CA2300544A1 - Security key system - Google Patents
Security key system Download PDFInfo
- Publication number
- CA2300544A1 CA2300544A1 CA002300544A CA2300544A CA2300544A1 CA 2300544 A1 CA2300544 A1 CA 2300544A1 CA 002300544 A CA002300544 A CA 002300544A CA 2300544 A CA2300544 A CA 2300544A CA 2300544 A1 CA2300544 A1 CA 2300544A1
- Authority
- CA
- Canada
- Prior art keywords
- resonance
- resonance tag
- reflected wave
- frequency
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000009434 installation Methods 0.000 claims abstract description 6
- 230000005540 biological transmission Effects 0.000 claims description 14
- 238000010408 sweeping Methods 0.000 claims description 8
- 238000001228 spectrum Methods 0.000 claims description 4
- 230000005684 electric field Effects 0.000 claims description 3
- 238000005187 foaming Methods 0.000 claims 1
- 239000004020 conductor Substances 0.000 description 4
- 239000003990 capacitor Substances 0.000 description 3
- 238000003780 insertion Methods 0.000 description 3
- 230000037431 insertion Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 239000004743 Polypropylene Substances 0.000 description 2
- 239000000853 adhesive Substances 0.000 description 2
- 230000001070 adhesive effect Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000003111 delayed effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- -1 polypropylene Polymers 0.000 description 2
- 239000004698 Polyethylene Substances 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005530 etching Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000000034 method Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 229920000573 polyethylene Polymers 0.000 description 1
- 229920001155 polypropylene Polymers 0.000 description 1
- 238000004080 punching Methods 0.000 description 1
- 238000005070 sampling Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B23/00—Record carriers not specific to the method of recording or reproducing; Accessories, e.g. containers, specially adapted for co-operation with the recording or reproducing apparatus ; Intermediate mediums; Apparatus or processes specially adapted for their manufacture
- G11B23/28—Indicating or preventing prior or unauthorised use, e.g. cassettes with sealing or locking means, write-protect devices for discs
- G11B23/283—Security features, e.g. digital codes
- G11B23/284—Security features, e.g. digital codes on the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/109—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00876—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy wherein physical copy protection means are attached to the medium, e.g. holograms, sensors, or additional semiconductor circuitry
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Signal Processing (AREA)
- Burglar Alarm Systems (AREA)
- Storage Device Security (AREA)
- Near-Field Transmission Systems (AREA)
- Selective Calling Equipment (AREA)
Abstract
A security key system adapted to preventing illegal copying of softwares. A CD-ROM is sold with a plurality of LC
resonance tags 1 being stuck to a CD case 23 of the CD-ROM as means for generating check digits at the time of installation.
Waves reflected by the LC resonance tags are detected by placing the CD case 23 on a reflected wave scanner 11 connected to a personal computer 21. The reflected wave scanner 11 sends check digits corresponding to the waves reflected by the LC resonance tags 1 to the personal computer 21. The installer in the personal computer 21 executes the instillation after having confirmed the ID key data of the CD-ROM and the check digits.
After the instillation, the LC resonance tag 1 on the CD case 23 is peeled off or the sticking position is changed according to the message, and the installer confirms a change in the reflected wave to complete the instillation.
resonance tags 1 being stuck to a CD case 23 of the CD-ROM as means for generating check digits at the time of installation.
Waves reflected by the LC resonance tags are detected by placing the CD case 23 on a reflected wave scanner 11 connected to a personal computer 21. The reflected wave scanner 11 sends check digits corresponding to the waves reflected by the LC resonance tags 1 to the personal computer 21. The installer in the personal computer 21 executes the instillation after having confirmed the ID key data of the CD-ROM and the check digits.
After the instillation, the LC resonance tag 1 on the CD case 23 is peeled off or the sticking position is changed according to the message, and the installer confirms a change in the reflected wave to complete the instillation.
Description
SECURITY REY SYSTEM
BACKGROUND OF THE INVENTION
Field of the Invention The present invention relates to a security key system and, particularly, to a security key system using an LC
resonance tag as a security key.
Description of the Prior Art Software programs recorded in the media such as CD-ROM, ROM cartridge and floppy disk and placed in the market are accompanied by a problem of illegal deed of copying violating the Copyright Law, and it has been urged to provide a security key system for preventing the deed of illegal copying.
In recent years, further, a system has been put into practice for providing software programs and a variety of data through an on-line network such as Internet, and a system has been proposed for offering music programs and video programs through the Internet with charge. In such a fee-charging data service system, a security key system becomes necessary which permits only those users who satisfy predetermined conditions to download the data from the data service system from the standpoint of settlement of the charge, etc.
A known security key system of this kind can be represented by the one which uses an IC card or a magnetic card.
A person who wishes to utilize a data service system purchases an IC card or a magnetic card issued by the data source, reads and writes the data of the card using a card reader to unlock the security key for a particular content on the on-line network and is thus able to download a desired program.
However, the IC card and the magnetic card require a considerable cost. In the future where it is expected that a strikingly increased number of people may utilize the communication network, therefore, it is desired to provide a security key system of a lower cost. Thus, there arises a technical assignment that must be solved for providing a security key system which can be mass-produced at lower costs.
BACKGROUND OF THE INVENTION
Field of the Invention The present invention relates to a security key system and, particularly, to a security key system using an LC
resonance tag as a security key.
Description of the Prior Art Software programs recorded in the media such as CD-ROM, ROM cartridge and floppy disk and placed in the market are accompanied by a problem of illegal deed of copying violating the Copyright Law, and it has been urged to provide a security key system for preventing the deed of illegal copying.
In recent years, further, a system has been put into practice for providing software programs and a variety of data through an on-line network such as Internet, and a system has been proposed for offering music programs and video programs through the Internet with charge. In such a fee-charging data service system, a security key system becomes necessary which permits only those users who satisfy predetermined conditions to download the data from the data service system from the standpoint of settlement of the charge, etc.
A known security key system of this kind can be represented by the one which uses an IC card or a magnetic card.
A person who wishes to utilize a data service system purchases an IC card or a magnetic card issued by the data source, reads and writes the data of the card using a card reader to unlock the security key for a particular content on the on-line network and is thus able to download a desired program.
However, the IC card and the magnetic card require a considerable cost. In the future where it is expected that a strikingly increased number of people may utilize the communication network, therefore, it is desired to provide a security key system of a lower cost. Thus, there arises a technical assignment that must be solved for providing a security key system which can be mass-produced at lower costs.
SU1~1ARY OF TAE INVENTION
The object of this invention is to solve the above assignment.
The present invention was proposed in order to accomplish the above-mentioned object, and provides a security key system, comprising:
an LC resonance tag constituting an LC resonance circuit by forming an electrically conducting spiral pattern on one surface or on both surfaces of a dielectric film; and a reflected wave scanner which transmits sweeping electromagnetic waves from a frequency sweeping transmitter, compares the waveforms received by a receiver with the transmitted waveforms, and detects the presence of the LC
resonance tag in the transmission electric field and the resonance frequency of the LC resonance tag based upon the result of comparison;
the reflected wave scanner being connected to a personal computer, and the security of the computer being managed by using, as a security key, the waves reflected by the LC resonance tag and detected by the reflected wave scanner;
wherein the LC resonance tag is attached to a package software such as Cd-ROM or ROM cartridge, check digit data are formed in connection with the frequency of the waves reflected by the LC
resonance tag detected by the reflected wave scanner or in connection with a frequency spectrum pattern thereof, the ID key data of the package software are collated with the check digit data, and the installation, copying and rewriting of data of the software are permitted or inhibited relying upon the result of collation.
The invention further provides a security key system, wherein check digit data are formed in connection with the frequency of the waves reflected by the LC resonance tag that is delivered or sold or in connection with the frequency spectrum pattern thereof, the ID key data of a particular content on the on-line network are collated with the check digit data, and the access to the content and the do~mloading of the data are permitted or inhibited relying upon the result of collation.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a sectional view of an LC resonance tag;
Fig. 2 illustrates the LC resonance tag, wherein Fig.
2(a) is a plan view showing an electrically conducting pattern on the front surface, Fig. 2(b) is a plan view showing an electrically conducting pattern on the back surface, and Fig.
2(c) is a view illustrating a positional relationship between the. electrically conducting patterns on the front and back surfaces;
Fig. 3 is a block diagram of a reflected wave scanner circuit;
Fig. 4 is a timing chart illustrating the scanning operation of the reflected wave scanner;
Fig. 5 is a graph illustrating a waveform pattern drawn by sampling the echo waves of the LC resonance tag;
Fig. 6 is a view of a software installation managing system; and Fig. 7 is a view of a fee-charging on-line data delivering system.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
An embodiment of the invention will now be described in detail. The security key system of the invention is constituted by a reflected wave scanner connected to a personal computer and an LC resonance tag.
Fig. 1 shows an LC resonance tag 1 having patterns formed on both surfaces, as an example of the LC resonance tag, which is in the form of a thin sheet formed by adhering metallic electric conductors 4 and 5 on both surfaces of a dielectric film 2 via an adhesive 3. Referring to Figs. 2(a), 2(b) and 2(c), the conductors 4 and 5 on both surfaces of the LC
resonance tag 1 have capacitor patterns 4b and 5b of relatively large areas continuous to the outer ends of rectangular spiral coil patterns 4a and 5a. The inner peripheral ends of the coil patterns 4a ad 5a on the front and back surfaces are connected together by a conductor 6 shaHm in Fig. 1. An LC series resonance circuit is formed by an inductance due to the coil patterns 4a, 5a and by a capacitance due to the capacitor patterns 4b, 5b facing thereto via the dielectric film 2.
The resonance frequency of the LC resonance tag 1 varies depending upon the numbers of turns of the coil patterns 4a, 5a and the areas of the capacitor patterns 4b, 5b, and many kinds of LC resonance tags having different resonance frequencies are prepared and used in a range of a short wave band up to an ultrashort wave band. The conductors 4 and 5 are formed by etching, by printing an electrically conducting paste or by the like means. As the dielectric film 2, there can be used PP (polypropylene), PET (polyethylene terephthalatej or PI
(polyimidej. As the adhesive 3, there can be preferably used a material having a dielectric constant nearly equal to that of the dielectric film 2.
Fig. 3 illustrates the constitution of circuit blocks of the reflected wave scanner 11, in which the output of a VCO
13 controlled by a sequence control unit 12 is amplified through a transmission amplifier 14, and is transmitted frown a transmission antenna 15. Here, the frequency band that is used is from a short wave band through up to an ultrashort wave band, and the scanning of a preset frequency band is repeated at a regular scanning interval.
When the transmitted waves are reflected by an LC
resonance tag 1 that resonances with a given frequency in the sweeping frequency band of the reflected wave scanner 11, then, the reflected waves fall on a reception antenna 16. The received waves are amplified through a reception amplifier 17 and are input to a phase comnparator 18 together with the output of the transmission amplifier 14. The output of the phase comparator 18 is sampled by an A/D converter 19 in synchronism with the reference clocks. The received waveform data from which noise is removed and which are binary-coded, are written into a memory in the sequence control unit 12.
Sweeping frequency band data, scan interval data and waveform pattern-analyzing program are stored in the memory of the sequence control unit 12. The sequence control unit 12 has a comparing/analyzing function based on a pattern matching method that is widely used in a field of image processing, and collates the reference waveform pattern data with the received waveform pattern data. Based on the result of comparing and analyzing the reflected waves, the sequence control unit 12 sends, to the host computer, the data that are related to the LC
resonance tag.
Next, described blow is the operation of the reflected wave scanner 11. Here, the transmission frequency band of the reflected wave scanner is divided into ten channels, and ten kinds of LC resonance tags are used having resonance frequencies lying nearly at the centers of the bands of the channels.
The reflected wave scanner successively scans the frequency bands of from CH-1 (channel 1) through up to CH-10 (channel 10) shown in Fig. 41~. Each channel is constituted, as shown in Fig. 4~, by frequency bands of 17 steps (fn00 to fnl6 (n = 1, 2, ---, 10)). The frequency is changed stepwise like 5.00 MHz, 5.01 MHz, 5.02 MHz, 5.03 MHz, --- by controlling the sequence control unit, in order to sweep each channel in 17 steps.
As shown in Fig. 4(>3, further, every frequency fn(i) of 17 steps is transmitted for a predetermined period of time T2 (several microseconds). In order to cope with noise, every frequency fn(i) is intermittently and repetitively transmitted a plurality of times maintaining a repeating timing T1 (several tens of microseconds) and, then, a frequency fn (i+1) of the next step is transmitted.
Fig. 4~ illustrates the timing of a transmission output gate, wherein A represents the waveform of electr~nagnetic waves transmitted from the transmission antenna, and B represents the waveform input to the reception antenna when the LC resonance tag does not exist in the sensitive region of the reception antenna.
On the other hand, when the LC resonance tag that resonates with the frequency of the transmitted electromagnetic waves exists in the sensitive region of the antenna, echo waves of the LC resonance tag are superposed on the electromagnetic waves directly arriving at the reception antenna from the transmission antenna thereby to form a waveform as represented by C.
In a section P1 (transmission time), in this case, the phase differs between B and C with respect to the transmission waveform denoted by A (A - B ~ A - C). In C, further, echo waves delayed by the LC resonance tag are recognized in a section P2 that follows the section P1.
A pattern of resonance levels shown in Fig. 5 is obtained if the reception level of the delayed portion (P2) of the echo wave only at the same frequency transmitted a plural number of times maintaining a predetermined timing is accumulated and if the reception levels of echo waves at respective frequencies (fn0 to fnl6) in each channel are subjected to the A/D conversion and are sampled.
The reflected wave scanner repeats the transmission of the same frequency fn(i) to remove white noise and impulsive noise, and specifies the frequency channel of the LC resonance tag when a phase difference of C from B is recognized in the section P1 like in C, and when a resonance level pattern in the section P2 satisfies the sharpness of resonance based on dl and d2 in Fig. 5 and satisfies a predetermined value.in an error allowable range for the design frequency denoted by d3. Then, the reflected wave scanner sends the data related to the LC
resonance tag to the host computer.
In the case of a system in which the kinds of the LC
resonance tags are ten as described above, and one kind of the LC resonance tag among the LC resonance tags of 10 kinds is stuck to an object, the number of kinds that can be identified is ten. In the case of a system in which five kinds of the LC
resonance tags among ten channels of the LC resonance tags are stuck in co~bination to the object, the number of kinds that can be identified is loC5 = 252 according to the formula of coanbination of permutations. When any six channels among 42 channels are c~bined, the number of kinds that can be identified 1S 42C6 = 5,245,786. By increasing the transmission/reception channels and the frequency channels of the LC resonance tags as required, the number of kinds that can be identified can be increased nearly infinitely.
Next, described below is a software installation managing system based on the above-mentioned security key system. Referring to Fig. 6, the reflected wave scanner 11 is connected to a universal system bus (USB) of a personal computer 21 through a USB cable 22, and is controlled by an OS of the personal computer 21. The personal computer 21 sends a security data control signal to the reflected wave scanner 11 which, then, sends check digit data based on the waves reflected by the LC resonance tag to the personal computer 21. A plurality of LC
resonance tags 1 are attached to a CD case 23 of the CD-ROM
which is a package software to place it on the market, the LC
resonance tags 1 being used as means for generating check digits for compensating the serial ID key data of the CD-ROM.
When the CD case 23 is placed on the reflected wave scanner 11 at the time of installing the software, the reflected wave scanner 11 detects the waves reflected by the LC resonance tags 1 as described above, and check digits corresponding to the reflected waves are sent to the personal computer 21.
The means for forming check digits may,find the check digits from the resonance frequency of the LC resonance tags or from the reflected wave pattern data thereof according to a check digit-calculation formula like a bar-code system, or may form the check digits by making a reference to a check digit data table, or may find the check digits based on the combination thereof without any particular limitation.
The installer of OS of the personal computer 21 executes the installation of the software upon confirming the ID
key data of the CD-ROM and the check digits produced by the reflected wave scanner.
After the installation has been finished, the installer of the OS peels an LC resonance tag 1 off the CD case 23 or displays a message instructing a change in the position for sticking the LC resonance tag 1. As the user peels the LC
resonance tag 1 off according to the instruction, the reflected wave scanner 11 detects the reflected waves of a changed pattern. The installation is completed when it is confirmed that the output data are those as instructed. When the LC
resonance tag is to be peeled off, further, the LC resonance tag may be formed integrally with a postcard for registering the user, to prevent the deed of illegal copying without mistake.
For version-up of the software, an LC resonance tag for version-up is delivered. If the LC resonance tag is stuck to a predetermined position of the CD case 23 and is placed on the reflected wave scanner 11, check digits for the version-up are read out through the reflected wave scanner 11 to accomplish the version-up processing. In the case of the on-line version-up, the peeling of LC resonance tag 1 or a change in the sticking position is instructed on-line, and the version-up processing is executed when the output data of the reflected wave scanner 11 have changed as instructed.
Fig. 7 illustrates an on-line sales system of fee-charging program delivery media such as music and movies, and where a ticket 24 containing the LC resonance tag 1 that serves as a security key is sold, or the thicket is sold being attached to a magazine or a book. Charge for purchasing the music data can be included in the price of the ticket or in the price of the magazine. Or, the charge can be settled on-line from the user's account when the data are downloaded.
When the ticket 24 is set to the reflected wave scanner ll, check digits obtained from the LC resonance tag 1 of the ticket 24 serve as a key for unsealing the content of the fee-charging program delivery media on the Internet. Then, the management data such as electronic watermark data included in the desired music program data are collated with the check digits of the LC resonance tag 1. When the result of collation is OR, a predetermined LC resonance tag is peeled off according to the instruction from the ticket 24 on which a plurality of LC
resonance tags 1 have been stuck. After it is confirmed by the reflected wave scanner 11 that the LC resonance tag has been peeled off, music data are downloaded onto the personal computer and are written into a solid memory-type reproducing unit 25 exclusively for the delivered media. A thin LC resonance tag deforms after it is once peeled off. Even when adhered to the ticket again, therefore, the frequency characteristics undergo a change. Therefore, the LC resonance tag loses the function of the security key and hence cannot be reused.
Further, the reflected wave scanner 11 may be provided with a ticket insertion port, the interior of the ticket insertion port may be provided with means for destroying the LC
resonance tag by a laser beam or punching or may be provided with means for changing the resonance frequency so that, in the case of a ticket which is valid only one time, the LC resonance tag of the ticket is destroyed so that the ticket can be no longer used after having confirmed the check digits of the ticket inserted in the ticket insertion port and, in the case of a ticket which is valid for a plurality of times, one LC
resonance tag is destroyed among the plurality of LC resonance tags to change the resonance frequency, thereby to confirm the number of usable times by the reflected waves and to manage the number of times the ticket can be used.
It needs not be pointed out that the security key system of the invention can be applied as a system for preventing the deed of copying a computer game software and can be applied as a security key system for a prepaid system such as a fee-charging reading system of the Internet. Further, the invention is in no way limited to the above-mentioned embodiments only but can be modified in a variety of ways within the technical scope of the invention. It should therefore be noted that the invention encompasses even those modified embodiments, as a matter of course.
As described above, the security key system of the invention uses the LC resonance tag as a security key, and is less expensive than such security keys as IC card and magnetic card, and is little affected by the external environment and, hence, stable operation can be expected. Further, it is very difficult to copy the LC resonance tag itself, and great effect is exhibited in preventing the deed of illegally copying the softwares and in maintaining security for the on-line communications.
The object of this invention is to solve the above assignment.
The present invention was proposed in order to accomplish the above-mentioned object, and provides a security key system, comprising:
an LC resonance tag constituting an LC resonance circuit by forming an electrically conducting spiral pattern on one surface or on both surfaces of a dielectric film; and a reflected wave scanner which transmits sweeping electromagnetic waves from a frequency sweeping transmitter, compares the waveforms received by a receiver with the transmitted waveforms, and detects the presence of the LC
resonance tag in the transmission electric field and the resonance frequency of the LC resonance tag based upon the result of comparison;
the reflected wave scanner being connected to a personal computer, and the security of the computer being managed by using, as a security key, the waves reflected by the LC resonance tag and detected by the reflected wave scanner;
wherein the LC resonance tag is attached to a package software such as Cd-ROM or ROM cartridge, check digit data are formed in connection with the frequency of the waves reflected by the LC
resonance tag detected by the reflected wave scanner or in connection with a frequency spectrum pattern thereof, the ID key data of the package software are collated with the check digit data, and the installation, copying and rewriting of data of the software are permitted or inhibited relying upon the result of collation.
The invention further provides a security key system, wherein check digit data are formed in connection with the frequency of the waves reflected by the LC resonance tag that is delivered or sold or in connection with the frequency spectrum pattern thereof, the ID key data of a particular content on the on-line network are collated with the check digit data, and the access to the content and the do~mloading of the data are permitted or inhibited relying upon the result of collation.
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1 is a sectional view of an LC resonance tag;
Fig. 2 illustrates the LC resonance tag, wherein Fig.
2(a) is a plan view showing an electrically conducting pattern on the front surface, Fig. 2(b) is a plan view showing an electrically conducting pattern on the back surface, and Fig.
2(c) is a view illustrating a positional relationship between the. electrically conducting patterns on the front and back surfaces;
Fig. 3 is a block diagram of a reflected wave scanner circuit;
Fig. 4 is a timing chart illustrating the scanning operation of the reflected wave scanner;
Fig. 5 is a graph illustrating a waveform pattern drawn by sampling the echo waves of the LC resonance tag;
Fig. 6 is a view of a software installation managing system; and Fig. 7 is a view of a fee-charging on-line data delivering system.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
An embodiment of the invention will now be described in detail. The security key system of the invention is constituted by a reflected wave scanner connected to a personal computer and an LC resonance tag.
Fig. 1 shows an LC resonance tag 1 having patterns formed on both surfaces, as an example of the LC resonance tag, which is in the form of a thin sheet formed by adhering metallic electric conductors 4 and 5 on both surfaces of a dielectric film 2 via an adhesive 3. Referring to Figs. 2(a), 2(b) and 2(c), the conductors 4 and 5 on both surfaces of the LC
resonance tag 1 have capacitor patterns 4b and 5b of relatively large areas continuous to the outer ends of rectangular spiral coil patterns 4a and 5a. The inner peripheral ends of the coil patterns 4a ad 5a on the front and back surfaces are connected together by a conductor 6 shaHm in Fig. 1. An LC series resonance circuit is formed by an inductance due to the coil patterns 4a, 5a and by a capacitance due to the capacitor patterns 4b, 5b facing thereto via the dielectric film 2.
The resonance frequency of the LC resonance tag 1 varies depending upon the numbers of turns of the coil patterns 4a, 5a and the areas of the capacitor patterns 4b, 5b, and many kinds of LC resonance tags having different resonance frequencies are prepared and used in a range of a short wave band up to an ultrashort wave band. The conductors 4 and 5 are formed by etching, by printing an electrically conducting paste or by the like means. As the dielectric film 2, there can be used PP (polypropylene), PET (polyethylene terephthalatej or PI
(polyimidej. As the adhesive 3, there can be preferably used a material having a dielectric constant nearly equal to that of the dielectric film 2.
Fig. 3 illustrates the constitution of circuit blocks of the reflected wave scanner 11, in which the output of a VCO
13 controlled by a sequence control unit 12 is amplified through a transmission amplifier 14, and is transmitted frown a transmission antenna 15. Here, the frequency band that is used is from a short wave band through up to an ultrashort wave band, and the scanning of a preset frequency band is repeated at a regular scanning interval.
When the transmitted waves are reflected by an LC
resonance tag 1 that resonances with a given frequency in the sweeping frequency band of the reflected wave scanner 11, then, the reflected waves fall on a reception antenna 16. The received waves are amplified through a reception amplifier 17 and are input to a phase comnparator 18 together with the output of the transmission amplifier 14. The output of the phase comparator 18 is sampled by an A/D converter 19 in synchronism with the reference clocks. The received waveform data from which noise is removed and which are binary-coded, are written into a memory in the sequence control unit 12.
Sweeping frequency band data, scan interval data and waveform pattern-analyzing program are stored in the memory of the sequence control unit 12. The sequence control unit 12 has a comparing/analyzing function based on a pattern matching method that is widely used in a field of image processing, and collates the reference waveform pattern data with the received waveform pattern data. Based on the result of comparing and analyzing the reflected waves, the sequence control unit 12 sends, to the host computer, the data that are related to the LC
resonance tag.
Next, described blow is the operation of the reflected wave scanner 11. Here, the transmission frequency band of the reflected wave scanner is divided into ten channels, and ten kinds of LC resonance tags are used having resonance frequencies lying nearly at the centers of the bands of the channels.
The reflected wave scanner successively scans the frequency bands of from CH-1 (channel 1) through up to CH-10 (channel 10) shown in Fig. 41~. Each channel is constituted, as shown in Fig. 4~, by frequency bands of 17 steps (fn00 to fnl6 (n = 1, 2, ---, 10)). The frequency is changed stepwise like 5.00 MHz, 5.01 MHz, 5.02 MHz, 5.03 MHz, --- by controlling the sequence control unit, in order to sweep each channel in 17 steps.
As shown in Fig. 4(>3, further, every frequency fn(i) of 17 steps is transmitted for a predetermined period of time T2 (several microseconds). In order to cope with noise, every frequency fn(i) is intermittently and repetitively transmitted a plurality of times maintaining a repeating timing T1 (several tens of microseconds) and, then, a frequency fn (i+1) of the next step is transmitted.
Fig. 4~ illustrates the timing of a transmission output gate, wherein A represents the waveform of electr~nagnetic waves transmitted from the transmission antenna, and B represents the waveform input to the reception antenna when the LC resonance tag does not exist in the sensitive region of the reception antenna.
On the other hand, when the LC resonance tag that resonates with the frequency of the transmitted electromagnetic waves exists in the sensitive region of the antenna, echo waves of the LC resonance tag are superposed on the electromagnetic waves directly arriving at the reception antenna from the transmission antenna thereby to form a waveform as represented by C.
In a section P1 (transmission time), in this case, the phase differs between B and C with respect to the transmission waveform denoted by A (A - B ~ A - C). In C, further, echo waves delayed by the LC resonance tag are recognized in a section P2 that follows the section P1.
A pattern of resonance levels shown in Fig. 5 is obtained if the reception level of the delayed portion (P2) of the echo wave only at the same frequency transmitted a plural number of times maintaining a predetermined timing is accumulated and if the reception levels of echo waves at respective frequencies (fn0 to fnl6) in each channel are subjected to the A/D conversion and are sampled.
The reflected wave scanner repeats the transmission of the same frequency fn(i) to remove white noise and impulsive noise, and specifies the frequency channel of the LC resonance tag when a phase difference of C from B is recognized in the section P1 like in C, and when a resonance level pattern in the section P2 satisfies the sharpness of resonance based on dl and d2 in Fig. 5 and satisfies a predetermined value.in an error allowable range for the design frequency denoted by d3. Then, the reflected wave scanner sends the data related to the LC
resonance tag to the host computer.
In the case of a system in which the kinds of the LC
resonance tags are ten as described above, and one kind of the LC resonance tag among the LC resonance tags of 10 kinds is stuck to an object, the number of kinds that can be identified is ten. In the case of a system in which five kinds of the LC
resonance tags among ten channels of the LC resonance tags are stuck in co~bination to the object, the number of kinds that can be identified is loC5 = 252 according to the formula of coanbination of permutations. When any six channels among 42 channels are c~bined, the number of kinds that can be identified 1S 42C6 = 5,245,786. By increasing the transmission/reception channels and the frequency channels of the LC resonance tags as required, the number of kinds that can be identified can be increased nearly infinitely.
Next, described below is a software installation managing system based on the above-mentioned security key system. Referring to Fig. 6, the reflected wave scanner 11 is connected to a universal system bus (USB) of a personal computer 21 through a USB cable 22, and is controlled by an OS of the personal computer 21. The personal computer 21 sends a security data control signal to the reflected wave scanner 11 which, then, sends check digit data based on the waves reflected by the LC resonance tag to the personal computer 21. A plurality of LC
resonance tags 1 are attached to a CD case 23 of the CD-ROM
which is a package software to place it on the market, the LC
resonance tags 1 being used as means for generating check digits for compensating the serial ID key data of the CD-ROM.
When the CD case 23 is placed on the reflected wave scanner 11 at the time of installing the software, the reflected wave scanner 11 detects the waves reflected by the LC resonance tags 1 as described above, and check digits corresponding to the reflected waves are sent to the personal computer 21.
The means for forming check digits may,find the check digits from the resonance frequency of the LC resonance tags or from the reflected wave pattern data thereof according to a check digit-calculation formula like a bar-code system, or may form the check digits by making a reference to a check digit data table, or may find the check digits based on the combination thereof without any particular limitation.
The installer of OS of the personal computer 21 executes the installation of the software upon confirming the ID
key data of the CD-ROM and the check digits produced by the reflected wave scanner.
After the installation has been finished, the installer of the OS peels an LC resonance tag 1 off the CD case 23 or displays a message instructing a change in the position for sticking the LC resonance tag 1. As the user peels the LC
resonance tag 1 off according to the instruction, the reflected wave scanner 11 detects the reflected waves of a changed pattern. The installation is completed when it is confirmed that the output data are those as instructed. When the LC
resonance tag is to be peeled off, further, the LC resonance tag may be formed integrally with a postcard for registering the user, to prevent the deed of illegal copying without mistake.
For version-up of the software, an LC resonance tag for version-up is delivered. If the LC resonance tag is stuck to a predetermined position of the CD case 23 and is placed on the reflected wave scanner 11, check digits for the version-up are read out through the reflected wave scanner 11 to accomplish the version-up processing. In the case of the on-line version-up, the peeling of LC resonance tag 1 or a change in the sticking position is instructed on-line, and the version-up processing is executed when the output data of the reflected wave scanner 11 have changed as instructed.
Fig. 7 illustrates an on-line sales system of fee-charging program delivery media such as music and movies, and where a ticket 24 containing the LC resonance tag 1 that serves as a security key is sold, or the thicket is sold being attached to a magazine or a book. Charge for purchasing the music data can be included in the price of the ticket or in the price of the magazine. Or, the charge can be settled on-line from the user's account when the data are downloaded.
When the ticket 24 is set to the reflected wave scanner ll, check digits obtained from the LC resonance tag 1 of the ticket 24 serve as a key for unsealing the content of the fee-charging program delivery media on the Internet. Then, the management data such as electronic watermark data included in the desired music program data are collated with the check digits of the LC resonance tag 1. When the result of collation is OR, a predetermined LC resonance tag is peeled off according to the instruction from the ticket 24 on which a plurality of LC
resonance tags 1 have been stuck. After it is confirmed by the reflected wave scanner 11 that the LC resonance tag has been peeled off, music data are downloaded onto the personal computer and are written into a solid memory-type reproducing unit 25 exclusively for the delivered media. A thin LC resonance tag deforms after it is once peeled off. Even when adhered to the ticket again, therefore, the frequency characteristics undergo a change. Therefore, the LC resonance tag loses the function of the security key and hence cannot be reused.
Further, the reflected wave scanner 11 may be provided with a ticket insertion port, the interior of the ticket insertion port may be provided with means for destroying the LC
resonance tag by a laser beam or punching or may be provided with means for changing the resonance frequency so that, in the case of a ticket which is valid only one time, the LC resonance tag of the ticket is destroyed so that the ticket can be no longer used after having confirmed the check digits of the ticket inserted in the ticket insertion port and, in the case of a ticket which is valid for a plurality of times, one LC
resonance tag is destroyed among the plurality of LC resonance tags to change the resonance frequency, thereby to confirm the number of usable times by the reflected waves and to manage the number of times the ticket can be used.
It needs not be pointed out that the security key system of the invention can be applied as a system for preventing the deed of copying a computer game software and can be applied as a security key system for a prepaid system such as a fee-charging reading system of the Internet. Further, the invention is in no way limited to the above-mentioned embodiments only but can be modified in a variety of ways within the technical scope of the invention. It should therefore be noted that the invention encompasses even those modified embodiments, as a matter of course.
As described above, the security key system of the invention uses the LC resonance tag as a security key, and is less expensive than such security keys as IC card and magnetic card, and is little affected by the external environment and, hence, stable operation can be expected. Further, it is very difficult to copy the LC resonance tag itself, and great effect is exhibited in preventing the deed of illegally copying the softwares and in maintaining security for the on-line communications.
Claims (2)
1. A security key system, comprising:
an LC resonance tag constituting an LC resonance circuit by foaming an electrically conducting spiral pattern on one surface or on both surfaces of a dielectric film; and a reflected wave scanner which transmits sweeping electromagnetic waves from a frequency sweeping transmitter, compares the waveforms received by a receiver with the transmitted waveforms, and detects the presence of the LC
resonance tag in the transmission electric field and the resonance frequency of the LC resonance tag based upon the result of comparison;
the reflected wave scanner being connected to a personal computer, and the security of the computer being managed by using, as a security key, the waves reflected by the LC resonance tag and detected by the reflected wave scanner;
wherein the LC resonance tag is attached to a package software such as Cd-ROM or ROM cartridge, check digit data are formed in connection with the frequency of the waves reflected by the LC
resonance tag detected by the reflected wave scanner or in connection with a frequency spectrum pattern thereof, the ID key data of the package software are collated with the check digit data, and the installation, copying and rewriting of data of the software are permitted or inhibited relying upon the result of collation.
an LC resonance tag constituting an LC resonance circuit by foaming an electrically conducting spiral pattern on one surface or on both surfaces of a dielectric film; and a reflected wave scanner which transmits sweeping electromagnetic waves from a frequency sweeping transmitter, compares the waveforms received by a receiver with the transmitted waveforms, and detects the presence of the LC
resonance tag in the transmission electric field and the resonance frequency of the LC resonance tag based upon the result of comparison;
the reflected wave scanner being connected to a personal computer, and the security of the computer being managed by using, as a security key, the waves reflected by the LC resonance tag and detected by the reflected wave scanner;
wherein the LC resonance tag is attached to a package software such as Cd-ROM or ROM cartridge, check digit data are formed in connection with the frequency of the waves reflected by the LC
resonance tag detected by the reflected wave scanner or in connection with a frequency spectrum pattern thereof, the ID key data of the package software are collated with the check digit data, and the installation, copying and rewriting of data of the software are permitted or inhibited relying upon the result of collation.
2. A security key system, comprising:
an LC resonance tag constituting an LC resonance circuit by forming an electrically conducting spiral pattern on one surface or on both surfaces of a dielectric film; and a reflected wave scanner which transmits sweeping electromagnetic waves from a frequency sweeping transmitter, compares the waveforms received by a receiver with the transmitted waveforms, and detects the presence of the LC
resonance tag in the transmission electric field and the resonance frequency of the LC resonance tag based upon the result of comparison;
the reflected wave scanner being connected to a personal computer, and the security of the computer being managed by using, as a security key, the waves reflected by the LC resonance tag and detected by the reflected wave scanner;
wherein, check digit data are formed in connection with the frequency of the waves reflected by the LC resonance tag that is delivered or sold or in connection with the frequency spectrum pattern thereof, the ID key data of a particular content on the on-line network are collated with the check digit data, and the access to the content and the downloading of the data are permitted or inhibited relying upon the result of collation.
an LC resonance tag constituting an LC resonance circuit by forming an electrically conducting spiral pattern on one surface or on both surfaces of a dielectric film; and a reflected wave scanner which transmits sweeping electromagnetic waves from a frequency sweeping transmitter, compares the waveforms received by a receiver with the transmitted waveforms, and detects the presence of the LC
resonance tag in the transmission electric field and the resonance frequency of the LC resonance tag based upon the result of comparison;
the reflected wave scanner being connected to a personal computer, and the security of the computer being managed by using, as a security key, the waves reflected by the LC resonance tag and detected by the reflected wave scanner;
wherein, check digit data are formed in connection with the frequency of the waves reflected by the LC resonance tag that is delivered or sold or in connection with the frequency spectrum pattern thereof, the ID key data of a particular content on the on-line network are collated with the check digit data, and the access to the content and the downloading of the data are permitted or inhibited relying upon the result of collation.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP11-208269 | 1999-07-22 | ||
JP11208269A JP2001034468A (en) | 1999-07-22 | 1999-07-22 | Security system |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2300544A1 true CA2300544A1 (en) | 2001-01-22 |
Family
ID=16553456
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002300544A Abandoned CA2300544A1 (en) | 1999-07-22 | 2000-03-07 | Security key system |
Country Status (8)
Country | Link |
---|---|
JP (1) | JP2001034468A (en) |
KR (1) | KR20010020651A (en) |
CN (1) | CN1282027A (en) |
CA (1) | CA2300544A1 (en) |
DE (1) | DE10035380A1 (en) |
FR (1) | FR2796737A1 (en) |
GB (1) | GB2353920B (en) |
IT (1) | IT1320003B1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100436234B1 (en) * | 2001-09-18 | 2004-06-16 | 김동환 | The prevention method of program's illegal reproduction and the apparatus for thereof |
WO2012014975A1 (en) | 2010-07-29 | 2012-02-02 | 株式会社村田製作所 | Resonant circuit and antenna device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4583099A (en) * | 1983-12-27 | 1986-04-15 | Polyonics Corporation | Resonant tag circuits useful in electronic security systems |
SE450057B (en) * | 1984-11-20 | 1987-06-01 | Saab Automation Ab | IDENTITY ISSUES FOR IDENTIFICATION OF FORMAL |
US4794470A (en) * | 1986-06-25 | 1988-12-27 | Media Security Incorporated And Associates | Security system for protecting information |
US5081446A (en) * | 1990-09-24 | 1992-01-14 | Checkpoint Systems, Inc. | Security tag for compact disc storage container |
-
1999
- 1999-07-22 JP JP11208269A patent/JP2001034468A/en active Pending
-
2000
- 2000-03-07 CA CA002300544A patent/CA2300544A1/en not_active Abandoned
- 2000-03-09 KR KR1020000011693A patent/KR20010020651A/en not_active Application Discontinuation
- 2000-03-31 IT IT2000TO000304A patent/IT1320003B1/en active
- 2000-04-14 CN CN00105859.2A patent/CN1282027A/en active Pending
- 2000-05-08 GB GB0011103A patent/GB2353920B/en not_active Expired - Fee Related
- 2000-06-14 FR FR0007560A patent/FR2796737A1/en not_active Withdrawn
- 2000-07-20 DE DE10035380A patent/DE10035380A1/en not_active Withdrawn
Also Published As
Publication number | Publication date |
---|---|
CN1282027A (en) | 2001-01-31 |
JP2001034468A (en) | 2001-02-09 |
DE10035380A1 (en) | 2001-02-01 |
GB2353920A (en) | 2001-03-07 |
ITTO20000304A0 (en) | 2000-03-31 |
GB2353920B (en) | 2001-10-03 |
GB0011103D0 (en) | 2000-06-28 |
IT1320003B1 (en) | 2003-11-12 |
ITTO20000304A1 (en) | 2001-10-01 |
FR2796737A1 (en) | 2001-01-26 |
KR20010020651A (en) | 2001-03-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6094133A (en) | Method of displaying information by using an LC resonance tag | |
EP1172754B1 (en) | IC card data communication method | |
AU2001234494A1 (en) | Apparatus and method for reading radio frequency identification transponders used for livestock identification and data collection | |
EP0855064A1 (en) | Remotely powered electronic tag and associated exciter/reader and related method | |
WO2008026692A1 (en) | Data carrier and data carrier system | |
HK1049088A1 (en) | Time validation system | |
EP2243190A1 (en) | Enhancing the efficiency of energy transfer to/from passive id circuits using ferrite cores | |
EP0424415A1 (en) | System for protecting digital equipment against remote access. | |
US20060097870A1 (en) | Radio frquency identification tag apparatus for tire in radio freqeuncy identification system | |
EP1189106A3 (en) | Recording sheet media package having radio frequency identification transponder | |
CA2761719A1 (en) | Methods and systems for validating code from a wireless device | |
CA2300544A1 (en) | Security key system | |
CA2302885A1 (en) | System for analyzing reflected waves and reflected wave scanner | |
JPH11175650A (en) | Information display method using lc resonance tag | |
SG104944A1 (en) | Electronic data interchange system, sales server, settlement server, terminal, sales method, settlement method, purchasing method and information recording medium storing information for realizing the | |
JP2003216710A (en) | Support system for judging authenticity/imitation of merchandise | |
JP2001307042A (en) | Electronic page for internet access and internet accessing method | |
KR20010075050A (en) | A contactless capacitive data transmission system and method | |
JP4312044B2 (en) | Object recognition method and object recognition apparatus | |
JP4808870B2 (en) | Control method of reader / writer for non-contact type IC card | |
Wyatt et al. | RFID Technology Selection for Waste Management Applications | |
JP2005352953A (en) | Lending system for user using mobile telephone in library system using ic tag | |
AU5765500A (en) | Apparatus and associated method for limiting access of information transferred between an electronic security device and a host device | |
AU2002320880A1 (en) | Chip card comprising an optical modulator and method for transmitting an item of information from a chip card | |
JP2001043328A (en) | Antenna destroying method for data receiving/sending recording body |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Discontinued |