmitted, and then the key detailed description message is transmitted. Therefore, not only the transmission of the message but also the retransmission can be protected. The received message is attacked. The encryption method used is the three-data encryption standard method. Since it is a symmetric key algorithm, the encryption key and the decryption key are the same. The information is used to create a secret as a key to the key communication function for the mobile communication terminals 20-1 and 20-2 having the reading function. The key creation information is a parameter used for the key creation function. The key creation function is implemented by a program in the tag reader 20. In step S620, the mobile communication terminals 2〇_i and 2〇_2 having the reading function use a secret-based function-based ship- (4), the seed value is stored in the storage unit 910, and the secret information is received from the label 1. For example, when the seed value is 123456, the parameter may be several octaves created for the arrangement and combination of seed values. Select an index. On the other hand, the number can be an index used to select from a number of secret records. These secret records are extracted by encrypting - recording the day (four) block unit_sub___word. The subtraction can be about the algorithm. In the _ sub-parameter parameter, this algorithm is used to encrypt the (four) word of the table block value. For the construction, there are ♦ many different methods are very famous, and the description is ignored here. There is a tag reader 2G The read creation stored in the standard 10 includes an index for specifying the seed value. Here, the components of the 46 1294595 14924pif.doc 是 are the same as the embodiment having a single seed value, and the description thereof is omitted here. By using the above-described key creation function, it is possible to increase the number of authenticity authentication target products having different keys, and the number thereof and the number of secrets that can be created are large, without requiring the user to purchase the mobile communication terminal 20 having the reading function. After -1 and 20-2, upgrade it. The key description information can be an index specifying one of the multiple keys. Here, 'multiple records (eg, hundreds of keys) correspond to the density of all the tags. , all stored in The mobile communication terminal 2〇_i and the sign-reading function are used to specify the index of the key of the tag 10 and one of the plurality of keys, which are stored in the tag 10. The mobile communication terminal 204 having the reading function And 20-2 receive these indexes, and one key can be specified from a plurality of keys for the current label. Thus, by using a plurality of keys, it is possible to increase the authenticity of the target product, the number and the number of keys. There are as many users without upgrading the mobile communication terminals 20-1 and 20-2 having the reading function. η If multiple secrets are also stored in the tag 10, the secret description information can be stored in the tag 10. A plurality of indexes specifying a plurality of keys. The mobile communication terminals 20-1 and 20-2 having the tag reading function respond by randomly selecting a plurality of indexes received from the tag 10. Therefore, in the tag 1 The secret transmission is specified. In this case, the action with the tag reading function, the terminals 20-1 and 20-2 specify a key corresponding to the index of the ^ indexes received from the tag 1〇. More than 9 of these are from a number of stored secrets. The 匕 is used as a universal key for the tag 10. Therefore, according to the present invention, the authenticity product identification system including the tag H) and the mobile communication terminal 2 having the tag reading function (M and 2 〇 2 can provide more enhanced Security. 47 1294595 14924pif.doc In the three embodiments above, the selection of the secret record can be used for the industry type/manufacturer/brand/product. Therefore, the same key can be used for products of the same industry type, or Products of the same industry type produced by the same manufacturer. Therefore, if a manufacturer of the same industry type or the same industry type produces the new product, the new product is a mobile communication terminal having a tag reading function according to the present invention. The reading of 2〇-1 and 2〇_2 allows product information to be read without upgrading the key information of the mobile communication terminals 20·1 and 20-2 having the tag reading function. Also, when the key is generally used for a similar product, after the new product is released, more difficult items can be added to the mobile communication terminals 2〇-1 and 2〇_2 having the tag reading function. ^ Next, in step 3625, the mobile communication terminals 20-1 and 20-2 having the tag reading function transmit a product information request message requesting product information to the tag 10. At this time, the mobile communication terminal with the read function is left 1 and 20_2, and the message is added with a number of Ik machines received from the tag and a mobile communication terminal with tag reading function such as _1 and 2 〇_2 Newly created random number, and then use the specified master key to encrypt the product request message. The label » 1G receives the product information request message from the line terminals 2CM and 20_2 having the tag reading function, and extracts the ω number of the previously transmitted by the tag 1〇 contained in the product=1 product poor request message. Whether the extracted _ number is consistent with the previously sent age, thereby detecting whether the received signal is a resend attack. At this time, it is possible to perform the selective authentication processing of the mobile communication terminal 1^20·2 having the tag reading function. The identification of the mobile communication terminals 2〇4 and 2〇-2 performed by the tag 10 with the tag can be performed by receiving a response message via 48 1294595 14924pif.doc, and the response message is sent to have a tag read. The absolute encrypted messages of the functional mobile communication terminals 20-1 and 20_2. As mentioned above, some product information can be previously protected from the key index or key creation information index. In step S635, the tag 1〇 extracts the count value in the storage unit 3〇〇, and detects the extracted count value. If it is determined that the number of completed readings exceeds the allowed number of times, the tag 10 prevents further reading. On the other hand, in step S640, if the extracted count value is less than the allowed number of times, the tag 10 extracts product information from the storage unit 300, creates a product information message, and then responds to the message. On this day, after adding a random number to the product information received from the mobile communication terminals 20-1 and 20-2 having the tag buying function, the tag 10 encrypts the product information to create a product information message. In step S645, the tag 1〇 transmits the created product information message to the mobile communication terminals 2〇-1 and 2〇-2 having the tag reading function. After the product information is sent, the tag 10 increases the count value of the storage unit 3〇〇 in step S650, and stores the read history information in step S655, including reading the date and time, and requesting the read mobile communication with the tag reading function. The serial numbers of terminals 2〇-1 and 20-2. In step S660, the action terminals 20-1 and 20-2 having the tag reading function receive the product information message from the tag 1 , decrypt the received product information message, and include the decrypted message through the detection. Whether the random number is the same as the previously sent random number, and the received nickname is detected and the attack is resent. If it is determined that the received signal is not a false response from the replay attack, the mobile communication terminals 20-1 and 20-2 having the tag reading function display the product information in step S665. 49 df.doc, the upgrade process can be performed on the leak key between the tag i〇 and the mobile communication terminals 20-1 and 20-2 having the tag reading function. In this case, as shown in FIG. 4, if the mobile communication terminals 20-1 and 20-2 having the tag reading function transmit the key detailed description request message to the tag 1, the tag 10 is provided with the tag reading function. The mobile communication terminals 20-1 and 20-2 transmit a key upgrade request message instead of the secret detailed description message. Once the mobile communication terminal 2〇_ι and 2〇_2 having the 彳* signature picking function receives the secret upgrade request message, the existing secret transmission that is internally distributed to the corresponding label is ^

棄,由新,鑰代心具有標籤讀取魏的行紐訊終端2(M 和2〇:2還指定新升級的錄作為與標籤ig通訊的密錄。 些過程,—旦新密鍮被指定為通訊的密鑰,標籤10 和具有標籤讀取功能的行動通訊終端20-1和20-2從S620 執行到S665。 表^根據本發明的實施例在行動通訊終端#1和行 動通,#2之間執行的鑑定過程的流程圖。 被於在鑑定過程中’兩個標籤讀取器中的一個 = Li步驟_裡,這種指定可允許用 取器。在步驟S7Q5裡 取讀為主k紙-貝 讀取器的存在。主髓” 取^調查相鄰的副標籤 步驟S710裡進行-個^式^副標籤讀取器確定後’在 訊交談。主標籤讀取器創^於打開兩個終端之間的通 符發送給副標_取器,^ =談標識符,把交談標識 同樣的交談伊策令Ιλ 払籤讀取器之間的通訊包括 n夺,從而維持兩個標籤讀㈣之_通訊 1294595 14924pif.doc ======可 ===讀:r== 程式。這個程式4§:ή二而執行分發通訊所必須的密鑰的 鑰匙的程式,在標籤和標籤讀取器之間指定萬能 說,定程式完全倚賴於加密。換句話 -旦主和ίΐ的“戴魏器裡,有正確的密鑰。因此, 消息加C步驟S735裡用它自己的密鑰給檢測 “取過的檢測消息發送到副標鐵讀取器,則 =的檢測消息加密,然後發送加密過的檢測消息。: :收在步驟S74〇裡副標籤讀取器可以在顯示單元上顯示 透過^!1消息。其後,主標籤讀取11把收到的消息解密, 收到的消息的隨機數而檢測收到的消息是否是重 二!:$提取出的消息與原來發送的消息-樣,主標 =取二树定·籤讀取H是具有正確密鍮的標籤讀取 二。另二ί面,如果提取出的消息與原來發送的消息不一 二,主標籤讀取器就確定副標籤讀取器是虛假的標籤讀取 态三在步驟S750裡,主標籤讀取器顯示出關於副標籤讀 的確定結果。但是,本發明不侷限於這些實施例,副 才不鐵項取器可以透過消息處理而進行回應,例如在解密收 到的消息後,根據先前約定的規則,用位元組或字單元對 收至j的/肖息進行映射(脱卯丨叩)。 51 1294595 14924pif.doc 圖8表明根據本發明推薦的實施例提供真實產品鑑定 服務的方法的流程圖。 參照圖8,在步驟S800裡,服務管理伺服器40透過 無線通訊網路接收讀取細節資訊,包括分發給每個要從行 動通訊終端20-1和20-2讀取的產品的產品識別號,及分 發給每個行動通訊終端20-1和20-2的讀取器識別號。在 步驟S810裡,服務管理伺服器40檢測包含在選擇讀取的 讀取細節資訊裡的產品識別號和讀取器識別號,判斷它們 是否與包含在先前從行動通訊終端20-1和20-2讀取的讀 取細節資訊裡的内容一致,從而檢測資訊是否為重複發 送。在步驟S820裡,服務管理伺服器40基於含在行動通 訊終端20-1和20-2裡的、含在收到的讀取細節資訊裡的 識別號,向用戶伺服器30請求用戶資訊的查詢,從用戶伺 服器30接收用戶資訊。其次,在步驟S83〇裡,服務管理 伺服裔40創建並儲存客戶管理資訊,包括用戶分類資訊、 基於讀取細節資訊的產品資訊讀取細節與用戶資訊。用戶 分類資訊包括用戶的年紀、地區、性別與工作中的至少一 項;讀取細節資訊包括產業類型、生產商、品牌、等級、 式樣名、生產中心、生產曰期時間、產品序列號、產品價 格與鑑定日期中的至少一項。讀取細節資訊還可進一步包 1採買資訊’包括關於已採買產品的購買價格、購買日期 日守間。其次,在步驟S84〇裡,服務管理伺服器4〇根據讀 取^節資訊增加用戶的“積分點,,。在步驟 S850裡,服 務官理舰器4〇回應從外部設備輸人的魏輸出請求而 52 1294595 14924pif.doc 讀出並輸出客戶管理資訊。 本發明可以以計算機可讀碼形式在計算機可讀記錄媒 體裡實現。計算射讀記錄舰包括各種記錄設備,其中 儲,可被計算機系統讀取的數據。這種計算機可讀記錄媒 體是ROM、RAM、CD_R〇M、磁帶、磁片、光學資料儲 存體、載,(如透過網際網路的傳輪)。計算機可讀記錄 媒體可以是分佈在連咖路的計算機系統裡,可以以計算 機可讀碼的形式儲存和操作。 # 本發明使用是小而薄的行動通訊終端,也可以把它用 於更廣範圍產品的真實產品鑑定,補包括在顧時需要 進行真產品蚊的產品,如衣服、鞋類、皮革製品、飲料、 農產品&amp;家畜物品、毒品&amp;藥品、電子產品、機械產品, 而且包括需要連續、長期進行真實產品鑑定的產品,如首 飾、工藝品、估價報告書、人場券、證書、用於設備、錢、 銷售的有價註券、重要文件的票據等。 另外’透過使用根據本發明的具有標籤讀取功能的行 動通訊終端’購買者可崎時隨雜容枝地檢測產 品的真偽,批發商無法試圖欺騙購買者而賣一個偽造產 品’因為批發商不知道料者何時進行真實產品鐘定。°還 有,如果行動通訊終端分發給大量的料者, 發商=批發和採買傾向可大大降低。由於行動通訊終端以 純文字顯不產品資訊’剌者還可直接、容易地檢測真 產品鑑定的結果,從而具有更高可靠性。 一、 還有’根據健、本發_行動通祕端,由於真實產 53 1294595 14924pif.doc 品鑑定倚賴密鑰的有效性,顯示在便攜式終端上的内容倚 賴肉眼的確定,就不需要額外地訪問網路或事先評估並儲 存大量數據。另外,即使在同樣密鑰的情況下,產品可以 由頦示的内容而區別。因此,如果同樣的密錄應用到已分 發的新產品或其它種類產品上,也可進行產品的真偽鐘定 而=需要升級標籤讀取器。還有,根據依照本發明的標籤 和仃動通訊終端,透過包含可創建許多密鑰的密鑰創建模 組或健存多個錯,可關用有限的記憶體保護許多密 錄。即使在已經得到行動通訊終端後,有可能透過給引^ 的產品分發新密錄’組合更多的產業類型、品牌或產品在 真實產品鑑㈣項目裡。還有,即使當—個產業類型、品 ,或產品的錄麟ίϋ去,其它產業_、品牌或產品的 :錄^不-制,從而轉安紐。如果—健输拽 透過給料已發布誠品分發新絲,有可能更有效 ,防,關於額外已發布的產品的偽造讀取㈣使用。因 呼多技術的優點:透過升級已發布的 。午夕私紙頊取态,可以把一個讀取器用於新產品。 &quot;另外,根據本發明,透過限制讀取次數,可以 戴的重複使用而不毀壞標籤。還可 ‘ 靠iin 與物理方法相比具有更高可 ΐ服電子記關裡數聽細_關,祕需要長期擁 外,根據本發明,可以阻止真實產品…產品的範圍。另 祕1有,透過每次讀取日議行記,程式,2 ’如古董或工藝品’擴展可實用產 ,鑑定消息被盜用、或 54 1294595 14924pif.doc 透過^送攻”複製—個毅祕,增魅產品鑑定 的可靠性。另外’根據本㈣,如果密銳&amp;漏,可以 ^-個新分發的標籤崎線地升級行動通轉端。因此, 從用戶的肢,可崎級讀取H而不需要任何操作,可以 減少出現偽造產品造成的損壞。另外,根據本發明,由於 可以進行行動通鱗端之_互相鑑定,可防止利用偽造 的便攜式減讀取ϋ工作於偽造的非接觸通訊標鐵。Abandoned, by the new, key generation has a tag to read Wei's line of news terminals 2 (M and 2: 2 also specify the new upgrade record as a secret record of communication with the tag ig. Some processes, - the new secret is The key designated as the communication, the tag 10 and the mobile communication terminals 20-1 and 20-2 having the tag reading function are executed from S620 to S665. Table 2 is in the mobile communication terminal #1 and the mobile communication according to the embodiment of the present invention, Flowchart of the authentication process performed between #2. In the identification process, one of the two tag readers = Li step _, this designation allows the use of the device. In step S7Q5, read as The main k-paper reader exists. The main marrow is taken to investigate the adjacent sub-tags in step S710 - the ^ ^ ^ sub-tag reader is determined after the 'in-one conversation. The main tag reader creates ^ The communication between the two terminals is sent to the sub-marker, ^ = talk identifier, the conversation is marked with the same conversation, the communication between the 策 払 读取 读取 读取 读取 reader includes n ,, thus maintaining two Label reading (four) _ communication 1294595 14924pif.doc ====== can === read: r== program. This program 4 §: ή two and executed The program of the key of the key that is necessary for the communication, the omnipotent between the tag and the tag reader, the program is completely dependent on the encryption. In other words, the main and the wei wei "there are correct Therefore, the message plus C step S735 uses its own key to detect that "the received detection message is sent to the sub-standard iron reader, then the detection message of = is encrypted, and then the encrypted detection message is transmitted. : Receiving in step S74, the sub-tag reader can display the message transmitted through the ^!1 on the display unit. Thereafter, the main tag reads 11 to decrypt the received message, and the received random number of the message is detected and received. Whether the message is heavy two!: $ extracted message and the original message sent - the main standard = take two trees set · sign read H is the correct key tag read two. The other two, if The extracted message is different from the originally sent message, and the primary tag reader determines that the secondary tag reader is a false tag read state. In step S750, the primary tag reader displays the secondary tag read. The result is determined. However, the present invention is not limited to these In the embodiment, the secondary non-iron item extractor can respond by message processing, for example, after decrypting the received message, mapping the received/study to j by a byte or a word unit according to a previously agreed rule. (Dislocation) 51 1294595 14924pif.doc Figure 8 shows a flow chart of a method for providing a real product authentication service in accordance with a preferred embodiment of the present invention. Referring to Figure 8, in step S800, the service management server 40 transmits through the wireless communication network. The road receives read detail information, including a product identification number distributed to each product to be read from the mobile communication terminals 20-1 and 20-2, and a read to each mobile communication terminal 20-1 and 20-2. Picker identification number. In step S810, the service management server 40 detects the product identification number and the reader identification number included in the read detail information of the selected read, and determines whether they are included in the previous slave mobile communication terminals 20-1 and 20- 2 The read details in the read details are the same, so that the information is detected as repeated transmission. In step S820, the service management server 40 requests the user server 30 for the inquiry of the user information based on the identification numbers contained in the received read details contained in the mobile communication terminals 20-1 and 20-2. User information is received from the user server 30. Secondly, in step S83, the service management server 40 creates and stores customer management information, including user classification information, product information reading details and user information based on reading detailed information. User classification information includes at least one of the user's age, region, gender, and work; reading details includes industry type, manufacturer, brand, grade, model name, production center, production time, product serial number, product At least one of the price and the date of identification. Read the details information and further package 1 purchase information ‘including the purchase price of the purchased product, the purchase date, the day guard. Next, in step S84, the service management server 4 increases the user's "point of integration" according to the read information, and in step S850, the service officer 4 responds to the output of the input from the external device. The request and 52 1294595 14924pif.doc read and output the customer management information. The invention can be implemented in a computer readable recording medium in the form of computer readable code. The computing shooting record ship comprises various recording devices, wherein the storage can be used by the computer system Read data. The computer readable recording medium is a ROM, a RAM, a CD_R〇M, a magnetic tape, a magnetic disk, an optical data storage, and a carrier (such as a transmission through an Internet). The computer readable recording medium can be It is distributed in the computer system of Lianjia Road and can be stored and operated in the form of computer readable code. # The invention is a small and thin mobile communication terminal, and can also be used for real product identification of a wider range of products. Supplements include products that require genuine mosquito products, such as clothing, footwear, leather goods, beverages, agricultural products &amp; livestock, drugs & drugs. Electronic products, mechanical products, and products that require continuous and long-term identification of real products, such as jewelry, handicrafts, valuation reports, tickets, certificates, notes for equipment, money, sales, and important documents. In addition, by using the mobile communication terminal with the tag reading function according to the present invention, the purchaser can detect the authenticity of the product with the miscellaneous, and the wholesaler cannot try to deceive the buyer and sell a counterfeit product. Wholesalers don't know when the material supplier will make a real product. ° Also, if the mobile communication terminal is distributed to a large number of suppliers, the distributor = wholesale and purchase tendency can be greatly reduced. Because the mobile communication terminal displays product information in plain text. The latter can also directly and easily detect the results of the real product identification, which has higher reliability. First, there is also 'according to the health, the hair _ action secret end, due to the real production 53 1294595 14924pif.doc product identification relying on the secret The validity of the key, the content displayed on the portable terminal depends on the determination of the naked eye, and no additional access to the network is required. A large amount of data is evaluated and stored in advance. In addition, even in the case of the same key, the product can be distinguished by the displayed content. Therefore, if the same secret record is applied to a new product or other type of product that has been distributed, Performing the authenticity of the product = need to upgrade the tag reader. Also, according to the tag and the smashing communication terminal according to the present invention, the module is created or a plurality of errors are saved through a key containing a plurality of keys that can be created. It is possible to protect a lot of secrets with limited memory. Even after the mobile communication terminal has been obtained, it is possible to distribute the new secrets by combining the products of the products with the combination of more industry types, brands or products in the real product (4) In the project. Also, even when the industry type, product, or product of the recording of Lin Lin, other industries _, brand or product: record ^ not - system, and thus turn to New York. If the _ 拽 分发 分发 分发 分发 给 给 给 给 给 给 给 给 给 给 给 给 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发 分发Because of the advantages of the technology, it has been released through the upgrade. In the afternoon, you can use a reader for new products. &quot;In addition, according to the present invention, by limiting the number of readings, it is possible to reuse the wear without destroying the label. It is also possible to rely on iin to have a higher level of electronic record than the physical method. The secret requires long-term support. According to the present invention, the range of real products...products can be prevented. Another secret 1 is, through each reading of the calendar, program, 2 'such as antiques or crafts' expansion can be practical, identification messages are stolen, or 54 1294595 14924pif.doc through ^ send attack" copy - a secret In addition, according to this (four), if the sharp &amp; leak, you can ^- a new distribution of the label to upgrade the action to the end. Therefore, from the user's limbs, can be read at the level Taking H without any operation can reduce the damage caused by the occurrence of counterfeit products. In addition, according to the present invention, it is possible to prevent the use of counterfeit portable subtractive readings to work on counterfeit Contact the communication target.

雖然本發明已以較佳實施例揭露如上, 限定本發明,任何«此技藝者,在賴縣發明 1口耗圍内,當可作些許之更動與潤飾’因此本發明之保護 範圍當視後附之申請專利範圍所界定者為準。 【圖式簡單說明】 圖1是根據本發明轉真實產品蚊純的概觀。 圖2表明根據本發明的非接觸通訊標籤的架構。 圖3是根據本發明的行動通訊終端架構的示意方塊 圖0 〜 圖4Α是根據加密/解密單元21〇 範的密鑰。 第三實施例解釋示Although the present invention has been disclosed in the preferred embodiments as above, and the present invention is defined, any of the skilled artisans may make some modifications and refinements in the invention of Lai County's invention. Therefore, the scope of protection of the present invention is regarded as a The scope defined in the patent application is subject to change. BRIEF DESCRIPTION OF THE DRAWINGS Fig. 1 is an overview of the purity of mosquitoes transferred to real products according to the present invention. Figure 2 illustrates the architecture of a contactless communication tag in accordance with the present invention. Figure 3 is a schematic block diagram of a mobile communication terminal architecture according to the present invention. Figures 0 to 4B are keys according to the encryption/decryption unit 21. Explanation of the third embodiment

圖4Β是根據加密/解密單元21〇第八實施例 乾的密餘。 過程根據本發明的行動通訊終端的產品資訊讀取 圖6表明賊和行錢轉歡間軌過流程 圖0 55 1294595 14924pif.doc 圖7表明根據本發明的實施例在行動通訊終端# 1和行 動通訊終端#2之間執行的鑑定過程的流程圖。 圖8表明根據本發明的較佳實施例提供真實產品鑑定 服務的方法的流程圖。 【主要元件符號說明】 10、10-1、10-2、10-3 :非接觸通訊標籤 20 :標籤讀取器 20-1、20_2 :行動通訊終端 30 :用戶伺服器 40 :服務管理伺服器 50 :品牌擁有者伺服器 ①〜④:步驟 100 :非接觸通訊裝置 110、510 :天線 131、531 :能量供給單元 133、533 :解調單元 135、535 :調變單元 200、700 :控制單元 210、710 ··加密/解密單元 220、790 :洩漏密鑰升級單元 230、730 :重送攻擊防止單元 250、760 :資訊提供單元 270 :後管理處理單元 290、720 :刷新處理單元 56 1294595 14924pif.doc 300、910 ··儲存單元 310 :密鑰說明資訊 330 :密錄 350 :計數器 370 ··產品資訊 390 ··讀取細節資訊 500 ··標籤通訊單元 711 :鑰匙創建單元 750 :資訊讀取單元 770 :讀取器鑑定單元 930 :操縱單元 950 :顯示單元 960 :聲音輸出單元 970 :無線通訊單元 410、41 卜 413、415 :密鑰 420、490 :密鑰創建資訊 42卜 423、425 :索引 430、 450、470 ··密鑰表 431、 451、471 :密鑰說明資訊索引 433、453、473 :密鑰 435、455、475 :產業類型 491、493、495 :參數 S500 〜S550、S600 〜S665、S700 〜S750、S800 〜 S850 :步驟 57Figure 4A is a close-up of the encryption according to the eighth embodiment of the encryption/decryption unit 21. Process Product Information Reading of Mobile Communication Terminal According to the Invention FIG. 6 shows a flow chart of a thief and a money transfer. 0 55 1294595 14924pif.doc FIG. 7 shows a mobile communication terminal #1 and an action according to an embodiment of the present invention. Flowchart of the authentication process performed between communication terminals #2. Figure 8 illustrates a flow chart of a method of providing a real product authentication service in accordance with a preferred embodiment of the present invention. [Description of main component symbols] 10, 10-1, 10-2, 10-3: contactless communication tag 20: tag reader 20-1, 20_2: mobile communication terminal 30: user server 40: service management server 50: Brand Owner Servers 1 to 4: Step 100: Contactless Communication Devices 110, 510: Antennas 131, 531: Energy Supply Units 133, 533: Demodulation Units 135, 535: Modulation Units 200, 700: Control Unit 210, 710 · Encryption/decryption unit 220, 790: Leakage key upgrading unit 230, 730: Resend attack prevention unit 250, 760: Information providing unit 270: Post management processing unit 290, 720: Refresh processing unit 56 1294595 14924pif .doc 300, 910 · · storage unit 310: key description information 330: secret record 350: counter 370 · · product information 390 · · read details information 500 · · tag communication unit 711: key creation unit 750: information reading Unit 770: reader authentication unit 930: manipulation unit 950: display unit 960: sound output unit 970: wireless communication unit 410, 41 413, 415: key 420, 490: key creation information 42 423, 425: Index 430, 450, 47 0··Key Table 431, 451, 471: Key Description Information Index 433, 453, 473: Keys 435, 455, 475: Industry Types 491, 493, 495: Parameters S500 to S550, S600 to S665, S700~ S750, S800 ~ S850: Step 57

Claims (1)

1294595 14924pif.doc 十、申請專利範圍: ♦ 1.一種行動通訊終端,從一非接觸通訊標籤接收資 訊’該行動通訊終端包括: 一第一通訊單元,與該非接觸通訊標籤無線地交換數 據,並無線地發送该非接觸通訊標籤需要的電能; 第一通吼單元,透過_無線通訊網向一服務管理伺 服器發送和接收數據; 一儲存單元,儲存有至少一個密鑰相關資訊; -解密單元’基於密输相關資訊對於從該非接觸通訊 · 標,收到的數據進行解密,前述密鑰相關資訊是透過接收 自该非接觸通訊標籤的密鑰說明資訊而從密鑰相關資 選出的; ' 、、-資訊讀取設備,向附在產品上的該非接觸通訊標籤 要求產品資訊,並讀出來自該非接觸通訊標籤的產品 訊;以及 一輸出單元,輸出讀出的產品資訊。 一 2·如申請專利範圍第1項所述之行動通訊終端,其中 鲁 始、,相’訊包括至少—個錄,該職單元透過選擇出 ^山鑰把接收自该非接觸通訊標籤的產品資訊解密,這個 ,擇出的密餘是基於接收自該非接觸通訊標籤的密鑰說明 貧訊所選擇。 , 3·如申請專利範圍第2項所述之行動通訊終端,進一 步包括一洩漏密鑰升級單元,當從該非接觸通訊標籤收到 關於一洩漏密鑰的密鑰升級請求資訊時,從該儲存單元裡 58 1294595 14924pif.doc ϋ由密鑰升級請求資訊指定的密錄,並升級為新分發的 申明專利範圍第1項所述之行動通訊 苴 讀包括多個歸,根據分類參考被分類與: ^ 括產業類型、生產商、品牌與產品名至少 其中一個;以及 口次该解^單元利用密鑰把從該非接觸通訊標籤收到的產 土解^,這個密鑰是基於接收自該非接觸通訊標籤的 岔鑰說明資訊而從多個密鑰中選出的。 —&amp;士申明專利範圍弟1項所述之行動通訊終端,其中 密錄相關資訊包括至少—個種子值,用於不同密输白勺創 &gt;⑨ί解始、單元利用使用一種子值的密鑰把從該非接觸通 訊標籤收到的產品資訊解密,這個種子值是基於接收自該 非接觸通訊標籤的密鑰說明資訊選出的。 6·如申請專利範圍第5項所述之行動通訊終端,進一 步包括一洩漏種子值升級單元,當從該非接觸通訊標籤收 到關於一洩漏種子值的種子值升級請求資訊時,從該儲存 單元裡删除由種子值升級請求資訊指定的種子值,並升級 為新分發的種子值。 7.如申請專利範圍第1項所述之行動通訊終端,其中 密鑰相關資訊包括多個種子值,根據分類參考被分類與分 發,分類參考包括產業類型、生產商、品牌與產品名至少 其中一個;以及 59 1294595 14924pif.doc 口一該=ΐ單餘從該非接觸通訊標籤收到的產 值創建的’多個種子值是基於接收自該非 密鑰說明資訊。 知紙的 8. 如申請專概圍第丨摘狀行動通訊終端,進— 步包括-沒漏密錄升級單元,當從該非接觸通訊 關於浪漏密__訊的升級請求f訊時,從該儲存單元 裡刪除由升級請求資訊指定的密餘相關資訊 分發的密鑰相關資訊。 丌、、及為新 9. 如申請翻職f丨項所叙行動通贿端 ^括送攻擊阻止單元,它產生――次性使用隨機數 ^ 次性使崎機數字加到要發送到標籤讀取哭 i且ί供此資訊給該解密單元,並檢_接收自 標戴項取s的魏裡提取丨的關數字衫*該 用隨機數字一樣,從而阻止重送攻擊。'、 性使 1〇七申請翻第丨項所述之行動軌終端, _存早兀包括非易失性記憶體,且進 二 理單元’其從顧料元裡㈣產品資訊,並把讀出= 品資訊重記錄在該儲存單元裡。 的產 n:如f請翻制第1顧叙行騎轉端,其中 無線通訊早7L的射頻(RF)電路、資訊讀取單元资 元與儲存單元是鱗㈣途顏電路(ASIC) f現的二早 —12·,申請專利範圍第丨項所述之行動通訊終端, 該貧訊5胃取早碰基於接收自該非接觸軌賴的密餘說 1294595 I4924pif,(j&lt; 巧育訊的產業類型、生產商、品牌與 品資訊,並把紋的多個產品資訊提供^該輸曰^個^ 該輪出單元輸出指定的多個產品資訊。μ早兀’ +勺Hr請專利if第1項所述之行動通訊終端,進一 ndt單70 ’其透過與具有標籤讀取功能的 動的通訊,來鑑定具有標籤讀取功能的 二H動通祕端,並把關於具有賴讀取功能的該外 邛仃動通訊終端的鑑定結果輸出到該輸出單元。 14.如巾請專利範_丨項所述之行動通訊終端,進一 2括-加密單元,基於從錄_魏情出的密仙 關貝訊’透過接收自該非接觸通訊標籤的密鑰說明資訊, 把要發送到該非接觸通訊標籤的數據加密。 15·如申請專職圍第丨項所述之行動通訊終端,如果 透過含在該行動通祕端裡的—資訊輸人裝置輸入一採買 確認命令,其巾的#訊發送單元把產品的採買資訊加到確 定結果中,並把確定結果發送到該服務管理伺服器。 16·如申凊專利範圍第1項所述之行動通訊終端,其中 一確定結果在每次讀取產品資訊時都儲存在該儲存單元; 以及 ^ 如果透過含在行動通訊裝置裡的一資訊輸入裝置輸入 一資訊發送命令,資訊發送單元把儲存在該儲存單元的該 確定結果發送到該服務管理伺服器。 17· —種管理產品鑑定服務的方法,適用在一產品鏗定 服務管理伺服器裡,該產品鑑定服務管理伺服器透過—網 1294595 14924pif.doc 路與一行動通訊公司的一用戶伺服器通訊,並可透過一行 動通訊網與行動通訊終端通訊,該管理產品鏗定服務的方 法包括: 接收讀取細節資訊,包括分發給每個標籤可讀取的產 品的產品識別號,和從行動通訊終端分發給行動通訊終端 的讀取器識別號; '' 詢問該用戶伺服器查詢含在讀取細節資訊裡基於行動 通訊終端的識別號的用戶資訊,並接收來自該用戶伺服器 的用戶資訊; 創建與儲存各戶管理資訊,包含基於讀取細節資訊與 用戶資訊的用戶分類資訊與產品資訊讀取細節;以及 回應從一外部設備輸入的資訊輸出請求而讀出並輸出 客戶管理資訊。 18·如申明專利範圍第17項所述之管理產品鏗定服務 勺方法,其中的用戶分類資訊包括用戶的年齡、地區、性 別與工作至少其中一項;以及 讀取細節資訊包括產業類型、生產商、品牌、等級、 名、生產中心、生產曰期時間、產品序列號、產品價 σ^、4監定日期至少其中一項。 、 19. 如”專利範圍第18項所述之管理產品鑑定服務 法’其中的讀取細節資訊進一纟包括關於已採買的產 叩的採買資訊,其包括採買價格和採買日期與時間。 20. 如帽專概圍第17韻狀管理產品鑑定服務 法,進一步包括根據讀取細節資訊增加用戶的積分點。 62 1294595 14924pif.doc 21.如申請專利範圍第17項所述之管理產品鑑定服務 的方法,進一步包括透過檢測包含在讀取細節資訊裡的產 品識別號和讀取器識別號是否與包含在先前從行動通訊終 端收到的讀取細節資訊裡的一樣,從而檢測資訊的重複發 送。1294595 14924pif.doc X. Patent application scope: ♦ 1. A mobile communication terminal receives information from a contactless communication tag. The mobile communication terminal includes: a first communication unit that wirelessly exchanges data with the contactless communication tag, and Wirelessly transmitting the electrical energy required by the contactless communication tag; the first communication unit transmits and receives data to a service management server via the wireless communication network; a storage unit stores at least one key related information; - a decryption unit Decrypting data received from the contactless communication tag based on the confidentiality related information, the key related information is selected from the key related information through the key description information received from the contactless communication tag; And an information reading device that requests product information from the contactless communication tag attached to the product, and reads product information from the contactless communication tag; and an output unit that outputs the read product information. 1. The mobile communication terminal according to item 1 of the patent application scope, wherein the beginning, the phase message includes at least one record, and the job unit receives the product received from the contactless communication tag by selecting the key. Information decryption, this, the selected secret is based on the key received from the contactless communication tag. 3. The mobile communication terminal according to claim 2, further comprising a leakage key upgrading unit, when receiving the key upgrade request information about a leaked key from the contactless communication tag, from the storage Units in the unit 58 1294595 14924pif.doc 密 The secret record specified by the key upgrade request information, and upgraded to the new distribution of the patent scope described in the first paragraph of the mobile communication read includes multiple returns, classified according to the classification reference and: ^ at least one of an industry type, a manufacturer, a brand, and a product name; and a copy of the product obtained from the contactless communication tag by using the key, the key is based on receiving the contactless communication The key of the tag is selected from a plurality of keys by indicating information. —&amp; 申申明 Patent scope of the mobile communication terminal described in the first paragraph, wherein the cryptographic related information includes at least one seed value, which is used for different secret transmissions, and the unit utilizes a sub-value. The key decrypts the product information received from the contactless communication tag, and the seed value is selected based on the key description information received from the contactless communication tag. 6. The mobile communication terminal according to claim 5, further comprising a leak seed value upgrading unit, when receiving the seed value upgrade request information about a leak seed value from the contactless communication tag, from the storage unit The seed value specified by the seed value upgrade request information is deleted and upgraded to the newly distributed seed value. 7. The mobile communication terminal according to claim 1, wherein the key related information includes a plurality of seed values, which are classified and distributed according to the classification reference, and the classification reference includes at least an industrial type, a manufacturer, a brand, and a product name. One; and 59 1294595 14924pif.doc port one = ΐ single balance from the output value received from the contactless communication tag created by the 'multiple seed values based on receiving information from the non-key description. 8. If you apply for a general-purpose 丨 状 状 行动 行动 行动 , , , , , , , , , , , , 丨 丨 丨 丨 没 丨 丨 丨 丨 丨 丨 丨 丨 丨 丨 丨 丨 丨 丨 丨 丨 丨The storage unit deletes key related information distributed by the secret related information specified by the upgrade request information.丌, , and for the new 9. If the application for resignation is a bribery end, the bribery end is sent to the attack prevention unit, which generates a sub-random use random number ^ sub-sense to add the number to the label to be sent to the label Read the crying and 供 for this information to the decryption unit, and check the received digital shirt of the Wei Li extraction * from the standard item s*, which is the same as the random number, thus preventing the resend attack. ', Sexuality makes the application of the 轨 所述 之 之 之 之 行动 行动 , , , , , , , 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动 行动The output information is recorded in the storage unit. Production n: If f, please turn the first Gu Xuanxing riding end, where the wireless communication early 7L radio frequency (RF) circuit, information reading unit and storage unit is scale (four) way Yan circuit (ASIC) f now The second morning—12·, applying for the mobile communication terminal described in the third paragraph of the patent scope, the poverty-stricken 5 stomach intake early collision based on the secret received from the non-contact track, said 1294595 I4924pif, (j&lt; Qiao Yuxun's industry Type, manufacturer, brand and product information, and provide multiple product information for the pattern ^The input ^^^ The round unit outputs the specified multiple product information. μ早兀' + spoon Hr please patent if 1 The mobile communication terminal described in the item, enters a ndt single 70', and through the dynamic communication with the tag reading function, identifies the two-H mobile secret terminal with the tag reading function, and the related function of the reading function. The identification result of the external swaying communication terminal is output to the output unit. 14. If the mobile communication terminal described in the patent specification _ 丨 , , 进 进 进 进 进 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密 加密Guan Beixun's description of the key received from the contactless communication label The data to be sent to the contactless communication tag is encrypted. 15. If you apply for the mobile communication terminal described in the full-time sub-paragraph, enter the purchase confirmation through the information input device included in the mobile terminal. The command, the sending unit of the towel sends the purchase information of the product to the determination result, and sends the determination result to the service management server. 16* The mobile communication terminal according to claim 1 of the patent scope, wherein a determination result is stored in the storage unit each time the product information is read; and ^ if the information transmission command is input through a information input device included in the mobile communication device, the information transmission unit stores the information stored in the storage unit The determination result is sent to the service management server. 17· A method for managing the product authentication service, which is applicable to a product identification service management server, the product authentication service management server through the network 1294595 14924pif.doc road and a a user server communication of the mobile communication company, and can communicate with the mobile communication terminal through a mobile communication network, the tube The method for determining the service includes: receiving the read details, including the product identification number of the product readable by each tag, and the reader identification number distributed from the mobile communication terminal to the mobile communication terminal; '' The user server queries the user information based on the identification number of the mobile communication terminal in the read detail information, and receives the user information from the user server; creates and stores the management information of each household, including the information based on the read details and the user The user classification information and product information reading details of the information; and reading and outputting the customer management information in response to the information output request input from an external device. 18· The management product setting service spoon described in claim 17 of the patent scope The method, wherein the user classification information includes at least one of a user's age, region, gender, and work; and reading details including industry type, manufacturer, brand, grade, name, production center, production flood time, product sequence No., product price σ^, 4 at least one of the date of supervision. 19. The reading details of the “Management Product Appraisal Service Law described in Item 18 of the Patent Scope” include information on the purchase of the calves that have been purchased, including the purchase price and the date and time of purchase. For example, the cap specializes in the 17th rhyme management product identification service method, which further includes increasing the user's points according to the reading details. 62 1294595 14924pif.doc 21. The management product identification service as described in claim 17 The method further includes detecting the repeated transmission of the information by detecting whether the product identification number and the reader identification number included in the read detail information are the same as those included in the read detail information previously received from the mobile communication terminal. 6363
TW93130200A 2004-10-06 2004-10-06 Mobile communication terminal having a function of reading out information from contactless type communication tag and method for managing product authentication service TWI294595B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW93130200A TWI294595B (en) 2004-10-06 2004-10-06 Mobile communication terminal having a function of reading out information from contactless type communication tag and method for managing product authentication service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW93130200A TWI294595B (en) 2004-10-06 2004-10-06 Mobile communication terminal having a function of reading out information from contactless type communication tag and method for managing product authentication service

Publications (2)

Publication Number Publication Date
TW200612351A TW200612351A (en) 2006-04-16
TWI294595B true TWI294595B (en) 2008-03-11

Family

ID=45068202

Family Applications (1)

Application Number Title Priority Date Filing Date
TW93130200A TWI294595B (en) 2004-10-06 2004-10-06 Mobile communication terminal having a function of reading out information from contactless type communication tag and method for managing product authentication service

Country Status (1)

Country Link
TW (1) TWI294595B (en)

Also Published As

Publication number Publication date
TW200612351A (en) 2006-04-16

Similar Documents

Publication Publication Date Title
CA2519889C (en) Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not
JP4276259B2 (en) Mobile communication terminal having tag reading function and authentic authentication service providing method
US10387695B2 (en) Authenticating and managing item ownership and authenticity
US7657740B2 (en) Verifying the ownership of an owner&#39;s authority in terms of product and service
US20090219132A1 (en) System for product authentication and tracking
WO2010099714A1 (en) Product identity digital identification apparatus, inspection apparatus, product and anti-counterfeiting inspection method
ZA200507951B (en) Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not
CN102165474A (en) Apparatus, systems and methods for authentication of objects having multiple components
CN104217241A (en) Electronic anti-fake label and realizing method
TW201001295A (en) RFID tag and managing method thereof
WO2015154595A1 (en) One-time pad authentication system based on closed-loop authentication theory and internet
US20090204417A1 (en) System for product authentication using covert codes
KR100524176B1 (en) Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone
KR100848791B1 (en) Tag data recording and obtaining method which security verification are capable, tag data recording and obtaining apparatus
TWI294595B (en) Mobile communication terminal having a function of reading out information from contactless type communication tag and method for managing product authentication service
US9652775B2 (en) System, method, procedure and components for preparing an article for authentication and tracking
TWI303386B (en) Contactless type communication tag, portable tag reader for verifying a genuine article, and method for providing information of whether an article is genuine or not
CN113780016A (en) Verification system and verification method for preventing commodities and marked trademarks thereof from being imitated

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees